Poole D, Mackworth A (2010) Artificial Intelligence: foundations of computational agents. Cambridge University Press, Cambridge
Book
MATH
Google Scholar
Rogers Y, Sharp H, Preece J (2011) Interaction Design: beyond Human–Computer interaction, 3rd edn. Wiley, New York
Google Scholar
Jøsang A, Ismail R, Boyd C (2007) A survey of trust and reputation systems for online service provision. Decis Support Syst 43(2):618–644. https://doi.org/10.1016/j.dss.2005.05.019
Article
Google Scholar
Pinyol I, Sabater-Mir J (2013) Computational trust and reputation models for open multi-agent systems: a review. Artif Intell Rev 40(1):1–25. https://doi.org/10.1007/s10462-011-9277-z
Article
Google Scholar
Veruggio G, Operto F (2008) Roboethics: social and ethical implications of robotics. In: Siciliano B, Khatib O (eds) Handbook of Robotics. Springer, Berlin, pp 1499–1524. https://doi.org/10.1007/978-3-540-30301-5_65
Chapter
Google Scholar
Tzafestas SG (2016) Roboethics: A Navigating Overview. Intelligent systems, control and automation: science and engineering, vol 79. Springer, Berlin. https://doi.org/10.1007/978-3-319-21714-7
Google Scholar
Ellison C (2007) Ceremony design and analysis. Cryptol ePrint Archiv Rep 2007:399
Google Scholar
Radke K, Boyd C, Nieto JMG, Brereton M (2011) Ceremony analysis: strengths and weaknesses. Inform. Security and Privacy. IFIP AICT, vol 354. Springer, Berlin, pp 104–115
Google Scholar
Yee KP (2002) User interaction design for secure systems. Information and communications security. LNCS, vol 2513. Springer, Berlin, pp 278–290. https://doi.org/10.1007/3-540-36159-6_24
Google Scholar
Ruksenas R, Curzon P, Blandford A (2008) Modelling and analysing cognitive causes of security breaches. Innov Syst Softw Eng 4(2):143–160
Article
Google Scholar
Adams A, Sasse MA (1999) Users are not the enemy. Commun ACM 42(12):40–46
Article
Google Scholar
West R (2008) The psychology of security. Commun ACM 51(4):34–40
Article
Google Scholar
Lee JK, Moon SY, Park JH (2016) Hb-dipm: human behavior analysis-based malware detection and intrusion prevention model in the future internet. J Inf Process Syst 12(3):489–501
Google Scholar
Hong J (2012) The state of phishing attacks. Commun ACM 55(1):74–81. https://doi.org/10.1145/2063176.2063197
Article
Google Scholar
Fette I, Sadeh N, Tomasic A (2007) Learning to detect phishing emails. In: Proceedings of the 16th international conference on World Wide Web. WWW ’07. ACM, New York, pp 649–656. https://doi.org/10.1145/1242572.1242660
Abu-Nimeh S, Nappa D, Wang X, Nair S (2007) A comparison of machine learning techniques for phishing detection. In: Proceedings of the anti-phishing working groups 2Nd annual eCrime researchers summit. eCrime ’07. ACM, pp 60–69. https://doi.org/10.1145/1299015.1299021
Egelman S, Cranor LF, Hong J (2008) You’ve been warned: an empirical study of the effectiveness of web browser phishing warnings. In: Proceedings of the SIGCHI conference on human factors in computing systems. CHI ’08. ACM, New York, pp 1065–1074. https://doi.org/10.1145/1357054.1357219
Kumaraguru P, Sheng S, Acquisti A, Cranor LF, Hong J (2010) Teaching johnny not to fall for phish. ACM Trans Internet Technol 10(2):7–1731. https://doi.org/10.1145/1754393.1754396
Article
Google Scholar
Augusto JC, Huch M, Kameas A, Maitland J, McCullagh P, Roberts J, Sixsmith A, Wichert R (2012) Handbook of Ambient Assisted Living. IOS Press, Amsterdam
Google Scholar
Brush, A.J.B., Lee, B., Mahajan, R., Agarwal, S., Saroiu, S., Dixon, C.: Home automation in the wild: Challenges and opportunities. In: SIGCHI, pp. 2115–2124. ACM, (2011). https://doi.org/10.1145/1978942.1979249
Johansen C, Pedersen T, Jøsang A (2016) Towards behavioural computer science. In: 10th IFIP WG 11.11 international conference on trust management (IFIPTM). IFIP AICT advances in information and communication technology, vol. 473. Springer, Berlin, pp 154–163. https://doi.org/10.1007/978-3-319-41354-9_12
