1. Amankwa, E., Loock, M., and Kritzinger, E. 2014. “A Conceptual Analysis of Information Security Education, Information Security Training and Information Security Awareness Definitions,” in Internet Technology and Secured Transactions (ICITST), 2014 9th International Conference, pp. 248–252.
2. Bartel, A. P. (1994). Productivity gains from the implementation of employee training programs. Industrial relations: a journal of economy and society, 33(4), 411–425.
3. Blundell, R., Griffith, R., & Van Reenen, J. (1995). Dynamic count data models of technological innovation. The Economic Journal, 333–344.
4. Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness. MIS Quarterly, 34(3), 523–548.
5. Burns, A. J., Posey, C., Courtney, J. F., Roberts, T. L., & Nanayakkara, P. (2017). Organizational information security as a complex adaptive system: Insights from three agent-based models. Information Systems Frontiers, 19(3), 509–524.