Primary Sources
Average Cost of a Vacation. Value Penguin. Retrieved from https://www.valuepenguin.com/average-cost-vacation
Bakhshi, T. (2017). Social engineering: Revisiting end-user awareness and susceptibility to classic attack vectors. 2017 13th International Conference on Emerging Technologies (ICET) Retrieved from https://ieeexplore.ieee.org/document/8281653?denied=
Bean-Mellinger, B. (2019). The Average Cost Per Month for Office Supplies. Chron (Online). https://smallbusiness.chron.com/average-cost-per-month-office-supplies-12771.html
(2019). Consultant Salaries in 2019. Consulting.com. Retrieved from https://www.consulting.com/consultant-salaries
Cybersecurity and Infrastructure Security Agency (CISA). Avoiding Social Engineering and Phishing Attacks. Retrieved From: https://www.us-cert.gov/ncas/tips/ST04-014
Kaushalya, S.A.D.T.P. & Randeniya, R. M. R. S. B. & Liyanage, A. D. S. (2018). An Overview of Social Engineering in the Context of Social Security. 2018 IEEE 5th International Conference on Engineering Technologies and Applied Sciences (ICETAS). Retrieved from https://ieeexplore.ieee.org/document/8629126?denied=
(2017). How Much Does a Computer Programmer Make? U.S. News (Online). https://money.usnews.com/careers/best-jobs/computer-programmer/salary
(2018). How Much Might a Business Website Cost Today? Digital.com. Retrieved through https://digital.com/blog/how-much-does-website-cost/
(2014). How Much Do Startups Pay for Office Space? Priceonomics. Retrieved from https://priceonomics.com/how-much-do-startups-pay-for-office-space/
Stembert, N. et al. (2015). A Study of Preventing Email (Spear) Phishing by Enabling Human Intelligence. 2015 European Intelligence and Security Informatics Conference. Retrieved from: https://ieeexplore.ieee.org/document/7379731?denied=
Nyamsuren, E. & Ho-Jin Choi. (2007). Preventing Social Engineering in Ubiquitous Environment. Future Generation Communication and Networking (FGCN 2007). Retrieved from https://ieeexplore.ieee.org/document/4426307?denied=
Krombholz, K. Hobel, H. Huber, M. Wieppl, E. (June 2015). Advanced social engineering attacks. Journal of Information Security and Applications, Volume 22, pp. 113 – 122. Retrieved from: https://www.sciencedirect.com/science/article/pii/S2214212614001343
Lord, N. (January 2019). Social Engineering Attacks: Common Techniques & How to Prevent an
Attack. Digital Guardian. Retrieved From:
https://digitalguardian.com/blog/social-engineering-attacks-common-techniques-how-pre
Ruddy, R. (January, 2016). How to Prevent Social Engineering… You Can’t. Phoenix TS.
Retrieved From: https://phoenixts.com/blog/how-to-prevent-social-engineering-you-cant/
Olavsrud, T. (October 2010). 9 Best Defenses Against Social Engineering Attacks. eSecurity
Planet. Retrieved From: https://www.esecurityplanet.com/views/article.php/3908881/9-Best-Defenses-Against-So
Tankard, C. (August 2011). Advanced Persistent threats and how to monitor and deter them. Network Security, Volume 2011(Issue 8), pp. 16-19. Retrieved from: https://www.sciencedirect.com/science/article/pii/S1353485811700861
Shewan, D. (2019). The Comprehensive Guide to Online Advertising Costs. WordStream. Retrieved from https://www.wordstream.com/blog/ws/2017/07/05/online-advertising-costs
Bullee, J.H., & Montoya, L., & Pieters, W., Junger, M., Hartel, P. (January 2015). The persuasion and security awareness experiment: reducing the success of social engineering attacks. Journal of Experimental Criminology, Volume 11 (Issue 1), pp. 97-115. Retrieved from: https://link.springer.com/article/10.1007/s11292-014-9222-7
Gupta, S., & Singhal, A., & Kapoor, A. (January 2017). A literature survey on social engineering attacks: Phishing attacks, 2016 International Conference on Computing, Communication and Automation (ICCCA), Noida, India, April 2016. IEEE. Retrieved from: https://ieeexplore.ieee.org/abstract/document/7813778
Orgill, G. Romney, G. Bailey, M. Orgill, P. (October 2004). The Urgency for Effective User Privacy-education to Counter Social Engineering Attacks on Secure Computer Systems. ACM Digital Library. Retrieved from: https://dl.acm.org/citation.cfm?id=1029577
Images & Infographics
“https://www.dictionary.com/”
“https://www.cybintsolutions.com/cyber-security-facts-stats/”
“https://www.keepnetlabs.com/social-engineering-stats/”
“https://www.ibtimes.com/phishing-scams-fbi-says-businesses-have-lost-5-billion-phishing-social-engineering-2536205”
“https://www.edts.com/edts-blog/15-examples-of-phishing-emails-from-2016-2017”
“https://www.google.com/search?safe=strict&client=firefox-b-1-d&biw=1385&bih=732&tbm=isch&sa=1&ei=QFy-XNzoM4X4tAXKibHoCg&q=photo+of+a+usb+drive&oq=photo+of+a+usb+drive&gs_l=img.3…84456.90656..90756…5.0..0.92.1404.21……1….1..gws-wiz-img…….35i39j0j0i67j0i8i30j0i24.5inybD8-1xo#imgdii=vB7MQpn1C4njIM:&imgrc=lxj4sIL1AcftmM:”
“https://ieeexplore.ieee.org/document/8629126?denied=”
“https://www.imperva.com/learn/application-security/social-engineering-attack/”
“https://www.eccouncil.org/ethical-hacking/”