1. Aburrous, M.
,
Hossain, M.A.
,
Dahal, K.
and
Thabtah, F.
(2010), “Experimental case studies for investigating E-Banking phishing techniques and attack strategies”, Cognitive Computation, Vol. 2 No. 3, pp. 242-253.
2. Allen, B.R.
(1982), “Cognitive factors in human interaction with computers”, Behaviour and Information Technology, Vol. 1 No. 3, pp. 257-278.
3. Altintas, M.H.
and
Gursakal, N.
(2007), “Phishing attacks and perceptions of service quality: a content analysis of Internet banking in Turkey”, Journal of Internet Banking and Commerce, Vol. 12 No. 2, pp. 1-13.
4. Anastasiadou, S.
(2006), “Factorial avalidity evaluation of a measurement through principal components analysis and implicative statistical analysis”, in
Xatzidimou, D.X.
,
Mpikos, K.
,
Stravakou, P.A.
and
Xatzidimou, K.D.
(Eds), 5th Hellenic Conference of Pedagogy Company, Thessaloniki, pp. 341-348.
5. Anderson, K.B.
,
Durbin, E.
and
Salinger, M.A.
(2008), “Identity theft”, Journal of Economic Perspectives, Vol. 22 No. 2, pp. 171-192.