Bibliography

The following is the full list of reference material used throughout the research project.

Baur-Ahrens, A. (2017). The power of cyberspace centralisation: analysing the example of data territorialisation. In M. Leese & S. Wittendorp (Eds.), Security/Mobility: Politics of Movement (pp. 37-56). Manchester University Press.

Dennet, H. (2018). Collaborate with GovTEAMS: Govdex 2.0 gets a new name and release date. The Mandarin. Retrieved September 29, 2020, from https://www.themandarin.com.au/89991-govdex-2-0-gets-new-name-govteams-beta-launches-august/

Department of Defence. (2020). Service Level Charter – Australian Government Security Vetting Agency.  Commonwealth of Australia,. https://www1.defence.gov.au/sites/default/files/doc/files/Service%20Level%20Charter%20-%20Agency.pdf

Department of Home Affairs. (2020). Australia’s Cyber Security Strategy 2020.  Commonwealth of Australia,. https://www.homeaffairs.gov.au/cyber-security-subsite/files/cyber-security-strategy-2020.pdf

Digital Transformation Agency. (2018). Digital Transformation Strategy 2018 – 2025. https://www.dta.gov.au/digital-transformation-strategy/digital-transformation-strategy-2018-2025

Easton, S. (2018). Security problems surround the Commonwealth’s agencies. The Mandarin. Retrieved September 21, 2020, from https://www.themandarin.com.au/92812-security-problems-surround-the-commonwealths-agencies/

FireEye. (2017). Security Orchestration: Best practices for any organization. https://www2.fireeye.com/rs/848-DID-242/images/wp-accessible-security-orchestration.pdf

Griffith, M. K. (2018). A comprehensive security approach: bolstering Finnish cybersecurity capacity. Journal of Cyber Policy: SI: Comparative Industrial Policy and Cybersecurity, 3(3), 407-429. https://doi.org/10.1080/23738871.2018.1561919

Huang, H., & Li, T.-S. (2018). A centralised cybersecurity strategy for Taiwan. Journal of Cyber Policy: SI: Comparative Industrial Policy and Cybersecurity, 3(3), 344-362. https://doi.org/10.1080/23738871.2018.1553987

Islam, C., Babar, M., & Nepal, S. (2019). A Multi-Vocal Review of Security Orchestration. ACM Computing Surveys (CSUR), 52(2), 1-45. https://doi.org/10.1145/3305268

Jenkins, S. (2020). Commonwealth agencies ‘vulnerable to cyberthreats’, according to Australian Signals Directorate. The Mandarin. Retrieved September 30, 2020, from https://www.themandarin.com.au/130649-commonwealth-agencies-vulnerable-to-cyberthreats-according-to-australian-signals-directorate/

Linn, A. (2020). Securing the cloud. Microsoft News. Retrieved September 29, 2020, from https://news.microsoft.com/stories/cloud-security

MacDonald, N., Orans, L., & Skorupa, J. (2019). The Future of Network Security is in the Cloud. https://www.gartner.com/doc/reprints?id=1-1OG9EZYB&ct=190903&st=sb

Mallinder, J., & Drabwell, P. (2013). Cyber security: a critical examination of information sharing versus data sensitivity issues for organisations at risk of cyber attack. Journal of business continuity & emergency planning, 7(2), 103-111.

Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., & Ghalsasi, A. (2011). Cloud computing — The business perspective. Decision Support Systems, 51(1), 176-189. https://doi.org/10.1016/j.dss.2010.12.006

Microsoft News Center. (2020). Demand for GovTEAMS triples as Federal and State Governments strive to stay connected during pandemic. Microsoft News. Retrieved September 29, 2020, from https://news.microsoft.com/en-au/features/demand-for-govteams-triples-as-federal-and-state-governments-strive-to-stay-connected-during-pandemic/

Miskon, S., Bandara, W., Gable, G., & Fielt, E. (2011). Success and failure factors of Shared Services: An Information Systems literature analysis. Proceedings of the International Conference on Research and Innovation in Information Systems, 1-6. https://doi.org/10.1109/ICRIIS.2011.6125726

Moran, J. (2018). Security Orchestration, Automation and Response (SOAR) Technology. https://www.infosecurityeurope.com/__novadocuments/580567?v=636897259610400000

Neiva, C., Lawson, C., Bussa, T., & Sadowski, G. (2020). Market Guide for Security Orchestration, Automation and Response Solutions. https://www.gartner.com/doc/reprints?id=1-1Z9IGXEK&ct=200617&st=sb

Nickelsburg, M. (2019). What is JEDI? Explaining the $10B military cloud contract that Microsoft just won over Amazon. Geek Wire. Retrieved October 1, 2020, from https://www.geekwire.com/2019/jedi-explaining-10b-military-cloud-contract-microsoft-just-won-amazon/

Poppensieker, T., & Riemenschnitter, R. (2018). A new posture for cybersecurity in a networked world (McKinsey on Risk, Issue 5). https://www.mckinsey.com/~/media/McKinsey/Business Functions/Risk/Our Insights/A new posture for cybersecurity in a networked world/A-new-posture-for-cybersecurity-in-a-networked-world.pdf

Skopik, F., Settanni, G., & Fiedler, R. (2016). A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing. Computers & Security, 60, 154-176. https://doi.org/10.1016/j.cose.2016.04.003

Tourani, R., Bos, A., Misra, S., & Esposito, F. (2019). Towards security-as-a-service in multi-access edge. The Fourth ACM/IEEE Symposium on Edge Computing (pp. 358-363).  https://doi.org/10.1145/3318216.3363335

Turvallisuuskomitea. (2019). Finland’s Cyber Security Strategy 2019. https://turvallisuuskomitea.fi/wp-content/uploads/2019/10/Kyberturvallisuusstrategia_A4_ENG_WEB_031019.pdf

U.S. Department of Defense. (2020, September 4). DOD Reaffirms Original JEDI Cloud Award to Microsoft https://www.defense.gov/Newsroom/Releases/Release/Article/2337557/dod-reaffirms-original-jedi-cloud-award-to-microsoft/