1. Kaye, L.: An introduction to cyberpsychology. In: Cyberpsychology, Behavior, and Social Networking, vol. 19, no. 4, p. 294 (2016)
2. Connolly, I., Palmer, M., Barton, H., Kirwan, G.: An Introduction to Cyberpsychology. Taylor and Francis Group, London (2016)
3. Norman, K.: Cyberpsychology: An Introduction to Human Computer Interaction. Cambridge University Press, Cambridge (2008)
4. Griffin, P.: Biometric knowledge extraction for multi-factor authentication and key exchange. Procedia Comput. Sci. 61(2015), 66–71 (2016)
5. Shahmeer Amir: 4 Methods to Bypass two factor Authentication – Shahmeer Amir, 15 July 2017. https://shahmeeramir.com/4-methods-to-bypass-two-factor-authentication-2b0075d9eb5f