Al-Sharif, S., Iqbal, F., Baker, T., & Khattack, A. (2016, 21-23 Nov. 2016). White-Hat Hacking Framework for Promoting Security Awareness. Paper presented at the 2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS).
Au, K. W. Y., Zhou, Y. F., Huang, Z., & Lie, D. (2012, 2012). PScout: analyzing the Android permission specification.
Bubbl.us. (2017). Retrieved from https://bubbl.us/
Clark, G. D., Sarode, S., & Lindqvist, J. (2016). No time at all. Paper presented at the Proceedings of the 3rd Workshop on Hot Topics in Wireless – HotWireless ’16.
du Preez, N. D., & Louw, L. (2008). A framework for managing the innovation process. Paper presented at the PICMET ’08 – 2008 Portland International Conference on Management of Engineering & Technology.
Felt, A. P., Chin, E., Hanna, S., Song, D., & Wagner, D. (2011, 2011). Android permissions demystified.
Gillham, B. (2010). Case Study Research Methods. London, UNKNOWN: Bloomsbury Publishing PLC.
Johnson, R. B., & Onwuegbuzie, A. J. (2004). Mixed Methods Research: A Research Paradigm Whose Time Has Come. Educational Researcher; Washington, 33, 14-26.
M.J.WILKIN85. (2017). Cyber Security challenges for Australia in the Asian-Pacific region. Retrieved from http://thinkspace.csu.edu.au/itc571securitychallengesinapac/
Network, A. T. I. S. (2006, 2006). Generic SCADA risk management framework for the it security expert advisory group (ITSEAG).
Olmstead, K. M. (2013). Rethinking permissions in Android apps. (M.A.), Georgetown University, United States — District of Columbia. Available from ProQuest
Runeson, P., & Höst, M. (2008). Guidelines for conducting and reporting case study research in software engineering. Empirical Software Engineering, 14(2), 131-164. doi:10.1007/s10664-008-9102-8
Sasse, M. A., Brostoff, S., & Weirich, D. (2001). Transforming the ‘weakest link’ — a Human/Computer interaction approach to usable and effective security. BT Technology Journal, 19(3), 122.
Schumacher, T. White Hat Hacking. In: Department of Computer Science, University of Wisconsin, Platteville.
Sreejesh, S., Mohapatra, S., & Anusree, M. R. (2014). Business Research Process. In Business Research Methods (pp. 13-22).
Sufatrio, Tan, D. J. J., Chua, T.-W., & Thing, V. L. L. (2015). Securing Android. ACM Computing Surveys, 47(4), 1-45. doi:10.1145/2733306