1. A comparative study on information security risk analysis methods;Journal of Computers,2017
2. AIRMIC, Alarm, IRM (2010), “A structured approach to enterprise risk management (ERM) and the requirements of ISO 31000”, available at: www.theirm.org/media/886062/ISO3100_doc.pdf
3. Improving risk assessment model of cyber security using fuzzy logic inference system;Computers and Security,2018
4. Andrews, C. (2016), “From the inside out: creating a holistic cybersecurity strategy for government”, GovLoop, December 2016. available at: www.govloop.com/resources/inside-creating-holistic-cybersecurity-strategy-government/
5. Bailey, T. Kaplan, J. and Rezek, C. (2014), “Why senior leaders are the front line against cyberattacks”, McKinsey Digital, June 2014. available at: www.mckinsey.com/business-functions/digital-McKinsey/our-insights/why-senior-leaders-are-the-front-line-against-cyberattacks