1. User preference of cyber security awareness delivery methods
2. Abbasi , A. , Zahedi , F. M. , & Chen , Y. ( 2016 ). Phishing susceptibility: The good, the bad, and the ugly. Paper presented at the 2016 IEEE Conference on Intelligence and Security Informatics . Abbasi, A., Zahedi, F. M., & Chen, Y. (2016). Phishing susceptibility: The good, the bad, and the ugly. Paper presented at the 2016 IEEE Conference on Intelligence and Security Informatics.
3. Abraham , S. , & Chengalur-Smith , I. ( 2019 ). Evaluating the effectiveness of learner controlled information security training. Computers & Security, 87 . Abraham, S., & Chengalur-Smith, I. (2019). Evaluating the effectiveness of learner controlled information security training. Computers & Security, 87.
4. Lecture Notes in Engineering and Computer Science;Al-Daeef M. M.,2017