1. Li, Y., Siponen, M.: A call for research on home users information security behaviour. In: PACIS 2011, Proceedings, p. 112 (2011)
2. Stanton, J.M., et al.: Analysis of end user security behaviors. Comput. Secur. 24, 124–133 (2005). Elsevier
3. Payne, B., Edwards, W.: A brief introduction to usable security. IEEE Internet Comput. 12(3), 13–21 (2008)
4. Fetscherin, M.: Importance of cultural and risk aspects in music piracy: a cross-national comparison among university students. J. Electron. Commer. Res. 10, 45–55 (2009).
http://www.csulb.edu/journals/jecr/issues/20091/Paper4.pdf
5. Hadnagy, C.: Social Engineering: The Art of Human Hacking. Wiley Publishing, Indianapolis (2011). pp. 23–24