1. Aufderheide, P. (1993). Media literacy. A report of the national leadership conference on media literacy. Washington, DC: Aspen Inst.
2. Aytes, K., & Conolly, T. (2003). A research model for investigating human behavior related to computer security. In 9th Americas conference on information systems (pp. 2027–2031). Florida, USA: Tampa.
3. Baumgartner, S. E., Valkenburg, P. M., & Peter, J. (2010). Unwanted online sexual solicitation and risky sexual online behavior across the lifespan. Journal of Applied Developmental Psychology, 31(6), 439–447. https://doi.org/10.1016/j.appdev.2010.07.005 .
4. Berkman Center for Internet & Society. (2008). Enhancing child safety & online technologies. Cambridge, US. Retrieved from http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/ISTTF_Final_Report.pdf .
5. Camacho, S., Hassanein, K., & Head, M. (2014). Understanding the factors that influence the perceived severity of cyber-bullying. HCI in business (pp. 133–144). Hamilton, Canada: Springer International Publishing.