K. Mitnick and W. Simon, The Art of Deception: Controlling the human element of security, 2002.

A. Paller, For Questions: Allan Paller, SANS Institute, 2007.

A. Karakasiliotis, S. M. Furnell, and M. Papadaki, An assessment of end-user vulnerability to phishing attacks, Journal of Information Warfare, vol.6, pp.17-28, 2007.

T. Greening, Ask and ye shall receive, ACM SIGSAC Review, vol.14, issue.2, pp.8-14, 1996.
DOI : 10.1145/228292.228295

R. C. Dodge, C. Carver, and A. J. Ferguson, Phishing for user security awareness, Computers & Security, vol.26, issue.1, pp.73-80, 2007.
DOI : 10.1016/j.cose.2006.10.009

T. Bakhshi, M. Papadaki, and S. M. Furnell, A Practical Assessment of Social Engineering Vulnerabilities, Second International Symposium on Human Aspects of Information Security and Assurance, pp.12-23, 2008.

J. Evers, Security expert: User education is pointless, 2006.

P. Kumaraguru, Y. Rhee, A. Acquisti, L. F. Cranor, J. Hong et al., Protecting people from phishing, Proceedings of the SIGCHI conference on Human factors in computing systems , CHI '07, 2007.
DOI : 10.1145/1240624.1240760

S. A. Robila, J. James, and W. Ragucci, Don't be a phish: steps in user education, 11th Annual SIGCSE Conference on Innovation and Technology In Computer Science Education (ITICSE '06), pp.237-241, 2006.

H. Havenstein, Video games poised to boost corporate training, Computerworld, 2008.

. Microsoft, How to Protect Insiders from Social Engineering Threats, Midsize Business Security Guidance, 2006.

A. Thapar, Social Engineering : An Attack Vector Most Intricate to Tackle, Infosec Writers, 2007.