1. Almutiry, O., Wills, G., Alwabel, A., Crowder, R., WaIters, R.: Toward a framework for data quality in cloud-based health information system. Paper presented at the International Conference on Information Society (i-Society 2013) (2013)
2. Ani, L.: aCybercrime and national security: the role of the penal and procedural law. Law and Security in Nigeria, 200–202 (2011)
3. Chen, D., Zhao, H.: Data Security and Privacy Protection Issues in Cloud Computing. Paper presented at the 2012 International Conference on Computer Science and Electronics Engineering (2012)
4. Goud, N.: Cyber Attack on Tower Semiconductor. Cybersecurity Insiders. http://www.cybersecurity-insiders.com/cyber-attack-on-tower-semiconductor/ (2020)
5. Kamara, S., Lauter, K.: Cryptographic cloud storage. Paper presented at the Proceedings of Financial Cryptography: Workshop on Real-Life Cryptographic Protocols and Standardization (2010)