L. Lazarus, The right to security ??? securing rights or securitising rights?, 2012.
DOI : 10.1017/CBO9781139026291.007

S. A. Williams, S. C. Fleming, K. O. Lundqvist, and P. N. Parslow, Understanding your digital identity, Learning Exchange, vol.1, issue.1, 2010.

Y. Wu, C. S. Guynes, and J. Windsor, Security Awareness Programs, Review of Business Information Systems (RBIS), vol.16, issue.4, pp.165-168, 2012.
DOI : 10.19030/rbis.v16i4.7435

N. Veerasamy and B. Taute, Introduction to emerging threats and vulnerabilities to create user awareness Information Security South Africa, 2009.

I. O. For-standardization and I. E. , Commission, ISO/IEC 27002, ser. International Standard, 2007.

S. Furnell and K. Thomson, From culture to disobedience: Recognising the varying user acceptance of IT security, Computer Fraud & Security, vol.2009, issue.2, pp.5-10, 2009.
DOI : 10.1016/S1361-3723(09)70019-3

S. Talib, N. L. Clarke, and S. M. , An Analysis of Information Security Awareness within Home and Work Environments, 2010 International Conference on Availability, Reliability and Security, pp.196-203, 2010.
DOI : 10.1109/ARES.2010.27

P. Wood, Internet security threat report: 2011 trends Symantec Corporation, 350 Ellis Stree, 2012.

A. Stander, A. Dunnet, and J. Rizzo, A survey of computer crime and security in south africa, of publication: Proceedings of the ISSA 2009 Conference. ISSA, p.217, 2009.

S. M. Furnell, A. Jusoh, and D. Katsabas, The challenges of understanding and using security: A survey of end-users, Computers & Security, vol.25, issue.1, pp.27-35, 2006.
DOI : 10.1016/j.cose.2005.12.004

B. Ross, C. Jackson, N. Miyake, D. Boneh, and J. C. Mitchell, Stronger password authentication using browser extensions, Proceedings of the 14th Usenix Security Symposium, 1998.

R. Reid, J. Van-niekerk, and R. V. Solms, Guidelines for the creation of braincompatible cyber security educational material in moodle 2.0, Information Security South Africa (ISSA), pp.1-8, 2011.

R. S. Shaw, C. C. Chen, A. L. Harris, and H. Huang, The impact of information richness on information security awareness training effectiveness, ) Browser display statistics. [Online]. Available, pp.92-100, 2009.
DOI : 10.1016/j.compedu.2008.06.011

J. Johnston, J. Eloff, and L. Labuschagne, Security and human computer interfaces, Computers & Security, vol.22, issue.8, pp.675-684, 2003.
DOI : 10.1016/S0167-4048(03)00006-3