1. A Global Look at IT Audit Best Practices. Issue 2 (2nd August 2016) Authors: Brand, David Journal: EDPACS Issue: Volume 54:Issue 2(2016) Page Start: 8 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Implementing Practical Risk Control Using U.S. Government Standards. Issue 2 (2nd August 2016) Authors: Shoemaker, Dan Journal: EDPACS Issue: Volume 54:Issue 2(2016) Page Start: 1 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. What's the Big Deal About Big Data Loss (Actually Theft)?. Issue 6 (3rd June 2017) Authors: Cohen, Fred Journal: EDPACS Issue: Volume 55:Issue 6(2017) Page Start: 6 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. Why We Need Better Reporters to Solve Our Security Problems. Issue 6 (3rd June 2017) Authors: Cohen, Fred Journal: EDPACS Issue: Volume 55:Issue 6(2017) Page Start: 1 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. The Five Pillars of a Cognitive Risk Framework—Part II. Issue 6 (1st December 2016) Authors: Bone, James Journal: EDPACS Issue: Volume 54:Issue 6(2016) Page Start: 1 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. Implementing Objective-Centric ERM in Charities. Issue 6 (1st December 2016) Authors: Byrne, Angela Journal: EDPACS Issue: Volume 54:Issue 6(2016) Page Start: 17 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. Cyber Threat Mitigation of Wireless Sensor Nodes for Secured, Trustworthy IoT Services. Issue 1 (2nd July 2016) Authors: Chaudhuri, Abhik Journal: EDPACS Issue: Volume 54:Issue 1(2016) Page Start: 1 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
8. Cyber Education and the Emerging Profession of Cybersecurity. Issue 5 (1st November 2016) Authors: Shoemaker, Dan; Kohnke, Anne Journal: EDPACS Issue: Volume 54:Issue 5(2016) Page Start: 12 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
9. Cognitive Risk Framework for Cybersecurity: Bounded Rationality: Executive Summary: Part I. Issue 5 (1st November 2016) Authors: Bone, James Journal: EDPACS Issue: Volume 54:Issue 5(2016) Page Start: 1 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
10. VALIDATING CORE CONCEPTS OF CYBERSECURITY CONTROL USING COMMONLY ACCEPTED STANDARDS. Issue 5 (4th May 2019) Authors: Shoemaker, Dan; Kohnke, Anne; Sigler, Ken Journal: EDPACS Issue: Volume 59:Issue 5(2019) Page Start: 1 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