References
Betts, B. (2016). Shadow data and the risks posed by cloud storage apps. ComputerWeekly. Retrieved from http://www.computerweekly.com/news/450298345/Shadow-data-and-the-risks-posed-by-cloud-storage-and-apps
Burgess, M. (2017). GDPR will change data protection – here’s what you need to know. Wired. Retrieved from https://www.wired.co.uk/article/what-is-gdpr-uk-eu-legislation-compliance-summary-fines-2018
Christopher, E. (2016). 5 Shadow IT Trends Facing Today’s CIOs. My Tech Decisions. Retrieved from: https://mytechdecisions.com/it-infrastructure/5-shadow-trends-facing-todays-cios/
Collet, S. (2017). Five new threats to your mobile security. CSO Online. Retrieved from https://www.csoonline.com/article/2157785/data-protection/five-new-threats-to-your-mobile-security.html
Computer History Museum. (n.d.). Timeline of Computer History Memory & Storage. Retrieved from http://www.computerhistory.org/timeline/memory-storage/
Gallagher, S. (2017). Avast! There’s malware in that CCleaner software update. Ars Technica. Retrieved from https://arstechnica.com/information-technology/2017/09/backdoor-malware-planted-in-legitimate-software-updates-to-ccleaner/
Hamburger, E. (2013). Google Docs began as a hacked together experiment, says creator. The Verge. Retrieved from https://www.theverge.com/2013/7/3/4484000/sam-schillace-interview-google-docs-creator-box
Harris, E. (2014). Data Breach Hurts Profits at Target. The New York Times. Retrieved from https://www.nytimes.com/2014/02/27/business/target-reports-on-fourth-quarter-earnings.html
Hausman, K., Alston, N., Chapple, M. (2005). Protecting Your Network from Security Risks and Threats. informIT. Retrieved from: http://www.informit.com/articles/article.aspx?p=419051&seqNum=5
Meyer, D. (2015). Why shutting down Shadow IT stifles innovation. ITProPortal. Retrieved from https://www.itproportal.com/2015/11/20/why-shutting-down-shadow-it-stifles-innovation/
Miller, G. (2016). 60% of small companies that suffer a cyber attack are out of business within six months. The Denver Post. Retrieved from http://www.denverpost.com/2016/10/23/small-companies-cyber-attack-out-of-business/
Noyes, A. (2007). Shadow IT. Government Executive, 39(17), 63.
Pisello, T. (2004). IT ‘shadow spending’ has doubled. Computerworld. Retrieved from https://www.computerworld.com/article/2563363/it-management/it–shadow-spending–has-doubled.html
Silic, M., & Back, A. (2014). Shadow IT – A view from behind the curtain. Computers & Security, 45274-283.
Silic, M., Barlow, J. B., & Back, A. (2017). A new perspective on neutralization and deterrence: Predicting shadow IT usage. Information & Management, 541023-1037. doi:10.1016/j.im.2017.02.007
Thomchick, D. (2017). Symantec Publishes Shadow Data Report on Latest Security Risk Trends in Cloud Apps for 1H 2017. Symantec Official Blog. Retrieved from: https://www.symantec.com/connect/blogs/symantec-publishes-shadow-data-report-latest-security-risk-trends-cloud-apps-1h-2017
Walters, R. (2013). Bringing IT out of the shadows. Network Security, 2013(4), 5-11.