1. Choi, Y. S., & Seo, D. G. (2006). Analysis on Leakage and countermeasures of private information through social engineering attacks. Journal of Korea Institute of Information Security and Cryptology, 16(1), 40–48.
2. McAfee Lab. McAfee Threats Report: Third Quarter 2012. http://www.mcafee.com/us/resources/reports/rp-quarterly-threat-q3-2012.pdf .
3. Kaspersky Lab. The evolution of phishing attacks: 2011–2013. http://media.kaspersky.com/pdf/Kaspersky_Lab_KSN_report_The_Evolution_of_Phishing_Attacks_2011-2013.pdf .
4. IDC. Growth accelerates in the worldwide mobile phone and smartphone markets in the second quarter, According to IDC. http://www.idc.com/getdoc.jsp?containerId=prUS24239313 .
5. Kaspersky Lab. Kaspersky Security Bulletin 2012. The overall statistics for 2012. http://www.securelist.com/en/analysis/204792255/ ”.