Open Access. Powered by Scholars. Published by Universities.®

Psychology Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Psychology

Phishing For Fun, Madeline Moran, Anna Hart, Loretta Stalans, Eric Chan-Tin, Shelia Kennison Jun 2022

Phishing For Fun, Madeline Moran, Anna Hart, Loretta Stalans, Eric Chan-Tin, Shelia Kennison

Computer Science: Faculty Publications and Other Works

Perform a phishing experiment to see how many people fall victim. This study was approved by the Loyola IRB


Comparing Online Surveys For Cybersecurity: Sona And Mturk, Anne Wagner, Anna Bakas, Shelia Kennison, Eric Chan-Tin Feb 2022

Comparing Online Surveys For Cybersecurity: Sona And Mturk, Anne Wagner, Anna Bakas, Shelia Kennison, Eric Chan-Tin

Computer Science: Faculty Publications and Other Works

People have many accounts and usually need to create a password for each. They tend to create insecure passwords and re-use passwords, which can lead to compromised data. This research examines if there is a link between personality type and password security among a variety of participants in two groups of participants: SONA and MTurk. Each participant in both surveys answered questions based on password security and their personality type. Our results show that participants in the MTurk survey were more likely to choose a strong password and to exhibit better security behaviors and knowledge than participants in the SONA …


Bias Mitigation For Toxicity Detection Via Sequential Decisions, Lu Cheng, Ahmadreza Mosallanezhad, Yasin N. Silva, Deborah Hall, Huan Liu Jan 2022

Bias Mitigation For Toxicity Detection Via Sequential Decisions, Lu Cheng, Ahmadreza Mosallanezhad, Yasin N. Silva, Deborah Hall, Huan Liu

Computer Science: Faculty Publications and Other Works

Increased social media use has contributed to the greater prevalence of abusive, rude, and offensive textual comments. Machine learning models have been developed to detect toxic comments online, yet these models tend to show biases against users with marginalized or minority identities (e.g., females and African Americans). Established research in debiasing toxicity classifiers often (1) takes a static or batch approach, assuming that all information is available and then making a one-time decision; and (2) uses a generic strategy to mitigate different biases (e.g., gender and racial biases) that assumes the biases are independent of one another. However, in real …


A Labeled Dataset For Investigating Cyberbullying Content Patterns In Instagram, Mara Hamlett, Grace Powell, Yasin N. Silva, Deborah Hall Jan 2022

A Labeled Dataset For Investigating Cyberbullying Content Patterns In Instagram, Mara Hamlett, Grace Powell, Yasin N. Silva, Deborah Hall

Computer Science: Faculty Publications and Other Works

As online communication continues to become more prevalent, instances of cyberbullying have also become more common, particularly on social media sites. Previous research in this area has studied cyberbullying outcomes, predictors of cyberbullying victimization/perpetration, and computational detection models that rely on labeled datasets to identify the underlying patterns. However, there is a dearth of work examining the content of what is said when cyberbullying occurs and most of the available datasets include only basic labels (cyberbullying or not). This paper presents an annotated Instagram dataset with detailed labels about key cyberbullying properties, such as the content type, purpose, directionality, and …


Predicting The Adoption Of Password Managers: A Tale Of Two Samples, Shelia Kennison, D. Eric Chan-Tin Nov 2021

Predicting The Adoption Of Password Managers: A Tale Of Two Samples, Shelia Kennison, D. Eric Chan-Tin

Computer Science: Faculty Publications and Other Works

Using weak passwords and re-using passwords can make one vulnerable to cybersecurity breaches. Cybersecurity experts recommend the adoption of password managers (PMs), as they generate and store strong passwords for all accounts. Prior research has shown that few people adopt PMs. Our research examined PM adoption in a sample of 221 undergraduates from psychology courses and a sample of 278 MTurk workers. We hypothesized that PM adoption could be predicted using a small set of user characteristics (i.e., gender, age, Big Five personality traits, number of devices used, frequency of using social media, and cybersecurity knowledge). The results showed that …


Nudging Students To Use Stronger Passwords: A Test Of Big Five Personality-Based Messages, Shelia Kennison, Eric Chan-Tin Nov 2021

Nudging Students To Use Stronger Passwords: A Test Of Big Five Personality-Based Messages, Shelia Kennison, Eric Chan-Tin

Computer Science: Faculty Publications and Other Works

Cybersecurity breaches can occur when one uses an easily hacked password. Prior research has investigated 1) possible steps to encourage users to use strong passwords and 2) how personality is related to users using strong passwords.

