Information security

References

Amerding, T (2012) ‘The 15 worst data security breaches of the 21st Century’, CSO, 15 February [Online]. Available at www.csoonline.com/article/2130877/data-protection/data-protection-the-15-worst-data-security-breaches-of-the-21st-century.html (Accessed 4 June 2016).

Hunt, T. (2016) have I been pwned [Online]. Available at https://haveibeenpwned.com (Accessed 7 June 2016).

Itami, H. and Roehl, T. (1987) Mobilizing Invisible Assets, Harvard, Harvard University Press.

Pew Research Center (2012) The State of the News Media 2012 – Audio: By the Numbers [Online]. Available at http://stateofthemedia.org/2012/audio-how-far-will-digital-go/audio-by-the-numbers/ (Accessed 4 June 2016).

Protalinski, E. (2013) ‘Belgian rail firm SNCB Europe sees 1.5m customer details leaked, but fails to take responsibility’, The Next Web, [Online]. Available at http://thenextweb.com/insider/2012/12/24/belgian-rail-firm-sncb-europe-sees-1-5m-customer-details-leaked-but-fails-to-take-responsibility/ (Accessed 4 June 2016).

Wikipedia (2016a) Coca-Cola Formula [Online], 31 May 2016. Available at https://en.wikipedia.org/wiki/Coca-Cola_formula#Pemberton_recipe (Accessed 4 June 2016).

Wikipedia (2016b) Stuxnet [Online], 2 June 2016. Available at http://en.wikipedia.org/wiki/E-commerce (Accessed 1 June 2015).

Wolfram Alpha computational knowledge engine (Wolfram Alpha) (2016a) [Online]. Available at http://www.wolframalpha.com/input/?i=market+value+and+book+value+coca-cola (Accessed 12 May 2016).

Wolfram Alpha computational knowledge engine (Wolfram Alpha) (2016b) [Online]. Available at http://www.wolframalpha.com/input/?i=market+value+and+book+value+facebook (Accessed 12 May 2016).

WordPress (2013) Stats – Wordpress.com [Online]. Available at https://wordpress.com/activity/ (Accessed 27 September 2013).