Stevens, G.M. (2008) CRS Report for Congress: Federal Information Security and Data Breach Notification Laws. Congressional Research Service
Adam, Z.R. (2003). E-commerce and e-business. Manila, Philippines: United Nations Development Programme.
Gulati, Radha (2002). The Threat of Social Engineering and Your Defense Against It. Retrieved April 9, 2014, from http://www.sans.org/rr/papers/index.php?id=1232
Arthurs, Wendy (2001). A Proactive Defence to Social Engineering. Retrieved April 9, 2014, from http://www.sans.org/rr/papers/index.php?id=511
Krebs, B. (2009). Security Fix, The Washinton Post.
Messmer, E. (2009) Security breach has cost Heartland £8.4m so far. Computerworld.uk http://www.computerworlduk.com/news/security/14680/security-breach-has-cost-heartland-84m-so-far/?pn=2
Thompson, L.L. (2011). Data Breach Encryption Handbook. Chicago, IL: American Bar Association.
Thompson takes an in-depth analysis of the escalating data breaches across the world and their associated legal implications. She takes a specific focus on the legal implications of data breaches alongside the encryption technology, information security, and methods of preventing data breaches. The fact that the author uses information from different organizations hit by data breaches in the past forms the strength of the author's work. The book is important for the study because it provides insights into different issues related to data breach such as methods the hackers use to access the information and ways of preventing data breach in an organization.
Authors Note: Thomson is a senior engineer and private advocate at the CSC. She has published on topics related to data breach prevention and is the vice chair of the American Bar Association (ABA).
Greenfield, R. (2013). Look What the Hacked AP Tweet About White House Bombs Did to the Market. Atlantic Wire, 23, Apr 2013. Retrieved from http://www.theatlanticwire.com/technology/2013/04/hacked-ap-tweet-white-house-bombs-stock-market/64492/
BloombergNews (2013).How did AP's Twitter Account get Hacked? Bloomberg News, 24 April 2013. Retrieved from http://www.tampabay.com/news/nation/how-did-aps-twitter-account-get-hacked/2117089
Ngak, C. (2013). Security pro-on Twitter hacks: No patch for human error. CBS News 24 Apr 2013. Retrieved from http://www.cbsnews.com/8301-205_162-57581160/security-pro-on-twitter-hacks-no-patch-for-human-error/