Acquisti, A., & Grossklags, J. (2005). Privacy and Rationality in Individual Decision Making. IEEE Security and Privacy Magazine, 3(1), 26–33. https://doi.org/10.1109/MSP.2005.22
Adams, A., & Sasse, M. A. (1999). Users Are Not the Enemy. Communications of the ACM, 42(12), 40–46. https://doi.org/10.1145/322796.322806
Arıcak, O. T., Dündar, Ş., & Saldaña, M. (2015). Mediating Effect of Self-Acceptance Between Values and Offline/online Identity Expressions Among College Students. Computers in Human Behavior, 49, 362–374. https://doi.org/10.1016/j.chb.2015.03.025
Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness. MIS Quarterly, 34(3). https://doi.org/10.2307/25750690
Cho, H., Lee, J.-S., & Chung, S. (2010). Optimistic Bias About Online Privacy Risks: Testing the Moderating Effects of Perceived Controllability and Prior Experience. Computers in Human Behavior, 26(5), 987–995. https://doi.org/10.1016/j.chb.2010.02.012
Cialdini, R. B. (2007). Influence: The Psychology of Persuasion (Revised edition). Collins.
Cialdini, R. B. (2009). Influence: The Psychology of Persuasion (EPub edition). Collins. https://www.safaribooksonline.com/library/view/-/9780061899874/?ar
Ciampa, M. D. (2017). Security Awareness: Applying Practical Security in Your World (Fifth edition). Cengage Learning.
Clarke, R. (2009). Privacy Impact Assessment: Its Origins and Development. Computer Law & Security Review, 25(2), 123–135. https://doi.org/10.1016/j.clsr.2009.02.002
Colwill, C. (2009). Human Factors in Information Security: The Insider Threat – Who Can You Trust These Days? Information Security Technical Report, 14(4), 186–196. https://doi.org/10.1016/j.istr.2010.04.004
Da Veiga, A., & Eloff, J. H. P. (2010). A Framework and Assessment Instrument for Information Security Culture. Computers & Security, 29(2), 196–207. https://doi.org/10.1016/j.cose.2009.09.002
Dennedy, M. F., Fox, J., & Finneran, T. R. (2014). The Privacy Engineer’s Manifesto: Getting From Policy to Code to QA to Value. Apress Open.
Dourish, P., & Anderson, K. (2006). Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena. Human-Computer Interaction, 21(3), 319–342. https://doi.org/10.1207/s15327051hci2103_2
Gupta, M., & Sharman, R. (2009). Social and Human Elements of Information Security: Emerging Trends and Countermeasures. Information Science Reference. http://ezproxy01.rhul.ac.uk/login?url=http://www.dawsonera.com/depp/reader/protected/external/AbstractView/S9781605660370
Hadnagy, C. (2010). Social Engineering: The Art of Human Hacking. John Wiley & Sons.
Hadnagy, C. (2011). Social Engineering: The Art of Human Hacking. Wiley. http://ezproxy01.rhul.ac.uk/login?url=http://www.dawsonera.com/depp/reader/protected/external/AbstractView/S9781118028018
Herath, T., & Rao, H. R. (2009a). Encouraging Information Security Behaviors in Organizations: Role of Penalties, Pressures and Perceived Effectiveness. Decision Support Systems, 47(2), 154–165. https://doi.org/10.1016/j.dss.2009.02.005
Herath, T., & Rao, H. R. (2009b). Protection Motivation and Deterrence: A Framework for Security Policy Compliance in Organisations. European Journal of Information Systems, 18(2), 106–125. https://doi.org/10.1057/ejis.2009.6
Hovav, A., & D’Arcy, J. (2012). Applying an Extended Model of Deterrence Across Cultures: An Investigation of Information Systems Misuse in the U.S. and South Korea. Information & Management, 49(2), 99–110. https://doi.org/10.1016/j.im.2011.12.005
Ifinedo, P. (2012). Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory. Computers & Security, 31(1), 83–95. https://doi.org/10.1016/j.cose.2011.10.007
Johnston & Warkentin. (2010). Fear Appeals and Information Security Behaviors: An Empirical Study. MIS Quarterly, 34(3). https://doi.org/10.2307/25750691
Leeuw, K. de, & Bergstra, J. A. (2007a). The History of Information Security: A Comprehensive Handbook. Elsevier.
Leeuw, K. de, & Bergstra, J. A. (2007b). The History of Information Security: A Comprehensive Handbook. Elsevier. http://ezproxy01.rhul.ac.uk/login?url=http://www.dawsonera.com/depp/reader/protected/external/AbstractView/S9780080550589
Magnusson, J. (2013). Intentional Decentralization and Instinctive Centralization. Information Resources Management Journal, 26(4), 1–17. https://doi.org/10.4018/irmj.2013100101
Mitnick, K. D., & Simon, W. L. (2011). Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker. Little, Brown.
Okenyi, P. O., & Owens, T. J. (2007). On the Anatomy of Human Hacking. Information Systems Security, 16(6), 302–314. https://doi.org/10.1080/10658980701747237
Öqvist, K. L. (2018a). Hands-On Guide to GDPR Compliance: Privacy by Design, Privacy by Default. International Association for Privacy Professionals.
Öqvist, K. L. (2018b). Hands-On Guide to GDPR Compliance: Privacy by Design, Privacy by Default. International Association for Privacy Professionals.
Pfleeger, S. L., Sasse, M. A., & Furnham, A. (2014). From Weakest Link to Security Hero: Transforming Staff Security Behavior. Journal of Homeland Security and Emergency Management, 11(4). https://doi.org/10.1515/jhsem-2014-0035
Safa, N. S. (2016). Human Aspects of Information Security in Organisations. Computer Fraud & Security, 2016(2), 15–18. https://doi.org/10.1016/S1361-3723(16)30017-3
Sharman, R., & Gupta, M. (2008). Social and Human Elements of Information Security: Emerging Trends and Countermeasures. Information Science Reference.
Smith, G. M. (2005). Into Cerberus’ Lair: Bringing the Idea of Security to Light. The British Journal of Politics and International Relations, 7(4), 485–507. https://doi.org/10.1111/j.1467-856x.2005.00204.x
Warren, S. D., & Brandeis, L. D. (1890). The Right to Privacy. Harvard Law Review, 4(5). https://doi.org/10.2307/1321160
Wilson, M., & Hash, J. (n.d.). Building an Information Technology Security Awareness and Training Program. https://ws680.nist.gov/publication/get_pdf.cfm?pub_id=151287
Wright, D., & Hert, P. de (Eds.). (2012). Privacy Impact Assessment: Vol. volume 6. Springer.