T. AdlinJ. Pruitt 2010 The essential persona lifecycle: your guide to building and using personas. Elsevier
A. AtzeniC. CameroniS. FailyJ. LyleI. Flechais 2011 Here’s Johnny: a methodology for developing attacker personas 2011 Sixth International Conference on Availability, Reliability & Security Vienna 2011 722 727
S. BødkerE. Christiansen 1997 Scenarios as springboard in CSCW design S. S. G. BowkerW. TurnerL. Gasser (Eds.) Social science, technical systems and cooperative work 217 234 London Lawrence Erlbaum
BCS - British Computer Society 2014 Cybercrime Forensics Specialist Group Briefings. Compiled by Denis Edgar-Nevill (Canterbury Christ Church University), available via group distribution list 2010 2014
CCCD - Cambridge Computer Crime Database - Hutchings A 2018 http://www.cl.cam.ac.uk/~ah793/cccd.html (16 April 2018)
J. M. Carroll 2000 Making Use: scenario-based design of human-computer interactions Cambridge, Mass MIT Press
R. ChiesaS. Ducci 2009 Profiling Hackers CRC Press, Taylor & Francis
A. Cooper 1999 The inmates are running the asylum SAMS
A. CooperR. Reimann 2007 About Face 3.0: The essentials of interaction design Wiley
FBI - Federal Bureau Investigation 2018 Cyber’s Most Wanted http://www.fbi.gov/wanted/cyber (16 April 2018)
Images Getty – iStock database 2018 Source for attacker persona images – IDs for purchased images: 82011555, 247519731, 249380561, 125323949, 125705417, 117226075, 249461806, 249461806 http://www.istockphoto.com (16 April 2018)
K. Goodwin 2009 Designing for the digital age: how to create human-centred products and services Wiley
J. GrudinJ. Pruitt 2002 Personas, participatory design and product development: An infrastructure for engagement PDA
Times Gulf 2014 80 detained in global cyber-crime takedown http://www.gulf-times.com/story/392708/80-detained-in-global-cyber-crime-takedown (16 April 2018)
D. Ki-AriesS. Faily 2017 Persona-centred information security awareness Computers & Security 70 Sept. 2017 663 674 Elsevier
L. Nielsen 2007 10 steps to personas http://personas.dk/wp-content/LOWRES-Personas-english-version-oktober-200821.pdf (16 April 2018)
L. Nielsen 2013 Personas - user focused design Springer
A. Shostack 2014 Threat modelling: designing for security John Wiley & Sons
A. SteeleX. Jia 2008 Adversary-centred design: threat modelling using anti-scenarios, anti-use cases and anti-personas International Conference on Information and Knowledge Engineering (IKE 2008) Las Vegas, Nevada, USA July 14-17, 2008 CSREA Press