1. European Network Information Security Agency, Glossary [cited July 2014]. Available from: https://www.enisa.europa.eu/activities/risk-management/current-risk/risk-management-inventory/glossary.
2. McCaughey and Ayers, CyberActivism: Online Activism in Theory and Practice, (February 2003), [cited July 2014]. Available from: http://www.amazon.com/Cyberactivism-Online-Activism-Theory-Practice/dp/0415943205.
3. Fred Cohen, Computer Viruses: Theory and Experiments, [cited July 2014]. Available from: http://web.eecs.umich.edu/∼aprakash/eecs588/handouts/cohen-viruses.html.
4. F-Secure, Cascade [cited July 2014]. Available from: http://www.f-secure.com/v-descs/cascade.shtml.
5. F-Secure, Ping-Pong [cited July 2014]. Available from: http://www.f-secure.com/v-descs/pingpong.shtml.
6. Ralph Langner, Langer. To Kill a Centrifuge (November 2013), [cited July 2014]. Available from: http://www.langner.com/en/wp-content/uploads/2013/11/To-kill-a-centrifuge.pdf.
7. Ponemon Institute, 2013 Cost of Data Breach study (May 2013), [cited October 2013]. Available from: https://www4.symantec.com/mktginfo/whitepaper/053013_GL_NA_WP_Ponemon-2013-Cost-of-a-Data-Breach-Report_daiNA_cta72382.pdf.
8. Beazley, Beazley Small business spotlight; Data Breach costs (January 2012), [cited October 2013]. Available from: https://www.beazley.com/.../Data%20Breach%20costs%20June%202012 .
9. Bloomberg Law, Complicated Compliance: State Data Breach Notification Laws Cited October 2013. Available from: http://about.bloomberglaw.com/practitioner-contributions/complicated-compliance-state-r.
10. Official Journal of the European Union, Commission Regulation (EU) No 611/2013 (August 2013), [cited October 2013]. Available from: http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ: L:2013:173:0002:0008:EN: PDF.
11. The Christian Science Monitor, Data Theft: Top 5 most expensive data breaches Cited October 2013. Available from: http://www.csmonitor.com/Business/2011/0504/Data-theft-Top-5-most-expensive-data-breaches/3.-TJX-256-million-or-more.
12. Wired.com, Data Breach Will Cost TJX $1.7B, Security Firm Estimates [cited October 2013]. Available from: http://www.wired.com/threatlevel/2007/03/data_breach_wil/.
13. Jim Lewis and Stewart Baker, CSIS, Economic Impact of Cybercrime (July 2014), [cited July 2014]. Available from:http://www.mcafee.com/hk/resources/reports/rp-economic-impact-cybercrime2.pdf
14. Wired.com, IBM Cloud Storage Partner Nirvanix Files for Bankruptcy (October 2013), [cited October 2013]. Available from: http://www.wired.com/wiredenterprise/2013/10/nirvanix-bankrupt/.
15. NetworkComputing.Com, The Nirvanix Failure: Villains, Heroes and Lessons (October 2013), [cited October 2013]. Available from: http://www.networkcomputing.com/storage-networking-management/the-nirvanix-failure-villains-heroes-and/240162664.
16. Molitor Legal, New Luxembourg law on the right to claim back data from bankrupt IT and cloud service providers (July 2013), [cited October 2013]. Available from: http://www.molitorlegal.lu/news/new-luxembourg-law-right-claim-back-data-bankrupt-it-and-cloud-services-providers-0.
17. GigaOm. Power Outages are the Most Pervasive Reasons for Cloud Outages (March 2013), [cited October 2013]. Available from: http://research.gigaom.com/2013/03/power-outages-are-the-most-pervasive-reasons-for-cloud-outages/.
18. ZDNet, AWS cloud Accidentally deletes customer data (August 2010), [cited October 2013]. Available from: http://www.zdnet.com/aws-cloud-accidentally-deletes-customer-data-3040093665/.
19. Beth Pariseau, TechTarget.com, Code Spaces goes dark after AWS cloud security hack (June 2014), [cited July 2014]. Available from: http://searchaws.techtarget.com/news/2240223024/Code-Spaces-goes-dark-after-AWS-cloud-security-hack.
20. Ibid.
21. BBC.com, Burger King Twitter account hacked with McDonalds logo (February 2013) [cited November 2013]. Available from: http://www.bbc.co.uk/news/world-us-canada-21500175.
22. Wired.com, How Apple and Amazon Security Flaws Led to My Epic Hacking (August 2012), [cited November 2013]. Available from: http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/.
23. LifeHacker ITPro, Why Cloud Services are so easy to hack (February 2013), [cited November 2013]. Available from: http://www.lifehacker.com.au/2013/02/why-cloud-services-are-so-easy-to-hack/.
