References
- Morgan, S. (2015, November 24). IBM’s CEO On Hackers: ‘Cyber Crime Is The Greatest Threat To Every Company In The World’. Retrieved August 05, 2017, from https://www.forbes.com/sites/stevemorgan/2015/11/24/ibms-ceo-on-hackers-cyber-crime-is-the-greatest-threat-to-every-company-in-the-world/#75f85d3973f0
- Global Cost of Cybercrime Predicted to Hit $6 Trillion Annually By 2021, Study Says. (2016, August 16). Retrieved August 05, 2017, from http://www.darkreading.com/attacks-breaches/global-cost-of-cybercrime-predicted-to-hit-$6-trillion-annually-by-2021-study-says/d/d-id/1326742
- Cybersecurity Questions for CEOs. (n.d.). Retrieved August 5, 2017, from https://www.us-cert.gov/sites/default/files/publications/DHS-Cybersecurity-Questions-for-CEOs.pdf
- Fry, E. (2014, June 12). The 6 worst kinds of computer hackers. Retrieved August 05, 2017, from http://fortune.com/2013/02/26/the-6-worst-kinds-of-computer-hackers/
- M. (2016, October 24). 7 Types of Hacker Motivations. Retrieved August 05, 2017, from https://securingtomorrow.mcafee.com/consumer/family-safety/7-types-of-hacker-motivations/
- Enterprise Risk Management Consequence and Likelihood Tables. (n.d.). Retrieved August 6, 2017, from https://ppl.app.uq.edu.au/sites/default/files/Risk%20Consequence%20and%20Likelihood %20Table%20-%20Form.pdf
- Touhill, Gregory J., and C. Joseph Touhill. Cybersecurity for Executives, Wiley, 2014. ProQuest Ebook Central, https://ebookcentral.proquest.com/lib/columbia/detail.action?docID=1707094.
- Wheeler, E. (2011), Security Risk Management, Chapter 8, Risk Evaluation and Mitigation Strategies, Elsevier Inc.
- Institute, F. (n.d.). FAIR, an international standard by the Open Group. Retrieved August 08, 2017, from http://www.fairinstitute.org/an-international-standard
- Deinert, A. (2016), “Cybersecurity Breach Playbook: What Every IT Administrator Needs to Know”, Vantage Point Solutions, Mitchell, SD
- Framework for Improving Critical Infrastructure Cybersecurity. (n.d.). Retrieved August 8, 2017, from
- https://www.bing.com/cr?IG=46B942FD8FD04ED7A2EF4DE7E061BAE0&CID=18B3474BBA4361240BCE4D93BB45607D&rd=1&h=qHbOGImxzOpDg5E54Eh7p9I1gen0wVXVy1g-wVCQk6w&v=1&r=https%3a%2f%2fwww.nist.gov%2fdocument-3766&p=DevEx,5063.1
- Cichonski, P. R., Millar, T., Grance, T., & Scarfone, K. (2017, February 19). Computer Security Incident Handling Guide. Retrieved August 08, 2017, from https://www.nist.gov/publications/computer-security-incident-handling-guide
- Cichonski, P. R., Millar, T., Grance, T., & Scarfone, K. (2017, February 19). Computer Security Incident Handling Guide. Retrieved August 08, 2017, from https://www.nist.gov/publications/computer-security-incident-handling-guide
- NIST. (2014, February 12) Retrieved from https://www.nist.gov/sites/default/files/documents/cyberframework/cybersecurity-framework-021214.pdf
- Scholtz, T., McMillan, R. (2017, January 26). Institute Cybersecurity and Risk Governance Practices to Improve Information Security. Gartner.
- Kark, K., Francois, M., Aguas, T. (2016, July 25). The new CISO: Leading the strategic security organization. (n.d.). Retrieved August 09, 2017, from https://dupress.deloitte.com/dup-us-en/deloitte-review/issue-19/ciso-next-generation-strategic-security-organization.html
- Fry, E. (2014, June 12). The 6 worst kinds of computer hackers. Retrieved August 09, 2017, from http://fortune.com/2013/02/26/the-6-worst-kinds-of-computer-hackers/
- M. (2016, October 24). 7 Types of Hacker Motivations. Retrieved August 09, 2017, from https://securingtomorrow.mcafee.com/consumer/family-safety/7-types-of-hacker-motivations/
- https://www.us-cert.gov/sites/default/files/publications/DHS-Cybersecurity-Questions-for-CEOs.pdf
- https://www.forbes.com/sites/stevemorgan/2015/11/24/ibms-ceo-on-hackers-cyber-crime-is-the-greatest-threat-to-every-company-in-the-world/#bfb909373f07
- http://www.darkreading.com/attacks-breaches/global-cost-of-cybercrime-predicted-to-hit-$6-trillion-annually-by-2021-study-says/d/d-id/1326742
- G. Eason, B. Noble, and I. N. Sneddon, “On certain integrals of Lipschitz-Hankel type involving products of Bessel functions,” Phil. Trans. Roy. Soc. London, vol. A247, pp. 529–551, April 1955. (references)
- J. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd ed., vol. 2. Oxford: Clarendon, 1892, pp.68–73.
- I. S. Jacobs and C. P. Bean, “Fine particles, thin films and exchange anisotropy,” in Magnetism, vol. III, G. T. Rado and H. Suhl, Eds. New York: Academic, 1963, pp. 271–350.
- K. Elissa, “Title of paper if known,” unpublished.
- R. Nicole, “Title of paper with only first word capitalized,” J. Name Stand. Abbrev., in press.
- Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, “Electron spectroscopy studies on magneto-optical media and plastic substrate interface,” IEEE Transl. J. Magn. Japan, vol. 2, pp. 740–741, August 1987 [Digests 9th Annual Conf. Magnetics Japan, p. 301, 1982].
- M. Young, The Technical Writer’s Handbook. Mill Valley, CA: University Science, 1989.
- Electronic Publication: Digital Object Identifiers (DOIs): Article in a journal:
- D. Kornack and P. Rakic, “Cell Proliferation without Neurogenesis in Adult Primate Neocortex,” Science, vol. 294, Dec. 2001, pp. 2127-2130, doi:10.1126/science.1065467.
- H. Goto, Y. Hasegawa, and M. Tanaka, “Efficient Scheduling Focusing on the Duality of MPL Representatives,” Proc. IEEE Symp. Computational Intelligence in Scheduling (SCIS 07), IEEE Press, Dec. 2007, pp. 57-64, doi:10.1109/SCIS.2007.357670.