1. Bulgurcu, B., Cavusoglu, H., Benbasat, I.: Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness. MIS Q. 34(3), 523–548 (2010)
2. Busch, M., Wolkerstorfer, P., Hochleitner, C., Regal, G., Tscheligi, M.: Designing a persuasive application to improve organizational information security policy awareness, attitudes and behavior. In: Poster Abstract, 10th Symposium on Usable Privacy and Security, SOUPS 2014 (2014)
3. Chiasson, S., Forget, A., Biddle, R., van Oorschot, P.C.: Influencing users towards better passwords: Persuasive cued click-points. In: Proceedings of the 22nd British HCI Group Annual Conference, BCS-HCI 2008, pp. 121–130, British Computer Society, Swinton, UK (2008)
4. Chiasson, S., Stobert, E., Forget, A., Biddle, R., Van Oorschot, P.: Persuasive cued click-points: Design, implementation, and evaluation of a knowledge-based authentication mechanism. IEEE Trans. Dependable Secur. Comput. 9(2), 222–235 (2012)
5. Department for Business, Innovation & Skills: Information security breaches survey (2013). http://www.pwc.co.uk/assets/pdf/cyber-security-2013-exec-summary.pdf