Simon HA (1979) Rational decision making in business organizations. Am Econ Rev 69(4):493–513
Google Scholar
Simon HA (1983) Reason in human affairs. Stanford University Press, Palo Alto
Google Scholar
Simon HA (1997) Models of bounded rationality: empirically grounded economic reason. MIT Press, Cambridge
Google Scholar
Thaler RH, Sunstein CR (2008) Nudge: improving decisions about health, wealth, and happiness. Yale University Press, New Haven
Google Scholar
Kahneman D, Thaler RH (2006) Anomalies: utility maximization and experienced utility. J Econ Persp 20(1):221–234. https://doi.org/10.1257/089533006776526076
Article
Google Scholar
Gilovich T, Griffin D, Kahneman D (2002) Heuristics and Biases: the psychology of intuitive judgment. Cambridge University Press, Cambridge
Book
Google Scholar
Tversky A, Kahneman D (1974) Judgment under uncertainty: Heuristics and biases. Science 185(4157):1124–1131
Article
Google Scholar
Kahneman D (2003) A perspective on judgment and choice: mapping bounded rationality. Am Psychol 58:697–720
Article
Google Scholar
(2003) Behavioral game theory: experiments in strategic interaction. Princeton University Press, Princeton
MATH
Google Scholar
Gärling T, Ettema D, Friman M (2014) Handbook of sustainable travel. Springer, Berlin
Book
Google Scholar
Pedersen T, Friman M, Kristensson P (2011) Affective forecasting: predicting and experiencing satisfaction with public transportation. J Appl Soc Psychol 41(8):1926–1946. https://doi.org/10.1111/j.1559-1816.2011.00789.x
Article
Google Scholar
Bella G, Coles-Kemp L (2012) Layered analysis of security ceremonies. Information security and privacy. IFIP AICT, vol 376. Springer, Berlin, pp 273–286
Google Scholar
Dolev D, Yao AC (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198–207. https://doi.org/10.1109/TIT.1983.1056650
Article
MathSciNet
MATH
Google Scholar
Abadi M (2001) Mobile values, new names, and secure communication. In: Hankin C, Schmidt D et al (eds) POPL. ACM, New York, pp 104–115
Google Scholar
Abadi M, Blanchet B, Fournet C (2016) The applied pi calculus: mobile values, new names, and secure communication. J ACM 65:1
Article
MathSciNet
Google Scholar
Semančík R (2007) Basic properties of the persona model. Comput Inf 26(2):105–121
MATH
Google Scholar
Bolton M, Bass E, Siminiceanu R (2013) Using formal verification to evaluate human-automation interaction: a review. IEEE Trans Syst Man Cyb 43(3):488–503. https://doi.org/10.1109/TSMCA.2012.2210406
Article
Google Scholar
Bevan N (2001) International standards for HCI and usability. Int J Hum Comput Studies 55(4):533–552. https://doi.org/10.1006/ijhc.2001.0483
Article
MATH
Google Scholar
Johansen C, Jøsang A (2014) Probabilistic modeling of humans in security ceremonies. In: Aldini A, Martinelli F, Suri N (eds) Workshop on quantitative aspects in security assurance (QASA). LNCS, vol 8872. Springer, Berlin, pp 277–292. https://doi.org/10.1007/978-3-319-17016-9_18
Google Scholar
Newell A, Card SK (1985) The prospects for psychological science in Human–Computer interaction. Hum Comput Interact 1(3):209–242. https://doi.org/10.1207/s15327051hci0103_1
Article
Google Scholar
Harrison M, Thimbleby H (eds) (1990) Formal methods in Human–Computer interaction. Cambridge Univ Press, Cambridge
MATH
Google Scholar
Carroll JM (2003) HCI models, theories, and frameworks: toward a multidisciplinary science. Morgan Kaufmann. Elsevier, Amsterdam
Google Scholar
Oliver RL (2010) Satisfaction: a behavioral perspective on the consumer. M.E, Sharpe, New York
Google Scholar
Kahneman D (2000) Evaluation by moments, past and future. In: Kahneman D, Tversky a (eds) Choices, values and frames. Cambridge University Press, Cambridge, p 693
Google Scholar
