1. Abdullahi, R., & Mansor, N. (2015). Fraud triangle theory and fraud diamond theory. Understanding the convergent and divergent for future research. Retrieved from https://pdfs.semanticscholar.org/d86f/5988fccc216c92c891191323a2c7f639b834.pdf
2. Abu-Shanab, E., & Matalqa, S. (2015). Security and fraud issues of E-banking. International Journal of Computer Networks and Applications, 2(4), 179–187. Retrieved from https://www.ijcna.org/Manuscripts/Volume-2/Issue-4/Vol-2-issue-4-M-04.pdf
3. Anderson, R., & Murdoch, J. S. (2014). EMV: Why payment systems fail. Retrieved from https://cacm.acm.org/magazines/2014/6/175170-emv/abstract
4. Binns, C. A. (2019). Investigations: Fraud. In L. Shapiro & M.-H. Maras (Eds.), Encyclopedia of security and emergency management. Cham: Springer.
5. Butavicius, A. M., Parson, K., Pattinson, R. M., & McCormac, A. (2016). Breaching the human firewall: Social engineering in phishing and spear-phishing emails. Retrieved from https://www.semanticscholar.org/paper/Breaching-the-Human-Firewall%3A-Social-engineering-in-Butavicius-Parsons/b58de02e690f07853e88cc93e93e5b71fdf9b493