Open Access, 22 Aug 2012 Our most significant security challenges involve people. While human behavior has long been studied, computational modeling of…