Adlin, T. and Pruitt, J. (2010), “The essential persona lifecycle: Your guide to building and using personas”, Morgan Kaufmann.
Atzori, L., Iera, A. and Morabito, G. (2010), The internet of things: A survey. Computer networks, Vol. 54 No. 15, pp. 2787–2805.
Bada, M. and Sasse, A. (2014), “Cyber security awareness campaigns: Why do they fail to change behaviour?”, Global Cyber Security Capacity Centre.
Bernd, J., Gordo, B., Choi, J., Morgan, B., Henderson, N., Egelman, S., Garcia, D.D. and Friedland, G. (2015), “Teaching privacy: Multimedia making a difference”, IEEE MultiMedia, No. 1, pp. 12–19.
Blomquist, Å. and Arvola, M. (2002), “Personas in action: ethnography in an interaction design team”, In Proceedings of the second Nordic conference on Human-computer interaction, ACM, pp. 197–200.
Bruijn, H. and Janssen, M. (2017), “Building cybersecurity awareness: The need for evidence-based framing strategies”, Government Information Quarterly, Vol. 34, pp. 1–7. https://doi.org/10.1016/j.giq.2017.02.007.
Chang, Y. N., Lim, Y. K. and Stolterman, E. (2008), “Personas: from theory to practices”, In Proceedings of the 5th Nordic conference on Human-computer interaction: building bridges, ACM, pp. 439–442.
Cooper, A. (1999), “The Inmates are Running the Asylum”, In: Arend, U., Eberleh, E., Pitschke, K. (eds) Software-Ergonomie ’99. Berichte des German Chapter of the ACM, Vol. 53. Vieweg+Teubner Verlag, Wiesbaden. https://doi.org/10.1007/978-3-322-99786-9_1 Faily, S. and Flechais, I. (2011), “Persona cases: a technique for grounding personas”, In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2267–2270. ACM. https://doi.org/10.1145/1978942.1979274
Friess, E. (2012), “Personas and decision making in the design process: an ethnographic case study”, In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1209–1218.
Gubbi, J., Buyya, R., Marusic, S. and Palaniswami, M. (2013), “Internet of Things (IoT): A vision, architectural elements, and future directions”, Future generation computer systems, Vol. 29 No. 7, pp. 1645–1660. https://doi.org/10.1016/j.future.2013.01.010.
Harknett, R.J. and Stever, J.A. (2011), “The new policy world of cybersecurity”, Public Administration Review, Vol. 71 No. 3, pp. 455–460.
Johnston, J., Rodney, A. and Chong, P. (2014), “Making change in the kitchen? A study of celebrity cookbooks, culinary personas, and inequality”, Poetics, Vol. 47, pp. 1–22.
Kim, E., Jensen, M.B., Poreh, D. and Agogino, A.M. (2018), “Novice designer's lack of awareness to cybersecurity and data vulnerability in new concept development of mobile sensing devices”, In DS92: Proceedings of the DESIGN 2018 15th International Design Conference, Dubrovnik, Croatia, pp. 2035–2044. https://doi.org/10.21278/idc.2018.0461
Kim, E., Kocsik, V.S., Basnage, C.E. and Agogino, A.M. (2013), “Human-centric study of digital-paper transitions: framing design opportunity spaces”, International Conference on Engineering Design (ICED13), The Design Society, Seoul, Korea, 19-22.08. 2013.
Marble, J., Lawless, W., Mittu, R., Coyne, J., Abramson, M. and Sibley, C. (2014), “The Human Factor in Cybersecurity: Robust & Intelligent Defense”, Cyber Warfare, Vol. 56, pp. 173–206. https://doi.org/10.1007/978-3-319-14039-1_9. Massanari, A. (2010), “Designing for imaginary friends: information architecture, personas, and the politics of user-centered design”, New Media & Society, Vol. 12 No. 3, pp. 401–416. https://doi.org/10.1057/palgrave.ivs.9500066.
McCormac, A., Zwaans, T., Parsons, K., Calic, D., Butavicius, M. and Pattinson, M. (2017), “Individual differences and information security awareness”, Computers in Human Behavior, Vol. 69, pp. 151–156.
McGinn, J.J. and Kotamraju, N. (2008), “Data-driven persona development”, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1521–1524. ACM. https://doi.org/10.1145/1357054.1357292 McKenna, S., Staheli, D. and Meyer, M. (2015), “Unlocking user-centered design methods for building cyber security visualizations”, Visualization for Cyber Security (VizSec), 2015 IEEE Symposium on, pp. 1–8. IEEE. https://doi.org/10.1109/vizsec.2015.7312771.
Newhouse, W., Keith, S., Scribner, B. and Witte, G. (2017), “National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework”, NIST Special Publication, Vol. 800, p. 181.
Pillemer, K.A. (2012), “30 lessons for living: tried and true advice from the wisest Americans”, Penguin.
Piyare, R. (2013), “Internet of Things: Ubiquitous home control and monitoring system using Android based smart phone”, International Journal of Internet of Things, Vol. 2 No. 1, pp. 5–11.
Pruitt, J. and Adlin, T. (2010), “The persona lifecycle: keeping people in mind throughout product design”, Elsevier.
Rosner, G. and Kenneally, E. (2017), Privacy and the Internet of Things, Center for Long-Term Cybersecurity, Berkeley, CA.
Siddall, E., Baibarac, C., Byrne, A., Byrne, N., Deasy, A., Flood, N., … and Wang, , Y. (2011), “Personas as a user-centred design tool for the built environment”, Proceedings of the Institution of Civil Engineers-Engineering Sustainability, Vol. 164 No. 1, March 2011, pp. 59–69, https://doi.org/10.1680/ensu.1000015
Stoll, J., McColgin, D., Gregory, M., Crow, V. and Edwards, W.K. (2008), “Adapting personas for use in security visualization design. In VizSEC 2007 (pp. 39-52). Springer, Berlin, Heidelberg.
Ten, C.W., Liu, C.C. and Manimaran, G. (2008), “Vulnerability Assessment of Cybersecurity for SCADA Systems”, IEEE Transactions on Power Systems, Vol. 23 No. 4, pp. 1836–1846. https://doi.org/10.1109/tpwrs.2008.2002298. Ten, C.W., Manimaran, G. and Liu, C.C. (2010), “Cybersecurity for critical infrastructures: Attack and defense modeling”, IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans, Vol. 40 No. 4, pp. 853–865. https://doi.org/10.1109/tsmca.2010.2048028.