Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Engineering

A Primer On The Human Readiness Level Scale (Ansi/Hfes 400-2021), Kelly Steelman, Holly Handley, Katie Plant (Ed.), Gesa Praetorius (Ed.) Jan 2022

A Primer On The Human Readiness Level Scale (Ansi/Hfes 400-2021), Kelly Steelman, Holly Handley, Katie Plant (Ed.), Gesa Praetorius (Ed.)

Engineering Management & Systems Engineering Faculty Publications

"The Human Readiness Level (HRL) Scale is a simple 9-level scale for evaluating, tracking, and communicating the readiness of a technology for safe and effective human use. It is modeled after the well-established Technology Readiness Level (TRL) framework that is used throughout the government and industry to communicate the maturity of a technology and to support decision making about technology acquisition. Here we (1) introduce the ANSI/HFES 400-2021 Standard that defines the HRL scale and (2) provide concrete examples of evaluation activities to support the application of HRLs in the development of automated driving systems."


Precursors Of Email Response To Cybersecurity Scenarios: Factor Exploration And Scale Development, Miguel A. Toro-Jarrin, Pilar Pazos-Lago, Miguel Padilla Jan 2022

Precursors Of Email Response To Cybersecurity Scenarios: Factor Exploration And Scale Development, Miguel A. Toro-Jarrin, Pilar Pazos-Lago, Miguel Padilla

Engineering Management & Systems Engineering Faculty Publications

In the last decade, information security research has further expanded to include human factors as key elements of the organization's cybersecurity infrastructure. Numerous factors from several theories have been explored to explain and predict the multitude of information security-related behaviors in organizations. Lately, there has been a call for the study of specific cybersecurity behaviors in contextualized scenarios that reflect specific and realistic situations of a potential cyber-attack. This paper focuses on precursors of email response in situations that can be the origin of cybersecurity incidents in organizations (i.e., phishing attacks, ransomware, etc.). This study explores participants' intentions to follow …