R. Atterer M. Wnuk, & A. Schmidt (2006) Knowing the user's every move: User activity tracking for website usability evaluation and implicit interaction Proceedings of the 15th International Conference on World Wide Web 203–212 ACM, New York, NY, USA.
C. Bartneck A. Duenser E. Moltchanova, & K. Zawieska (2015) Comparing the similarity of responses received from studies in Amazon's Mechanical Turk to studies conducted online and with direct recruitment PLOS One 10(4).
J. A. Benítez J. E. Labra E. Quiroga V. Martín I. García P. Marqués-Sánchez, & C. Benavides (2017) A Web-Based tool for automatic data collection, curation, and visualization of complex healthcare survey studies including social network analysis Computational and Mathematical Methods in Medicine 1–8.
A. Bianchi J. Corbetta L. Invernizzi Y. Fratantonio C. Kruegel, & G. Vigna (2015) What the App is That? Deception and Countermeasures in the Android User Interface 2015 IEEE Symposium on Security and Privacy.
K. Gajos (n.d.) Multitasking Test http://multitasking.labinthewild.org/multitasking/ (Retrieved April 06 2018)
T. Kaczmarek A. Kobsa R. Sy, & G. Tsudik (2015). An unattended study of users performing security critical tasks under adversarial noise Proceedings of 2015 Workshop on Usable Security.
A. Kittur E. H. Chi, & B. Suh (2008) Crowdsourcing User Studies with Mechanical Turk,” in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems 453–456 ACM, New York, NY, USA.
G. Lawton (2005) LAMP lights enterprise development efforts Computer 38(9), 18–20.
L. Layman, & G. Sigurdsson (2013) Using Amazons Mechanical Turk for user studies: Eight things you need to know 2013 ACM / IEEE International Symposium on Empirical Software Engineering and Measurement.
H. Ollesch E. Heineken, & F. P. Schulte (2006) Physical or virtual presence of the experimenter: Psychological online-experiments in different settings,” International Journal of Internet Science 1(1), 71–81.
M. Thomson, & R. V. Solms (1998) Information security awareness: Educating your users effectively Information Management & Computer Security 6(4), 167–173.
R. Willison, & M. Warkentin (2013) Beyond Deterrence: An Expanded View of Employee Computer Abuse MIS Quarterly 37(1), 1-20.