Anti-Phishing Working Group, Inc. (2016, July 2). Phishing Activity Trends Report 1st Quarter 2016. Retrieved 11 11, 2016, from http://docs.apwg.org/reports/apwg_trends_report_q1_2016.pdf
CMOD Department of Finance. (2008, December). Protecting the confidentiality of Personal Data. Retrieved 11.11.2016, from https://www.dataprotection.ie/documents/guidance/GuidanceFinance.pdf
Hadnagy, C. (2012). Socjotechnika: sztuka zdobywania władzy nad umysłami. Gliwice: Wydawnictwo Helion. Klempka, A., & Stimson, A. (2014). Anonymous Communication on the Internet and Trolling. Concordia University, Saint Paul, MN. Retrieved 11.15.2016, from https://comjournal.csp.edu/wp-content/uploads/sites/16/2013/12/
Owens J. (2008). A study of passwords and methods used in brute-force SSH attacks. Clarkson University. Retrieved 11.16.2016, from http://people.clarkson.edu/~owensjp/pubs/Owens_MS_thesis.pdf
Privacy Technical Assistance Center. (2011, December). Data Security: Top Threats to Data Protection. Retrieved 11.15.2016, from http://ptac.ed.gov/sites/default/files/issue-brief-threats-to-your-data.pdf
Reinecke P., Seybert S. (2014). Internet and cloud services - statistics on the use by individuals - Statistics Explained. Retrieved 11.15.2016, from http://ec.europa.eu/eurostat/statistics-explained/index.php/Internet and cloud services - statistics on the use by individuals
Security Awareness Program Special Interest Group, & PCI Security Standards Council. (2014). Best Practices for Implementing a Security Awareness Program. Retrieved 11.15.2016, from https://www.pcisecuritystandards.org/documents/PCI DSS V1.0 Best Practices for Implementing Security Awareness Program.pdf.
Shravani, R., & Nagamani, O. (2012). Analysis of Equivalence of Network positions and social roles. In National Conference On Social Networking (p. 33). Retrieved 11.15.2016, from http://repository.um.edu.my/26680/1/Jar-Kumar-Conference%20PROCEEDINGS-MAIL%20(1)%20(1).pdf#page=41
Symantec Corporation. (2016). Internet Security Threat Report Internet Report (No. 21). Retrieved 11.15.2016, from https://www.symantec.com/securitycenter/threat-report
Symantec Corporation. (2015). Keeping Your Private Data Secure. Retrieved 11.15. 2016, from https://www.symantec.com/content/dam/symantec/docs/whitepapers/keeping-your-private-data-secure-en.pdf
Toshniwal R., Dastidar K. G., Nath, A. (2015). Big Data Security Issues and Challenges. Complexity, 2(2). Retrieved 11.15.2016, from http://www.ijirae.com/volumes/Vol2/iss2/03.FBCS10080.pdf
Wawrzyniak M. (2015). Hejtoholik czyli Jak zaszczepić się na hejt, nie wpaść w pułapkę obgadywania oraz nauczyć zarabiać na tych, ktorzy cię oczerniają. Gliwice: Wydawnictwo Helion.
W¨uest C. (2010). The Risks of Social Networking. Symantec Corporation. Retrieved 11.15.2016, from https://www.symantec.com/content/en/us/enterprise/media/securityresponse/whitepapers/the_risks_of_social_networking.pdf