1.
Safa NS. Human Aspects of Information Security in Organisations. Computer Fraud & Security. 2016;2016(2):15–18.
2.
Smith GM. Into Cerberus’ Lair: Bringing the Idea of Security to Light. The British Journal of Politics and International Relations. 2005;7(4):485–507.
3.
Leeuw K de, Bergstra JA. The History of Information Security: A Comprehensive Handbook. Amsterdam: Elsevier; 2007.
4.
Leeuw K de, Bergstra JA. The History of Information Security: A Comprehensive Handbook [Internet]. Amsterdam: Elsevier; 2007. Available from: http://ezproxy01.rhul.ac.uk/login?url=http://www.dawsonera.com/depp/reader/protected/external/AbstractView/S9780080550589
5.
Öqvist KL. Hands-On Guide to GDPR Compliance: Privacy by Design, Privacy by Default. Portsmouth, NH: International Association for Privacy Professionals; 2018.
6.
Warren SD, Brandeis LD. The Right to Privacy. Harvard Law Review. 1890;4(5).
7.
Herath T, Rao HR. Protection Motivation and Deterrence: A Framework for Security Policy Compliance in Organisations. European Journal of Information Systems. 2009;18(2):106–125.
8.
Cho H, Lee JS, Chung S. Optimistic Bias About Online Privacy Risks: Testing the Moderating Effects of Perceived Controllability and Prior Experience. Computers in Human Behavior. 2010;26(5):987–995.
9.
Bulgurcu B, Cavusoglu H, Benbasat I. Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness. MIS Quarterly. 2010;34(3).
10.
Hovav A, D’Arcy J. Applying an Extended Model of Deterrence Across Cultures: An Investigation of Information Systems Misuse in the U.S. and South Korea. Information & Management. 2012 Mar;49(2):99–110.
11.
Herath T, Rao HR. Encouraging Information Security Behaviors in Organizations: Role of Penalties, Pressures and Perceived Effectiveness. Decision Support Systems [Internet]. 2009;47(2):154–165. Available from: https://www.sciencedirect.com/science/article/pii/S0167923609000530
12.
Ifinedo P. Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory. Computers & Security [Internet]. 2012;31(1):83–95. Available from: https://www.sciencedirect.com/science/article/pii/S0167404811001337
13.
Ciampa MD. Security Awareness: Applying Practical Security in Your World. Fifth edition. Australia: Cengage Learning; 2017.
14.
Wilson M, Hash J. Building an Information Technology Security Awareness and Training Program [Internet]. Available from: https://ws680.nist.gov/publication/get_pdf.cfm?pub_id=151287
15.
Adams A, Sasse MA. Users Are Not the Enemy. Communications of the ACM. 1999;42(12):40–46.
16.
Arıcak OT, Dündar Ş, Saldaña M. Mediating Effect of Self-Acceptance Between Values and Offline/online Identity Expressions Among College Students. Computers in Human Behavior. 2015;49:362–374.
17.
Pfleeger SL, Sasse MA, Furnham A. From Weakest Link to Security Hero: Transforming Staff Security Behavior. Journal of Homeland Security and Emergency Management [Internet]. 2014;11(4). Available from: https://discovery.ucl.ac.uk/id/eprint/1460572/2/jhsem-2014-0035.pdf
18.
Colwill C. Human Factors in Information Security: The Insider Threat – Who Can You Trust These Days? Information Security Technical Report. 2009;14(4):186–196.
19.
Öqvist KL. Hands-On Guide to GDPR Compliance: Privacy by Design, Privacy by Default. Portsmouth, NH: International Association for Privacy Professionals; 2018.
20.
Dennedy MF, Fox J, Finneran TR. The Privacy Engineer’s Manifesto: Getting From Policy to Code to QA to Value. [Place of publication not identified]: Apress Open; 2014.
21.
Wright D, Hert P de, editors. Privacy Impact Assessment. Dordrecht: Springer; 2012.
22.
Clarke R. Privacy Impact Assessment: Its Origins and Development. Computer Law & Security Review [Internet]. 2009;25(2):123–135. Available from: https://www.sciencedirect.com/science/article/pii/S0267364909000302
23.
Acquisti A, Grossklags J. Privacy and Rationality in Individual Decision Making. IEEE Security and Privacy Magazine. 2005;3(1):26–33.
24.
Johnston, Warkentin. Fear Appeals and Information Security Behaviors: An Empirical Study. MIS Quarterly. 2010;34(3).
25.
Sharman R, Gupta M. Social and Human Elements of Information Security: Emerging Trends and Countermeasures. Hershey, Pa: Information Science Reference; 2008.
26.
Gupta M, Sharman R. Social and Human Elements of Information Security: Emerging Trends and Countermeasures [Internet]. Hershey, PA: Information Science Reference; 2009. Available from: http://ezproxy01.rhul.ac.uk/login?url=http://www.dawsonera.com/depp/reader/protected/external/AbstractView/S9781605660370
27.
Magnusson J. Intentional Decentralization and Instinctive Centralization. Information Resources Management Journal [Internet]. 2013;26(4):1–17. Available from: https://www.igi-global.com/gateway/article/99710
28.
Cialdini RB. Influence: The Psychology of Persuasion. Revised edition. New York: Collins; 2007.
29.
Cialdini RB. Influence: The Psychology of Persuasion [Internet]. EPub edition. New York: Collins; 2009. Available from: https://www.safaribooksonline.com/library/view/-/9780061899874/?ar
30.
Okenyi PO, Owens TJ. On the Anatomy of Human Hacking. Information Systems Security. 2007;16(6):302–314.
31.
Hadnagy C. Social Engineering: The Art of Human Hacking. John Wiley & Sons; 2010.
32.
Hadnagy C. Social Engineering: The Art of Human Hacking [Internet]. Indianapolis, Ind: Wiley; 2011. Available from: http://ezproxy01.rhul.ac.uk/login?url=http://www.dawsonera.com/depp/reader/protected/external/AbstractView/S9781118028018
33.
Mitnick KD, Simon WL. Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker. New York: Little, Brown; 2011.
34.
Da Veiga A, Eloff JHP. A Framework and Assessment Instrument for Information Security Culture. Computers & Security. 2010;29(2):196–207.
35.
Dourish P, Anderson K. Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena. Human-Computer Interaction. 2006;21(3):319–342.