Wilson TD, Gilbert DT (2003) Affective forecasting. Advances in experimental social psychology, vol 35. Academic Press, Cambridge, pp 345–411. https://doi.org/10.1016/S0065-2601(03)01006-2
Google Scholar
Sloman SA (2002) Two systems of reasoning. In: Gilovich T, Griffin D, Kahneman D (eds) Heuristics and biases. Cambridge University Press, Cambridge, pp 379–396
Chapter
Google Scholar
Cialdini RB (2001) The science of persuasion. Scientific American. Springer, Berlin
Google Scholar
Butterworth R, Blandford A, Duke DJ (2000) Demonstrating the cognitive plausibility of interactive system specifications. Formal Asp Comput 12(4):237–259. https://doi.org/10.1007/s001650070021
Article
MATH
Google Scholar
Curzon P, Ruksenas R, Blandford A (2007) An approach to formal verification of Human–Computer interaction. Formal Asp Comput 19(4):513–550. https://doi.org/10.1007/s00165-007-0035-6
Article
MATH
Google Scholar
Ruksenas R, Back J, Curzon P, Blandford A (2009) Verification-guided modelling of salience and cognitive load. Formal Asp Comput 21(6):541–569. https://doi.org/10.1007/s00165-008-0102-7
Article
MATH
Google Scholar
Newell A (1990) Unified theories of cognition. Harvard University Press, Cambridge
Google Scholar
Hollnagel E, Woods DD (2005) Joint cognitive systems: foundations of cognitive systems engineering. CRC Press, Boca Raton
Book
Google Scholar
Buehler R, McFarland C (2001) Intensity bias in affective forecasting: the role of temporal focus. Personal Soc Psychol Bull 27(11):1480–1493
Article
Google Scholar
Manna Z, Pnueli A (1992) The temporal logic of reactive and concurrent systems: specification. Springer, Berlin
Book
MATH
Google Scholar
Stirling C (2001) Modal and temporal properties of processes. Springer, Berlin
Book
MATH
Google Scholar
Baier C, Katoen JP (2008) Principles of model checking. MIT Press, Cambridge
MATH
Google Scholar
Robinson MD, Clore GL (2002) Episodic and semantic knowledge in emotional self-report. J Personal Soc Psychol 83(1):198–215
Article
Google Scholar
Harel D, Tiuryn J, Kozen D (2000) Dynamic logic. MIT Press, Cambridge
MATH
Google Scholar
Beckert B, Hähnle R, Schmitt PH (2007) Verification of object-oriented software: the keY approach. Springer, Berlin
MATH
Google Scholar
Conway MA (1997) Cognitive models of memory. MIT Press, Cambridge
Google Scholar
Neath I, Surprenant AM (2003) Human memory: an introduction to research, data, and theory, 2nd edn. Thomson/Wadsworth, Belmont
Google Scholar
Byrne MD, Bovair S (1997) A working memory model of a common procedural error. Cogn Sci 21(1):31–61. https://doi.org/10.1207/s15516709cog2101_2
Article
Google Scholar
Oberauer K, Kliegl R (2006) A formal model of capacity limits in working memory. J Memory Lang 55(4):601–626. https://doi.org/10.1016/j.jml.2006.08.009
Article
Google Scholar
Wang Y (2013) Cognitive informatics for revealing human cognition: knowledge manipulations in natural intelligence. IGI Global, Hershey
Book
Google Scholar
Fagin R, Halpern JY, Moses Y, Vardi MY (1995) Reasoning about knowledge. MIT Press, Cambridge
MATH
Google Scholar
Baltag A, Moss LS (2004) Logics for epistemic programs. Synthese 139(2):165–224
Article
MathSciNet
MATH
Google Scholar
Wilson TD, Wheatley T, Meyers JM, Gilbert DT, Axsom D (2000) Focalism: a source of durability bias in affective forecasting. J Person Soc Psychol 78(5):821–836
Article
Google Scholar
Droste M, Kuich W, Vogler H (2009) Handbook of weighted automata. Springer, Berlin
Book
MATH
Google Scholar
Kwiatkowska MZ (2007) Quantitative verification: models techniques and tools. In: Foundations of software engineering ACM SIGSOFT. ACM, pp 449–458. https://doi.org/10.1145/1287624.1287688
Ruksenas R, Curzon P, Back J, Blandford A (2007) Formal Modelling of Cognitive Interpretation. In: 13th International workshop on design, specification, and verification of interactive systems (DSVIS’06). LNCS, vol. 4323. Springer, Berlin, pp 123–136
