Exploring rationality of self awareness in social networking for logical modeling of unintentional insiders

[1]  Florian Kammüller,et al.  Applying the Isabelle Insider Framework to Airplane Security , 2020, Sci. Comput. Program..

[2]  Florian Kammuller,et al.  A Formal Development Cycle for Security Engineering in Isabelle , 2020, ArXiv.

[3]  Florian Kammüller,et al.  Attack trees in Isabelle extended with probabilities for quantum cryptography , 2019, Comput. Secur..

[4]  Florian Kammuller,et al.  QKD in Isabelle - Bayesian Calculation , 2019, ArXiv.

[5]  Florian Kammüller,et al.  Combining Secure System Design with Risk Assessment for IoT Healthcare Systems , 2019, 2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).

[6]  Florian Kammüller,et al.  Formal Modeling and Analysis of Data Protection for GDPR Compliance of IoT Healthcare Systems , 2018, 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC).

[7]  Florian Kammuller,et al.  Attack Trees in Isabelle , 2018, 1803.06494.

[8]  S. Furnell,et al.  A toolkit approach to information security awareness and education , 2017 .

[9]  Florian Kammüller,et al.  A Proof Calculus for Attack Trees in Isabelle , 2017, DPM/CBT@ESORICS.

[10]  Florian Kammüller,et al.  Human Centric Security and Privacy for the IoT Using Formal Techniques , 2017, AHFE.

[11]  Florian Kammüller,et al.  Modeling and Verification of Insider Threats Using Logical Analysis , 2017, IEEE Systems Journal.

[12]  Florian Kammueller,et al.  Towards Formal Analysis of Insider Threats for Auctions , 2016, MIST@CCS.

[13]  Florian Kammüller,et al.  Investigating Airplane Safety and Security Against Insider Threats Using Logical Modeling , 2016, 2016 IEEE Security and Privacy Workshops (SPW).

[14]  Giuseppe Primiero,et al.  Modeling Human Behaviour with Higher Order Logic: Insider Threats , 2014, 2014 Workshop on Socio-Technical Aspects in Security and Trust.

[15]  Jason R. C. Nurse,et al.  Cyber Security Awareness Campaigns: Why do they fail to change behaviour? , 2014, ArXiv.

[16]  Sadie Creese,et al.  Understanding Insider Threat: A Framework for Characterising Attacks , 2014, 2014 IEEE Security and Privacy Workshops.

[17]  Florian Kammüller,et al.  Combining Generated Data Models with Formal Invalidation for Insider Threat Analysis , 2014, 2014 IEEE Security and Privacy Workshops.

[18]  Florian Kammüller,et al.  Invalidating Policies using Structural Information , 2013, 2013 IEEE Security and Privacy Workshops.

[19]  Dawn M. Cappelli,et al.  The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes , 2012 .

[20]  Aubrey Labuschagne,et al.  Design of cyber security awareness game utilizing a social media framework , 2011, 2011 Information Security for South Africa.

[21]  Elmarie Kritzinger,et al.  Cyber security for home users: A new way of protection through awareness enforcement , 2010, Comput. Secur..

[22]  Izak Benbasat,et al.  Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness , 2010, MIS Q..

[23]  David Lacey,et al.  Managing the Human Factor in Information Security: How to win over staff and influence business managers , 2009 .

[24]  Susan B. Barnes,et al.  A privacy paradox: Social networking in the United States , 2006, First Monday.

[25]  Hennie A. Kruger,et al.  A prototype for assessing information security awareness , 2006, Comput. Secur..

[26]  Florian Kammüller,et al.  Locales - A Sectioning Concept for Isabelle , 1999, TPHOLs.

[27]  Andrew C. Myers,et al.  Complete, safe information flow with decentralized labels , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).

[28]  Lawrence C. Paulson,et al.  Proving properties of security protocols by induction , 1997, Proceedings 10th Computer Security Foundations Workshop.

[29]  M. Schäfers,et al.  Wirtschaft und Gesellschaft , 1988 .

[30]  G. Homans,et al.  Social Behaviour, Its Elementary Forms , 1962 .

[31]  C. Hempel,et al.  Studies in the Logic of Explanation , 1948, Philosophy of Science.

[32]  Uwe Nestmann,et al.  Inter-Blockchain Protocols with the Isabelle Infrastructure Framework , 2020, FMBC@CAV.

[33]  Florian Kammüller,et al.  Modeling and Analyzing the Corona-Virus Warning App with the Isabelle Infrastructure Framework , 2020, DPM/CBT@ESORICS.

[34]  W. Hager,et al.  and s , 2019, Shallow Water Hydraulics.

[35]  M. Bishop,et al.  Inside the Insider Threat (Introduction) , 2016 .

[36]  Yoshimichi Sato Rational choice theory , 2013 .

[37]  W. Marsden I and J , 2012 .

[38]  H. Esser,et al.  Soziologie : Allgemeine Grundlagen , 1999 .

[39]  Paul Weirich,et al.  The Cement of Society , 1992 .

[40]  Maximilian Weber,et al.  Wirtschaft und Gesellschaft : Grundriss der verstehenden Soziologie , 1976 .