1. Advantages to Disadvantages of Cloud Computing for Small-Sized Business
2. A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate
3. Maryam Nasser AL-Nuaimi. 2022. Human and contextual factors influencing cyber-security in organizations and implications for higher education institutions: a systematic review. Global Knowledge Memory and Communication ahead-of-print ahead-of-print (2022) ahead–of–print.
4. Catherine L Anderson and Ritu Agarwal. 2010. Practicing safe computing: A multimethod empirical examination of home computer user security behavioral intentions. MIS quarterly (2010), 613–643.
5. Manos Antonakakis, Tim April, Michael Bailey, Matt Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J. Alex Halderman, Luca Invernizzi, Michalis Kallitsis, Deepak Kumar, Chaz Lever, Zane Ma, Joshua Mason, Damian Menscher, Chad Seaman, Nick Sullivan, Kurt Thomas, and Yi Zhou. 2017. Understanding the Mirai Botnet. In 26th USENIX Security Symposium (USENIX Security 17). USENIX Association, Vancouver, BC, 1093–1110. https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/antonakakis