1. Pegna, D. L. (2015). Big data sends cybersecurity back to the future. Retrieved June 15, 2015, from
http://www.computerworld.com/article/2893656/the-future-of-cybersecurity-big-data-and-data-science.html
.
2. Leedom, D. K. (2004). Analytic representation of sensemaking and kowledge management within a military C2 organization. Vienna, VA: Evidence Based Research Inc.
3. Ramanan, S. (2015). Top ten security breaches of 2015. Forbes.com. Retrieved from
http://www.forbes.com/sites/quora/2015/12/31/the-top-10-security-breaches-of-2015/#2f01eff01f76
.
4. (ISC)2 US Government Adviory Council Bureau. (2015). There were so many data breaches in 2015. Did we learn anything from them? Retrieved December 29, 2015, from
http://www.nextgov.com/technology-news/tech-insider/2015/12/there-were-so-many-data-breaches-2015-did-we-learn-anything-them/124780/
.
5. Cirilli, K. (2014). Home depot breach costs doubled target’s. Retrieved October 30, 2014, from
http://thehill.com/policy/finance/222340-home-depot-breach-costs-doubled-targets
.