1. Akyeşilmen, N. (2018). Siber politika ve siber güvenlik, Ankara: Orion Kitapevi.
2. Aldawood, H. And Skinner, D. (2019). Contemporary cyber security social engineering solutions, measures, policies, tools and applications: A critical appraisal, International Journal of Security (IJS), 10(1), 1-15. https://f.hubspotusercontent30.net/hubfs/8156085/WhitePaper%20-%20IJS%20-%20Contemporary%20Cyber%20Security%20Social%20Engineering%20Solutions%5B1%5D.pdf Access date: October 30, 2022.
3. Allen, J. (2022). Social engineering penetration testing: Attacks, methods, & steps. https://purplesec.us/social-engineering-penetration-testing/ Access date: November 13, 2022.
4. Baezner, M and Robin, P. (2017). Hotspot analysis: Stuxnet, Zürich:Center for Security Studies (CSS). https://css.ethz.ch/content/dam/ethz/special-interest/gess/cis/center-for-securities-studies/pdfs/Cyber-Reports-2017-04.pdf Access date: November 10, 2022.
5. Breda, F., Barbosa, H. and Morais, T. (2017). Social engineering and cybersecurity, conference: International technology, education and development conference. https://www.researchgate.net/publication/315351300_SOCIAL_ENGINEERING_AND_CYBER_SECURITY Access date: October 30, 2022.