1. Albakry , S. et al . 2020 . What is this URL's Destination?Empirical Evaluation of Users' URL Reading . (2020). DOI:https://doi.org/10.1145/3313831.3376168. 10.1145/3313831.3376168 Albakry, S. et al. 2020. What is this URL's Destination?Empirical Evaluation of Users' URL Reading. (2020). DOI:https://doi.org/10.1145/3313831.3376168.
2. Why phishing still works: User strategies for combating phishing attacks
3. Amran , A. et al . 2018 . Habituation effects in computer security warning. https://doi.org/10.1080/19393555.2018.1505008. 27, 4 (Jul. 2018), 192--204. DOI:https://doi.org/10.1080/19393555.2018.1505008. 10.1080/19393555.2018.1505008 Amran, A. et al. 2018. Habituation effects in computer security warning. https://doi.org/10.1080/19393555.2018.1505008. 27, 4 (Jul. 2018), 192--204. DOI:https://doi.org/10.1080/19393555.2018.1505008.
4. Phishing threat avoidance behaviour: An empirical investigation
5. Arnett , J. 1992. Reckless behavior in adolescence: A developmental perspective. Developmental Review. 12, 4 ( 1992 ), 339--373. DOI:https://doi.org/10.1016/0273--2297(92)90013-R. 10.1016/0273--2297(92)90013-R Arnett, J. 1992. Reckless behavior in adolescence: A developmental perspective. Developmental Review. 12, 4 (1992), 339--373. DOI:https://doi.org/10.1016/0273--2297(92)90013-R.