R. Shillair, S. R. Cotten, H. S. Tsai, S. Alhabash, R. Larose et al., Online safety begins with you and me: Convincing Internet users to protect themselves, Computers in Human Behavior, vol.48, pp.199-207, 2015.
DOI : 10.1016/j.chb.2015.01.046

A. Parsons, M. Mccormac, M. Butavicius, C. Pattinson, and . Jerram, Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q), Computers & Security, vol.42, pp.165-176, 2014.

Z. A. Soomro, M. H. Shah, and J. Ahmed, Information security management needs more holistic approach: A literature review, International Journal of Information Management, vol.36, issue.2, pp.215-225, 2016.
DOI : 10.1016/j.ijinfomgt.2015.11.009

Y. Rezgui and A. Marks, Information security awareness in higher education: An exploratory study, Computers & Security, vol.27, issue.7-8, pp.241-253, 2008.
DOI : 10.1016/j.cose.2008.07.008

Z. S. Byrne, K. J. Dvorak, J. M. Peters, I. Ray, A. Howe et al., From the user's perspective: Perceptions of risk relative to benefit associated with using the Internet, Computers in Human Behavior, vol.59, pp.456-468, 2016.

N. A. Arachchilage and S. Love, Security awareness of computer users: A phishing threat avoidance perspective, Computers in Human Behavior, vol.38, pp.304-312, 2014.

F. A. , The Need for Effective Information Security Awareness, Journal of Advances in Information Technology, vol.3, issue.3, pp.176-183, 2012.

C. C. Chen, B. D. Medlin, and R. S. Shaw, A cross-cultural investigation of situational information security awareness programs, Information Management & Computer Security, vol.16, issue.4, pp.360-376, 2008.

M. E. Thomson and R. Solms, Information security awareness: educating your users effectively, Information Management & Computer Security, vol.6, issue.4, pp.167-173, 1998.
DOI : 10.1108/09685229810227649

M. T. Siponen, A conceptual foundation for organizational information security awareness, Information Management & Computer Security, vol.8, issue.1, pp.31-41, 2000.

H. A. Kruger and W. D. Kearney, A prototype for assessing information security awareness, Computers & Security, vol.25, issue.4, pp.289-296, 2006.

B. Ng, A. Kankanhalli, and Y. Xu, Studying users' computer security behavior: A health belief perspective, Decision Support Systems, vol.46, issue.4, pp.815-825, 2009.

A. Tsohou, M. Karyda, and S. Kokolakis, Analysing the role of cognitive and cultural biases in the internalization of information security policies: recommendations for information security awareness programs, Computers & Security, vol.52, pp.128-141, 2015.

M. A. Boksem and M. Tops, Mental fatigue: Costs and benefits, Brain Research Reviews, vol.59, issue.1, pp.125-139, 2008.


D. Van-der-linden, M. Frese, and T. F. Meijman, Mental fatigue and the control of cognitive processes: effects on perseveration and planning, Acta Psychologica, vol.113, issue.1, pp.150-156, 2003.

S. Furnell and K. Thomson, Recognising and addressing 'security fatigue, Computer Fraud & Security, issue.11, pp.70139-70142, 2009.

J. Scott and P. J. Carrington, The SAGE Handbook of Social Network Analysis, 2011.

J. Fu, D. Sun, J. Chai, J. Xiao, and S. Wang, The "six-element" analysis method for the research on the characteristics of terrorist activities, Ann Oper Res, vol.234, pp.17-35, 2015.

E. Philips, J. Nurse, M. Goldsmith, and S. Creese, Applying social network analysis to security, Working Papers of the Sustainable Society Network, pp.11-27, 2015.

D. Dang-pham, S. Pittayachawan, and V. Bruno, Applications of social network analysis in behavioural information security research: concepts and empirical analysis, Computers & Security, vol.68, pp.1-15, 2017.

H. L. Armstrong and I. Mcculloh, Organizational Risk using Network Analysis, Proc. South African Information Security Multi-Conference, 2010.

H. Armstrong, C. Armstrong, and I. Mcculloh, A Course Applying Network Analysis to Organizational Risk in Information Security, 2010.

M. E. Whitman and H. J. Mattord, Principles of Information Security, Cengage Learning, 2011.

F. M. Clemente, F. M. Martins, and R. S. Mendes, Social network analysis applied to team sports analysis, 2016.

S. Brin and L. Page, The anatomy of a large-scale hypertextual web search engine, Computer networks and ISDN systems, vol.30, pp.107-117, 1998.

L. C. Freeman, D. Roeder, and R. R. Mulholland, Centrality in social networks: II. Experimental results, Social networks, vol.2, issue.2, pp.119-141, 1979.

R. A. Hanneman and M. Riddle, Introduction to social network methods, 2005.

S. Wasserman and K. Faust, Social network analysis: Methods and applications, 1994.

S. P. Borgatti, Centrality and network flow, Social Networks, issue.27, pp.55-71, 2005.

D. K. Clancy and F. Collins, Informal accounting information systems: Some tentative findings, Accounting, Organizations and Society, vol.4, issue.1-2, pp.21-30, 1979.

S. Macdonald, Informal information flow and strategy in the international firm, International Journal of Technology Management, vol.11, issue.1-2, pp.219-232, 1996.

R. Duncombe and R. Heeks, Enterprise across the digital divide: information systems and rural microenterprise in Botswana, Journal of International Development, vol.14, issue.1, pp.61-74, 2002.
DOI : 10.1002/jid.869

&. Casos and . Ora-lite, , 2018.