[1]
|
C. Bravo-Lillo, L. F. Cranor, J. S. Downs and S. Komanduri, “Bridging the Gap in Computer Security Warnings - A Mental Model Approach,” IEEE, 2011.
|
[2]
|
M. Sierhuis and W. J. Clancey,“Modeling and Simulating Work Practice: A Method for Work Systems Design,” IEEE, 2002.
|
[3]
|
L. JEAN CAMP, “Mental Models of Privacy and Security,” IEEE, Tech & Society Magazine, FALL 2009.
|
[4]
|
C. Bravo-Lillo, L. F. Cranor, J. Downs, S. Komanduri and M. Sleeper, “Improving Computer Security,” P. Campos et al. (Eds.): INTERACT 2011, Part IV, LNCS 6949, pp. 18–35.
|
[5]
|
L. F. Cranor, “A Framework for Reasoning About The Human in the Loop,” Carnegie Mellon University.
|
[6]
|
J. Blythe USC, Jean Camp, Vaibhav Garg,“Targeted Risk Communication for computer security,” IUI11, California, USA, 2011.
|
[7]
|
J. Blythe, A. Botello, J. Sutton, D. Mazzocco, J. Lin, M. Spraragen and M. Zyda, “Testing Cyber Security with Simulated Human,” 2011.
|
[8]
|
G. S. Poh, N. N. Abdullah, M. R. Z’aba and M. Ridza Wahiddin, “Reasoning of Collaborative Human Behaviour in Security-Criticial Work Practices: A Framework,” Atlantis Press 2012.
|
[9]
|
J. Blythe, A. Botello, J. Sutton, D. Mazzocco, J. Lin, M. Spraragen and M. Zyda, “Testing Cyber Security with Simulated Human,” Copyright 2011, Association for the Advancement of Artificial Intelligence. www.aaai.org.
|