Arachchilage, N. A. G. & Love, S. (2014). Security awareness of computer users: A phishing threat avoidance perspective. Computers in Human Behavior, 38, 304-312. https://doi.org/10.1016/j.chb.2014.05.046
Baadel, S. & Lu, J. (2019). Data Analytics: Intelligent Anti-Phishing Techniques Based on Machine Learning. Journal of Information and Knowledge Management
, 18(1),1-20. https://doi.org/10.1142/S0219649219500059
Chen, M., Wang, R., Schneider, J. K., Tsai, C., Jiang, D. D., Hung, M. & Lin, L. (2011). Using the health belief model to understand caregiver factors influencing childhood influenza vaccinations. Journal of Community Health Nursing
, 28(1), 29–40. https://doi.org/10.1080/07370016.2011.539087
Claar, C. L. (2011). The adoption of computer security: An analysis of home personal computer user behavior using the health belief model
. Utah State University. Retrieved from http://digitalcommons.usu.edu/etd/878/
Collett, D. (1991) Modelling Binary Data. Texts in Statistical Science Series, Chapman and Hall, London
Cronbach, L. J. & Meehl, P. E. (1955). Construct validity in psychological test. Psychological Bulletin, 52, 281–302.
Edwards, K. (2015). Examining the security awareness, information privacy, and the security behaviors of home computer users
. Doctoral dissertation, Nova Southeastern University. Retrieved from https://nsuworks.nova.edu/gscis_etd/947
EUC (2020). Survey on scams and fraud experienced by consumers. European Union Commission Fact Sheet, 1-47.
Fagerland, M. W. & Hosmer, D. W. (2017). How to test for goodness of fit in ordinal logistic regression models. Stata Journal, 17(3), 668–686. https://doi.org/10.1177/1536867x1701700308
Frauenstein, E. D. (2014). A framework to mitigate phishing threats. Doctoral Dissertation, Nelson Mandela Metropolitan University, 1- 262. Retrieved from https://www.researchgate.net/publication/267512601
Hair, J. F., Hult, G. T. M., Ringle, C. M. & Sarstedt, M. (2017). A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM). New York: Sage Publications, 1-390.
Kathrine, G. J. W., Praise, P. M., Rose, A. A. & Kalaivani, E. C. (2019). Variants of phishing attacks and their detection techniques. In Proceedings of the International Conference on Trends in Electronics and Informatics, ICOEI 2019, 255–259. https://doi.org/10.1109/ICOEI.2019.8862697
Kirlappos, I. & Sasse, M. A. (2012). Security Education against Phishing: A Modest Proposal for a Major Rethink. IEEE Security & Privacy Magazine, 10(2), 24–32. https://doi.org/10.1109/msp.2011.179
Krol, K., Moroz, M. & Sasse, M. A. (2012). Don't work. Can't work? Why it's time to rethink security warnings. In Seventh International Conference on Risks and Security of Internet and Systems (CRiSIS). https://doi.org/10.1109/crisis.2012.6378951
Li, L., Xu, L., He, W., Chen, Y. & Chen, H. (2016). Cyber Security Awareness and Its Impact on Employee's Behavior. In 10th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS)
, Vienna, Austria, 103-111. Retrieved from https://hal.inria.fr/hal-01630550
Patil, S. & Dhage, S. (2019). A methodical overview on phishing detection along with an organized way to construct an anti-phishing framework. In Fifth International Conference on Advanced Computing & Communication Systems (ICACCS) (pp. 588-593). IEEE.
PhishLabs. (2019). 2019 Phishing Trends and Intelligence Report: The Growing Social Engineering Threat. PhishLabs, Annual Report, 1-30. Retrieved from https://info.phishlabs.com/hubfs/2019%20PTI%20Report/2019%20Phishing%20Trends%20and%20Intelligence%20Report.pdf
PhishMe. (2016). Q1 2016 Malware Review. PhishMe Intelligence, 2016 1st Quarter Active Threat Reports, 1–15. Retrieved from https://cofense.com/wpcontent/uploads/2017/10/Q1_2016_Malware_Review_PhishMe.pdf
Proofpoint (2020). State of the Phish: An in-depth look at user awareness, vulnerability and resilience, Annual Report, 1-48.
Rea, L. M. & Parker, R. A. (2005). Designing & Conducting Survey Research: A Comprehensive Guide (3rd ed.). Hoboken, NJ: John Wiley & Sons, Inc.
Smith, H. J., Milberg, S. J. & Burke, S. J. (1996). Information privacy: Measuring individuals' concerns about organizational practices. MIS Quarterly: Management Information Systems, 20(2), 167–195. https://doi.org/10.2307/249477
Son, J. Y. & Kim, S. S. (2008). Internet users' information privacy-protective responses: A Taxonomy and a nomological model. MIS Quarterly: Management Information Systems, 32(3), 503–529. https://doi.org/10.2307/25148854
Triwidyati, H. & Tentama, F. (2020). Validity and Reliability Construct of Subjective Well-being Scale. International Journal of Sciences: Basic and Applied Research
, 51(2), 191–200. Retrieved from http://eprints.uad.ac.id/id/eprint/20150
Williams, C. K., Madupalli, R., Karahanna, E. & Duncan, B.K. (2014). Explaining Users' Security Behaviors with the Security Belief Model. Journal of Organizational and End User Computing, 26(3), 23-46. https://doi.org/10.4018/joeuc.2014070102
Williams, E. J., Hinds, J. & Joinson, A. N. (2018). Exploring susceptibility to phishing in the workplace. International Journal of Human Computer Studies, 120, 1–13. https://doi.org/10.1016/j.ijhcs.2018.06.004