1. J. Bichsel, E. Dahlstrom, Ecar study of undergraduate students and information technology, 2014, Educause, Louisville.
2. L. L. Bann, M. M. Singh, A. Samsudin, Trusted security policies for tackling advanced persistent threat via spear phishing in byod environment, Procedia Computer Science 72 (2015) 129–136. URL http://www.sciencedirect.com/science/article/pii/S1877050915035747.
3. Z.Zulkefli,M.Mahinderjit-Singh,N.Malim,AdvancedPersistentThreatMitigationUsingMultiLevelSecurity AccessControlFramework, Vol. 9158 of Lecture Notes in Computer Science, Springer International Publishing, 2015, book section 7, pp. 90–105.
4. Protection motivation and deterrence: a framework for security policy compliance in organisations;Herath;European Journal of Information Systems,2009
5. Comparing intention to avoid malware across contexts in a byod-enabled Australian university: A protection motivation theory approach;Dang-Pham;Computers & Security,2015