1. Here's Johnny: A methodology for developing attacker personas;Atzeni,2011
2. Cyber security awareness campaigns: Why do they fail to change behaviour?;Bada,2015
3. A serious game for eliciting social engineering security requirements;Beckers,2016
4. BS ISO/IEC 27001:2013: Information technology – Security techniques – Information security management systems – Requirements [Electronic version];British Standards Institution,2016