Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Engineering

Better Beware: Comparing Metacognition For Phishing And Legitimate Emails, Casey I. Canfield, Baruch Fischhoff, Alex Davis Dec 2019

Better Beware: Comparing Metacognition For Phishing And Legitimate Emails, Casey I. Canfield, Baruch Fischhoff, Alex Davis

Engineering Management and Systems Engineering Faculty Research & Creative Works

Every electronic message poses some threat of being a phishing attack. If recipients underestimate that threat, they expose themselves, and those connected to them, to identity theft, ransom, malware, or worse. If recipients overestimate that threat, then they incur needless costs, perhaps reducing their willingness and ability to respond over time. In two experiments, we examined the appropriateness of individuals' confidence in their judgments of whether email messages were legitimate or phishing, using calibration and resolution as metacognition metrics. Both experiments found that participants had reasonable calibration but poor resolution, reflecting a weak correlation between their confidence and knowledge. These …


2x-Thru, 1x-Reflection, And Thru-Line De-Embedding: Theory, Sensitivity Analysis, And Error Corrections, Bichen Chen Jan 2019

2x-Thru, 1x-Reflection, And Thru-Line De-Embedding: Theory, Sensitivity Analysis, And Error Corrections, Bichen Chen

Doctoral Dissertations

"Due to the simplicity of design and measurement, as well as the accuracy of results, the 2X-Thru de-embedding (2XTD), 1X-Reflection de-embedding (1XRD), and Thru-Line de-embedding (TLD) have been replaced the traditional de-embedding algorithms, such as TRL and SOLT. In this dissertation, theory of 2n-port 2XTD, 1XRD, and TLD are completely derived first. The self-error reduction schemes is introduced to mitigate the de-embedding errors due to non-ideal manufacturing effects of non-zero mode conversion terms, as well as the asymmetric, and manufacturing variations. The validations are performed on both theory and self-error reduction through simulation and measurements cases. The 2X-Thru …