[1] B. Schneier, “Semantic Attacks, The Third Wave of Network Attacks”, Crypto-Gram Newsletter, October 2000, Retrieved from http://www.schneier.com/crypto-gram0010.html.(Accessed date: 02 April 2011.) [2] B. Y. Ng and M. A. Rahim, “A Socio-Behavioral Study of Home Computer Users' Intention to Practice Security”, The Ninth Pacific Asia Conference on Information Systems, Bangkok, Thailand, 2005. [3] C. E. Drake, J. J. Oliver and E. J. Koontz, “Mail Frontier Anatomy of a Phishing Email”, February 2006, Retrieved from http://www.mailfrontier.com/docs/MF_Phish_Anato my.pdf.(Accessed date: 03 April 2011.) [4] CNN. com, “A convicted hacker debunks some myths”, 2005, http://www.cnn.com/2005/TECH/internet/10/07/kevin .mitnick.cnna/index.html.(Accessed date: 04 April 2011.) [5] H. Liang and Y. Xue, “Avoidance of Information Technology Threats: A Theoretical Perspective”, MIS Quarterly, vol. 33 (1), pp. 71-90, 2009. [6] H. Liang and Y. Xue, “Understanding Security Behaviours in Personal Computer Usage: A Threat Avoidance Perspective”, Journal of the Association for Information Systems, vol. 11 (7), pp. 394-413, July 2010. [7] J. O'Brien, T. Rodden, M. Rouncefield and J. Hughes, “At Home with the Technology: An Ethnographic Study of a Set-Top-Box Trial”, ACM Transactions on Computer-Human Interaction, vol. 6 (3), pp.282-308, 1999. [8] J. S. Downs, M. Holbrook and L. F. Cranor, “Behavioural response to phishing risk”, Proceedings of the anti-phishing working groups - 2nd annual eCrime researchers summit, pp.37-44, October 2007, Pittsburgh, Pennsylvania, Retrieved from doi>10.1145/1299015.1299019.(Accessed date: 25 March 2011) [9] K. Ponnurangam, Y. Rhee, S. Sheng, S. Hasan, A. Acquisti, L. F. Cranor and J. Hong, "Getting Users to Pay Attention to Anti-Phishing Education: Evaluation of Retention and Transfer", APWG eCrime Researchers Summit, October,4-5, Pittsburgh, PA, USA, 2007. [10] L. James, “Phishing Exposed”, Syngress, Canada, 2005. [11] N.A.G. Arachchilage and M. Cole, "Design a mobile game for home computer users to prevent from “phishing attacks”," Information Society (i-Society), 2011 International Conference on , vol., no., pp.485489, 27-29 June 2011 URL:http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=& arnumber=5978543&isnumber=5978433. (Accessed Date: 22 December 2011) [12] N.A.G. Arachchilage and M. Cole, "Designing a mobile game for home computer users to protect against “phishing attacks”," Intenatioal Journal for eLearning Security (IJeLS), Volume 1, Issue 1/2, March/June 2011. [13] P. Kumaraguru, Y. Rhee, A. Acquisti, L. F. Cranor, J. Hong and E. Nunge, “Protecting people from phishing: the design and evaluation of an embedded training email system”, Proceedings of the SIGCHI conference on Human Factors in Computing Systems, San Jose, California, USA, April - May 2007. [14] P. Michael, The Magazine for the IT Professional, British Computer Society, The Charted Institute for IT, March 2011. [15] Dhamija, R. and Tygar, J. D. 2005. The battle against phishing: Dynamic Security Skins. In Proceedings of the 2005 Symposiumon Usable Privacy and Security (Pittsburgh, Pennsylvania, July 06 - 08, 2005). SOUPS '05, vol. 93. ACM Press, New York,NY, 7788. DOI= http://doi.acm.org/10.1145/1073001.1073009. (Accessed Date: 20 March 2011) [16] R. G. Brody, E. Mulig and V. Kimball, "Phishing, pharming and identity theft", Journal of Academy of Accounting and Financial Studies, vol. 11, pp. 43-56, 2007. [17] R. Richmond, “Hackers set up attacks on home PCs, Financial Firms: study”, September 2006, Retrieved fromhttp://www.marketwatch.com/News/Story/Story.aspx ?dist=newsfinder&siteid=google&guid=%7B92615073-95B6452EA3B9 569BEACF91E8%7D&keyword=.(Accessed date: 27 March 2011.) [18] S. A. Robila, J. W. Ragucci, “Don't be a phish: steps in user education”, Proceedings of the 11th annual SIGCSE conference on Innovation and technology in computer science education, 26 - 28 June 2006, Bologna, Italy, Retrieved from doi>10.1145/1140124.1140187.(Accessed date: 29 March 2011.) [19] S. Sheng, B. Magnien, P. Kumaraguru, A. Acquisti, L. F. Cranor, J. Hong and E. Nunge, “Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish”, Proceedings of the 3rd symposium on Usable privacy and security, Pittsburgh, Pennsylvania, July 2007. [20] Y. Zhang, S. Egelman, L. Cranor and J. Hong, Phinding Phish: Evaluating Anti-Phishing Tools. In Proceedings of the 14th Annual Network and Distributed System Security Symposium (NDSS 2007), San Diego, CA, 28 February -2 March, 2007. [21] Z. Ye and S. Sean, Trusted Paths for Browsers, Proceedings of the 11th USENIX Security Symposium, USENIX Association. Berkeley, CA, USA, pp. 263 - 279, 2002. [22] D. Parsons, H. Ryu and M. Cranshaw, "A Study of Design Requirements for Mobile Learning Environments", Proceedings of the Sixth IEEE International Conference on Advanced Learning Technologies, pp. 96-100, 2006