This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Morgan, S. (2015, November 24). IBM’s CEO On Hackers: ‘Cyber Crime Is The Greatest Threat To Every Company In The World’. Retrieved August 05, 2017, from https://www.forbes.com/sites/stevemorgan/2015/11/24/ibms-ceo-on-hackers-cyber-crime-is-the-greatest-threat-to-every-company-in-the-world/#75f85d3973f0MorganS.2015, November 24).Retrieved August 05, 2017, from https://www.forbes.com/sites/stevemorgan/2015/11/24/ibms-ceo-on-hackers-cyber-crime-is-the-greatest-threat-to-every-company-in-the-world/#75f85d3973f0Search in Google Scholar
Global Cost of Cybercrime Predicted to Hit $6 Trillion Annually By 2021, Study Says. (2016, August 16). Retrieved August 05, 2017, from http://www.darkreading.com/attacks-breaches/global-cost-of-cybercrime-predicted-to-hit-$6-trillion-annually-by-2021-study-says/d/d-id/13267422016, August 16). Retrieved August 05, 2017, from http://www.darkreading.com/attacks-breaches/global-cost-of-cybercrime-predicted-to-hit-$6-trillion-annually-by-2021-study-says/d/d-id/1326742Search in Google Scholar
Cybersecurity Questions for CEOs. (n.d.). Retrieved August 5, 2017, from https://www.us-cert.gov/sites/default/files/publications/DHS-Cybersecurity-Questions-for-CEOs.pdfSearch in Google Scholar
Fry, E. (2014, June 12). The 6 worst kinds of computer hackers. Retrieved August 05, 2017, from http://fortune.com/2013/02/26/the-6-worst-kinds-of-computer-hackers/FryE.2014, June 12).Retrieved August 05, 2017, from http://fortune.com/2013/02/26/the-6-worst-kinds-of-computer-hackers/Search in Google Scholar
M. (2016, October 24). 7 Types of Hacker Motivations. Retrieved August 05, 2017, from https://securingtomorrow.mcafee.com/consumer/family-safety/7-types-of-hacker-motivations/M.2016, October 24).Retrieved August 05, 2017, from https://securingtomorrow.mcafee.com/consumer/family-safety/7-types-of-hacker-motivations/Search in Google Scholar
Enterprise Risk Management Consequence and Likelihood Tables. (n.d.). Retrieved August 6, 2017, from https://ppl.app.uq.edu.au/sites/default/files/Risk%20Consequence%20and%20Likelihood %20Table%20-%20Form.pdfSearch in Google Scholar
Touhill, Gregory J., and C. Joseph Touhill. Cybersecurity for Executives, Wiley, 2014. ProQuest Ebook Central, https://ebookcentral.proquest.com/lib/columbia/detail.action?docID=1707094.TouhillGregoryJ., and TouhillC. JosephWiley2014ProQuest Ebook Central, https://ebookcentral.proquest.com/lib/columbia/detail.action?docID=170709410.1002/9781118908785Search in Google Scholar
Wheeler, E. (2011), Security Risk Management, Chapter 8, Risk Evaluation and Mitigation Strategies, Elsevier Inc.WheelerE.2011Elsevier Inc10.1016/B978-1-59749-615-5.00008-6Search in Google Scholar
Institute, F. (n.d.). FAIR, an international standard by the Open Group. Retrieved August 08, 2017, from http://www.fairinstitute.org/an-international-standardInstitute, F.(n.d.).Retrieved August 08, 2017, from http://www.fairinstitute.org/an-international-standardSearch in Google Scholar
Deinert, A. (2016), “Cybersecurity Breach Playbook: What Every IT Administrator Needs to Know”, Vantage Point Solutions, Mitchell, SDDeinertA.2016Vantage Point SolutionsMitchell, SDSearch in Google Scholar
Framework for Improving Critical Infrastructure Cybersecurity. (n.d.). Retrieved August 8, 2017, fromSearch in Google Scholar
https://www.bing.com/cr?IG=46B942FD8FD04ED7A2EF4DE7E061BAE0&CID=18B3474BBA4361240BCE4D93BB45607D&rd=1&h=qHbOGImxzOpDg5E54Eh7p9I1gen0wVXVy1g-wVCQk6w&v=1&r=https%3a%2f%2fwww.nist.gov%2fdocument-3766&p=DevEx,5063.1Search in Google Scholar
Cichonski, P. R., Millar, T., Grance, T., & Scarfone, K. (2017, February 19). Computer Security Incident Handling Guide. Retrieved August 08, 2017, from https://www.nist.gov/publications/computer-security-incident-handling-guideCichonskiP. R.MillarT.GranceT., & ScarfoneK.2017, February 19).Retrieved August 08, 2017, from https://www.nist.gov/publications/computer-security-incident-handling-guideSearch in Google Scholar
Cichonski, P. R., Millar, T., Grance, T., & Scarfone, K. (2017, February 19). Computer Security Incident Handling Guide. Retrieved August 08, 2017, from https://www.nist.gov/publications/computer-security-incident-handling-guideCichonskiP. R.MillarT.GranceT., & ScarfoneK.2017, February 19).Retrieved August 08, 2017, from https://www.nist.gov/publications/computer-security-incident-handling-guideSearch in Google Scholar
NIST. (2014, February 12) Retrieved from https://www.nist.gov/sites/default/files/documents/cyberframework/cybersecurity-framework-021214.pdfSearch in Google Scholar
