1. Aaron, G. (2010). The state of phishing. Computer Fraud & Security, 6, 5-8.
2. Bandyopadhyay, S. (2009). Antecedents and consequences of consumers online privacy concerns. Journal of Business & Economics Research, 7 (3), 41-48.
3. Bergstein, B. (2004, January 1), AOL lists most common spam messages, Detroit Free Press. Retrieved November 20, 2012 from http://www.crn.com/news/channel-programs/18825162/aol-cites-top-spam-topics.htm.
4. Boyce, C. & Neale, P. (2006). Conducting In-depth interviews: A Guide for Designing and Conducting In-depth Interviews for Evaluation Input. http://www.pathfind.org/site/DocServer/m_e_tool_series_indepth_interviews.pdf?docID=6301.
5. Buchanan, T., Paine, C., Joinson, A., & Reips, U.-D. (2006). Development of measures of online privacy concern and protection for use on the Internet. Journal of the American Society for Information Science and Technology, 58 (2), 157-165.