N. G. Carr, IT doesn't matter, IEEE Engineering Management Review, vol.32, issue.1, pp.41-49, 2003.
DOI : 10.1109/EMR.2004.25006

K. Mitnick and W. Simon, The art of deception: Controlling the human element of security, 2002.

P. Puhakainen, A design theory for information security awareness, 2006.

M. Siponen, A conceptual foundation for organizational information security awareness, Information Management & Computer Security, vol.8, issue.1, pp.31-41, 2000.
DOI : 10.1108/09685220010371394

J. Van-niekerk, V. Solms, and R. , Using Bloom???s Taxonomy for Information Security Education, Information Security South Africa (ISSA), 2008.
DOI : 10.1007/978-3-642-39377-8_33

J. Van-niekerk, V. Solms, and R. , Using bloom's taxonomy for information security education. Education and Technology for a Better World, 9th IFIP TC 3 World Conference on Computers in Education, 2009.

L. Anderson, D. Krathwohl, P. Airasian, K. Cruikshank, R. Mayer et al., A Taxonomy for Learning, Teaching, and Assessing: A Revision of Bloom's Taxonomy of Educational Objectives, 2001.

J. Van-niekerk, V. Solms, and R. , Corporate Information Security Education, 10th IFIP WG11.1 Annual Working Conference on Information Security Management, World Computer Congress (WCC), 2004.
DOI : 10.1007/1-4020-8145-6_1

D. A. Sousa, How the brain learns, 2006.

U. Fuller, C. G. Johnson, T. Ahoniemi, D. Cukierman, I. Hern´an-losada et al., Developing a computer science-specific learning taxonomy, ACM SIGCSE Bulletin, vol.39, issue.4, pp.152-170, 2007.
DOI : 10.1145/1345375.1345438

C. Roper, J. Grau, and L. Fischer, Security Education, Awareness and Training: From Theory to Practice, 2005.