1. A. Anand, I. Walsh, Should knowledge be shared generously? Tracing insights from past to present and describing a model. J. Knowl. Manag. 20(4), 713–730 (2016). Retrieved from https://search-proquest-com.ezproxy2.apus.edu/docview/1826809620?accountid=8289
2. R.W. Breaux, E.W. Black, T. Newman, A guide to data protection and breach response-part 1. Intell. Prop. Technol. Law J. 26(7), 3–10 (2014)., 1. Retrieved from https://search-proquest-com.ezproxy2.apus.edu/docview/1541531465?accountid=8289
3. M. Ehrlich, Strengthening data breach protection. Risk Manage. 64(7), 10–11 (2017). Retrieved from https://search-proquest-com.ezproxy2.apus.edu/docview/1928357494?accountid=8289
4. Every Day Big Data Statistics (2015). Retrieved from http://www.vcloudnews.com/every-day-big-data-statistics-2-5-quintillion-bytes-of-data-created-daily/
5. S. Gressin, The Equifax Data Breach: What to Do (2017). Retrieved from https://www.consumer.ftc.gov/blog/2017/09/equifax-data-breach-what-do