1. Wright, A., Aaron, S., & Bates, D. W. (2016). The big phish: Cyberattacks against US healthcare systems. Journal of General Internal Medicine, 31, 1115–1118.
2. Jarrett, M. P. (2017). Cybersecurity—A serious patient care concern. JAMA, 318(14), 1319–1320.
3. Gudla, C., Rana, M. S., & Sung, A. H. (2018). Defense techniques against cyber attacks on unmanned aerial vehicles. In Proceedings of the international conference on embedded systems, cyber-physical systems, and applications (ESCS). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp).
4. Anawar, S., Kunasegaran, D. L., Mas’ud, M. Z., Zakaria, N. A., et al. (2019). Analysis of phishing susceptibility in a workplace: A big-five personality perspectives. Journal of Engineering Science and Technology, 14(5), 2865–2882.
5. Sommestad, T., & Karlzén, H. (2019). A meta-analysis of field experiments on phishing susceptibility. In 2019 APWG symposium on electronic crime research (eCrime). IEEE.