Poole D, Mackworth A (2010) Artificial Intelligence: foundations of computational agents. Cambridge University Press, Cambridge

Book
MATH
Google Scholar

Rogers Y, Sharp H, Preece J (2011) Interaction Design: beyond Human–Computer interaction, 3rd edn. Wiley, New York

Google Scholar

Jøsang A, Ismail R, Boyd C (2007) A survey of trust and reputation systems for online service provision. Decis Support Syst 43(2):618–644. https://doi.org/10.1016/j.dss.2005.05.019

Article
Google Scholar

Pinyol I, Sabater-Mir J (2013) Computational trust and reputation models for open multi-agent systems: a review. Artif Intell Rev 40(1):1–25. https://doi.org/10.1007/s10462-011-9277-z

Article
Google Scholar

Veruggio G, Operto F (2008) Roboethics: social and ethical implications of robotics. In: Siciliano B, Khatib O (eds) Handbook of Robotics. Springer, Berlin, pp 1499–1524. https://doi.org/10.1007/978-3-540-30301-5_65

Chapter
Google Scholar

Tzafestas SG (2016) Roboethics: A Navigating Overview. Intelligent systems, control and automation: science and engineering, vol 79. Springer, Berlin. https://doi.org/10.1007/978-3-319-21714-7

Google Scholar

Ellison C (2007) Ceremony design and analysis. Cryptol ePrint Archiv Rep 2007:399

Google Scholar

Radke K, Boyd C, Nieto JMG, Brereton M (2011) Ceremony analysis: strengths and weaknesses. Inform. Security and Privacy. IFIP AICT, vol 354. Springer, Berlin, pp 104–115

Google Scholar

Yee KP (2002) User interaction design for secure systems. Information and communications security. LNCS, vol 2513. Springer, Berlin, pp 278–290. https://doi.org/10.1007/3-540-36159-6_24

Google Scholar

Ruksenas R, Curzon P, Blandford A (2008) Modelling and analysing cognitive causes of security breaches. Innov Syst Softw Eng 4(2):143–160

Article
Google Scholar

Adams A, Sasse MA (1999) Users are not the enemy. Commun ACM 42(12):40–46

Article
Google Scholar

West R (2008) The psychology of security. Commun ACM 51(4):34–40

Article
Google Scholar

Lee JK, Moon SY, Park JH (2016) Hb-dipm: human behavior analysis-based malware detection and intrusion prevention model in the future internet. J Inf Process Syst 12(3):489–501

Google Scholar

Hong J (2012) The state of phishing attacks. Commun ACM 55(1):74–81. https://doi.org/10.1145/2063176.2063197

Article
Google Scholar

Fette I, Sadeh N, Tomasic A (2007) Learning to detect phishing emails. In: Proceedings of the 16th international conference on World Wide Web. WWW ’07. ACM, New York, pp 649–656. https://doi.org/10.1145/1242572.1242660

Abu-Nimeh S, Nappa D, Wang X, Nair S (2007) A comparison of machine learning techniques for phishing detection. In: Proceedings of the anti-phishing working groups 2Nd annual eCrime researchers summit. eCrime ’07. ACM, pp 60–69. https://doi.org/10.1145/1299015.1299021

Egelman S, Cranor LF, Hong J (2008) You’ve been warned: an empirical study of the effectiveness of web browser phishing warnings. In: Proceedings of the SIGCHI conference on human factors in computing systems. CHI ’08. ACM, New York, pp 1065–1074. https://doi.org/10.1145/1357054.1357219

Kumaraguru P, Sheng S, Acquisti A, Cranor LF, Hong J (2010) Teaching johnny not to fall for phish. ACM Trans Internet Technol 10(2):7–1731. https://doi.org/10.1145/1754393.1754396

Article
Google Scholar

Augusto JC, Huch M, Kameas A, Maitland J, McCullagh P, Roberts J, Sixsmith A, Wichert R (2012) Handbook of Ambient Assisted Living. IOS Press, Amsterdam

Google Scholar

Brush, A.J.B., Lee, B., Mahajan, R., Agarwal, S., Saroiu, S., Dixon, C.: Home automation in the wild: Challenges and opportunities. In: SIGCHI, pp. 2115–2124. ACM, (2011). https://doi.org/10.1145/1978942.1979249

