Privacy and rationality in individual decision making, IEEE Security and Privacy Magazine, vol.3, issue.1, pp.26-33, 2005. ,
DOI : 10.1109/MSP.2005.22
The triad of risk related behaviors, 2015. ,
An experimental microworld for evaluating the tradeoffs between usability and security, Usable Security Experiment Reports (USER) Workshop in the Symposium on Usable Privacy and Security (SOUPS), 2010. ,
User settings of cue thresholds for binary categorization decisions., Journal of Experimental Psychology: Applied, vol.16, issue.1, pp.1-15, 2010. ,
DOI : 10.1037/a0018758
Empirical Model Building and Response Surfaces, 1987. ,
Can you engineer privacy?, Communications of the ACM, vol.57, issue.8, pp.20-23, 2014. ,
DOI : 10.1145/2633029
Measures of Reliance and Compliance in Aided Visual Scanning, Human Factors, vol.36, issue.5, pp.840-849, 2014. ,
DOI : 10.1111/1529-1006.001
Modeling the behavior of users who are confronted with security mechanisms, Computers & Security, vol.30, issue.4, pp.242-256, 2011. ,
DOI : 10.1016/j.cose.2011.01.001
Engineering Privacy, IEEE Transactions on Software Engineering, vol.35, issue.1, pp.67-82, 2009. ,
DOI : 10.1109/TSE.2008.88
Cognitive Work Analysis, 1999. ,
Privacy and Freedom, 1967. ,