1. Dhillon, G.: Information Security - Text & Cases Prospect Press, Burlington (2017)
2. Whitman, M.E.: Security policy - from design to maintenance. In: Straub, D.W., Goodman, S., Baskerville, R. (eds.) Information Security - Policy, Processes, and Practices, pp. 123–151. M E Sharpe, New York (2008)
3. PwC: The information security breaches survey - Technical report. Department for Business, Innovation and Skills (BIS) (2014)
4. PwC: The Global State of Information Security Survey 2018. PriceWaterhouseCoopers (2018)
5. ENISA: ENISA Threat Landscape 2014. Overview of current and emerging cyber-threats. European Union Agency for Network and Information Security (2014)