Breaking bad systems with Human Factors and Ergonomics: Using Work Domain Analysis to identify strategies to disrupt trading in dark net marketplaces
暂无分享,去创建一个
Paul M. Salmon | Neville A. Stanton | Ben R. Lane | Dennis B. Desmond | Adrian Cherney | Gayan Kulatilleke | Anita Matthews | David Lacey
[1] Paul M. Salmon,et al. It's Dark in There: Using Systems Analysis to Investigate Trust and Engagement in Dark Web Forums , 2015, HCI.
[2] Danny Bradbury,et al. Unveiling the dark web , 2014, Netw. Secur..
[3] Chad M. Steel,et al. Idiographic Digital Profiling: Behavioral Analysis Based On Digital Forensics , 2014 .
[4] G. McCarthy. FRAM: the functional resonance analysis method, modelling complex socio-technical systems , 2013 .
[5] Martin C. Libicki,et al. Markets for Cybercrime Tools and Stolen Data , 2014 .
[6] N. Stanton,et al. The Dark Side Of The Net: Event Analysis Of Systemic Teamwork (East) Applied To Illicit Trading On A Darknet Market , 2018, Proceedings of the Human Factors and Ergonomics Society Annual Meeting.
[7] N. Stanton,et al. Using the Event Analysis of Systemic Teamwork (EAST) broken-links approach to understand vulnerabilities to disruption in a darknet market , 2019, Ergonomics.
[8] Ingrid Bouwer Utne,et al. Human Fatigue’s Effect on the Risk of Maritime Groundings - A Bayesian Network Modeling Approach , 2014 .
[9] T. Holt,et al. Exploring stolen data markets online: products and market forces , 2010 .
[10] Neelam Naikar. Work Domain Analysis: Concepts, Guidelines, and Cases , 2013 .
[11] Hsinchun Chen. Dark Web Research Overview , 2012 .
[12] Neville A Stanton,et al. Fitting methods to paradigms: are ergonomics methods fit for systems thinking? , 2017, Ergonomics.
[13] K. J. Vicente,et al. Cognitive Work Analysis: Toward Safe, Productive, and Healthy Computer-Based Work , 1999 .
[14] Nancy G. Leveson,et al. A new accident model for engineering safer systems , 2004 .
[15] Neelam Naikar. Work Domain Analysis , 2013 .
[16] Paul M. Salmon,et al. Breaking bad systems: using work domain analysis to identify strategies for disrupting terrorist cells , 2018 .