1. Agrafiotis, I., Bada, M., Cornish, P., Creese, S., Goldsmith, M., Ignatuschtschenko, E., Roberts, T., & Upton, D.M. Cyber harm: Concepts, taxonomy and measurement, Saïd Business School WP 23.
2. Albarracín, D., Gillette, J. C., Earl, A. N., Glasman, L. R., Durantini, M. R., & Ho, M.-H. (2005). A test of major assumptions about behaviorchange: A comprehensive look at the effects of passive and active HIV-prevention interventions since the beginning of the epidemic., Psychological Bulletin, 131(6), 856–897.
3. Albayram, Y., Khan, M.M.H., Jensen, T., & Nguyen, N. (2017). “... Better to use a lock screen than to worry about saving a few seconds of time”: Effect of Fear Appeal in the Context of Smartphone Locking Behavior. In: Thirteenth symposium on usable privacy and security (SOUPS), Santa Clara, CA (pp. 49–63).
4. American Psychological Association, Ethical Principles of Psychologists and Code of Conduct. Retrieved May 18, 2018, from http://www.apa.org/ethics/code/index.aspx.
5. Anabo, I. F., Elexpuru-Albizuri, I., & Villardón-Gallego, L. (2019). Revisiting the belmont report’s ethical principles in internet-mediated research: Perspectives from disciplinary associations in the social sciences. Ethics and Information Technology, 21(2), 137–149.