Johansen C, Pedersen T, Jøsang A (2016) Towards behavioural computer science. In: 10th IFIP WG 11.11 international conference on trust management (IFIPTM). IFIP AICT advances in information and communication technology, vol. 473. Springer, Berlin, pp 154–163. https://doi.org/10.1007/978-3-319-41354-9_12

Simon HA (1979) Rational decision making in business organizations. Am Econ Rev 69(4):493–513

Google Scholar

Simon HA (1983) Reason in human affairs. Stanford University Press, Palo Alto

Google Scholar

Simon HA (1997) Models of bounded rationality: empirically grounded economic reason. MIT Press, Cambridge

Google Scholar

Thaler RH, Sunstein CR (2008) Nudge: improving decisions about health, wealth, and happiness. Yale University Press, New Haven

Google Scholar

Kahneman D, Thaler RH (2006) Anomalies: utility maximization and experienced utility. J Econ Persp 20(1):221–234. https://doi.org/10.1257/089533006776526076

Article
Google Scholar

Gilovich T, Griffin D, Kahneman D (2002) Heuristics and Biases: the psychology of intuitive judgment. Cambridge University Press, Cambridge

Book
Google Scholar

Tversky A, Kahneman D (1974) Judgment under uncertainty: Heuristics and biases. Science 185(4157):1124–1131

Article
Google Scholar

Kahneman D (2003) A perspective on judgment and choice: mapping bounded rationality. Am Psychol 58:697–720

Article
Google Scholar

(2003) Behavioral game theory: experiments in strategic interaction. Princeton University Press, Princeton

MATH
Google Scholar

Gärling T, Ettema D, Friman M (2014) Handbook of sustainable travel. Springer, Berlin

Book
Google Scholar

Pedersen T, Friman M, Kristensson P (2011) Affective forecasting: predicting and experiencing satisfaction with public transportation. J Appl Soc Psychol 41(8):1926–1946. https://doi.org/10.1111/j.1559-1816.2011.00789.x

Article
Google Scholar

Bella G, Coles-Kemp L (2012) Layered analysis of security ceremonies. Information security and privacy. IFIP AICT, vol 376. Springer, Berlin, pp 273–286

Google Scholar

Dolev D, Yao AC (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198–207. https://doi.org/10.1109/TIT.1983.1056650

Article
MathSciNet
MATH
Google Scholar

Abadi M (2001) Mobile values, new names, and secure communication. In: Hankin C, Schmidt D et al (eds) POPL. ACM, New York, pp 104–115

Google Scholar

Abadi M, Blanchet B, Fournet C (2016) The applied pi calculus: mobile values, new names, and secure communication. J ACM 65:1

Article
MathSciNet
Google Scholar

Semančík R (2007) Basic properties of the persona model. Comput Inf 26(2):105–121

MATH
Google Scholar

Bolton M, Bass E, Siminiceanu R (2013) Using formal verification to evaluate human-automation interaction: a review. IEEE Trans Syst Man Cyb 43(3):488–503. https://doi.org/10.1109/TSMCA.2012.2210406

Article
Google Scholar

Bevan N (2001) International standards for HCI and usability. Int J Hum Comput Studies 55(4):533–552. https://doi.org/10.1006/ijhc.2001.0483

Article
MATH
Google Scholar

Johansen C, Jøsang A (2014) Probabilistic modeling of humans in security ceremonies. In: Aldini A, Martinelli F, Suri N (eds) Workshop on quantitative aspects in security assurance (QASA). LNCS, vol 8872. Springer, Berlin, pp 277–292. https://doi.org/10.1007/978-3-319-17016-9_18

Google Scholar

Newell A, Card SK (1985) The prospects for psychological science in Human–Computer interaction. Hum Comput Interact 1(3):209–242. https://doi.org/10.1207/s15327051hci0103_1

Article
Google Scholar

Harrison M, Thimbleby H (eds) (1990) Formal methods in Human–Computer interaction. Cambridge Univ Press, Cambridge

MATH
Google Scholar

Carroll JM (2003) HCI models, theories, and frameworks: toward a multidisciplinary science. Morgan Kaufmann. Elsevier, Amsterdam

Google Scholar

Oliver RL (2010) Satisfaction: a behavioral perspective on the consumer. M.E, Sharpe, New York

Google Scholar

Kahneman D (2000) Evaluation by moments, past and future. In: Kahneman D, Tversky a (eds) Choices, values and frames. Cambridge University Press, Cambridge, p 693