24. Warwick Ashford, ComputerWeekly.com, FBI warns of increased spear phishing attacks (July 2013), [cited November 2013]. Available from: http://www.computerweekly.com/news/2240187487/FBI-warns-of-increased-spear-phishing-attacks.
25. MindTools, Caldini’s six principles of influence, [Cited November 2013]. Available from: http://www.mindtools.com/pages/article/six-principles-influence.htm.
26. Mashery, APIs: the key to a thriving cloud (February 2009), [cited November 2013] Available from: http://readwrite.com/2009/02/26/mashery_apis_the_key_to_a_thriving_cloud.
27. Amazon Elastic Compute Cloud: API Reference (October 2013), [cited November 2013]. Available from: http://awsdocs.s3.amazonaws.com/EC2/latest/ec2-api.pdf.
28. Rob Lemos, DarkReading.com, Insecure API Implementations Threaten Cloud (April 2012), [cited November 2013] Available from: http://www.darkreading.com/cloud/insecure-api-implementations-threaten-cl/232900809.
29. Raj Samani and Francois Paget, CyberCrime Exposed: Cybercrime-as-a-Service (September 2013), [cited November 2013]. Available from: http://www.mcafee.com/uk/resources/white-papers/wp-cybercrime-exposed.pdf.
30. Prolexic, Prolexic Quarterly DDOS Threat Report. Q3 2013 [cited November 2013]. Available from: http://www.prolexic.com/knowledge-center-dos-and-ddos-attack-reports.html.
31. ENISA, Critical Cloud Computing: A CIIP Perspective on cloud computing services (December 2012), [cited November 201s3]. Available from: https://www.enisa.europa.eu/activities/Resilience-and-CIIP/cloud-computing/critical-cloud-computing.
32. Rackspace, DDOS mitigation, prevention and Network security tool [cited November 2013]. Available from: http://www.rackspace.com/managed_hosting/services/security/ddosmitigation/.
33. Cade Metz, The Register. DDoS attack rains down on Amazon cloud (October 2009), [cited November 2013]. Available from: http://www.theregister.co.uk/2009/10/05/amazon_bitbucket_outage/.
34. Carl Brooks, TechTarget, Amazon EC2 attack prompts customer support changes. October 2009 [cited November 2013. Available from: http://searchcloudcomputing.techtarget.com/news/1371090/Amazon-EC2-attack-prompts-customer-support-changes.
35. Rich Bolstridge, Asia Cloud Forum, Risks underlying shared services DDoS (August 2013), [cited November 2013]. Available from: http://www.asiacloudforum.com/content/risks-underlying-shared-services-ddos.
36. CERT, The CERT Insider Threat Center [cited November 2013]. Available from: http://www.cert.org/insider_threat/.
37. CERT. Insider Threats to Cloud Computing: Directions for New Research Challenges. [cited November 2013]. Available from: www.cert.org/archive/pdf/CERT_cloud_insiders.pdf.
38. Matthew Schwarz, Fired employee indicted for hacking Gucci Network (May 2011), [cited November 2013]. Available from: http://www.informationweek.com/infrastructure/networking/fired-employee-indicted-for-hacking-gucci-network/d/d-id/1097007?.
39. Jessica Scarpati, TechTarget.com, For cloud providers, fraud detection is integral part of business plan [cited November 2013]. Available from: http://searchcloudprovider.techtarget.com/feature/For-cloud-providers-fraud-detection-is-integral-part-of-business-plan.
40. BBC News, Analysis reveals popular Adobe passwords. (November 2013), [cited November 2013]. Available from: http://www.bbc.co.uk/news/technology-24821528.
41. Jack Clark, ZDNet, Hacker uses cloud computing to crack passwords (November 2010), [cited November 2013]. Available from: http://www.zdnet.com/hacker-uses-cloud-computing-to-crack-passwords-4010021067/.
42. Dan Goodin.The Register Service cracks passwords from the cloud.(December 2009), [November 2013] Available from:.http://www.theregister.co.uk/2009/12/07/cloud_based_password_cracking/.
43. Louise Kidney. The Guardian. Navigating a tricky airspace: information governance in the cloud (July 2011), [cited November 2013]. Available from: http://www.theguardian.com/local-government-network/2011/jul/14/information-governance-cloud.
44. Out-Law.com, Certifications of cloud provider services welcome, but users cannot rely on them for own data protection compliance, says ICO [cited November 2013]. http://www.out-law.com/en/articles/2012/july/certifications-of-cloud-provider-services-welcome-but-users-cannot-rely-on-them-for-own-data-protection-compliance-says-ico/.
45. Article 29 Working Party, Opinion 05/2012 on Cloud Computing (May 2012), [cited November 2013]. Available from: http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2012/wp196_en.pdf.
46. European Network Information Security Agency, Cloud Computing Security Risk Assessment (2009), [cited July 2014]. Available from: https://www.enisa.europa.eu/activities/risk-management/files/deliverables/cloud-computing-risk-assessment.