1.
Safa NS. Human Aspects of Information Security in Organisations. Computer Fraud & Security. 2016;2016(2):15-18. doi:10.1016/S1361-3723(16)30017-3
2.
Smith GM. Into Cerberus’ Lair: Bringing the Idea of Security to Light. The British Journal of Politics and International Relations. 2005;7(4):485-507. doi:10.1111/j.1467-856x.2005.00204.x
3.
Leeuw K de, Bergstra JA. The History of Information Security: A Comprehensive Handbook. Elsevier; 2007.
4.
Leeuw K de, Bergstra JA. The History of Information Security: A Comprehensive Handbook. Elsevier; 2007. http://ezproxy01.rhul.ac.uk/login?url=http://www.dawsonera.com/depp/reader/protected/external/AbstractView/S9780080550589
5.
Öqvist KL. Hands-On Guide to GDPR Compliance: Privacy by Design, Privacy by Default. International Association for Privacy Professionals; 2018.
6.
Warren SD, Brandeis LD. The Right to Privacy. Harvard Law Review. 1890;4(5). doi:10.2307/1321160
7.
Herath T, Rao HR. Protection Motivation and Deterrence: A Framework for Security Policy Compliance in Organisations. European Journal of Information Systems. 2009;18(2):106-125. doi:10.1057/ejis.2009.6
8.
Cho H, Lee JS, Chung S. Optimistic Bias About Online Privacy Risks: Testing the Moderating Effects of Perceived Controllability and Prior Experience. Computers in Human Behavior. 2010;26(5):987-995. doi:10.1016/j.chb.2010.02.012
9.
Bulgurcu B, Cavusoglu H, Benbasat I. Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness. MIS Quarterly. 2010;34(3). doi:10.2307/25750690
10.
Hovav A, D’Arcy J. Applying an Extended Model of Deterrence Across Cultures: An Investigation of Information Systems Misuse in the U.S. and South Korea. Information & Management. 2012;49(2):99-110. doi:10.1016/j.im.2011.12.005
11.
Herath T, Rao HR. Encouraging Information Security Behaviors in Organizations: Role of Penalties, Pressures and Perceived Effectiveness. Decision Support Systems. 2009;47(2):154-165. doi:10.1016/j.dss.2009.02.005
12.
Ifinedo P. Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory. Computers & Security. 2012;31(1):83-95. doi:10.1016/j.cose.2011.10.007
13.
Ciampa MD. Security Awareness: Applying Practical Security in Your World. Fifth edition. Cengage Learning; 2017.
14.
Wilson M, Hash J. Building an Information Technology Security Awareness and Training Program. https://ws680.nist.gov/publication/get_pdf.cfm?pub_id=151287
15.
Adams A, Sasse MA. Users Are Not the Enemy. Communications of the ACM. 1999;42(12):40-46. doi:10.1145/322796.322806
16.
Arıcak OT, Dündar Ş, Saldaña M. Mediating Effect of Self-Acceptance Between Values and Offline/online Identity Expressions Among College Students. Computers in Human Behavior. 2015;49:362-374. doi:10.1016/j.chb.2015.03.025
17.
Pfleeger SL, Sasse MA, Furnham A. From Weakest Link to Security Hero: Transforming Staff Security Behavior. Journal of Homeland Security and Emergency Management. 2014;11(4). doi:10.1515/jhsem-2014-0035
18.
Colwill C. Human Factors in Information Security: The Insider Threat – Who Can You Trust These Days? Information Security Technical Report. 2009;14(4):186-196. doi:10.1016/j.istr.2010.04.004
19.
Öqvist KL. Hands-On Guide to GDPR Compliance: Privacy by Design, Privacy by Default. International Association for Privacy Professionals; 2018.
20.
Dennedy MF, Fox J, Finneran TR. The Privacy Engineer’s Manifesto: Getting From Policy to Code to QA to Value. Apress Open; 2014.
21.
Wright D, Hert P de, eds. Privacy Impact Assessment. Vol volume 6. Springer; 2012.
22.
Clarke R. Privacy Impact Assessment: Its Origins and Development. Computer Law & Security Review. 2009;25(2):123-135. doi:10.1016/j.clsr.2009.02.002
23.
Acquisti A, Grossklags J. Privacy and Rationality in Individual Decision Making. IEEE Security and Privacy Magazine. 2005;3(1):26-33. doi:10.1109/MSP.2005.22
24.
Johnston, Warkentin. Fear Appeals and Information Security Behaviors: An Empirical Study. MIS Quarterly. 2010;34(3). doi:10.2307/25750691
25.
Sharman R, Gupta M. Social and Human Elements of Information Security: Emerging Trends and Countermeasures. Information Science Reference; 2008.
26.
Gupta M, Sharman R. Social and Human Elements of Information Security: Emerging Trends and Countermeasures. Information Science Reference; 2009. http://ezproxy01.rhul.ac.uk/login?url=http://www.dawsonera.com/depp/reader/protected/external/AbstractView/S9781605660370
27.
Magnusson J. Intentional Decentralization and Instinctive Centralization. Information Resources Management Journal. 2013;26(4):1-17. doi:10.4018/irmj.2013100101
28.
Cialdini RB. Influence: The Psychology of Persuasion. Revised edition. Collins; 2007.
29.
Cialdini RB. Influence: The Psychology of Persuasion. EPub edition. Collins; 2009. https://www.safaribooksonline.com/library/view/-/9780061899874/?ar
30.
Okenyi PO, Owens TJ. On the Anatomy of Human Hacking. Information Systems Security. 2007;16(6):302-314. doi:10.1080/10658980701747237
31.
Hadnagy C. Social Engineering: The Art of Human Hacking. John Wiley & Sons; 2010.
32.
Hadnagy C. Social Engineering: The Art of Human Hacking. Wiley; 2011. http://ezproxy01.rhul.ac.uk/login?url=http://www.dawsonera.com/depp/reader/protected/external/AbstractView/S9781118028018
33.
Mitnick KD, Simon WL. Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker. Little, Brown; 2011.
34.
Da Veiga A, Eloff JHP. A Framework and Assessment Instrument for Information Security Culture. Computers & Security. 2010;29(2):196-207. doi:10.1016/j.cose.2009.09.002
35.
Dourish P, Anderson K. Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena. Human-Computer Interaction. 2006;21(3):319-342. doi:10.1207/s15327051hci2103_2