Google Scholar

Wilson TD, Gilbert DT (2003) Affective forecasting. Advances in experimental social psychology, vol 35. Academic Press, Cambridge, pp 345–411. https://doi.org/10.1016/S0065-2601(03)01006-2

Google Scholar

Sloman SA (2002) Two systems of reasoning. In: Gilovich T, Griffin D, Kahneman D (eds) Heuristics and biases. Cambridge University Press, Cambridge, pp 379–396

Chapter
Google Scholar

Cialdini RB (2001) The science of persuasion. Scientific American. Springer, Berlin

Google Scholar

Butterworth R, Blandford A, Duke DJ (2000) Demonstrating the cognitive plausibility of interactive system specifications. Formal Asp Comput 12(4):237–259. https://doi.org/10.1007/s001650070021

Article
MATH
Google Scholar

Curzon P, Ruksenas R, Blandford A (2007) An approach to formal verification of Human–Computer interaction. Formal Asp Comput 19(4):513–550. https://doi.org/10.1007/s00165-007-0035-6

Article
MATH
Google Scholar

Ruksenas R, Back J, Curzon P, Blandford A (2009) Verification-guided modelling of salience and cognitive load. Formal Asp Comput 21(6):541–569. https://doi.org/10.1007/s00165-008-0102-7

Article
MATH
Google Scholar

Newell A (1990) Unified theories of cognition. Harvard University Press, Cambridge

Google Scholar

Hollnagel E, Woods DD (2005) Joint cognitive systems: foundations of cognitive systems engineering. CRC Press, Boca Raton

Book
Google Scholar

Buehler R, McFarland C (2001) Intensity bias in affective forecasting: the role of temporal focus. Personal Soc Psychol Bull 27(11):1480–1493

Article
Google Scholar

Manna Z, Pnueli A (1992) The temporal logic of reactive and concurrent systems: specification. Springer, Berlin

Book
MATH
Google Scholar

Stirling C (2001) Modal and temporal properties of processes. Springer, Berlin

Book
MATH
Google Scholar

Baier C, Katoen JP (2008) Principles of model checking. MIT Press, Cambridge

MATH
Google Scholar

Robinson MD, Clore GL (2002) Episodic and semantic knowledge in emotional self-report. J Personal Soc Psychol 83(1):198–215

Article
Google Scholar

Harel D, Tiuryn J, Kozen D (2000) Dynamic logic. MIT Press, Cambridge

MATH
Google Scholar

Beckert B, Hähnle R, Schmitt PH (2007) Verification of object-oriented software: the keY approach. Springer, Berlin

MATH
Google Scholar

Conway MA (1997) Cognitive models of memory. MIT Press, Cambridge

Google Scholar

Neath I, Surprenant AM (2003) Human memory: an introduction to research, data, and theory, 2nd edn. Thomson/Wadsworth, Belmont

Google Scholar

Byrne MD, Bovair S (1997) A working memory model of a common procedural error. Cogn Sci 21(1):31–61. https://doi.org/10.1207/s15516709cog2101_2

Article
Google Scholar

Oberauer K, Kliegl R (2006) A formal model of capacity limits in working memory. J Memory Lang 55(4):601–626. https://doi.org/10.1016/j.jml.2006.08.009

Article
Google Scholar

Wang Y (2013) Cognitive informatics for revealing human cognition: knowledge manipulations in natural intelligence. IGI Global, Hershey

Book
Google Scholar

Fagin R, Halpern JY, Moses Y, Vardi MY (1995) Reasoning about knowledge. MIT Press, Cambridge

MATH
Google Scholar

Baltag A, Moss LS (2004) Logics for epistemic programs. Synthese 139(2):165–224

Article
MathSciNet
MATH
Google Scholar

Wilson TD, Wheatley T, Meyers JM, Gilbert DT, Axsom D (2000) Focalism: a source of durability bias in affective forecasting. J Person Soc Psychol 78(5):821–836

Article
Google Scholar

Droste M, Kuich W, Vogler H (2009) Handbook of weighted automata. Springer, Berlin

Book
MATH
Google Scholar

Kwiatkowska MZ (2007) Quantitative verification: models techniques and tools. In: Foundations of software engineering ACM SIGSOFT. ACM, pp 449–458. https://doi.org/10.1145/1287624.1287688

Ruksenas R, Curzon P, Back J, Blandford A (2007) Formal Modelling of Cognitive Interpretation. In: 13th International workshop on design, specification, and verification of interactive systems (DSVIS’06). LNCS, vol. 4323. Springer, Berlin, pp 123–136

