1. Alexander Gostev , Roman Unuchek , Maria Garnaeva , Denis Makrushin , and Anton Ivanov . 2016. IT threat evaluation in Q1 2016 . Kaspersky Lab. Retrieved July 6, 2022, from https://itcafe.hu/dl/cnt/2016-05/128009/q1_2016_mw_report_final_eng.pdf Alexander Gostev, Roman Unuchek, Maria Garnaeva, Denis Makrushin, and Anton Ivanov. 2016. IT threat evaluation in Q1 2016. Kaspersky Lab. Retrieved July 6, 2022, from https://itcafe.hu/dl/cnt/2016-05/128009/q1_2016_mw_report_final_eng.pdf
2. Mobile Devices in Education. In Toward Sustainability Through Digital Technologies and Practices in the Eurasian Region;Khalikova Anastassiya;IGI Global,2020
3. Andrew Malecki . 2018. Cybersecurity in the classroom: Bridging the gap between computer access and online safety. Cyber Security Capstone Research Project Reports, 1. Retrieved July 6, 2022 , from https://scholar.valpo.edu/cscrpr/1 Andrew Malecki. 2018. Cybersecurity in the classroom: Bridging the gap between computer access and online safety. Cyber Security Capstone Research Project Reports, 1. Retrieved July 6, 2022, from https://scholar.valpo.edu/cscrpr/1
4. Andrew Perrin . 2021. Mobile technology and home broadband 2021 . Pew Research Center . Retrieved July 6, 2022, from https://www.pewresearch.org/internet/2021/06/03/mobile-technology-and-home-broadband-2021/ Andrew Perrin. 2021. Mobile technology and home broadband 2021. Pew Research Center. Retrieved July 6, 2022, from https://www.pewresearch.org/internet/2021/06/03/mobile-technology-and-home-broadband-2021/
5. Bruce Schneier . 2008. Inside the twisted mind of the security professional. Wired. Retrieved July 6, 2022 , from https://www.wired.com/2008/03/securitymatters-0320/ Bruce Schneier. 2008. Inside the twisted mind of the security professional. Wired. Retrieved July 6, 2022, from https://www.wired.com/2008/03/securitymatters-0320/