1. https://www.bundesdruckerei.de/de/studie-it-sicherheit
, Abruf am 11.7.2017
2. https://www.bmwi.de/Redaktion/DE/Publikationen/Studien/kompetenzen-fuer-einedigitale-souveraenitaet.pdf? blob=publicationFile&v=14
, Abruf am 11.7.2017
3. https://www.bitkom.org/Presse/Presseinformation/IT-Sicherheit-Cloud-Computing-und-Internet-of-Things-sind-Top-Themen-des-Jahres-in-der-Digitalwirtschaft.html
, Abruf am 11.7.2017
4. Fry, A., Chiasson, S., & Somayaji, A. (2012, June). Not sealed but delivered: The (un) usability of s/mime today. In Annual Symposium on Information Assurance and Secure Knowledge Management (ASIA’12), Albany, NY.
5. https://arstechnica.com/security/2013/06/encrypted-e-mail-how-much-annoyance-will-you-tolerate-to-keep-the-nsa-away/3/
, Abruf am 21.7.2017