M. BadaM. A. SasseJ. R. C. Nurse 2015 Cyber security awareness campaigns: Why do they fail to change behaviour? International Conference on Cyber Security for Sustainable Society 118 131
K. BeckersS. Pape 2016 A serious game for eliciting social engineering security requirements. Proceedings of the 24th IEEE International Conference on Requirements Engineering, RE ’16 IEEE Computer Society. To Appear
M. BeyerS. AhmedK. DoerlemannS. ArnellS. ParkinM. A. SasseN. Passingham 2015 White paper: Awareness is only the first step: A framework for progressive engagement of staff in cyber security Technical report, Hewlett Packard Enterprise
A. CooperR. ReimannD. CroninC Noessel 2014 About Face: The Essentials of Interaction Design John Wiley & Sons
C. HochleitnerC. GrafM. Tscheligi 2013 Do you enjoy getting gifts?: Keeping personas alive through marketing materials. CHI ’13 Extended Abstracts on Human Factors in Computing Systems, CHI EA ’13 2355 2358 ACM
M. M. LewisL. Coles-Kemp 2014 Who says personas can’t dance?: The use of comic strips to design information security personas CHI ’14 Extended Abstracts on Human Factors in Computing Systems, CHI EA ’14 2485 2490 ACM
I. Mann 2008 Hacking the Human: Social Engineering Techniques and Security Countermeasures Gower
PwC 2015 2015 Information security breaches survey Technical report, PwC
M. WilsonJ. Hash 2003 NIST Special Publication 800-50: Building an Information Technology Security Awareness and Training Programme Technical report, National Institute of Standards and Technology