1. Adams, A. and Sasse, M.A. (1999), “Users are not the enemy”, Communication on ACM, Vol. 42 No. 12, pp. 4-46, available at: http://doi.acm.org/10.1145/322796.322806
2. A practical assessment of social engineering vulnerabilities,2008
3. Penetration testing and social engineering: hacking the weakest link;Information Security Technical Report,2003
4. A serious game for eliciting social engineering security requirements,2016
5. HATCH: Hack and trick capricious humans – a serious game on social engineering,2016