1. Center for Strategic and International Studies.
http://csis.org/
2. Scheele, B., Groeben, N.: Dialog-Konsens-Methoden zur Rekonstruktion Subjektiver Theorien: die Heidelberger Struktur-Lege-Technik (SLT), konsuale Ziel-Mittel-Argumentation und kommunikative Flußdiagramm-Beschreibung von Handlungen (1988)
3. Bravo-Lillo, C., Cranor, L., Downs, J., Komanduri, S.: Bridging the gap in computer security warnings: a mental model approach. Secur. Priv. IEEE. 1–1 (2011)
4. Egelman, S., Cranor, L.F., Hong, J.: You’ve been warned: an empirical study of the effectiveness of web browser phishing warnings. In: Proceeding of the Twenty-Sixth Annual SIGCHI Conference on Human Factors In Computing Systems, pp. 1065–1074 (2008)
5. De Win, B., Piessens, F., Joosen, W., Verhanneman, T.: On the importance of the separation-of-concerns principle in secure software engineering. In: Workshop on the Application of Engineering Principles to System Security Design, pp. 1–10 (2002)