“…Although we focused on only two areas, decision making and choice are also central to other areas in the domain of cybersecurity: Individual users must make decisions about passwords to use (Das, Bonneau, Caesar, Borisov, & Wang, 2014) and the privacy offered by Web sites (Vu, Chambers, Creekmur, Cho, & Proctor, 2010), which involve processes similar to those of phishing detection and app selection. System administrators must configure access control policies, detect intrusions, and take appropriate actions (Corchado & Herrero, 2011), and security analysts need to anticipate adversaries' reactions to particular security actions (Proctor, Vu, & Schultz, 2009;Schultz, 2012).…”