We investigated whether personality-based nudging messages based on Big Five traits could nudge people to create stronger passwords (c.f., Jones et al., 2021). We also examined how personal characteristics, such as gender, age, personality traits, password knowledge, attitudes, and behavior, and need for cognition, were related to password strength.

We tested the hypothesis that passwords created following messages matching participants’ personality would be stronger …


Tweets R Us: Predicting Personality From Language And Emoji Use On Twitter, Maxwell Meckling, Sarah Shoup, D. E. Chan-Tin, Shelia Kennison Nov 2021

Tweets R Us: Predicting Personality From Language And Emoji Use On Twitter, Maxwell Meckling, Sarah Shoup, D. E. Chan-Tin, Shelia Kennison

Computer Science: Faculty Publications and Other Works

The research investigated the suggestion from prior research that language and emojis use on Twitter and other social media platforms can predict users’ personality and gender (Adali et al., 2014; Golbeck et al., 2011; Li et al., 2019; Moreno et al., 2019; Raess, 2018). Some studies have also analyzed Twitter language to identify individuals with specific health conditions (e.g., alcohol recovery, Golbeck, 2012; sleep problems, Suarez et al., 2018).

If strategies to predict Twitter users’ characteristics prove to be successful, future efforts to direct persuasive messages related to recommended practices in public health and/or cybersecurity will be possible. Commercial applications …


Who Creates Strong Passwords When Nudging Fails, Shelia M. Kennison, Ian T. Jones, Victoria H. Spooner, D. Eric Chan-Tin Aug 2021

Who Creates Strong Passwords When Nudging Fails, Shelia M. Kennison, Ian T. Jones, Victoria H. Spooner, D. Eric Chan-Tin

Computer Science: Faculty Publications and Other Works

The use of strong passwords is viewed as a recommended cybersecurity practice, as the hacking of weak passwords led to major cybersecurity breaches. The present research investigated whether nudging with messages based on participants’ self-schemas could lead them to create stronger passwords. We modeled our study on prior health-related research demonstrating positive results using messages based on self-schema categories (i.e., True Colors categories -compassionate, loyal, intellectual, and adventurous). We carried out an online study, one with 256 (185 women, 66 men, 5 other) undergraduates and one with 424 (240 men, 179 women, 5 other) Amazon Mechanical Turk (MTurk) workers, in …


Impact Of Personality Types And Matching Messaging On Password Strength, Anna Bakas, Anne Wagner, Spencer Johnston, Shelia Kennison, Eric Chan-Tin Jun 2021

Impact Of Personality Types And Matching Messaging On Password Strength, Anna Bakas, Anne Wagner, Spencer Johnston, Shelia Kennison, Eric Chan-Tin

Computer Science: Faculty Publications and Other Works

People often create passwords for their accounts that are insecure. An insecure password is often easy to guess– thus, hackers can easily access their victims’ accounts. It is important for users to know how to create and manage secure passwords so they can better protect themselves from hackers. It is well-known that different users have different personality types, such as Big Five and True Colors. This research examines if there is any link between personality types and password security behavior. Each participant was shown either a matching or mismatching message based on their personality type, and it was measured whether …


Research Design And Statistical Applications, Grayson Holmbeck, Kathy Zebracki, Katie Mcgoron Jan 2009

Research Design And Statistical Applications, Grayson Holmbeck, Kathy Zebracki, Katie Mcgoron

Psychology: Faculty Publications and Other Works

What is the role of research in the field of pediatric psychology? To answer this question, it is useful to imagine what clinical practice would be like if we had no research foundation for our work. Without such a foundation, practitioners would have no basis for suggesting specific interventions or understanding why some interventions are successful and why others fail. Similarly, without a research foundation, assessments conducted with children would be based on unstandardized assessment methods, and no normative data would be available. Clearly, most of us would agree that scientific research is the foundation of pediatric psychology, including all …