J. Downs, M. Holbrook, and C. Lorrie, Decision strategies and susceptibility to phishing, Proceedings of the second symposium on Usable privacy and security , SOUPS '06, 2006.
DOI : 10.1145/1143120.1143131

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.364.8084

D. Hicks, Phishing and Pharming: Helping Consumers Avoid Internet Fraud, Communities and Banking, pp.29-31, 2005.

F. Stajano and P. Wilson, Understanding scam victims, Communications of the ACM, vol.54, issue.3, pp.70-75, 2011.
DOI : 10.1145/1897852.1897872

T. N. Jagatic, N. A. Johnson, M. Jakobsson, and F. Menczer, Social phishing, Communications of the ACM, vol.50, issue.10, pp.94-100, 2007.
DOI : 10.1145/1290958.1290968

J. Markoff, Larger prey are targets of phishing, New York Times, vol.1616, 2008.

J. Hong, Why have there been so many security breaches recently? Blog@CACM), 2011.

R. Dodge and F. A. , Using Phishing for User Email Security Awareness, Proceedings of the 21st IFIP International Information Security Conference, 2006.
DOI : 10.1007/0-387-33406-8_41

R. Dodge, E. Rovira, Z. Radwick, and J. Shevchik, Phishing Awareness Exercises, Proceedings of the 15th Colloquium for Information Systems Security Education, pp.120-125, 2011.