REFERENCES
Abrahamsen, E.B., Røed, W, Jongejan, R., 2013. A
practical approach for the evaluation of acceptable risk
in road tunnels, Journal of Risk Research, Vol. 16,
Issue 5, pp. 625–633.
Allinson, C., Hayes, J., 1996. The Cognitive Style Index:
A Measure of Intuition-Analysis for Organizational
Research, Journal of Management Studies, Vol. 33,
Issue 1, pp. 119–135.
Champ, P.A., Moore, R., Bishop, R.C., 2009. A
Comparison of Approaches to Mitigate Hypothetical
Bias, Agricultural and Resource Economics Review,
Vol. 38, Issue 2, pp. 166–180.
Deleeuw, K., Mayer, R., 2008. A Comparison of Three
Measures of Cognitive Load: Evidence for Separable
Measures of Intrinsic, Extraneous, and Germane Load,
Journal of Educational Psychology, Vol. 100, Issue 1,
pp. 223–234.
Dunning, D., 2011. The Dunning-Kruger effect. On being
ignorant of one’s own ignorance, Advances in Experi-
mental Social Psychology, Vol. 44, pp. 247–296.
Gardoni, P., Murphy, C., 2013. A Scale of Risk, Risk
Analysis, Vol. 34, Issue 7, pp. 1208–1227.
Goerlandt, F., Reniers, G., 2016. On the assessment of
uncertainty in risk diagrams, Safety Science, Vol. 84,
pp. 67–77.
Hansson, S.O., Hirsch Hadorn, G., 2017. Argument-based
decision support for risk analysis, Journal of Risk
Research. (Accepted).
Hassenzahl, D.M., 2006. Implications of Excessive
Precision for Risk Comparisons: Lessons from the
Past Four Decades, Risk Analysis, Vol. 26, Issue 1, pp.
265–276.
Holm, H., Sommestad, T., Ekstedt, M., Honeth, N., 2014.
Indicators of expert judgement and their significance:
an empirical investigation in the area of cyber security,
Expert Systems, Vol. 31, Issue 4, pp. 299–318.
ISO/IEC, 2011. 27005 International Standard, Information
technology — Security techniques — Information
security risk management, ISO/IEC, 2nd edition.
ISO/IEC, 2012. 27032 International Standard, Information
technology — Security techniques — Guidelines for
cybersecurity, ISO/IEC, 1st edition.
Kahneman, D., Slovic, P., Tversky, A., (Eds.), 1982.
Judgments under uncertainty: Heuristics and biases.
Cambridge, England: Cambridge University Press.
Karlzén, H., Bengtsson, J.E., Hallberg, J., 2017. Assessing
Information Security Risks using Pairwise Weighting,
In Proceedings of the 3rd International Conference on
Information Systems Security and Privacy, ICISSP,
Vol. 1, pp. 318–324.
Kleinmuntz, B., 1990. Why we still use our heads instead
of formulas: Toward an integrative approach.
Psychological Bulletin, Vol. 107, Issue 3, pp. 296-310.
Lombard, M., Snyder-Duch, J., Campanella Bracken, C.,
2002. Content Analysis in Mass Communication:
Assessment and Reporting of Intercoder Reliability,
Human Communication Research, Vol. 28, Issue 4, pp.
587–604.
McShane, S., 2006. Activity 8.8: Decision Making Style
Inventory, In Canadian Organizational Behaviour,
McGraw-Hill Education.
Montibeller, G., von Winterfeldt D., 2015. Cognitive and
Motivational Biases in Decision and Risk Analysis.
Risk Analysis, Vol. 35, Issue 7, pp. 1230–1251.
Sommestad, T., Karlzén, H., Nilsson, P., Hallberg, J.,
2017. An empirical test of the perceived relationship
between risk and the constituents severity and
probability, Information and Computer Security, Vol.
24, Issue 2, pp. 194–204.
Trevethan, R., 2017. Intraclass correlation coefficients:
clearing the air, extending some cautions, and making
some requests, Health Services and Outcomes
Research Methodology, Vol. 17, Issue 2, pp. 127–143.
Wangen, G., 2016. An initial insight into Information
Security Risk Assessment practices, In Proceedings of
the Federated Conference on Computer Science and
Information Systems, ACSIS, Vol. 8, pp. 999–1008
Weinstein, N.D., 2000. Perceived probability, perceived
severity, and health-protective behavior, Health
Psychology, Vol. 19, Issue 1, pp. 65–74.
ICISSP 2018 - 4th International Conference on Information Systems Security and Privacy
476