Aiello, C. (2018, March 30). Under Armour says data breach affected about 150 million MyFitnessPal accounts. Retrieved September 27, 2018, from https://www.cnbc.com/2018/03/29/under-armour-stock-falls-after-company-admits-data-breach.html
Abagail, A. (2015, August). Design and Validation of Information Security Culture Framework. Computers in Human Behavior, 49, pp. 567-575.10.1016/j.chb.2015.03.054
Basu, E. (2015). Forbes Welcome. Forbes.com. Retrieved 28 December 2016, from http://www.forbes.com/sites/ericbasu/2015/10/26/cybersecurity-lessons-learned-from-the-ashley-madison-hack/#4539c09aed99
Chaeikar, S., Jafari, M., Therdoost, H., & Kar, N. (2012). Definitions and Criteria of CIA Security Triangle in Electronic Voting System. International Journal of Advanced Computer Science and Information Technology, 1(1), 14-24. doi:2296-1739
Coty, S. (2014). The eBay breach explained. www.scmagazine.com. Retrieved 28 December 2016, from https://www.scmagazine.com/the-ebay-breach-explained/article/537762/2/
Doell, L. (2012). 10 Essential Cybersecurity Measures. OPEN Forum. Retrieved 28 December 2016, from https://www.americanexpress.com/us/small-business/openforum/articles/10-essential-cybersecurity-measures/
Goud, N. (2018, March 30). Over 150 million users of MyFitnessPal affected by Cyber Attack. Retrieved September 27, 2018, from https://www.cybersecurity-insiders.com/over-150-million-users-of-myfitnesspal-affected-by-cyber-attack/
Gomes, R., & Rebeiro, J. (2009). The Main Benefits of COBIT in a High Public Educational Institution - A Case Study. Pacific Asia Conference on Information Systems, 1-11. Retrieved from http://aisel.aisnet.org/pacis2009/88
Haviluddin, H., Anthony, P., & Alfred, R. (2012). The Utilization of COBIT Framework Within It Governance: A Study of Literature. The 2nd ACIKITA International Conference on Science and Technology (AICST), 1-8. doi:10.13140/2.1.3616.4160
McGee, M. (2018, June 1). Lawsuit Filed in Wake of Under Armour Data Breach. Retrieved September 27, 2018, from https://www.bankinfosecurity.com/lawsuit-filed-in-wake-under-armour-data-breach-a-11051
Omari, L. (2016). It Governance Evaluation: Adapting and Adopting The COBIT Framework for Public Sector Organizations (Ph.D.). The Queensland University of Technology.
Pagliery, J. (2015). The inside story of the biggest hack in history. CNNMoney. Retrieved 28 December 2016, from http://money.cnn.com/2015/08/05/technology/aramco-hack/
Rigby, J. (2015). Cybersecurity and Risk Management: Lead from the C-suite. Legacy.alixpartners.com. Retrieved 28 December 2016, from http://legacy.alixpartners.com/en/Publications/AllArticles/tabid/635/articleType/ArticleView/artcleId/1929/Cybersecurity-and-Risk-Management-Lead-from-the-C-suite.aspx#sthash.VyxzTPDI.dpbs
Schlarman, S. (2007, Feb). Selecting An IT Control Framework. EDPACS, pp. 11-17. Retrieved from http://search.proquest.com.ezproxy.trident.edu:2048/docview/234907576?pqorigsite=summon10.1080/07366980601148030
Von Solms, R. (1998). Information security management (1): why information security is so important. Information Management & Computer Security, 6(4), 174-177. doi:10.1108/eum000000000453310.1108/EUM0000000004533
White, S. (2017, December). What is COBIT? A framework for alignment and governance. Retrieved from https://www.cio.com/article/3243684/methodology-frameworks/what-is-cobit-a-framework-for-alignment-and-governance.html