1. Net Losses: Estimating the Global Cost of Cybercrime (Center for Strategic and International Studies, 2014); available at
http://go.nature.com/15nom3
2. IBM 2015 Cyber Security Intelligence Index (IBM, 2015); available at
http://go.nature.com/qcxkux
3. Bonneau, J., Herley, C., van Oorschot, P. C. & Stajano, F. Proc. IEEE Symp. on Security and Privacy 553–567 (2012).
4. Steves, M. et al. Report: Authentication Diary Study (National Institute for Standards and Technology, 2014); available at
http://dx.doi.org/10.6028/NIST.IR.7983
5. Kirlappos, I., Parkin, S. & Sasse, M. A. Proc. Workshop on Usable Security
http://dx.doi.org/10.14722/usec.2014.23007
(2014).