1. Association of Chief Police Officers (2013). Online research and investigation [Online]. Available at: http://library.college.police.uk/docs/appref/online-research-and-investigation-guidance.pdf . Accessed May 2016
2. blue_beetle (2010). User-driven discontent [Online]. Available at: http://www.metafilter.com/95152/Userdriven-discontent#3256046 . Accessed April 2016
3. CESG (2015a) Principles of effective cyber security risk management [Online]. Available at: https://www.gov.uk/government/publications/principles-of-effective-cyber-security-risk-management/principles-of-effective-cyber-security-risk-management . Accessed April 2016
4. CESG (2015b) Principles of effective cyber security risk management—GOV.UK [Online]. Available at: https://www.gov.uk/government/publications/principles-of-effective-cyber-security-risk-management/principles-of-effective-cyber-security-risk-management . Accessed September 2015
5. CESG (n.d.) End user devices security and configuration guidance—GOV.UK [Online]. Available at: https://www.gov.uk/government/collections/end-user-devices-security-guidance . Accessed September 2015