E. Creditexpert, Online ID OD: illegal web trade in personal information soars, 2012.

M. Honan, How Apple and Amazon Security Flaws Led to My Epic Hacking. Wired, 2012-08-06
DOI : 10.7312/star16075-030

M. Kelly, Your weakest link: All those online accounts you've forgotten about. VentureBeat, 2013-03-05

M. J. Osborne and A. Rubinstein, A course in game theory, 1994.

O. Williams, The dark side of Apple's two-factor authentication. The Next Web, pp.2014-2026, 2014.