[Aiello, C. (2018, March 30). Under Armour says data breach affected about 150 million MyFitnessPal accounts. Retrieved September 27, 2018, from https://www.cnbc.com/2018/03/29/under-armour-stock-falls-after-company-admits-data-breach.html]Search in Google Scholar
[Abagail, A. (2015, August). Design and Validation of Information Security Culture Framework. Computers in Human Behavior, 49, pp. 567-575.10.1016/j.chb.2015.03.054]Search in Google Scholar
[Basu, E. (2015). Forbes Welcome. Forbes.com. Retrieved 28 December 2016, from http://www.forbes.com/sites/ericbasu/2015/10/26/cybersecurity-lessons-learned-from-the-ashley-madison-hack/#4539c09aed99]Search in Google Scholar
[Chaeikar, S., Jafari, M., Therdoost, H., & Kar, N. (2012). Definitions and Criteria of CIA Security Triangle in Electronic Voting System. International Journal of Advanced Computer Science and Information Technology, 1(1), 14-24. doi:2296-1739]Search in Google Scholar
[Coty, S. (2014). The eBay breach explained. www.scmagazine.com. Retrieved 28 December 2016, from https://www.scmagazine.com/the-ebay-breach-explained/article/537762/2/]Search in Google Scholar
[Doell, L. (2012). 10 Essential Cybersecurity Measures. OPEN Forum. Retrieved 28 December 2016, from https://www.americanexpress.com/us/small-business/openforum/articles/10-essential-cybersecurity-measures/]Search in Google Scholar
[Goud, N. (2018, March 30). Over 150 million users of MyFitnessPal affected by Cyber Attack. Retrieved September 27, 2018, from https://www.cybersecurity-insiders.com/over-150-million-users-of-myfitnesspal-affected-by-cyber-attack/]Search in Google Scholar
[Gomes, R., & Rebeiro, J. (2009). The Main Benefits of COBIT in a High Public Educational Institution - A Case Study. Pacific Asia Conference on Information Systems, 1-11. Retrieved from http://aisel.aisnet.org/pacis2009/88]Search in Google Scholar
[Haviluddin, H., Anthony, P., & Alfred, R. (2012). The Utilization of COBIT Framework Within It Governance: A Study of Literature. The 2nd ACIKITA International Conference on Science and Technology (AICST), 1-8. doi:10.13140/2.1.3616.4160]Search in Google Scholar
[McGee, M. (2018, June 1). Lawsuit Filed in Wake of Under Armour Data Breach. Retrieved September 27, 2018, from https://www.bankinfosecurity.com/lawsuit-filed-in-wake-under-armour-data-breach-a-11051]Search in Google Scholar
[Omari, L. (2016). It Governance Evaluation: Adapting and Adopting The COBIT Framework for Public Sector Organizations (Ph.D.). The Queensland University of Technology.]Search in Google Scholar
[Pagliery, J. (2015). The inside story of the biggest hack in history. CNNMoney. Retrieved 28 December 2016, from http://money.cnn.com/2015/08/05/technology/aramco-hack/]Search in Google Scholar
[PECB. (2018). ISO/IEC 27002:2013 Information Technology - Security Techniques Code of Practice for Information Security Controls.]Search in Google Scholar
[Rigby, J. (2015). Cybersecurity and Risk Management: Lead from the C-suite. Legacy.alixpartners.com. Retrieved 28 December 2016, from http://legacy.alixpartners.com/en/Publications/AllArticles/tabid/635/articleType/ArticleView/artcleId/1929/Cybersecurity-and-Risk-Management-Lead-from-the-C-suite.aspx#sthash.VyxzTPDI.dpbs]Search in Google Scholar
[Schlarman, S. (2007, Feb). Selecting An IT Control Framework. EDPACS, pp. 11-17. Retrieved from http://search.proquest.com.ezproxy.trident.edu:2048/docview/234907576?pqorigsite=summon10.1080/07366980601148030]Search in Google Scholar
[U.S. Department of Commerce. (2018, November). Cybersecurity. Retrieved from https://www.nist.gov/topics/cybersecurity]Search in Google Scholar
[Von Solms, R. (1998). Information security management (1): why information security is so important. Information Management & Computer Security, 6(4), 174-177. doi:10.1108/eum000000000453310.1108/EUM0000000004533]Search in Google Scholar
[White, S. (2017, December). What is COBIT? A framework for alignment and governance. Retrieved from https://www.cio.com/article/3243684/methodology-frameworks/what-is-cobit-a-framework-for-alignment-and-governance.html]Search in Google Scholar