1. On the collaborative practices of cyber threat intelligence analysts to develop and utilize tacit threat and defence knowledge;Ahrend,2016
2. Managing information security risks: the OCTAVE approach;Alberts,2003
3. It's about time: privacy, information life cycles, and the right to be forgotten;Ambrose;Stanford Technol Law Rev,2012
4. Cyber supply chain security practices DNA – filling in the puzzle using a diverse set of disciplines;Bartol;Technovation,2014