A Human Factor Approach to Threat Modeling

[1]  Danny Dhillon,et al.  Developer-Driven Threat Modeling: Lessons Learned in the Trenches , 2011, IEEE Security & Privacy.

[2]  Pilsung Choe,et al.  A Framework of Information Security Integrated with Human Factors , 2019, HCI.

[3]  Nico Martins,et al.  Information security culture and information protection culture: A validated assessment instrument , 2015, Comput. Law Secur. Rev..

[4]  Rosa Lanzilotti,et al.  Alerting Users About Phishing Attacks , 2019, HCI.

[5]  Princely Ifinedo,et al.  Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition , 2014, Inf. Manag..

[6]  Elmarie Kritzinger,et al.  Theoretical Domain Framework to Identify Cybersecurity Behaviour Constructs , 2019, ICITL.

[7]  Wouter Joosen,et al.  A descriptive study of Microsoft’s threat modeling technique , 2015, Requirements Engineering.

[8]  Dianxiang Xu,et al.  A threat model‐based approach to security testing , 2013, Softw. Pract. Exp..

[9]  Punam Bedi,et al.  Threat‐oriented security framework in risk management using multiagent system , 2013, Softw. Pract. Exp..

[10]  Robert Lagerström,et al.  Threat modeling - A systematic literature review , 2019, Comput. Secur..

[11]  James Purnama,et al.  Enhancing Honeypot Deception Capability Through Network Service Fingerprinting , 2017 .

[12]  Tony Ucedavélez,et al.  Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis , 2015 .

[13]  Pascale Carayon,et al.  Human and organizational factors in computer and information security: Pathways to vulnerabilities , 2009, Comput. Secur..

[14]  Ken H. Guo Security-related behavior in using information systems in the workplace: A review and synthesis , 2013, Comput. Secur..

[15]  Josine G. M. van de Ven,et al.  Understanding human factors in cyber security as a dynamic system , 2017 .

[16]  Waldemar Karwowski,et al.  Human Factors in Information Security Culture: A Literature Review , 2017, AHFE.

[17]  Arvind Mallari Rao,et al.  Technical Aspects of Cyber Kill Chain , 2015, SSCC.

[18]  Eduardo B. Fernández,et al.  An extensible pattern-based library and taxonomy of security threats for distributed systems , 2014, Comput. Stand. Interfaces.

[19]  Grayson Kemper Improving employees' cyber security awareness , 2019 .

[20]  Lauren S. Ferro,et al.  Another Week at the Office (AWATO) - An Interactive Serious Game for Threat Modeling Human Factors , 2020, HCI.

[21]  Özlem Müge Testik,et al.  Analysis of personal information security behavior and awareness , 2016, Comput. Secur..

[22]  S. Brace,et al.  Human factors and error prevention in emergency medicine , 2011, Emergency Medicine Journal.

[23]  Fatemeh Zahedi,et al.  Individuals' Internet Security Perceptions and Behaviors: Polycontextual Contrasts Between the United States and China , 2016, MIS Q..