C. Ellison, Ceremony design and analysis, Cryptology ePrint Archive Report, p.739, 2007.

W. Pieters, Representing Humans in System Security Models: An Actor-Network Approach, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, pp.75-92, 2011.

J. E. Martina, T. C. De-souza, and R. F. Custódio, Ceremonies design for PKIs hardware security modules, Proc. of the 9th Brazilian Symposium on Information and Computer System Security (NDSS'09), pp.115-128, 2009.

C. Karlof, J. D. Tygar, and D. Wagner, Conditioned-safe ceremonies and a user study of an application to web authentication, Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS '09, 2009.
DOI : 10.1145/1572532.1572578

A. Cooper, The Inmates are Running the Asylum, 2004.
DOI : 10.1007/978-3-322-99786-9_1

K. Radke, C. Boyd, J. G. Nieto, and M. Brereton, Ceremony Analysis: Strengths and Weaknesses, Proc. of the 26th IFIP International Information Security Conference (IFIP SEC'11), 2011.
DOI : 10.1007/978-3-642-21424-0_9

URL : http://eprints.qut.edu.au/42327/1/42327S.pdf

P. Kumaraguru and L. F. Cranor, Privacy indexes: A survey of westins studies, SCS Technical Report Collection, 2005.

G. Bella, Formal Correctness of Security Protocols. Information Security and Cryptography, 2007.

B. Whitworth, The Social Requirements of Technical Systems In: Socio-technical Design and Social Networking Systems, pp.3-22, 2009.

J. M. Jr, Social Protocols, 1998.

G. Bella and L. Coles-kemp, Seeing the Full Picture: the Case for Extending Security Ceremony Analysis URL: Privacy on the internet: Attitudes and be- haviours, Proceedings of the 9th Australian Information Security Management Conference, 2010.

T. Hubbard and L. Ampofo, What's out there? an evaluation of online identity management, 2010.

T. Buchanan, U. D. Reips, C. Paine, and A. N. Joinson, Development of measures of online privacy concern and protection for use on the Internet, Journal of the American Society for Information Science and Technology, vol.4, issue.2, pp.157-165, 2007.
DOI : 10.1002/asi.20459

P. A. Norberg, D. R. Horne, and D. A. Horne, The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors, Journal of Consumer Affairs, vol.14, issue.1 and 2, pp.100-126, 2007.
DOI : 10.1111/j.1745-6606.2006.00070.x

C. Paine, U. D. Reips, S. Stieger, A. Joinson, and T. Buchanan, Internet users??? perceptions of ???privacy concerns??? and ???privacy actions???, International Journal of Human-Computer Studies, vol.65, issue.6, pp.526-536, 2007.
DOI : 10.1016/j.ijhcs.2006.12.001

L. Coles-kemp and E. Kani-zabihi, On-line privacy and consent, Proceedings of the 2010 workshop on New security paradigms, NSPW '10, 2010.
DOI : 10.1145/1900546.1900560

L. Coles-kemp and E. Kani-zabihi, Practice Makes Perfect: Motivating Confident Privacy Protection Practices, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing, 2011.
DOI : 10.1109/PASSAT/SocialCom.2011.51

URL : http://repository.uwl.ac.uk/1407/

L. Coles-kemp and E. Kani-zabihi, Service users' requirements for tools to support effective on-line privacy and consent practices, Proc. of the 15th Nordic Conference in Secure IT Systems (NordSec'10), pp.106-120, 2010.

K. Mcmillan, Symbolic Model Checking, 1993.

T. Nipkow, L. C. Paulson, and M. Wenzel, Isabelle/HOL: A Proof Assistant for Higher-Order Logic, 2002.
DOI : 10.1007/3-540-45949-9