1.
Safa, N. S. Human Aspects of Information Security in Organisations. Computer Fraud & Security 2016, 15–18 (2016).
2.
Smith, G. M. Into Cerberus’ Lair: Bringing the Idea of Security to Light. The British Journal of Politics and International Relations 7, 485–507 (2005).
3.
Leeuw, K. de & Bergstra, J. A. The History of Information Security: A Comprehensive Handbook. (Elsevier, 2007).
4.
Leeuw, K. de & Bergstra, J. A. The History of Information Security: A Comprehensive Handbook. (Elsevier, 2007).
5.
Öqvist, K. L. Hands-On Guide to GDPR Compliance: Privacy by Design, Privacy by Default. (International Association for Privacy Professionals, 2018).
6.
Warren, S. D. & Brandeis, L. D. The Right to Privacy. Harvard Law Review 4, (1890).
7.
Herath, T. & Rao, H. R. Protection Motivation and Deterrence: A Framework for Security Policy Compliance in Organisations. European Journal of Information Systems 18, 106–125 (2009).
8.
Cho, H., Lee, J.-S. & Chung, S. Optimistic Bias About Online Privacy Risks: Testing the Moderating Effects of Perceived Controllability and Prior Experience. Computers in Human Behavior 26, 987–995 (2010).
9.
Bulgurcu, B., Cavusoglu, H. & Benbasat, I. Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness. MIS Quarterly 34, (2010).
10.
Hovav, A. & D’Arcy, J. Applying an Extended Model of Deterrence Across Cultures: An Investigation of Information Systems Misuse in the U.S. and South Korea. Information & Management 49, 99–110 (2012).
11.
Herath, T. & Rao, H. R. Encouraging Information Security Behaviors in Organizations: Role of Penalties, Pressures and Perceived Effectiveness. Decision Support Systems 47, 154–165 (2009).
12.
Ifinedo, P. Understanding Information Systems Security Policy Compliance: An Integration of the Theory of Planned Behavior and the Protection Motivation Theory. Computers & Security 31, 83–95 (2012).
13.
Ciampa, M. D. Security Awareness: Applying Practical Security in Your World. (Cengage Learning, 2017).
14.
Wilson, M. & Hash, J. Building an Information Technology Security Awareness and Training Program.
15.
Adams, A. & Sasse, M. A. Users Are Not the Enemy. Communications of the ACM 42, 40–46 (1999).
16.
Arıcak, O. T., Dündar, Ş. & Saldaña, M. Mediating Effect of Self-Acceptance Between Values and Offline/online Identity Expressions Among College Students. Computers in Human Behavior 49, 362–374 (2015).
17.
Pfleeger, S. L., Sasse, M. A. & Furnham, A. From Weakest Link to Security Hero: Transforming Staff Security Behavior. Journal of Homeland Security and Emergency Management 11, (2014).
18.
Colwill, C. Human Factors in Information Security: The Insider Threat – Who Can You Trust These Days? Information Security Technical Report 14, 186–196 (2009).
19.
Öqvist, K. L. Hands-On Guide to GDPR Compliance: Privacy by Design, Privacy by Default. (International Association for Privacy Professionals, 2018).
20.
Dennedy, M. F., Fox, J. & Finneran, T. R. The Privacy Engineer’s Manifesto: Getting From Policy to Code to QA to Value. (Apress Open, 2014).
21.
Privacy Impact Assessment. vol. volume 6 (Springer, 2012).
22.
Clarke, R. Privacy Impact Assessment: Its Origins and Development. Computer Law & Security Review 25, 123–135 (2009).
23.
Acquisti, A. & Grossklags, J. Privacy and Rationality in Individual Decision Making. IEEE Security and Privacy Magazine 3, 26–33 (2005).
24.
Johnston & Warkentin. Fear Appeals and Information Security Behaviors: An Empirical Study. MIS Quarterly 34, (2010).
25.
Sharman, R. & Gupta, M. Social and Human Elements of Information Security: Emerging Trends and Countermeasures. (Information Science Reference, 2008).
26.
Gupta, M. & Sharman, R. Social and Human Elements of Information Security: Emerging Trends and Countermeasures. (Information Science Reference, 2009).
27.
Magnusson, J. Intentional Decentralization and Instinctive Centralization. Information Resources Management Journal 26, 1–17 (2013).
28.
Cialdini, R. B. Influence: The Psychology of Persuasion. (Collins, 2007).
29.
Cialdini, R. B. Influence: The Psychology of Persuasion. (Collins, 2009).
30.
Okenyi, P. O. & Owens, T. J. On the Anatomy of Human Hacking. Information Systems Security 16, 302–314 (2007).
31.
Hadnagy, C. Social Engineering: The Art of Human Hacking. (John Wiley & Sons, 2010).
32.
Hadnagy, C. Social Engineering: The Art of Human Hacking. (Wiley, 2011).
33.
Mitnick, K. D. & Simon, W. L. Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker. (Little, Brown, 2011).
34.
Da Veiga, A. & Eloff, J. H. P. A Framework and Assessment Instrument for Information Security Culture. Computers & Security 29, 196–207 (2010).
35.
Dourish, P. & Anderson, K. Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena. Human-Computer Interaction 21, 319–342 (2006).