This work is licensed under the Creative Commons Attribution 4.0 International License.
Abrahams Nick, Griffin Jamie ‘Privacy law: The end of a long road: Mandatory data breach notification becomes law’ (2017) 32 Law Society of NSW Journal.NickAbrahamsJamieGriffin‘Privacy law: The end of a long road: Mandatory data breach notification becomes law’201732Law Society of NSW JournalSearch in Google Scholar
Alhazmi Omar H., Malaiya Yashwant K., ‘Assessing disaster recovery alternatives: On-site, colocation or cloud’. Software Reliability Engineering Workshops (ISSREW), 2012 IEEE 23rd International Symposium on. IEEE.Alhazmi OmarH.Malaiya YashwantK.‘Assessing disaster recovery alternatives: On-site, colocation or cloud’Software Reliability Engineering Workshops (ISSREW), 2012 IEEE 23rd International Symposium on. IEEE10.1109/ISSREW.2012.20Search in Google Scholar
Chakraborty Nilotpal, ‘Intrusion detection system and intrusion prevention system: A comparative study’ (2013) International Journal of Computing and Business Research.NilotpalChakraborty‘Intrusion detection system and intrusion prevention system: A comparative study’2013International Journal of Computing and Business ResearchSearch in Google Scholar
Drozd, Olha, ‘Privacy pattern catalogue: A tool for integrating privacy principles of ISO/IEC 29100 into the software development process’ IFIP International Summer School on Privacy and Identity Management (Springer, Cham 2015).DrozdOlha‘Privacy pattern catalogue: A tool for integrating privacy principles of ISO/IEC 29100 into the software development process’IFIP International Summer School on Privacy and Identity ManagementSpringerCham201510.1007/978-3-319-41763-9_9Search in Google Scholar
Fortiş, Teodor-Florin, Ion Munteanu Victor, ‘Topics in cloud incident management’ (2017).FortişTeodor-FlorinVictorIon Munteanu‘Topics in cloud incident management’201710.1016/j.future.2016.11.003Search in Google Scholar
Humphreys Edward, Implementing the ISO/IEC 27001: 2013 ISMS Standard (Artech House 2016).EdwardHumphreysImplementing the ISO/IEC 27001: 2013 ISMS StandardArtech House2016Search in Google Scholar
Jun, Ma, et al., ‘The application of Chinese wall policy in data leakage prevention’. Communication Systems and Network Technologies (CSNT), 2012 International Conference on. IEEE.JunMa‘The application of Chinese wall policy in data leakage prevention’Communication Systems and Network Technologies (CSNT), 2012 International Conference on. IEEE10.1109/CSNT.2012.111Search in Google Scholar
Maldoff Gabriel, ‘The risk-based approach in the GDPR: interpretation and implications’ IAPP https://iapp.org/media/pdf/resource_center/GDPR_Study_Maldoff.pdf.GabrielMaldoff‘The risk-based approach in the GDPR: interpretation and implications’IAPP https://iapp.org/media/pdf/resource_center/GDPR_Study_Maldoff.pdf.Search in Google Scholar
Malviya Rupali, Umrao Brajesh K, ‘Machine Learning Security’ (2014).RupaliMalviyaUmrao BrajeshK‘Machine Learning Security’2014Search in Google Scholar
Purohit, Bijayalaxmi, Pawan Prakash Singh, ‘Data leakage analysis on cloud computing’ (2013) 3.3. International Journal of Engineering Research and Applications.PurohitBijayalaxmiSinghPawan Prakash‘Data leakage analysis on cloud computing’201333International Journal of Engineering Research and ApplicationsSearch in Google Scholar
Routray Ramani Ranjan et al., ‘Method and system for automated integrated server-network-storage disaster recovery planning’ U.S. Patent No. 8,121,966. 21 Feb. 2012.RanjanRoutray Ramani‘Method and system for automated integrated server-network-storage disaster recovery planning’U.S. Patent No. 8,121,966.21Feb.2012Search in Google Scholar
Setiawan, Alexander, Wibowo Adi, Hartanto Susilo Andrew, ‘Risk Analysis on the development of a Business Continuity Plan’ Computer Applications and Information Processing Technology (CAIPT), 2017 4th International Conference on. IEEE.SetiawanAlexanderAdiWibowoAndrewHartanto Susilo‘Risk Analysis on the development of a Business Continuity Plan’Computer Applications and Information Processing Technology (CAIPT), 2017 4th International Conference on. IEEE10.1109/CAIPT.2017.8320736Search in Google Scholar
Sloan, Robert H., Warner Richard ‘How Much Should We Spend to Protect Privacy?: Data Breaches and the Need for Information We Do Not Have’ (2017).SloanRobert H.RichardWarner‘How Much Should We Spend to Protect Privacy?: Data Breaches and the Need for Information We Do Not Have’201710.2139/ssrn.3032143Search in Google Scholar
Sobel, William E., McCorkendale Bruce, ‘Restoration of backed up data by restoring incremental backup (s) in reverse chronological order’ U.S. Patent No. 7,802,134. 21 Sep. 2010.SobelWilliam E.BruceMcCorkendale‘Restoration of backed up data by restoring incremental backup (s) in reverse chronological order’U.S. Patent No. 7,802,134.21Sep.2010Search in Google Scholar
Verheul Eric, Jacobs Bart, ‘Polymorphic encryption and pseudonymisation in identity management and medical research’ (2017).EricVerheulBartJacobs‘Polymorphic encryption and pseudonymisation in identity management and medical research’2017Search in Google Scholar
Yod-Samuel Martin, Kung Antonio, ‘Methods and Tools for GDPR Compliance Through Privacy and Data Protection Engineering’ 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).MartinYod-SamuelAntonioKung‘Methods and Tools for GDPR Compliance Through Privacy and Data Protection Engineering’2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)10.1109/EuroSPW.2018.00021Search in Google Scholar