1. Albakri, A., Boiten, E., de Lemos, R.: Risks of sharing cyber incident information. In: 1st International Workshop on Cyber Threat Intelligence Management (CyberTIM) (2018, to appear)
2. Boiten, E.: What is the unit of security? (2016). FOSAD Summer School 2016.
http://www.sti.uniurb.it/events/fosad16/Programme.html
3. Brooks, S., Garcia, M., Lefkovitz, N., Lightman, S., Nadeau, E.: An introduction to privacy engineering and risk management in federal systems. Technical report NIST IR 8062, National Institute of Standards and Technology, Gaithersburg, MD, January 2017.
https://doi.org/10.6028/NIST.IR.8062
4. Calder, A., Watkins, S.: IT Governance: An International Guide to Data Security and ISO27001/ISO27002. Kogan Page, London (2015)
5. Cavoukian, A.: Privacy by design: the 7 foundational principles (2011).
https://www.ipc.on.ca/wp-content/uploads/Resources/7foundationalprinciples.pdf