1. Svetlana Abramova and Rainer Böhme. Anatomy of a high-profile data breach: Dissecting the aftermath of a crypto-wallet case. In USENIX Security Symposium, pages 715–732, Anaheim, CA, USA, August 2023. USENIX. https://www.usenix.org/system/files/usenixsecurity23-abramova.pdf.
2. The theory of planned behavior
3. Elham Al Qahtani, Mohamed Shehab, and Abrar Aljohani. The effectiveness of fear appeals in increasing smartphone locking behavior among saudi arabians. In Symposium on Usable Privacy and Security, SOUPS ’18, pages 31–46, Baltimore, MD, USA, August 2018. USENIX. https://www.usenix.org/system/files/conference/soups2018/soups2018-qahtani.pdf.
4. Yusuf Albayram, Mohammad Maifi Hasan Khan, Theodore Jensen, and Nhan Nguyen. “… better to use a lock screen than to worry about saving a few seconds of time”: Effect of Fear Appeal in the Context of Smartphone Locking Behavior. In Symposium on Usable Privacy and Security, pages 49–63, Santa Clara, CA, USA, July 2017. USENIX. https://www.usenix.org/system/files/conference/soups2017/soups2017-albayram.pdf.
5. Why Do People Adopt, or Reject, Smartphone Password Managers?