Jøsang A (2001) A logic for uncertain probabilities. Int J Uncertain Fuzziness Knowl Based Syst 9(3):279–311. https://doi.org/10.1142/S0218488501000831

Article
MathSciNet
MATH
Google Scholar

Pedersen T, Kristensson P, Friman M (2012) Counteracting the focusing illusion: effects of defocusing on car users predicted satisfaction with public transport. J Environ Psychol 32(1):30–36. https://doi.org/10.1016/j.jenvp.2011.10.004

Article
Google Scholar

Pavlovic D, Meadows C (2011) Actor-network procedures: modeling multi-factor authentication, device pairing, social interactions. arXiv.org

Pieters W (2011) Representing humans in system security models: an actor-network approach. J Wirel Mobile Netw Ubiquitous Comput Dependable Appl 2(1):75–92

Google Scholar

Prisacariu C (2014) Actor network procedures as psi-calculi for security ceremonies. In: International workshop on graphical models for security. Electronic proceedings in theoretical computer science, vol. 148. Open Publishing Association., pp 63–77. https://doi.org/10.4204/EPTCS.148.5

Latour B (2005) Reassembling the social—an introduction to actor-network-theory. Oxford Univ Press, Oxford

Google Scholar

Harel D (1987) Statecharts: a visual formalism for complex systems. Sci Comput Program 8(3):231–274

Article
MathSciNet
MATH
Google Scholar

Harel D, Naamad A (1996) The statemate semantics of statecharts. ACM TOSEM 5(4):293–333

Article
Google Scholar

Harel D, Marelly R (2003) Come, Let’s play: scenario-based programming using LSCs and the play-engine, vol 1. Springer, Berlin

Book
Google Scholar

Wickens CD, Hollands JG, Banbury S, Parasuraman R (2015) Engineering psychology and human performance, 4th edn. Taylor & Francis, Rautledge

Google Scholar

Salvendy G (2012) Handbook of human factors and ergonomics. Wiley, New Jersey

Book
Google Scholar

Kirwan B, Ainsworth LK (1992) A guide to task analysis: the task analysis working group. Taylor & Francis, Rautledge

Book
Google Scholar

Crandall B, Klein GA, Hoffman RR (2006) Working minds: a practitioner’s guide to cognitive task analysis. MIT Press, Cambridge

Google Scholar

Paterno F, Mancini C, Meniconi S (1997) In: Howard S, Hammond J, Lindgaard G (eds) ConcurTaskTrees: a diagrammatic notation for specifying task models. Springer, Boston, pp 362–369. https://doi.org/10.1007/978-0-387-35175-9_58

Nóbrega L, Nunes NJ, Coelho H (2006) Mapping concurtasktrees into uml 2.0. In: Gilroy SW, Harrison MD (eds) Interactive systems. Design, specification, and verification. Springer, Berlin, pp 237–248

Chapter
Google Scholar

Mitchell CM, Miller RA (1986) A discrete control model of operator function: a methodology for information display design. IEEE Trans Syst Man Cybernet 16(3):343–357

Article
Google Scholar

Bolton ML, Siminiceanu RI, Bass EJ (2011) A systematic approach to model checking Human–Automation interaction using task analytic models. IEEE Trans Syst Man Cybern Part A Syst Hum 41(5):961–976. https://doi.org/10.1109/TSMCA.2011.2109709

Article
Google Scholar

Bolton ML, Bass EJ (2010) Formally verifying human-automation interaction as part of a system model: limitations and tradeoffs. Innov Syst Softw Eng 6(3):219–231

Article
Google Scholar

Pérez-Medina J-L, Dupuy-Chessa S, Front A (2007) A survey of model driven engineering tools for user interface design. In: Winckler M, Johnson H, Palanque P (eds) Task models and diagrams for user interface design. Springer, Berlin, pp 84–97

Chapter
Google Scholar

Ivory MY, Hearst MA (2001) The state of the art in automating usability evaluation of user interfaces. ACM Comput Surv 33(4):470–516

Article
Google Scholar

Law EL-C, Van Schaik P (2010) Modelling user experience-an agenda for research and practice. Interact comput 22(5):313–322

Article
Google Scholar

Turner JC (1991) Social influence. Thomson Brooks/Cole Publishing Co, Pacific Grove

Google Scholar

Omand D (2012) Securing the State. C Hurst Publishers, London

Google Scholar