Bibliografía

Autor:Jesús Jimeno Muñoz
Cargo del Autor:Abogado y Doctor en Derecho
Páginas:281-308
 
EXTRACTO GRATUITO
BIBLIOGRAFÍA
“2015 Cost of Cyber Crime Study: United Kingdom”, Ponemon Institute,
(octubre de 2015).
“2016 Terrorism Risk Insurance Report”, Marsh, (Julio de 2016).
https://www.marsh .com/content/dam/marsh/Documents/PDF/
USen/2016%20Terrorism%20Risk%20Insurance%20Report.pdf
“A History of Excellence and Innovation”, Merit, https://www.merit.edu/
about-us/merIT-history/
“Allianz Global Corporate & Specialty A Guide to Cyber Risk”, (sep-
tiembre 2015), https://www.allianz.com/v_1441789023000/media/
press/document/other/Allianz_Global_Corporate_Specialty_Cy-
ber_Guide_ nal.pdf
“AMCC TF on Cyber Resilience and AMCC Working Group”, Cyber
Security in Securities Markets An International Perspective, IOSCO
(abril 2016), p. 23 y 24, https://www.iosco.org/library/pubdocs/
pdf/IOSCOPD528.pdf
“Asegurabilidad de las sanciones que impone la Agencia de Protección
de Datos”, Davies Arnold Cooper (DAC), Boletín WIRE (Julio 2008)
“Ashley Madison hack reveals IT 37 million users deepest sexual fanta-
sies, Independent “(20 de agosto de 2015) http://www.independent.
co.uk/life-style/love-sex/ashley-madison-hack-reveals-IT-37-mil-
lion-users-deepest-sexual-fantasies-10463985.html
“Big brother: a government or person in authority that tries to control
people’s behavior and thoughts”, cambridge diccionari, http://dic-
tiona ry.cam bridge.org/us /dictionary /english/big-brother
“Ciberseguros”, Thiber (abril 2016), p. 52, http://www.thiber.org/
ciberseguros.pdf
Bibliografía
282
“COBIT 5 for Risk”, ISACA (2013) http://www.isaca.org/COBIT/Doc-
uments/COBIT-5-for-Risk-Preview_res_eng_0913.pdf
“Corporate history”, Lloyd’s, https://www.lloyds.com/lloyds/about-us/
history/corporate-history
“Cost of UK data breaches 2010”, Ponemon Institute, (julio de 2010).
“CTO – A CTO perspective. Research Technology Management”, 35. en
Roger D. Smith, “The Role of the Chief Technology Of cer in Strate-
gic Innovation”, Project Execution, and Mentoring, Princeton (2002),
p. 5, https://www.cs .princeton .edu /courses/archive/spring12/
cos448/web/readings/smith.pdf
“Cyber Exploitation–Law Enforcement FAQs”, State of California De-
partment of Justice, Of ce of the Attorney General, p. 1, https://
oag .ca.gov /sites /all / les/ agweb/pdfs/ce/cyber-exploitation-law-
enforcement-faqs.pdf
“Cyber insurance market set to reach $7.5 billion by 2020”, PWC
News room (16 de septiembre de 2015), http://press.pwc.com/
News-releases/cyber-insurance-market-set-to-reach--7.5-billion-by-
2020/s/5CC3FA21-221C-43DF-A133-05435E365342
“Cyber Risk– a Global Systemic Threat”, a White Paper to the Industry
on Systemic Risk, DTCC (octubre 2014).
“Cyber risks and government pools. Too soon?”, Artemis (30 marzo
2017) http://www.artemis.bm/blog/2017/03/30/cyber-risks-and-
government-pools-too-soon/
“Cyber Security in Securities Markets”, IOSCO (abril 2016), https://
www.iosco.org/library/pubdocs/pdf/IOSCOPD528.pdf
“Cybercrime trends report”, RSA (2011).
“Cybercrime”, UNODC, https://www.unodc.org/documents/da-
ta-and-analysistocta/ 10. Cybercrime.pdf.
“Cybersecurity and Corporate Liability: The Board’s View”, Veracode
(2015), p. 2 https://www.nyse.com/publicdocs/Veracode_Survey_Re-
port_Cybersecurity_Corporate_Liability.pdf
“Cybersecurity industry, DIGITAL SINGLE MARKET Digital Economy
& Society”, European Commission, (2016), https://ec.europa.eu/
digital-single-market /en/ cybersecurity-industry
“Cybersecurity Insurance”, The department of Homeland Security (30
de junio de 2016), https://www.dhs.gov/cybersecurity-insurance#
“Cybersecurity National Action Plan”, The White House Office of
the Press Secretary, https://www.whitehouse.gov/the-press-of-
ce/2016/02/09/fact-sheet-cybersecurity-national action-plan

Para continuar leyendo

SOLICITA TU PRUEBA