1.
Zobel J. Writing for computer science. 2nd ed. London: Springer; 2004.
2.
Warner M. Cybersecurity: A Pre-history. Intelligence and National Security. 2012 Oct;27(5):781–99.
3.
Subashini S, Kavitha V. A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications. 2011 Jan;34(1):1–11.
4.
Bonner L. Cyber Risk: How the 2011 Sony Data Breach and the Need for Cyber Risk Insurance Policies Should Direct the Federal Response to Rising Data Breaches. Washington University Journal of Law & Policy [Internet]. 2012;(40):257–78. Available from: http://ezproxy.lib.gla.ac.uk/login?url=http://heinonline.org/HOL/Page?public=false&handle=hein.journals/wajlp40&id=259
5.
Refsdal A, Solhaug B, Stølen K, SpringerLink (Online service). Cyber-risk management [Internet]. Vol. SpringerBriefs in computer science. Cham: Springer; 2015. Available from: http://ezproxy.lib.gla.ac.uk/login?url=http://link.springer.com/10.1007/978-3-319-23570-7
6.
Pfleeger SL, Cunningham RK. Why Measuring Security Is Hard. IEEE Security & Privacy Magazine. 2010 Jul;8(4):46–54.
7.
Wood CC. Writing infosec policies. Computers & Security. 1995 Jan;14(8):667–74.
8.
Arduini F, Morabito V. Business continuity and the banking industry. Communications of the ACM. 2010 Mar 1;53(3).
9.
Anderson R, Moore T. The Economics of Information Security. Science. 2006 Oct 27;314(5799):610–3.
10.
Saini V, Duan Q, Paruchuri V. Threat modeling using attack trees. Journal of Computing Sciences in Colleges [Internet]. 2008 Jan 4;23(4):124–31. Available from: http://ezproxy.lib.gla.ac.uk/login?url=http://dl.acm.org/citation.cfm?id=1352100
11.
Dipert RR. The Ethics of Cyberwarfare. Journal of Military Ethics. 2010 Dec;9(4):384–410.
12.
Webber M. The GDPR’s impact on the cloud service provider as a processor. Privacy & Data Protection [Internet]. 16(4). Available from: http://www.fieldfisher.com/media/3993765/the-gdprs-impact-on-the-cloud-service-provider-as-a-processor-mark-webber-privacy-data-protection.pdf
13.
Harnik D, Pinkas B, Shulman-Peleg A. Side Channels in Cloud Services: Deduplication in Cloud Storage. IEEE Security & Privacy Magazine. 2010 Nov;8(6):40–7.
14.
Meadows DH, Wright D. Thinking in systems: a primer. London: Earthscan; 2009.
15.
Griffor E. Handbook of system safety and security: cyber risk and risk management, cyber security, threat analysis, functional safety, software systems, and cyber physical systems [Internet]. Vol. Syngress advanced topics in information security. Cambridge, MA: Syngress; 2017. Available from: https://ezproxy.lib.gla.ac.uk/login?url=https://www.sciencedirect.com/science/book/9780128037737
16.
Ulsch NM. Cyber threat!: how to manage the growing risk of cyber attacks [Internet]. Vol. Wiley corporate F&A Series. Hoboken, New Jersey: Wiley; 2014. Available from: https://ezproxy.lib.gla.ac.uk/login?url=https://dx.doi.org/10.1002/9781118915028
17.
Barman S. Writing information security policies. Indianapolis, Ind: New Riders; 2002.
18.
Bayuk JL, Healey J, Rohmeyer P, Sachs MH, Schmidt J, Weiss J. Cyber security policy guidebook. Hoboken, New Jersey: John Wiley & Sons; 2012.
19.
Jaquith A. Security metrics: replacing fear, uncertainty, and doubt. Upper Saddle River, N.J.: Addison-Wesley; 2007.
20.
Trust in the Digital World and Cyber Security and Privacy EU Form. Cyber security and privacy: trust in the digital world and cyber security and privacy EU Forum 2013, Brussels, Belgium, April 2013, Revised selected papers [Internet]. Felici M, editor. Vol. Communications in Computer and Information Science. Heidelberg: Springer; 2013. Available from: https://ezproxy.lib.gla.ac.uk/login?url=https://dx.doi.org/10.1007/978-3-642-41205-9
21.
Kizza JM. Ethical and social issues in the information age [Internet]. 5. ed. 2013. Vol. Texts in Computer Science. London: Springer London; 2013. Available from: https://ezproxy.lib.gla.ac.uk/login?url=https://dx.doi.org/10.1007/978-1-4471-4990-3