Jøsang A (2001) A logic for uncertain probabilities. Int J Uncertain Fuzziness Knowl Based Syst 9(3):279–311. https://doi.org/10.1142/S0218488501000831
Article
MathSciNet
MATH
Google Scholar
Pedersen T, Kristensson P, Friman M (2012) Counteracting the focusing illusion: effects of defocusing on car users predicted satisfaction with public transport. J Environ Psychol 32(1):30–36. https://doi.org/10.1016/j.jenvp.2011.10.004
Article
Google Scholar
Pavlovic D, Meadows C (2011) Actor-network procedures: modeling multi-factor authentication, device pairing, social interactions. arXiv.org
Pieters W (2011) Representing humans in system security models: an actor-network approach. J Wirel Mobile Netw Ubiquitous Comput Dependable Appl 2(1):75–92
Google Scholar
Prisacariu C (2014) Actor network procedures as psi-calculi for security ceremonies. In: International workshop on graphical models for security. Electronic proceedings in theoretical computer science, vol. 148. Open Publishing Association., pp 63–77. https://doi.org/10.4204/EPTCS.148.5
Latour B (2005) Reassembling the social—an introduction to actor-network-theory. Oxford Univ Press, Oxford
Google Scholar
Harel D (1987) Statecharts: a visual formalism for complex systems. Sci Comput Program 8(3):231–274
Article
MathSciNet
MATH
Google Scholar
Harel D, Naamad A (1996) The statemate semantics of statecharts. ACM TOSEM 5(4):293–333
Article
Google Scholar
Harel D, Marelly R (2003) Come, Let’s play: scenario-based programming using LSCs and the play-engine, vol 1. Springer, Berlin
Book
Google Scholar
Wickens CD, Hollands JG, Banbury S, Parasuraman R (2015) Engineering psychology and human performance, 4th edn. Taylor & Francis, Rautledge
Google Scholar
Salvendy G (2012) Handbook of human factors and ergonomics. Wiley, New Jersey
Book
Google Scholar
Kirwan B, Ainsworth LK (1992) A guide to task analysis: the task analysis working group. Taylor & Francis, Rautledge
Book
Google Scholar
Crandall B, Klein GA, Hoffman RR (2006) Working minds: a practitioner’s guide to cognitive task analysis. MIT Press, Cambridge
Google Scholar
Paterno F, Mancini C, Meniconi S (1997) In: Howard S, Hammond J, Lindgaard G (eds) ConcurTaskTrees: a diagrammatic notation for specifying task models. Springer, Boston, pp 362–369. https://doi.org/10.1007/978-0-387-35175-9_58
Nóbrega L, Nunes NJ, Coelho H (2006) Mapping concurtasktrees into uml 2.0. In: Gilroy SW, Harrison MD (eds) Interactive systems. Design, specification, and verification. Springer, Berlin, pp 237–248
Chapter
Google Scholar
Mitchell CM, Miller RA (1986) A discrete control model of operator function: a methodology for information display design. IEEE Trans Syst Man Cybernet 16(3):343–357
Article
Google Scholar
Bolton ML, Siminiceanu RI, Bass EJ (2011) A systematic approach to model checking Human–Automation interaction using task analytic models. IEEE Trans Syst Man Cybern Part A Syst Hum 41(5):961–976. https://doi.org/10.1109/TSMCA.2011.2109709
Article
Google Scholar
Bolton ML, Bass EJ (2010) Formally verifying human-automation interaction as part of a system model: limitations and tradeoffs. Innov Syst Softw Eng 6(3):219–231
Article
Google Scholar
Pérez-Medina J-L, Dupuy-Chessa S, Front A (2007) A survey of model driven engineering tools for user interface design. In: Winckler M, Johnson H, Palanque P (eds) Task models and diagrams for user interface design. Springer, Berlin, pp 84–97
Chapter
Google Scholar
Ivory MY, Hearst MA (2001) The state of the art in automating usability evaluation of user interfaces. ACM Comput Surv 33(4):470–516
Article
Google Scholar
Law EL-C, Van Schaik P (2010) Modelling user experience-an agenda for research and practice. Interact comput 22(5):313–322
Article
Google Scholar
Turner JC (1991) Social influence. Thomson Brooks/Cole Publishing Co, Pacific Grove
Google Scholar
Omand D (2012) Securing the State. C Hurst Publishers, London
Google Scholar