
 
REFERENCES 
Abrahamsen,  E.B.,  Røed,  W,  Jongejan,  R.,  2013.  A 
practical approach for the evaluation of acceptable risk 
in  road  tunnels,  Journal  of  Risk  Research,  Vol.  16, 
Issue 5, pp. 625–633.  
Allinson, C., Hayes, J., 1996. The Cognitive Style Index: 
A  Measure  of  Intuition-Analysis  for  Organizational 
Research,  Journal  of  Management  Studies,  Vol.  33, 
Issue 1, pp. 119–135. 
Champ,  P.A.,  Moore,  R.,  Bishop,  R.C.,  2009.  A 
Comparison  of  Approaches  to  Mitigate  Hypothetical 
Bias,  Agricultural  and  Resource  Economics  Review, 
Vol. 38, Issue 2, pp. 166–180. 
Deleeuw,  K.,  Mayer,  R.,  2008.  A  Comparison  of  Three 
Measures of Cognitive Load: Evidence for Separable 
Measures of Intrinsic, Extraneous, and Germane Load, 
Journal of Educational Psychology, Vol. 100, Issue 1, 
pp. 223–234. 
Dunning, D., 2011. The Dunning-Kruger effect. On being 
ignorant of one’s own ignorance, Advances in Experi-
mental Social Psychology, Vol. 44, pp. 247–296. 
Gardoni,  P.,  Murphy,  C.,  2013.  A  Scale  of  Risk,  Risk 
Analysis, Vol. 34, Issue 7, pp. 1208–1227. 
Goerlandt,  F.,  Reniers,  G.,  2016.  On  the  assessment  of 
uncertainty in risk diagrams, Safety Science, Vol. 84, 
pp. 67–77.  
Hansson, S.O., Hirsch Hadorn, G., 2017. Argument-based 
decision  support  for  risk  analysis,  Journal  of  Risk 
Research. (Accepted). 
Hassenzahl,  D.M.,  2006.  Implications  of  Excessive 
Precision  for  Risk  Comparisons:  Lessons  from  the 
Past Four Decades, Risk Analysis, Vol. 26, Issue 1, pp. 
265–276. 
Holm, H., Sommestad, T., Ekstedt, M., Honeth, N., 2014. 
Indicators of expert judgement and their significance: 
an empirical investigation in the area of cyber security, 
Expert Systems, Vol. 31, Issue 4, pp. 299–318. 
ISO/IEC, 2011. 27005 International Standard, Information 
technology  —  Security  techniques  —  Information 
security risk management, ISO/IEC, 2nd edition. 
ISO/IEC, 2012. 27032 International Standard, Information 
technology  — Security techniques — Guidelines for 
cybersecurity, ISO/IEC, 1st edition. 
Kahneman,  D.,  Slovic,  P.,  Tversky,  A.,  (Eds.),  1982. 
Judgments  under  uncertainty:  Heuristics  and biases. 
Cambridge, England: Cambridge University Press. 
Karlzén, H., Bengtsson, J.E., Hallberg, J., 2017. Assessing 
Information Security Risks using Pairwise Weighting, 
In Proceedings of the 3rd International Conference on 
Information  Systems  Security  and  Privacy,  ICISSP, 
Vol. 1, pp. 318–324. 
Kleinmuntz, B., 1990. Why we still use our heads instead 
of  formulas:  Toward  an  integrative  approach. 
Psychological Bulletin, Vol. 107, Issue 3, pp. 296-310. 
Lombard, M., Snyder-Duch, J., Campanella Bracken, C., 
2002.  Content  Analysis  in  Mass  Communication: 
Assessment  and  Reporting  of  Intercoder  Reliability, 
Human Communication Research, Vol. 28, Issue 4, pp. 
587–604. 
McShane, S., 2006. Activity 8.8: Decision Making Style 
Inventory,  In  Canadian  Organizational  Behaviour, 
McGraw-Hill Education. 
Montibeller, G., von Winterfeldt D., 2015. Cognitive and 
Motivational  Biases  in  Decision  and  Risk  Analysis. 
Risk Analysis, Vol. 35, Issue 7, pp. 1230–1251. 
Sommestad,  T.,  Karlzén,  H.,  Nilsson,  P.,  Hallberg,  J., 
2017. An empirical test of the perceived relationship 
between  risk  and  the  constituents  severity  and 
probability, Information and Computer Security, Vol. 
24, Issue 2, pp. 194–204. 
Trevethan,  R.,  2017.  Intraclass  correlation  coefficients: 
clearing the air, extending some cautions, and making 
some  requests,  Health  Services  and  Outcomes 
Research Methodology, Vol. 17, Issue 2, pp. 127–143. 
Wangen,  G.,  2016.  An  initial  insight  into  Information 
Security Risk Assessment practices, In Proceedings of 
the  Federated  Conference  on  Computer  Science  and 
Information Systems, ACSIS, Vol. 8, pp. 999–1008 
Weinstein,  N.D.,  2000.  Perceived  probability,  perceived 
severity,  and  health-protective  behavior,  Health 
Psychology, Vol. 19, Issue 1, pp. 65–74. 
ICISSP 2018 - 4th International Conference on Information Systems Security and Privacy
476