1. ADAMSS.A. “The governance of cybersecurity” Tilburg University The Netherlands https://www.wodc.nl/binaries/2484‐volledige‐tekst_tcm28‐73672.pdf November2015.
2. A taxonomy of cyber‐harms: Defining the impacts of cyber‐attacks and understanding how they propagate;AGRAFIOTIS I.;Journal of Cybersecurity,2018
3. AICPA Description Criteria for Management's Description of the Entity's Cybersecurity Risk Management Program American Institute of Certified Public Accountants https://www.aicpa.org/interestareas/frc/assuranceadvisoryservices/downloadabledocuments/cybersecurity/description‐criteria.pdf 2017.
4. ANDERSONL.B.et al. A taxonomy for warfare simulation Military Operations Research Society Workshop report https://ia800105.us.archive.org/7/items/DTIC_ADA331305/DTIC_ADA331305.pdf 27 October1989.
5. Toward a taxonomy of secrets;ANONYMOUS;Cryptologic Quarterly,2001