L. Ben-othmane, H. Weffers, M. M. Mohamad, and M. Wolf, A Survey of Security and Privacy in Connected Vehicles, Wireless Sensor Networks (WSN) For Vehicular and Space Applications: Architecture and Implementation
DOI : 10.1007/978-1-4939-2468-4_10

B. Sundgren, What is a public information system, International Journal of Public Information Systems, vol.1, issue.1, pp.81-99, 2005.

V. Gilgor, A note on the denial-of-service problem, Proceedings of the 1983 IEEE Symposium on Security and Privacy. SP '83, pp.5101-5111, 1983.

R. Kissel, Glossary of key information security terms, 2011.

R. J. Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems. 2 edn, 2008.

D. Bailey and M. Solnik, iSEC partners presents: The hacked and the furious, 2012.

N. Grebennikov, Keyloggers: How they work and how to detect them (part 1) http://www.securelist.com/en/analysis, p.1, 2012.

J. Rosen, The web means the end of forgetting. The New York Times, 2010.

E. I. Society, ecall: Time saved = lives saved, 2011.

. Bosch, Bosch health buddy, 2013.

. Sgrenovation, http://sgrenovation.com/why-use-smart-home-appliances, 2013.

. Twitter, Twitter logo, 2013.

. Google, Playstore logo. https://play.google.com/store?hl=en, 2013.

. Google, Android logo, 2013.

P. Williams, What does security culture look like for small organizations? In: 7th Australian Information Security Management Conference, 2009.

R. C. Dodge-jr, C. Carver, and A. J. Ferguson, Phishing for user security awareness, Computers & Security, vol.26, issue.1, pp.73-80, 2007.
DOI : 10.1016/j.cose.2006.10.009

T. Schlienger and S. Teufel, Information Security Culture, Proc. of the IFIP TC11 17th International Conference on Information Security: Visions and Perspectives. SEC '02, pp.191-202, 2002.
DOI : 10.1007/978-0-387-35586-3_15

A. Colella and C. Colombini, Security Paradigm in Ubiquitous Computing, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp.634-638, 2012.
DOI : 10.1109/IMIS.2012.192

D. Halperin, T. S. Heydt-benjamin, B. Ransford, S. S. Clark, B. Defend et al., Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses, 2008 IEEE Symposium on Security and Privacy (sp 2008), pp.129-142, 2008.
DOI : 10.1109/SP.2008.31

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.453.4132

S. Checkoway, D. Mccoy, B. Kantor, D. Anderson, H. Shacham et al., Comprehensive experimental analyses of automotive attack surfaces, Proceedings of the 20th USENIX conference on Security. SEC'11, pp.6-6, 2011.

A. Whitten and J. D. Tygar, Why Johnny can't encrypt: a usability evaluation of pgp 5.0, Proceedings of the 8th conference on USENIX Security Symposium - Volume 8. SSYM'99, pp.14-14, 1999.

M. A. Sasse and I. Flechais, Usable Security: What is it? How do we get it? In: Security and Usability: Designing secure systems that people can use, pp.13-30, 2005.

N. Mcafee, 2012 ncsa/mcafee online safety survey, 2012.

R. Shirey, Internet Security Glossary, Version 2, RFCInformational), vol.4949, 2007.
DOI : 10.17487/rfc4949

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.374.4200

J. S. Lim, A. Ahmad, S. Chang, and S. B. Maynard, Embedding information security culture emerging concerns and challenges, Pacific Asia Conference on Information Systems, 2010.
DOI : 10.4018/ijcwt.2015040103

URL : https://ujcontent.uj.ac.za/vital/access/services/Download/uj:8610/CONTENT1

E. C. Johnson, Security awareness: switch to a better programme, Network Security, vol.2006, issue.2, pp.15-18, 2006.
DOI : 10.1016/S1353-4858(06)70337-3

H. Kruger and W. Kearney, A prototype for assessing information security awareness, Computers & Security, vol.25, issue.4, pp.289-296, 2006.
DOI : 10.1016/j.cose.2006.02.008

M. Lapke and G. Dhillon, Power relationships in information systems security policy formulation and implementation, Proc. 16th European Conference on Information Systems, pp.1358-1369, 2008.

S. Pahnila, M. Siponen, and A. Mahmood, Employees' Behavior towards IS Security Policy Compliance, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07), pp.156-156, 2007.
DOI : 10.1109/HICSS.2007.206

B. D. Cone, C. E. Irvine, M. F. Thompson, and T. D. Nguyen, A video game for cyber security training and awareness, Computers & Security, vol.26, issue.1, pp.63-72, 2007.
DOI : 10.1016/j.cose.2006.10.005