Scholtz, T., McMillan, R. (2017, January 26). Institute Cybersecurity and Risk Governance Practices to Improve Information Security. Gartner.ScholtzT.McMillanR.2017, January 26).GartnerSearch in Google Scholar
Kark, K., Francois, M., Aguas, T. (2016, July 25). The new CISO: Leading the strategic security organization. (n.d.). Retrieved August 09, 2017, from https://dupress.deloitte.com/dup-us-en/deloitte-review/issue-19/ciso-next-generation-strategic-security-organization.htmlKarkK.FrancoisM.AguasT.2016, July 25).. (n.d.). Retrieved August 09, 2017, from https://dupress.deloitte.com/dup-us-en/deloitte-review/issue-19/ciso-next-generation-strategic-security-organization.htmlSearch in Google Scholar
Fry, E. (2014, June 12). The 6 worst kinds of computer hackers. Retrieved August 09, 2017, from http://fortune.com/2013/02/26/the-6-worst-kinds-of-computer-hackers/FryE.2014, June 12).Retrieved August 09, 2017, from http://fortune.com/2013/02/26/the-6-worst-kinds-of-computer-hackers/Search in Google Scholar
M. (2016, October 24). 7 Types of Hacker Motivations. Retrieved August 09, 2017, from https://securingtomorrow.mcafee.com/consumer/family-safety/7-types-of-hacker-motivations/M. (2016, October 24).Retrieved August 09, 2017, from https://securingtomorrow.mcafee.com/consumer/family-safety/7-types-of-hacker-motivations/Search in Google Scholar
https://www.us-cert.gov/sites/default/files/publications/DHS-Cybersecurity-Questions-for-CEOs.pdfSearch in Google Scholar
https://www.forbes.com/sites/stevemorgan/2015/11/24/ibms-ceo-on-hackers-cyber-crime-is-the-greatest-threat-to-every-company-in-the-world/#bfb909373f07Search in Google Scholar
http://www.darkreading.com/attacks-breaches/global-cost-of-cybercrime-predicted-to-hit-$6-trillion-annually-by-2021-study-says/d/d-id/1326742Search in Google Scholar
G. Eason, B. Noble, and I. N. Sneddon, “On certain integrals of Lipschitz-Hankel type involving products of Bessel functions,” Phil. Trans. Roy. Soc. London, vol. A247, pp. 529–551, April 1955. (references)EasonG.NobleB., and SneddonI. N.“On certain integrals of Lipschitz-Hankel type involving products of Bessel functions,”, vol.A247, pp.529551, April1955(references)10.1098/rsta.1955.0005Search in Google Scholar
J. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd ed., vol. 2. Oxford: Clarendon, 1892, pp.68–73.MaxwellJ. Clerk3rd ed., vol.2OxfordClarendon1892, pp.6873Search in Google Scholar
I. S. Jacobs and C. P. Bean, “Fine particles, thin films and exchange anisotropy,” in Magnetism, vol. III, G. T. Rado and H. Suhl, Eds. New York: Academic, 1963, pp. 271–350.JacobsI. S. and BeanC. P.“Fine particles, thin films and exchange anisotropy,”in, vol.IIIRadoG. T. and SuhlH., Eds.New YorkAcademic1963, pp.27135010.1016/B978-0-12-575303-6.50013-0Search in Google Scholar
R. Nicole, “Title of paper with only first word capitalized,” J. Name Stand. Abbrev., in press.NicoleR.“Title of paper with only first word capitalized,”in pressSearch in Google Scholar
Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, “Electron spectroscopy studies on magneto-optical media and plastic substrate interface,” IEEE Transl. J. Magn. Japan, vol. 2, pp. 740–741, August 1987 [Digests 9th Annual Conf. Magnetics Japan, p. 301, 1982].YorozuY.HiranoM.OkaK., and TagawaY.“Electron spectroscopy studies on magneto-optical media and plastic substrate interface,”, vol.2, pp.740741, August 1987 [Digests 9th Annual Conf. Magnetics Japan, p. 301, 1982]10.1109/TJMJ.1987.4549593Search in Google Scholar
M. Young, The Technical Writer’s Handbook. Mill Valley, CA: University Science, 1989.YoungM.Mill Valley, CAUniversity Science1989Search in Google Scholar
Electronic Publication: Digital Object Identifiers (DOIs): Article in a journal:Search in Google Scholar
D. Kornack and P. Rakic, “Cell Proliferation without Neurogenesis in Adult Primate Neocortex,” Science, vol. 294, Dec. 2001, pp. 2127-2130, doi:10.1126/science.1065467.KornackD. and RakicP.“Cell Proliferation without Neurogenesis in Adult Primate Neocortex,”, vol.294, Dec.2001, pp.21272130, doi:10.1126/science.106546710.1126/science.106546711739948Search in Google Scholar
H. Goto, Y. Hasegawa, and M. Tanaka, “Efficient Scheduling Focusing on the Duality of MPL Representatives,” Proc. IEEE Symp. Computational Intelligence in Scheduling (SCIS 07), IEEE Press, Dec. 2007, pp. 57-64, doi:10.1109/SCIS.2007.357670.GotoH.HasegawaY., and TanakaM.“Efficient Scheduling Focusing on the Duality of MPL Representatives,”IEEE Press, Dec.2007, pp.5764, doi:10.1109/SCIS.2007.357670Search in Google Scholar