1. A survey of information security incident handling in the cloud
2. Ablon, L., Libicki, M. C., & Golay, A. A. (2014). Markets for Cybercrime Tools and Stolen Data. Retrieved August 16, 2016, from United States of America: http://www.rand.org/pubs/research_reports/RR610.html
3. Accenture. (2015). Fighting Financial Crime with Data. Retrieved August 10, 2016, from United Kingdom: https://www.accenture.com/t20160519T222110__w__/us-en/_acnmedia/Accenture/Conversion-Assets/DotCom/Documents/Global/PDF/Industries_6/Accenture-Fighting-Financial-Crime-with-Data.pdf
4. Accountants, C. (2014). Protecting our Cyber Future. Retrieved August 12, 2016, from Australia: https://charteredaccountantsanz.com/~/media/FutureInc/Pdfs/2014/FutureIncCyber%20Security.ashx
5. Actian. (2015). Under Siege: Combatting Cyb Analytics. Retrieved August 8, 2016, from http://www.actian.com/about-us/blog/siege-combatting-cyber-risk-big-data-analytics/