<h1>&nbsp;</h1> <div class="toc-about clearfix"> <h1><a href="http://many.at/links2tabs" class="header">Psychology - психологія 心理学 psychologie 心理學 ψυχολογία psychologia मनोविज्ञान pszichológia உளவியலாளர்கள் psicologia మానసిక నిపుణులు 심리학 psykologi tâm lý học psikoloji психология psicólogos علم النفس psicología פסיכולוגיה</a></h1><p>References 11 - 17 for The trick to blocking cognitive biases from clouding IT security decisions</p> </div><!-- class="about clearfix" --><h1>&nbsp;</h1> <div id="mysitesnoframes" class="sites_content"><ul> <li><a rel="nofollow" href="http://www.androidpolice.com/2014/04/06/the-1-new-paid-app-in-the-play-store-costs-4-has-over-10000-downloads-a-4-7-star-rating-and-its-a-total-scam/" ><img src="/wp-content/images/icons/32/globe2.png" width="32" height="32" /><strong>[11] did nothing except tell users they were safe</strong>androidpolice.com</a></li> <li><a rel="nofollow" href="http://www.slate.com/articles/technology/bitwise/2015/04/nq_mobile_vault_the_popular_encryption_app_has_laughably_crackable_encryption.html" ><img src="/wp-content/images/icons/32/globe3.png" width="32" height="32" /><strong>[12] Android and iOS used the weakest possible protection</strong>slate.com</a></li> <li><a rel="nofollow" href="http://www.techrepublic.com/article/the-shocking-truth-behind-privacy-policies-in-the-enterprise/" ><img src="/wp-content/images/icons/32/globe4.png" width="32" height="32" /><strong>[13] The shocking truth behind privacy policies in the enterprise</strong>techrepublic.com</a></li> <li><a rel="nofollow" href="http://www.techrepublic.com/article/stop-thinking-of-fraud-as-taboo-and-start-addressing-this-critical-it-security-topic/" ><img src="/wp-content/images/icons/32/globe5.png" width="32" height="32" /><strong>[14] Stop thinking of fraud as taboo, and start addressing this critical IT...</strong>techrepublic.com</a></li> <li><a rel="nofollow" href="http://www.techrepublic.com/blog/it-security/training-employees-on-security-measures-doesnt-have-to-be-boring/" ><img src="/wp-content/images/icons/32/globe6.png" width="32" height="32" /><strong>[15] Training employees on security measures doesn&#039;t have to be boring</strong>techrepublic.com</a></li> <li><a rel="nofollow" href="http://www.techrepublic.com/resource-library/whitepapers/executive-s-guide-to-the-next-wave-of-security-challenges/" ><img src="/wp-content/images/icons/32/globe7.png" width="32" height="32" /><strong>[16] Download: Executive&#039;s guide to the next wave of security...</strong>techrepublic.com</a></li> <li><a rel="nofollow" href="http://www.techproresearch.com/downloads/it-security-and-privacy-concerns-initiatives-and-predictions/" ><img src="/wp-content/images/icons/32/globe8.png" width="32" height="32" /><strong>[17] IT Security and Privacy: Concerns, initiatives and predictions</strong>techproresearch.com</a></li> </ul></div> Your browser does not handle frames, which are required to view the sites in tabs. Please upgrade to a more modern browser.<br /><br />