References
- Abrahams Nick, Griffin Jamie ‘Privacy law: The end of a long road: Mandatory data breach notification becomes law’ (2017) 32 Law Society of NSW Journal.
- Alhazmi Omar H., Malaiya Yashwant K., ‘Assessing disaster recovery alternatives: On-site, colocation or cloud’. Software Reliability Engineering Workshops (ISSREW), 2012 IEEE 23rd International Symposium on. IEEE.
- Chakraborty Nilotpal, ‘Intrusion detection system and intrusion prevention system: A comparative study’ (2013) International Journal of Computing and Business Research.
- Drozd, Olha, ‘Privacy pattern catalogue: A tool for integrating privacy principles of ISO/IEC 29100 into the software development process’ IFIP International Summer School on Privacy and Identity Management (Springer, Cham 2015).
- Fortiş, Teodor-Florin, Ion Munteanu Victor, ‘Topics in cloud incident management’ (2017).
- Humphreys Edward, Implementing the ISO/IEC 27001: 2013 ISMS Standard (Artech House 2016).
- Jun, Ma, et al., ‘The application of Chinese wall policy in data leakage prevention’. Communication Systems and Network Technologies (CSNT), 2012 International Conference on. IEEE.
- Maldoff Gabriel, ‘The risk-based approach in the GDPR: interpretation and implications’ IAPP https://iapp.org/media/pdf/resource_center/GDPR_Study_Maldoff.pdf.
- Malviya Rupali, Umrao Brajesh K, ‘Machine Learning Security’ (2014).
- Purohit, Bijayalaxmi, Pawan Prakash Singh, ‘Data leakage analysis on cloud computing’ (2013) 3.3. International Journal of Engineering Research and Applications.
- Routray Ramani Ranjan et al., ‘Method and system for automated integrated server-network-storage disaster recovery planning’ U.S. Patent No. 8,121,966. 21 Feb. 2012.
- Setiawan, Alexander, Wibowo Adi, Hartanto Susilo Andrew, ‘Risk Analysis on the development of a Business Continuity Plan’ Computer Applications and Information Processing Technology (CAIPT), 2017 4th International Conference on. IEEE.
- Sloan, Robert H., Warner Richard ‘How Much Should We Spend to Protect Privacy?: Data Breaches and the Need for Information We Do Not Have’ (2017).
- Sobel, William E., McCorkendale Bruce, ‘Restoration of backed up data by restoring incremental backup (s) in reverse chronological order’ U.S. Patent No. 7,802,134. 21 Sep. 2010.
- Verheul Eric, Jacobs Bart, ‘Polymorphic encryption and pseudonymisation in identity management and medical research’ (2017).
- Yod-Samuel Martin, Kung Antonio, ‘Methods and Tools for GDPR Compliance Through Privacy and Data Protection Engineering’ 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).