Agrawal, D P, Alsaryrah, O, Chung, T, Kuo, W, Mashal, I & Yang C 2015, ‘Choices for
interaction with things on Internet and underlying issues’, Ad Hoc Networks, vol. 28, pp. 68-
90.
Amazon Web Services 2019, What is cloud computing?, streaming video, https://www.youtube.com/watch?v=dH0yz-Osy54
Carroll, M & Merwe, A 2011, ‘Secure cloud computing: benefits, risks and controls’,
Information Security for South Africa, Johannesburg, 15-17 August.
Conteh, N Y & Schmick P J 2015, ‘Cybersecurity: risks, vulnerabilities and countermeasures
to prevent social engineering attacks’, International Journal of Advanced Computer
Research, vol. 6, iss. 23, pp. 31-38.
Edureka! 2018, Internet of Things (IoT) | What is IoT | How it Works | IoT Explained | Edureka, streaming video, https://www.youtube.com/watch?v=LlhmzVL5bm8
GraVoc 2017, What is social engineering?, streaming video, https://www.youtube.com/watch?v=Vo1urF6S4u0
Grundy, J, Morsy, M A & Muller, I 2010, ‘An analysis of the cloud computing security
problem, 17 th Asia-Pacific Software Engineering Conference (APSEC 2010) Cloud
Workshop, Sydney, 30 November – 3 December.
Hadnagyk, C 2010, Social Engineering: The Art of Human Hacking, Wiley US.
Hassan, H 2019, Scam phishing fraud email attack, https://pixabay.com/illustrations/scam-phishing-fraud-email-attack-3933004/
Hewlett-Packard 2014, HP Study Reveals 70 Percent of Internet of Things Devices
Vulnerable to Attack, https://www8.hp.com/us/en/hp-news/press-release.html?id=1744676
Hobel, H, Huber, M, Krombholz, K & Weippl, E 2014, ‘Advanced social engineering attacks’,
Journal of Information Security and Applications, vol. 22, no. 1, pp. 112-122.
Koilakonda, S, Sen J & Ukil, A 2011, ‘Embedded security for Internet of Things’, 2011 2 nd
National Conference on Emerging Trends and Applications in Computer Science, Shillong,
3-5 March.
Jeferrb 2015, Network IOT internet of things, https://pixabay.com/vectors/network-iot-internet-of-things-782707/
Lekkas, D & Zissis, D 2012, ‘Addressing cloud computing security issues’, Future
Generation Computer Systems, vol. 28, iss. 3, pp. 583-592.