[Anti-Phishing Working Group, Inc. (2016, July 2). Phishing Activity Trends Report 1st Quarter 2016. Retrieved 11 11, 2016, from http://docs.apwg.org/reports/apwg_trends_report_q1_2016.pdf]Search in Google Scholar
[Castells, M. (2010). Społeczeństwo sieci. Warszawa:Wydawnictwo Naukowe PWN.]Search in Google Scholar
[CMOD Department of Finance. (2008, December). Protecting the confidentiality of Personal Data. Retrieved 11.11.2016, from https://www.dataprotection.ie/documents/guidance/GuidanceFinance.pdf ]Search in Google Scholar
[Czapiński J., Panek T. (2015). Diagnoza Społeczna 2015 - Warunki i jakość życia Polakow. Retrieved 11.11.2016, from http://www.diagnoza.com/]Search in Google Scholar
[Hadnagy, C. (2012). Socjotechnika: sztuka zdobywania władzy nad umysłami. Gliwice: Wydawnictwo Helion. Klempka, A., & Stimson, A. (2014). Anonymous Communication on the Internet and Trolling. Concordia University, Saint Paul, MN. Retrieved 11.15.2016, from https://comjournal.csp.edu/wp-content/uploads/sites/16/2013/12/ ]Search in Google Scholar
[TrollingPaper-Kozinets, R. (2012). Netnografia: badania etnograficzne online. Warszawa:Wydawnictwo Naukowe PWN. ]Search in Google Scholar
[Lockhart, A. (2007). 125 sposobow na bezpieczeństwo sieci. Gliwice: Helion. ]Search in Google Scholar
[Manovich, L. (2006). Język nowych mediow. Warszawa:Wydawnictwa Akademickie i Profesjonalne. ]Search in Google Scholar
[Mayer-Sch¨onberger, V., Cukier, K. (2014). Big data: rewolucja, ktora zmieni nasze myślenie, pracę i życie. Warszawa: MT Biznes. ]Search in Google Scholar
[Owens J. (2008). A study of passwords and methods used in brute-force SSH attacks. Clarkson University. Retrieved 11.16.2016, from http://people.clarkson.edu/~owensjp/pubs/Owens_MS_thesis.pdf]Search in Google Scholar
[PCWorld (2007, May 24) 15 Great, Free Security Programs. Retrieved 11.11.2016, from http://www.pcworld.com/article/133631/article.html]Search in Google Scholar
[Privacy Technical Assistance Center. (2011, December). Data Security: Top Threats to Data Protection. Retrieved 11.15.2016, from http://ptac.ed.gov/sites/default/files/issue-brief-threats-to-your-data.pdf]Search in Google Scholar
[Reinecke P., Seybert S. (2014). Internet and cloud services - statistics on the use by individuals - Statistics Explained. Retrieved 11.15.2016, from http://ec.europa.eu/eurostat/statistics-explained/index.php/Internet and cloud services - statistics on the use by individuals ]Search in Google Scholar
[Security Awareness Program Special Interest Group, & PCI Security Standards Council. (2014). Best Practices for Implementing a Security Awareness Program. Retrieved 11.15.2016, from https://www.pcisecuritystandards.org/documents/PCI DSS V1.0 Best Practices for Implementing Security Awareness Program.pdf.]Search in Google Scholar
[Shravani, R., & Nagamani, O. (2012). Analysis of Equivalence of Network positions and social roles. In National Conference On Social Networking (p. 33). Retrieved 11.15.2016, from http://repository.um.edu.my/26680/1/Jar-Kumar-Conference%20PROCEEDINGS-MAIL%20(1)%20(1).pdf#page=41]Search in Google Scholar
[Susłow W., Słowik A., Statkiewicz M. (2014). Chcę zostać informatykiem. Gliwice: Wydawnictwo Helion. ]Search in Google Scholar
[Symantec Corporation. (2016). Internet Security Threat Report Internet Report (No. 21). Retrieved 11.15.2016, from https://www.symantec.com/securitycenter/threat-report ]Search in Google Scholar
[Symantec Corporation. (2015). Keeping Your Private Data Secure. Retrieved 11.15. 2016, from https://www.symantec.com/content/dam/symantec/docs/whitepapers/keeping-your-private-data-secure-en.pdf]Search in Google Scholar
[Top 200 Facebook Statistics (2016, April). (b.d.). Retrieved 11.15.2016, from http://expandedramblings.com/index.php/by-the-numbers-17-amazing-facebook-stats/ ]Search in Google Scholar
[Toshniwal R., Dastidar K. G., Nath, A. (2015). Big Data Security Issues and Challenges. Complexity, 2(2). Retrieved 11.15.2016, from http://www.ijirae.com/volumes/Vol2/iss2/03.FBCS10080.pdf]Search in Google Scholar
[Wawrzyniak M. (2015). Hejtoholik czyli Jak zaszczepić się na hejt, nie wpaść w pułapkę obgadywania oraz nauczyć zarabiać na tych, ktorzy cię oczerniają. Gliwice: Wydawnictwo Helion. ]Search in Google Scholar
[W¨uest C. (2010). The Risks of Social Networking. Symantec Corporation. Retrieved 11.15.2016, from https://www.symantec.com/content/en/us/enterprise/media/securityresponse/whitepapers/the_risks_of_social_networking.pdf]Search in Google Scholar