1. Abu-Salma, Ruba, M. Angela Sasse, Joseph Bonneau, Anastasia Danilova, Alena Naiakshina, and Matthew Smith. 2017. Obstacles to the adoption of secure communication tools. In Proceedings—IEEE Symposium on Security and Privacy, 137–153.
2. AccessNow. 2022. AccessNow helpline guides. https://guides.accessnow.org/. Accessed 21 Mar 2022.
3. ACM. 2018. ACM code of ethics and professional conduct. https://www.acm.org/code-of-ethics. Accessed 21 Mar 2022.
4. Aggarwal, Charu C., and Philip S. Yu. 2008. A general survey of privacy-preserving data mining models and algorithms. In Privacy-Preserving Data Mining. Advances in Database Systems,, vol. 34, ed. Charu C. Aggarwal, Philip S. Yu, 11–52. Boston: Springer. https://doi.org/10.1007/978-0-387-70992-5_2.
5. Aggarwal, Puneet Kumar, P.S. Grover, and Laxmi Ahuja. 2018. Security aspect in instant mobile messaging applications. In IEEE International Conference on 2018 Recent Advances on Engineering, Technology and Computational Sciences, RAETCS 2018.