1. Duncan, Bob, and Mark Whittington. “Enhancing Cloud Security and Privacy: The Power and the Weakness of the Audit Trail.”Cloud Comput (2016): 125-130. Publisher: IARIA, ISBN: 978-1-61208-460-2
2. PWC, “UK Information Security Breaches Survey - Technical Report 2012,” PWC2012, Tech. Rep., April, 2012.
3. R. E. Crossler, A. C. Johnston, P. B. Lowry, Q. Hu, M. Warkentin, and R. Baskerville, “Future directions for behavioral information security research,” Comput. Secur., 2013, vol. 32, pp. 90-101.
4. G. T. Willingmyre, “Standards at the crossroads,” StandardView, vol. 5, no. 4, pp. 190-194, 1997.
5. Cisco, “2013 Cisco annual security report,” Cisco, Tech. Rep., 2013. [Online]. Available: http://grs.cisco.com/grsx/cust/grsCustomerSurvey.html?SurveyCode=4153 ad_id=US-BN-SEC-M-CISCOASECURITYRPT-ENT KeyCode=000112137 Last Accessed: 5 Jan 2017.