1. 2020. Get Safe Online. (2020). https://www.getsafeonline.org/ 2020. Get Safe Online. (2020). https://www.getsafeonline.org/
2. Anne Adams and Angela Sasse . 1999. Users are not the enemy. Commun. ACM ( 1999 ). Anne Adams and Angela Sasse. 1999. Users are not the enemy. Commun. ACM (1999).
3. Imtiaz Ahmad , Rosta Farzan , Apu Kapadia , and Adam J Lee. 202 0. Tangible privacy: Towards user-centric sensor designs for bystander privacy. In Computer Supported Cooperative Work and Social Computing (CSCW). Imtiaz Ahmad, Rosta Farzan, Apu Kapadia, and Adam J Lee. 2020. Tangible privacy: Towards user-centric sensor designs for bystander privacy. In Computer Supported Cooperative Work and Social Computing (CSCW).
4. Elham Al Qahtani , Mohamed Shehab , and Abrar Aljohani . 2018 . The effectiveness of fear appeals in increasing smartphone locking behavior among Saudi Arabians . In Symposium On Usable Privacy and Security (SOUPS). Elham Al Qahtani, Mohamed Shehab, and Abrar Aljohani. 2018. The effectiveness of fear appeals in increasing smartphone locking behavior among Saudi Arabians. In Symposium On Usable Privacy and Security (SOUPS).
5. David Armstrong , Ann Gosling , John Weinman , and Theresa Marteau . 1997. The place of inter-rater reliability in qualitative research: An empirical study. Sociology ( 1997 ). David Armstrong, Ann Gosling, John Weinman, and Theresa Marteau. 1997. The place of inter-rater reliability in qualitative research: An empirical study. Sociology (1997).