A. Acquisti and J. Grossklags, Privacy and rationality in individual decision making, IEEE Security and Privacy Magazine, vol.3, issue.1, pp.26-33, 2005.
DOI : 10.1109/MSP.2005.22

N. Ben-asher and J. Meyer, The triad of risk related behaviors, 2015.

N. Ben-asher, J. Meyer, Y. Parmet, S. Möller, and R. Englert, An experimental microworld for evaluating the tradeoffs between usability and security, Usable Security Experiment Reports (USER) Workshop in the Symposium on Usable Privacy and Security (SOUPS), 2010.

A. Botzer, J. Meyer, P. Bak, and Y. Parmet, User settings of cue thresholds for binary categorization decisions., Journal of Experimental Psychology: Applied, vol.16, issue.1, pp.1-15, 2010.
DOI : 10.1037/a0018758

G. E. Box and N. R. Draper, Empirical Model Building and Response Surfaces, 1987.

S. Gurses, Can you engineer privacy?, Communications of the ACM, vol.57, issue.8, pp.20-23, 2014.
DOI : 10.1145/2633029

J. Meyer, R. Wiczorek, and T. Günzler, Measures of Reliance and Compliance in Aided Visual Scanning, Human Factors, vol.36, issue.5, pp.840-849, 2014.
DOI : 10.1111/1529-1006.001

S. Möller, N. Ben-asher, K. Engelbrecht, R. Englert, and J. Meyer, Modeling the behavior of users who are confronted with security mechanisms, Computers & Security, vol.30, issue.4, pp.242-256, 2011.
DOI : 10.1016/j.cose.2011.01.001

S. Spiekerman and L. F. Cranor, Engineering Privacy, IEEE Transactions on Software Engineering, vol.35, issue.1, pp.67-82, 2009.
DOI : 10.1109/TSE.2008.88

K. Vicente, Cognitive Work Analysis, 1999.

A. Westin, Privacy and Freedom, 1967.