The following is the full list of reference material used throughout the research project.
Baur-Ahrens, A. (2017). The power of cyberspace centralisation: analysing the example of data territorialisation. In M. Leese & S. Wittendorp (Eds.), Security/Mobility: Politics of Movement (pp. 37-56). Manchester University Press.
Better Cloud. (2019). State of Insider Threats in the Digital Workplace. https://www.bettercloud.com/monitor/wp-content/uploads/sites/3/2019/03/BetterCloud-State-of-Insider-Threats-2019-FINAL.pdf
Dennet, H. (2018). Collaborate with GovTEAMS: Govdex 2.0 gets a new name and release date. The Mandarin. Retrieved September 29, 2020, from https://www.themandarin.com.au/89991-govdex-2-0-gets-new-name-govteams-beta-launches-august/
Department of Defence. (2020). Service Level Charter – Australian Government Security Vetting Agency. Commonwealth of Australia,. https://www1.defence.gov.au/sites/default/files/doc/files/Service%20Level%20Charter%20-%20Agency.pdf
Department of Home Affairs. (2020). Australia’s Cyber Security Strategy 2020. Commonwealth of Australia,. https://www.homeaffairs.gov.au/cyber-security-subsite/files/cyber-security-strategy-2020.pdf
Digital Transformation Agency. (2018). Digital Transformation Strategy 2018 – 2025. https://www.dta.gov.au/digital-transformation-strategy/digital-transformation-strategy-2018-2025
Easton, S. (2018). Security problems surround the Commonwealth’s agencies. The Mandarin. Retrieved September 21, 2020, from https://www.themandarin.com.au/92812-security-problems-surround-the-commonwealths-agencies/
FireEye. (2017). Security Orchestration: Best practices for any organization. https://www2.fireeye.com/rs/848-DID-242/images/wp-accessible-security-orchestration.pdf
Griffith, M. K. (2018). A comprehensive security approach: bolstering Finnish cybersecurity capacity. Journal of Cyber Policy: SI: Comparative Industrial Policy and Cybersecurity, 3(3), 407-429. https://doi.org/10.1080/23738871.2018.1561919
Huang, H., & Li, T.-S. (2018). A centralised cybersecurity strategy for Taiwan. Journal of Cyber Policy: SI: Comparative Industrial Policy and Cybersecurity, 3(3), 344-362. https://doi.org/10.1080/23738871.2018.1553987
Islam, C., Babar, M., & Nepal, S. (2019). A Multi-Vocal Review of Security Orchestration. ACM Computing Surveys (CSUR), 52(2), 1-45. https://doi.org/10.1145/3305268
Jenkins, S. (2020). Commonwealth agencies ‘vulnerable to cyberthreats’, according to Australian Signals Directorate. The Mandarin. Retrieved September 30, 2020, from https://www.themandarin.com.au/130649-commonwealth-agencies-vulnerable-to-cyberthreats-according-to-australian-signals-directorate/
Linn, A. (2020). Securing the cloud. Microsoft News. Retrieved September 29, 2020, from https://news.microsoft.com/stories/cloud-security
MacDonald, N., Orans, L., & Skorupa, J. (2019). The Future of Network Security is in the Cloud. https://www.gartner.com/doc/reprints?id=1-1OG9EZYB&ct=190903&st=sb
Mallinder, J., & Drabwell, P. (2013). Cyber security: a critical examination of information sharing versus data sensitivity issues for organisations at risk of cyber attack. Journal of business continuity & emergency planning, 7(2), 103-111.
Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., & Ghalsasi, A. (2011). Cloud computing — The business perspective. Decision Support Systems, 51(1), 176-189. https://doi.org/10.1016/j.dss.2010.12.006
Microsoft News Center. (2020). Demand for GovTEAMS triples as Federal and State Governments strive to stay connected during pandemic. Microsoft News. Retrieved September 29, 2020, from https://news.microsoft.com/en-au/features/demand-for-govteams-triples-as-federal-and-state-governments-strive-to-stay-connected-during-pandemic/
Miskon, S., Bandara, W., Gable, G., & Fielt, E. (2011). Success and failure factors of Shared Services: An Information Systems literature analysis. Proceedings of the International Conference on Research and Innovation in Information Systems, 1-6. https://doi.org/10.1109/ICRIIS.2011.6125726
Moran, J. (2018). Security Orchestration, Automation and Response (SOAR) Technology. https://www.infosecurityeurope.com/__novadocuments/580567?v=636897259610400000
Neiva, C., Lawson, C., Bussa, T., & Sadowski, G. (2020). Market Guide for Security Orchestration, Automation and Response Solutions. https://www.gartner.com/doc/reprints?id=1-1Z9IGXEK&ct=200617&st=sb
Nickelsburg, M. (2019). What is JEDI? Explaining the $10B military cloud contract that Microsoft just won over Amazon. Geek Wire. Retrieved October 1, 2020, from https://www.geekwire.com/2019/jedi-explaining-10b-military-cloud-contract-microsoft-just-won-amazon/
Poppensieker, T., & Riemenschnitter, R. (2018). A new posture for cybersecurity in a networked world (McKinsey on Risk, Issue 5). https://www.mckinsey.com/~/media/McKinsey/Business Functions/Risk/Our Insights/A new posture for cybersecurity in a networked world/A-new-posture-for-cybersecurity-in-a-networked-world.pdf
Skopik, F., Settanni, G., & Fiedler, R. (2016). A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing. Computers & Security, 60, 154-176. https://doi.org/10.1016/j.cose.2016.04.003
Tourani, R., Bos, A., Misra, S., & Esposito, F. (2019). Towards security-as-a-service in multi-access edge. The Fourth ACM/IEEE Symposium on Edge Computing (pp. 358-363). https://doi.org/10.1145/3318216.3363335
Turvallisuuskomitea. (2019). Finland’s Cyber Security Strategy 2019. https://turvallisuuskomitea.fi/wp-content/uploads/2019/10/Kyberturvallisuusstrategia_A4_ENG_WEB_031019.pdf
U.S. Department of Defense. (2020, September 4). DOD Reaffirms Original JEDI Cloud Award to Microsoft https://www.defense.gov/Newsroom/Releases/Release/Article/2337557/dod-reaffirms-original-jedi-cloud-award-to-microsoft/