References
Amerding, T (2012) ‘The 15 worst data security breaches of the 21st Century’, CSO, 15 February [Online]. Available at www.csoonline.com/ article/ 2130877/ data-protection/ data-protection-the-15-worst-data-security-breaches-of-the-21st-century.html [Tip: hold Ctrl and click a link to open it in a new tab. (Hide tip)] (Accessed 4 June 2016).
Hunt, T. (2016) have I been pwned [Online]. Available at https://haveibeenpwned.com (Accessed 7 June 2016).
Itami, H. and Roehl, T. (1987) Mobilizing Invisible Assets, Harvard, Harvard University Press.
Pew Research Center (2012) The State of the News Media 2012 – Audio: By the Numbers [Online]. Available at http://stateofthemedia.org/ 2012/ audio-how-far-will-digital-go/ audio-by-the-numbers/ (Accessed 4 June 2016).
Protalinski, E. (2013) ‘Belgian rail firm SNCB Europe sees 1.5m customer details leaked, but fails to take responsibility’, The Next Web, [Online]. Available at http://thenextweb.com/ insider/ 2012/ 12/ 24/ belgian-rail-firm-sncb-europe-sees-1-5m-customer-details-leaked-but-fails-to-take-responsibility/ (Accessed 4 June 2016).
Wikipedia (2016a) Coca-Cola Formula [Online], 31 May 2016. Available at https://en.wikipedia.org/ wiki/ Coca-Cola_formula#Pemberton_recipe (Accessed 4 June 2016).
Wikipedia (2016b) Stuxnet [Online], 2 June 2016. Available at http://en.wikipedia.org/ wiki/ E-commerce (Accessed 1 June 2015).
Wolfram Alpha computational knowledge engine (Wolfram Alpha) (2016a) [Online]. Available at http://www.wolframalpha.com/ input/ ?i=market+value+and+book+value+coca-cola (Accessed 12 May 2016).
Wolfram Alpha computational knowledge engine (Wolfram Alpha) (2016b) [Online]. Available at http://www.wolframalpha.com/ input/ ?i=market+value+and+book+value+facebook (Accessed 12 May 2016).
WordPress (2013) Stats – Wordpress.com [Online]. Available at https://wordpress.com/ activity/ (Accessed 27 September 2013).