1. Liu J, Ye Y (2001) Introduction to E-commerce agents: marketplace solutions, security issues, and supply and demand. In: E-commerce agents, marketplace solutions, security issues, and supply and demand, London, UK
2. APWG, Aaron G, Manning R (2013) APWG phishing reports. APWG, 1 February 2013. [Online]. Available: http://www.antiphishing.org/resources/apwg-reports/ . Accessed 8 Feb 2013
3. Kaspersky Lab (2013) Spam in January 2012: love, politics and sport. [Online]. Available: http://www.kaspersky.com/about/news/spam/2012/Spam_in_January_2012_Love_Politics_and_Sport . Accessed 11 Feb 2013
4. Seogod (2011) Black Hat SEO. SEO Tools. [Online]. Available: http://www.seobesttools.com/black-hat-seo/ . Accessed 8 Jan 2013
5. Dhamija R, Tygar JD, Hearst M (2006) Why phishing works. In: Proceedings of the SIGCHI conference on human factors in computing systems, Cosmopolitan Montréal, Canada