1. Abraham, S., & Chengalur-Smith, I. (2010). An overview of social engineering malware: Trends, tactics, and implications. Technology in Society, 32(3), 183–196.
2. Acquisti, A., Brandimarte, L., & Loewenstein, G. (2015). Privacy and human behavior in the age of information. Science, 347(6221), 509–514.
3. Acquisti, A., Adjerid, I., Balebako, R., Brandimarte, L., Cranor, L. F., Komanduri, S., et al. (2017). Nudges for privacy and security: Understanding and assisting users’ choices online. ACM Computing Surveys, 50(3), 44:1–44:41.
4. Alnajim, A., & Munro, M. (2009). An anti-phishing approach that uses training intervention for phishing websites detection. In ITNG 2009 – 6th international conference on information technology: New generations IEEE Computer Society Washington, DC, USA (pp. 405–410).
5. Arthur, C. (2010). Virus phone scam being run from call centres in India. [Newspaper Article]. Retrieved from
http://www.theguardian.com/world/2010/jul/18/phone-scam-india-call-centres
.