1. Gallagher, S. (2012, November 3). Born to be breached. Arstechnica . Retrieved from http://arstechnica.com/information-technology/2012/11/ born-to-be-breached-the-worst-passwords-are-still-the- most-common/ 2. SANS Institute. (n.d.). Information Security Policy Templates. Retrieved from http://www.sans.org/security-resources/ policies/Policy_Primer.pdf on May 31, 2013. 3. SANS . (n.d.). SCORE: Checklists and Step by Step Guides. Retrieved from http://www.sans.org/score/checklists/ mobile-device-checklist.xls 4. Iansiti, M. and Lakhani, K. R. (2017, January). The truth about blockchain. Harvard Business Review . Retrieved from https://hbr.org/2017/01/the-truth-about-blockchain ↵ 5. Wikipedia . (n.d.). Bitcoin. Harvard Business Review . Retrieved from https://en.wikipedia.org/wiki/Bitcoin ↵ 6. Fernandes, B. (2017, October 20). Personal telephone interview ↵
Information Systems for Business and Beyond (2019) pg. 141
Made with FlippingBook flipbook maker