1. Buckley, S. (2011). IT Change Management. Internal Auditor. Retrieved from https://www.theiia.org/intAuditor/itaudit/2011-articles/it-change-management/
2. Carnegie Mellon University and The John Hopkins University Applied Physics Laboratory, LLC. (2020). Cybersecurity Maturity Model Certification (CMMC) v 1.02. Carnegie Mellon University and The John Hopkins University Applied Physics Laboratory, LLC.
3. Cavusoglu, H., Cavusoglu, H., & Zhang, J. (2004). Economics of Security Patch Management. Annual Workshop on the Economics of Information Security. Retrieved November 14, 2012, from http://ns2.honlab.dc.hu/~mfelegyhazi/courses/BMEVIHIAV15/readings/06_Cavasoglu2006security_patch.pdf
4. Choi, E. (2020, Jul 28). Business news: Garmin says hack disabled software. Wall Street Journal. Retrieved from http://lib-proxy.jsu.edu/login?url=https://www-proquest-com.lib-proxy.jsu.edu/newspapers/business-news-garmin-says-hack-disabled-software/docview/2427462869/se-2?accountid=11662