1. Anderson, R., Moore, T.: Information security: where computer science, economics and psychology meet. Philos. Trans. R. Soc. A Math. Phys. Eng. Sci. 367(1898), 2717–2727 (2009)
2. Auchard, E.: Smartphones at Risk: Vulnerable to Stolen Passwords, Data Theft, August 2014. http://www.carriermanagement.com/news/2014/08/05/127054.htm
3. Bangladesh Telecommunication Regulatory Commission: Internet Subscribers in Bangladesh, January 2015. http://www.btrc.gov.bd/content/internet-subscribers-bangladesh-january-2015
4. Bureau of Justice Statistics: Identity Theft Supplement (ITS) to the National Crime Victimization Survey (2012). http://www.bjs.gov/content/pub/pdf/vit12.pdf
5. Chen, J., Paik, M., McCabe, K.: Exploring internet security perceptions and practices in Urban Ghana. In: Proceedings of SOUPS. Usenix (2014)