M. S. Wogalter, Purposes and scope of warnings: Handbook of warnings. Human Factors and Ergonomics. First edn, pp.3-9, 2006.

J. S. Downs, M. B. Holbrook, and L. F. Cranor, Decision strategies and susceptibility to phishing, Proceedings of the second symposium on Usable privacy and security , SOUPS '06, pp.79-90, 2006.
DOI : 10.1145/1143120.1143131

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.364.8084

S. Egelman, L. F. Cranor, and J. I. Hong, You " ve been warned: an empirical study of the effectiveness of web browser phishing warnings, Proceedings of the 2008 Conference on Human Factors in Computing Systems (CHI), ACM, pp.1065-1074, 2008.

J. Sunshine, S. Egelman, H. Almuhimedi, N. Atri, and L. F. Cranor, Crying wolf: An empirical study of ssl warning effectiveness, Proceedings of the 18th Usenix Security Symposium, Usenix Security Symposium, 2009.

S. E. Schechter, R. Dhamija, A. Ozment, and I. Fischer, The emperor " s new security indicators, SP " 07: Proceedings of the 2007 IEEE Symposium on Security and Privacy, pp.51-65, 2007.
DOI : 10.1109/sp.2007.35

L. J. Camp, Mental models of privacy and security. Technology and Society Magazine, IEEE, vol.28, issue.3, pp.37-46, 2009.

J. Meyer, Responses to dynamic warnings: Handbook of warnings. Human Factors and Ergonomics. First edn, pp.221-229, 2006.

M. Wu, R. C. Miller, S. L. Garfinkel, R. E. Grinter, T. Rodden et al., Do security toolbars actually prevent phishing attacks?, Proceedings of the SIGCHI conference on Human Factors in computing systems , CHI '06, pp.601-610, 2006.
DOI : 10.1145/1124772.1124863

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.136.7624

C. Herley, So long, and no thanks for the externalities, Proceedings of the 2009 workshop on New security paradigms workshop, NSPW '09, pp.133-144, 2009.
DOI : 10.1145/1719030.1719050

J. S. Downs, M. B. Holbrook, and L. F. Cranor, Behavioral response to phishing risk, Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit on , eCrime '07, pp.37-44, 2007.
DOI : 10.1145/1299015.1299019

URL : http://repository.cmu.edu/cgi/viewcontent.cgi?article=1044&context=isr

S. Motieé, K. Hawkey, and K. Beznosov, Do windows users follow the principle of least privilege?, Proceedings of the Sixth Symposium on Usable Privacy and Security, SOUPS '10, pp.1-13, 2010.
DOI : 10.1145/1837110.1837112

M. S. Wogalter, Communication-human information processing model: Handbook of warnings. Human Factors and Ergonomics. First edn, pp.51-61, 2006.

L. F. Cranor, A framework for reasoning about the human in the loop, 2008.

A. Inc, Apple human interface guidelines, 2010.

C. Benson, A. Elman, S. Nickell, and C. Z. Robertson, Gnome human interface guidelines 2.2.1. Online document available at http://library.gnome.org (2010) Last visit on, 2010.

S. Egelman, Trust me: Design Patterns for Constructing Trustworthy Trust Indicators, 2009.

C. Nodder, Users and trust: a microsoft case study Security and Usability: Designing secure systems that people can use. Theory in practice, pp.589-606, 2005.

B. Ross, Firefox and the worry-free web Security and Usability: Designing secure systems that people can use. Theory in practice, pp.577-587, 2005.

C. Bravo-lillo, L. Cranor, J. Downs, and S. Komanduri, Bridging the gap in computer security warnings: a mental model approach (to appear). Security and Privacy Magazine, IEEE, 2011.

J. Ross, L. Irani, M. S. Silberman, A. Zaldivar, and B. Tomlinson, Who are the crowdworkers?, Proceedings of the 28th of the international conference extended abstracts on Human factors in computing systems, CHI EA '10, pp.2863-2872, 2010.
DOI : 10.1145/1753846.1753873