1. D. Ragu. (2022, June 26), “Break your silence on millions lost by victims in ‘fraud’, MP tells bank. Freemalaysiatoday,” https://www.freemalaysiatoday.com/category/nation/ 2022/06/26/break-your-silence-on-millions-lost-by-victims-in-fraud-mp-tells-bank/
2. The Star Online. (2022, June 10). Rise in cases of money transferred unknowingly from accounts. The Star. https://www.thestar.com.my/news/nation/2022/06/10/rise-in-cases-of-money-transferred-unknowingly-from-accounts
3. Zalani, A. (2022, August 21). I lost my money in a blink of an eye, says CIMB customer. Sinar Daily. https://www.sinardaily.my/article/178696/malaysia/national/i-lost-my-money-in-a-blink-of-an-eye-says-cimb-customer-
4. C. Wang, Y. Wang, Y. Chen, H. Liu, and J. Liu., “User authentication on mobile devices: Approaches, threats and trends,” Computer Networks, vol. 170, 107118, 2020.
5. N. H. Zakaria. “Graphical Password Mechanisms: A Case Study,”.
6. F. Binbeshr, M. M. Kiah, L. Y. Por, and A. A. Zaidan, “A systematic review of PIN-entry methods resistant to shoulder-surfing attacks,” Computers & Security, 101, 102116, 2021
7. H. Khan, U . Hengartner, and D . Vogel, “ Evaluating attack and defense strategies for smartphone pin shoulder surfing. In Proc. 2018 CHI Conference on Human Factors in Computing Systems, April. 2018, pp. 1-10.
8. M. J. A. Sabani, and U. M. Rishan, “Effectiveness of ATM security mechanisms: a review analysis,” 2019.
9. A. Saad, M. Chukwu, and S. Schneegass, “ Communicating shoulder surfing attacks to users,” in Proc. 17th International Conference on Mobile and Ubiquitous Multimedia, Nov. 2018, pp. 147-152.
10. T. G. Zewdie, “Usable Security Case of Remote Web Access. in International Conference on Human-Computer Interaction, Ju l . 2020, pp. 491-501. Springer, Cham.
11. P. Coulton, and J. G. Lindley, “More-than human centred design: Considering other things,” The Design Journal, 2019, vol. 22, no. 4, pp. 463-481.
12. G. Briones-Villafuerte, A Naula-Bone, M. Vaca-Cardenas, and L. Vaca-Cardenas, “User Interfaces Promoting Appropriate HCI: Systematic Literature Review”. Revista Ibérica de Sistemas e Tecnologias de Informação, (E47), 2022, pp. 61-76.
13. T. Zhang, W. Du, H. Wang, Q. Zeng, and L. Fan, “A Stronger Adaptive Local Dimming Method with Details Preservation,” Applied Sciences, 2020, vol. 10, no.5, 1820.
14. C. Y. Jang, S. Kim, K. R. Cho, and Y. H. Kim, “Performance analysis of structural similarity-based backlight dimming algorithm modulated by controlling allowable local distortion of output image,” Displays, 2019, vol. 59, pp. 1-8.
15. T. Kojić, D. Ali, R. Greinacher, S. Möller, and J. N. Voigt-Antons, “ User experience of reading in virtual reality—finding values for text distance, size and contrast,” in 2020 Twelfth IEEE. International Conference on Quality of Multimedia Experience (QoMEX), May 2020, pp. 1-6.
16. Bâce, Mihai, Alia Saad, Mohamed Khamis, Stefan Schneegass, and Andreas Bulling. "PrivacyScout: Assessing Vulnerability to Shoulder Surfing on Mobile Devices." Proceedings on Privacy Enhancing Technologies 1, 2022, vol. 21.