[Agrafiotis, A., Nurse, J., Goldsmith, M., Creese, S., & Upton, D. (2018). A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate. Journal of Cybersecurity, Vol. 4, Issue 1.10.1093/cybsec/tyy006]Search in Google Scholar
[Carnegie Endowment for International Peace. (2020). Timeline of Cyber Incidents Involving Financial Institutions. Washington.]Search in Google Scholar
[Dearden, L. (2017). Ukraine cyber attack: Chaos as national bank, state power provider and airport hit by hackers. The Independent, available at: https://www.independent.co.uk/news/world/europe/ukraine-cyber-attack-hackers-national-bank-state-power-company-airportrozenko-pavlo-cabinet-a7810471.html, accessed on 09 April 2020.]Search in Google Scholar
[Gandhi, R. et al. (2011). Dimensions of Cyber-Attacks: Cultural, Social, Economic, and Political. IEEE Technology and Society Magazine.10.1109/MTS.2011.940293]Search in Google Scholar
[Gunaratna, R. et al. (2017). Cyber Terrorism: Assessment of the Threat to Insurance. United Kingdom: Cambridge Centre for Risk Studies.]Search in Google Scholar
[Hopper, T. (2015). Ashley Madison aftermath: Confessions, suicide reports and hot on the hacker’s trail. The National Post, available at: https://nationalpost.com/news/canada/ashley-madison-aftermath-confessions-suicide-reports-and-hot-on-the-hackers-trail, accessed on 09 April 2020.]Search in Google Scholar
[Maxat, A., Vassilakis, V.G., & Logothetis, M.D. (2019). WannaCry Ransomware: Analysis of Infection, Persistence, Recovery Prevention and Propagation Mechanisms. Journal of Telecommunications and Information Technology, Vol. 1, Issue 1.]Search in Google Scholar
[McGuire, M. (2012). Organised Crime in the Digital Age. London: John Grieve Centre for Policing and Security.]Search in Google Scholar
[McQuade, M. (2018). The Untold Story of NotPetya, the Most Devastating Cyberattack in History. The Wired Magazine.]Search in Google Scholar
[Mills, C. (2017). Nuclear Weapons – Country Comparisons. London: House of Commons Library.]Search in Google Scholar
[Perez, E. (2016). U.S. official blames Russia for power grid attack in Ukraine. CNN, available at: https://edition.cnn.com/2016/02/11/politics/ukraine-power-grid-attack-russiaus/index.html, accessed on 07 May 2020.]Search in Google Scholar
[Romanian National Computer Security Incident Response Team. (2018). Threats evolution in the Romanian cyberspace 2018. Bucharest.]Search in Google Scholar
[Roscini, M. (2014). Cyber Operations and the Use of Force in International Law. Oxford: Oxford University Press.10.1093/acprof:oso/9780199655014.001.0001]Search in Google Scholar
[Satter, R., Stubbs, J., & Bing, C. (2020). Hackers tried to infiltrate the World Health Organization, the latest in a string of cyberattacks aimed at health officials during the coronavirus pandemic. Reuters, available at: https://www.businessinsider.com/world-healthorganization-hack-tried-steal-passwords-with-fake-website-2020-3?r=US&IR=T, accessed on 12 April 2020.]Search in Google Scholar
[Trend Micro. (2015). US OPM Hack Exposes Data of 4 Million Federal Employees, available at: https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/us-opm-hackexposes-data-of-4-million-federal-employees, accessed on 09 April 2020.]Search in Google Scholar
[Whitehead, D. E, Owens, K., Gammel, D., & Smith, J. (2017). Ukraine Cyber-Induced Power Outage: Analysis and Practical Mitigation Strategies. 70th Annual Conference for Protective Relay Engineers, Washington.10.1109/CPRE.2017.8090056]Search in Google Scholar