1.
Zobel, J.: Writing for computer science. Springer, London (2004).
2.
Warner, M.: Cybersecurity: A Pre-history. Intelligence and National Security. 27, 781–799 (2012). https://doi.org/10.1080/02684527.2012.708530.
3.
Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications. 34, 1–11 (2011). https://doi.org/10.1016/j.jnca.2010.07.006.
4.
Bonner, L.: Cyber Risk: How the 2011 Sony Data Breach and the Need for Cyber Risk Insurance Policies Should Direct the Federal Response to Rising Data Breaches. Washington University Journal of Law & Policy. 257–278 (2012).
5.
Refsdal, A., Solhaug, B., Stølen, K., SpringerLink (Online service): Cyber-risk management. Springer, Cham (2015).
6.
Pfleeger, S.L., Cunningham, R.K.: Why Measuring Security Is Hard. IEEE Security & Privacy Magazine. 8, 46–54 (2010). https://doi.org/10.1109/MSP.2010.60.
7.
Wood, C.C.: Writing infosec policies. Computers & Security. 14, 667–674 (1995). https://doi.org/10.1016/0167-4048(96)81706-8.
8.
Arduini, F., Morabito, V.: Business continuity and the banking industry. Communications of the ACM. 53, (2010). https://doi.org/10.1145/1666420.1666452.
9.
Anderson, R., Moore, T.: The Economics of Information Security. Science. 314, 610–613 (2006). https://doi.org/10.1126/science.1130992.
10.
Saini, V., Duan, Q., Paruchuri, V.: Threat modeling using attack trees. Journal of Computing Sciences in Colleges. 23, 124–131 (2008).
11.
Dipert, R.R.: The Ethics of Cyberwarfare. Journal of Military Ethics. 9, 384–410 (2010). https://doi.org/10.1080/15027570.2010.536404.
12.
Webber, M.: The GDPR’s impact on the cloud service provider as a processor. Privacy & Data Protection. 16,.
13.
Harnik, D., Pinkas, B., Shulman-Peleg, A.: Side Channels in Cloud Services: Deduplication in Cloud Storage. IEEE Security & Privacy Magazine. 8, 40–47 (2010). https://doi.org/10.1109/MSP.2010.187.
14.
Meadows, D.H., Wright, D.: Thinking in systems: a primer. Earthscan, London (2009).
15.
Griffor, E.: Handbook of system safety and security: cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems. Syngress, Cambridge, MA (2017).
16.
Ulsch, N.M.: Cyber threat!: how to manage the growing risk of cyber attacks. Wiley, Hoboken, New Jersey (2014).
17.
Barman, S.: Writing information security policies. New Riders, Indianapolis, Ind (2002).
18.
Bayuk, J.L., Healey, J., Rohmeyer, P., Sachs, M.H., Schmidt, J., Weiss, J.: Cyber security policy guidebook. John Wiley & Sons, Hoboken, New Jersey (2012).
19.
Jaquith, A.: Security metrics: replacing fear, uncertainty, and doubt. Addison-Wesley, Upper Saddle River, N.J. (2007).
20.
Trust in the Digital World and Cyber Security and Privacy EU Form: Cyber security and privacy: trust in the digital world and cyber security and privacy EU Forum 2013, Brussels, Belgium, April 2013, Revised selected papers. Springer, Heidelberg (2013).
21.
Kizza, J.M.: Ethical and social issues in the information age. Springer London, London (2013).