References: Australian Government (2009). Cyber Security Strategy: An Overview. Retrieved from http://www.ag.gov.au/RightsAndProtections/CyberSecurity/Documents/Cyber%20Security%20-%20An%20Overview%20 (Brochure-Booklet).pdf Bamrara, A., Singh, G., & Bhatt, M Boateng, R., Olumide, L., Isabalija, R., & Budu J. (2011). Sakawa - Cybercrime and Criminality in Ghana. Journal of Information Technology Impact, 11(2), 85-100. Daryabar, F., Dehghantanha, A., Udzir, I., Sani, N., Shamsuddin, S., & Norouzizadeh, F. (2013). A Survey about Impacts of Cloud Computing on Digital Forensics. International Journal of Cyber-Security and Digital Forensics, 2(2), 77-94. Georgia Tech. (2012). Emerging Cyber Security Threats Report 2013. Retrieved from http://www.gtcybersecuritysummit.com/pdf/2013ThreatsReport.pdf Grauman, B Hansen, L. & Nissenbaum, H. (2009). Digital Disaster, Cyber Security, and the Copenhagen School. International Studies Quarterly, 53, 1155–1175. Kleiner, A., Nicholas, P., & Sullivan, K. (2013). Linking Cybersecurity Policy and Performance. Retrieved from http://www.gwumc.edu Leukfeldt, R., Veenstra, S., & Stol, W Ponemon Institute (2012). The Impact of Cybercrime on Business: Studies of IT practitioners in the United States, United Kingdom, Germany, Hong Kong and Brazil. Retrieved from http://www.ponemon.org Sommer, P., & Brown, I Suffolk, J. (2012). Cyber Security Perspectives: 21st Century Technology and Security – a Difficult Marriage. Retrieved from http://www.huawei.com
References: Australian Government (2009). Cyber Security Strategy: An Overview. Retrieved from http://www.ag.gov.au/RightsAndProtections/CyberSecurity/Documents/Cyber%20Security%20-%20An%20Overview%20 (Brochure-Booklet).pdf Bamrara, A., Singh, G., & Bhatt, M Boateng, R., Olumide, L., Isabalija, R., & Budu J. (2011). Sakawa - Cybercrime and Criminality in Ghana. Journal of Information Technology Impact, 11(2), 85-100. Daryabar, F., Dehghantanha, A., Udzir, I., Sani, N., Shamsuddin, S., & Norouzizadeh, F. (2013). A Survey about Impacts of Cloud Computing on Digital Forensics. International Journal of Cyber-Security and Digital Forensics, 2(2), 77-94. Georgia Tech. (2012). Emerging Cyber Security Threats Report 2013. Retrieved from http://www.gtcybersecuritysummit.com/pdf/2013ThreatsReport.pdf Grauman, B Hansen, L. & Nissenbaum, H. (2009). Digital Disaster, Cyber Security, and the Copenhagen School. International Studies Quarterly, 53, 1155–1175. Kleiner, A., Nicholas, P., & Sullivan, K. (2013). Linking Cybersecurity Policy and Performance. Retrieved from http://www.gwumc.edu Leukfeldt, R., Veenstra, S., & Stol, W Ponemon Institute (2012). The Impact of Cybercrime on Business: Studies of IT practitioners in the United States, United Kingdom, Germany, Hong Kong and Brazil. Retrieved from http://www.ponemon.org Sommer, P., & Brown, I Suffolk, J. (2012). Cyber Security Perspectives: 21st Century Technology and Security – a Difficult Marriage. Retrieved from http://www.huawei.com