1. Adams, A., Sasse, M.A.: Users are not the enemy. Communications of the ACM 42(12), 40–46 (1999)
2. Anderson, L., Krathwohl, D., Airasian, P., Cruikshank, K., Mayer, R., Pintrich, P., Raths, J., Wittrock, M.: A taxonomy for learning, teaching, and assessing. In: Anderson, L., Krathwohl, D. (eds.) A Revision of Bloom’s Taxonomy of Educational Objectives, Complete Edition, pp. 212–218. Longman (2001)
3. Appelt, W., Hinrichs, E., Woetzel, G.: Effectiveness and efficiency: the need for tailorable user interfaces on the web. Computer Networks and ISDN Systems 30(1), 499–508 (1998)
4. Lecture Notes in Computer Science;F. Asgharpour,2007
5. Asgharpour, F., Liu, D., Camp, L.J.: Mental models of computer security risks. In: WEIS: Workshop on the Economics of Information Security, Carnegie Mellon University, June 7-8 (2007)