Benz, M. and Chatterjee, D. (2020). Calculated risk? A cy-
bersecurity evaluation tool for SMEs. Business Hori-
zons, 63:531–540.
Boletsis, C., Halvorsrud, R., Pickering, J. B., Phillips, S. C.,
and Surridge, M. (2021). Cybersecurity for SMEs:
Introducing the Human Element into Socio-technical
Cybersecurity Risk Assessment. In VISIGRAPP (3:
IVAPP), pages 266–274.
Brooke, J. (1996). SUS - A quick and dirty usability scale.
In Jordan, P., Thomas, B., Weerdmeester, B., and Mc-
Clelland, I., editors, Usability Evaluation in Industry,
pages 189–194. Taylor & Francis.
Brooke, J. (2013). SUS: A Retrospective. Journal of Us-
ability Studies, 8(2):29–40.
Ch
´
avez-Feria, S., Garc
´
ıa-Castro, R., and Poveda-Villal
´
on,
M. (2021). Converting UML-based ontology concep-
tualizations to OWL with Chowlk. In European Se-
mantic Web Conference, pages 44–48. Springer.
Ch
´
avez-Feria, S., Garc
´
ıa-Castro, R., and Poveda-Villal
´
on,
M. (2022). Chowlk: from UML-based ontology con-
ceptualizations to OWL. In European Semantic Web
Conference, pages 338–352. Springer.
Dimitrakos, T., Ritchie, B., Raptis, D., and Stølen, K.
(2002). Model based security risk analysis for web
applications: the CORAS approach. In EuroWeb 2002
Conference, pages 1–13.
Eterovic, T., Kaljic, E., Donko, D., Salihbegovic, A., and
Ribic, S. (2015). An Internet of Things visual do-
main specific modeling language based on UML.
In 2015 XXV International Conference on Informa-
tion, Communication and Automation Technologies
(ICAT), pages 1–5. IEEE.
Fair, N., Phillips, S., Erdogan, G., and Tverdal, S. (2022).
Information security & risk management: trustwor-
thiness and human interaction. In Tutorial proceed-
ings of the 16th International Conference on Research
Challenges in Information Science, pages 1–48.
RCIS. https://www.rcis-conf.com/rcis2022/files/T1-
NicholasFairEtAl.pdf.
Halvorsrud, R., Boletsis, C., and Garcia-Ceja, E. (2021).
Designing a modeling language for customer jour-
neys: Lessons learned from user involvement. In 2021
ACM/IEEE 24th International Conference on Model
Driven Engineering Languages and Systems (MOD-
ELS), pages 239–249. IEEE.
Halvorsrud, R., Haugstveit, I. M., and Pultier, A. (2016a).
Evaluation of a modelling language for customer jour-
neys. In 2016 IEEE Symposium on Visual Languages
and Human-Centric Computing (VL/HCC), pages 40–
48. IEEE.
Halvorsrud, R., Kvale, K., and Følstad, A. (2016b). Improv-
ing service quality through customer journey analysis.
Journal of Service Theory and Practice, 24(6):840–
867.
Halvorsrud, R., Lee, E., Haugstveit, I. M., and Følstad, A.
(2014). Components of a visual language for service
design. In ServDes. 2014 Service Future, Proceedings
of the fourth Service Design and Service Innovation
Conference, Lancaster University, United Kingdom,
9-11 April 2014.
Haugstveit, I. M., Halvorsrud, R., and Karahasanovic, A.
(2016). Supporting redesign of C2C services through
customer journey mapping. In Service Design Ge-
ographies. Proceedings of the ServDes. 2016 Confer-
ence, number 125, pages 215–227. Link
¨
oping Univer-
sity Electronic Press.
Jaimez-Gonz
´
alez, C. and Mart
´
ınez-Samora, J. (2020).
DiagrammER: A Web Application to Support the
Teaching-Learning Process of Database Courses
Through the Creation of ER Diagrams. International
Journal of Emerging Technologies in Learning (iJET),
15(19):4–21.
JGraph (2022). Features of diagrams.net and draw.io.
https://diagrams.net/features (Accessed 17 Nov
2022).
Khan, M. I., Tanwar, S., and Rana, A. (2020). The Need
for Information Security Management for SMEs. In
2020 9th International Conference System Modeling
and Advancement in Research Trends (SMART), pages
328–332. IEEE.
Kortum, P. and Acemyan, C. Z. (2013). How low can you
go? Is the System Usability Scale range restricted?
Journal of Usability Studies, 9(1):14–24.
Kullman, K., Buchanan, L., Komlodi, A., and Engel, D.
(2020). Mental model mapping method for cyber-
security. In International Conference on Human-
Computer Interaction, pages 458–470. Springer.
Lund, M. S., Solhaug, B., and Stølen, K. (2011). Risk anal-
ysis of changing and evolving systems using CORAS.
In International School on Foundations of Security
Analysis and Design, pages 231–274. Springer.
Meshkat, L., Miller, R. L., Hillsgrove, C., and King, J.
(2020). Behavior modeling for cybersecurity. In
2020 Annual Reliability and Maintainability Sympo-
sium (RAMS), pages 1–7. IEEE.
Meszaros, J. and Buchalcevova, A. (2017). Introducing
OSSF: A framework for online service cybersecurity
risk management. computers & security, 65:300–313.
Miranda, T., Challenger, M., Tezel, B. T., Alaca, O. F.,
Bari
ˇ
si
´
c, A., Amaral, V., Goul
˜
ao, M., and Kardas, G.
(2018). Improving the usability of a mas dsml. In In-
ternational workshop on engineering multi-agent sys-
tems, pages 55–75. Springer.
Nair, A., Ning, X., and Hill, J. H. (2021). Using recom-
mender systems to improve proactive modeling. Soft-
ware and Systems Modeling, 20(4):1159–1181.
Nielsen, J. (2020). 10 Usability Heuristics for User Inter-
face Design . https://www.nngroup.com/articles/ten-
usability-heuristics/ (Accessed 17 Nov 2022).
Nurse, J. R., Creese, S., Goldsmith, M., and Lamberts, K.
(2011). Trustworthy and effective communication of
cybersecurity risks: A review. In 2011 1st Work-
shop on Socio-Technical Aspects in Security and Trust
(STAST), pages 60–68. IEEE.
Paulsen, C. (2016). Cybersecuring small businesses. Com-
puter, 49(8):92–97.
Ponsard, C. and Grandclaudon, J. (2019). Guidelines and
Tool Support for Building a Cybersecurity Aware-
ness Program for SMEs. In International Conference
IVAPP 2023 - 14th International Conference on Information Visualization Theory and Applications
212