Johnson, C. W. (2015). Contrasting Approaches to Incident
Reporting in the Development of Safety and Security-
-Critical Software. Safecomp, 19. http://www.
dcs.gla.ac.uk/~johnson
Madnick, S. (2022a). Why Companies Need to Start
Sharing More Information About Cyberattacks.
https://www.wsj.com/
Madnick, S. (2022b, August 29). New Cybersecurity
Regulations Are Coming. Here’s How to Prepare.
https://hbr.org/2022/08/new-cybersecurity-regulations-
are-coming-heres-how-to-prepare
Maglaras, L., Ferrag, M. A., Derhab, A., Mukherjee, M., &
Janicke, H. (2019). Cyber Security: From Regulations
and Policies to Practice. Springer Proceedings in
Business and Economics, 763–770. https://doi.
org/10.1007/978-3-030-12453-3_88
Marotta, A., & Madnick, S. (2021). A Framework for
Investigating GDPR Compliance Through the Lens of
Security. In Jamal Bentahar, I. Awan, M. Younas, & T.-
M. Grønli (Eds.), Mobile Web and Intelligent
Information Systems (pp. 16–31). Springer, Cham.
https://doi.org/10.1007/978-3-030-83164-6_2
Merken, S. (2022). Accellion reaches $8.1 mln settlement
to resolve data breach litigation | Reuters. Reuters.
https://www.reuters.com/legal/litigation/accellion-reac
hes-81-mln-settlement-resolve-data-breach-litigation-2
022-01-13/
Michalec, O., Milyaeva, S., & Rashid, A. (2022). When the
future meets the past: Can safety and cyber security
coexist in modern critical infrastructures? Big Data and
Society, 9(1). https://doi.org/10.1177/20539517221
108369
New York Consolidated Laws. (2022). Part 500
Cybersecurity Requirements for Financial Services
Companies. In Westlaw. https://govt.westlaw.com/
nycrr/Browse/Home/NewYork/NewYorkCodesRulesa
ndRegulations?guid=I5be30d2007f811e79d43a037eef
d0011&originationContext=documenttoc&transitionT
ype=Default&contextData=(sc.Default)
NIST. (n.d.-a). CVEs and the NVD Process. Retrieved May
3, 2023, from https://nvd.nist.gov/general/cve-process
NIST. (n.d.-b). National Vulnerability Database - NVD
Dashboard. Retrieved May 3, 2023, from
https://nvd.nist.gov/general/nvd-dashboard
NIST. (2011). Computer Security Incident. CSRC.
https://doi.org/10.1007/springerreference_10815
Parlour, R. (2019). EU Cybersecurity Policy in the
Financial Sector. Journal of Financial Crime, 26(3),
666–668. https://doi.org/10.1108/JFC-07-2018-0073/
FULL/PDF
Ross, R., Pillitteri, V., Graubart, R., Bodeau, D., &
Mcquaid, R. (2021). Developing Cyber-Resilient
Systems: A Systems Security Engineering Approach.
National Institute of Standards and Technology,
2(NIST Special Publication 800-160), 310.
https://doi.org/10.6028/NIST.SP.800-160v2r1
Security Administration Transportation. (2021). Security
Directiver Pipeline 2021-02C (SD02C). https://
www.cisa.gov/shields-up.
Silverajan, B., & Vistiaho, P. (2019). Enabling
cybersecurity incident reporting and coordinated
handling for maritime sector. Proceedings - 2019 14th
Asia Joint Conference on Information Security,
AsiaJCIS 2019
, 88–95. https://doi.org/10.1109/
AsiaJCIS.2019.000-1
Slayton, R., & Clark-Ginsberg, A. (2018). Beyond
regulatory capture: Coproducing expertise for critical
infrastructure protection. Regulation and Governance,
12(1), 115–130. https://doi.org/10.1111/rego.12168
Slonka, K. J. (2020). Managing Cyber Security Compliance
Across Business Sectors. Issues In Information
Systems, 21(1), 22–29. https://doi.org/10.48009/
1_iis_2020_22-29
SOCRadar. (2022). Top Critical Vulnerabilities Used by
Ransomware Groups -SOCRadar. SOCRadar.Io.
https://socradar.io/top-critical-vulnerabilities-used-by-
ransomware-groups/
The European Parliament and the Council of the European
Union. (2016). Regulation (EU) 2016/679 of the
European Parliament and of the Council of 27 April
2016 on the protection of natural persons with regard to
the processing of personal data and on the free
movement of such data. In Official Journal of the
European Union. https://eur-lex.europa.eu/legal-
content/EN/TXT/PDF/?uri=CELEX:32016R0679&fro
m=ES
The Securities and Exchange Commission. (2022). SEC
Proposes Rules on Cybersecurity Risk Management,
Strategy, Governance, and Incident Disclosure by
Public Companies. https://www.sec.gov/news/press-
release/2022-39
The White House. (2023). National Cybersecurity Startegy.
U.S. Government Printing Office (GPO).
https://www.whitehouse.gov/wp-content/uploads/2023
/03/National-Cybersecurity-Strategy-2023.pdf
Thoroman, B., Goode, N., Salmon, P., & Wooley, M.
(2019). What went right? An analysis of the protective
factors in aviation near misses. Ergonomics, 62(2),
192–203. https://doi.org/10.1080/00140139.2018.147
2804
Uberti, D. (2022). TSA Eases Pipeline Cybersecurity Rules
Issued After Colonial Hack. Wall Street Journal.
https://www.wsj.com/articles/tsa-eases-pipeline-cyber
security-rules-issued-after-colonial-hack-11656511031
Whitney, L. (2021). Kaseya supply chain attack impacts
more than 1,000 companies | TechRepublic.
TechRepublic. https://www.techrepublic.com/article/
kaseya-supply-chain-attack-impacts-more-than-1000-c
ompanies/
Wolff, J. (2016). Models for Cybersecurity Incident
Information Sharing and Reporting Policies. SSRN
Electronic Journal. https://doi.org/10.2139/ssrn.258
7398
Young, S. D. (2022). MEMORANDUM FOR THE
HEADS OF EXECUTIVE DEPARTMENTS AND
AGENCIES. The White House. https://www.
whitehouse.gov/wp-content/uploads/2022/09/M-22-18
.pdf.