Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Personality (4)
- Cybersecurity (3)
- Extraversion (2)
- Introversion (2)
- Password Strength (2)
-
- Child Psychology (1)
- Cybersecurity knowledge (1)
- Emoji (1)
- Hacking (1)
- Individual differences (1)
- MTurk (1)
- Matching Messages (1)
- Methodology (1)
- Nudging (1)
- Password (1)
- Password managers (1)
- Passwords (1)
- Pediatric Psychology (1)
- Personality traits (1)
- Research (1)
- Research Design (1)
- Risk-taking (1)
- SONA (1)
- Secure passwords (1)
- Self-schemas (1)
- Social media (1)
- Statistics (1)
- Survey (1)
- Technology adoption (1)
- Twitter (1)
- Publication
- File Type
Articles 1 - 10 of 10
Full-Text Articles in Psychology
Phishing For Fun, Madeline Moran, Anna Hart, Loretta Stalans, Eric Chan-Tin, Shelia Kennison
Phishing For Fun, Madeline Moran, Anna Hart, Loretta Stalans, Eric Chan-Tin, Shelia Kennison
Computer Science: Faculty Publications and Other Works
Perform a phishing experiment to see how many people fall victim. This study was approved by the Loyola IRB
Comparing Online Surveys For Cybersecurity: Sona And Mturk, Anne Wagner, Anna Bakas, Shelia Kennison, Eric Chan-Tin
Comparing Online Surveys For Cybersecurity: Sona And Mturk, Anne Wagner, Anna Bakas, Shelia Kennison, Eric Chan-Tin
Computer Science: Faculty Publications and Other Works
People have many accounts and usually need to create a password for each. They tend to create insecure passwords and re-use passwords, which can lead to compromised data. This research examines if there is a link between personality type and password security among a variety of participants in two groups of participants: SONA and MTurk. Each participant in both surveys answered questions based on password security and their personality type. Our results show that participants in the MTurk survey were more likely to choose a strong password and to exhibit better security behaviors and knowledge than participants in the SONA …
Bias Mitigation For Toxicity Detection Via Sequential Decisions, Lu Cheng, Ahmadreza Mosallanezhad, Yasin N. Silva, Deborah Hall, Huan Liu
Bias Mitigation For Toxicity Detection Via Sequential Decisions, Lu Cheng, Ahmadreza Mosallanezhad, Yasin N. Silva, Deborah Hall, Huan Liu
Computer Science: Faculty Publications and Other Works
Increased social media use has contributed to the greater prevalence of abusive, rude, and offensive textual comments. Machine learning models have been developed to detect toxic comments online, yet these models tend to show biases against users with marginalized or minority identities (e.g., females and African Americans). Established research in debiasing toxicity classifiers often (1) takes a static or batch approach, assuming that all information is available and then making a one-time decision; and (2) uses a generic strategy to mitigate different biases (e.g., gender and racial biases) that assumes the biases are independent of one another. However, in real …
A Labeled Dataset For Investigating Cyberbullying Content Patterns In Instagram, Mara Hamlett, Grace Powell, Yasin N. Silva, Deborah Hall
A Labeled Dataset For Investigating Cyberbullying Content Patterns In Instagram, Mara Hamlett, Grace Powell, Yasin N. Silva, Deborah Hall
Computer Science: Faculty Publications and Other Works
As online communication continues to become more prevalent, instances of cyberbullying have also become more common, particularly on social media sites. Previous research in this area has studied cyberbullying outcomes, predictors of cyberbullying victimization/perpetration, and computational detection models that rely on labeled datasets to identify the underlying patterns. However, there is a dearth of work examining the content of what is said when cyberbullying occurs and most of the available datasets include only basic labels (cyberbullying or not). This paper presents an annotated Instagram dataset with detailed labels about key cyberbullying properties, such as the content type, purpose, directionality, and …
Predicting The Adoption Of Password Managers: A Tale Of Two Samples, Shelia Kennison, D. Eric Chan-Tin
Predicting The Adoption Of Password Managers: A Tale Of Two Samples, Shelia Kennison, D. Eric Chan-Tin
Computer Science: Faculty Publications and Other Works
Using weak passwords and re-using passwords can make one vulnerable to cybersecurity breaches. Cybersecurity experts recommend the adoption of password managers (PMs), as they generate and store strong passwords for all accounts. Prior research has shown that few people adopt PMs. Our research examined PM adoption in a sample of 221 undergraduates from psychology courses and a sample of 278 MTurk workers. We hypothesized that PM adoption could be predicted using a small set of user characteristics (i.e., gender, age, Big Five personality traits, number of devices used, frequency of using social media, and cybersecurity knowledge). The results showed that …
Nudging Students To Use Stronger Passwords: A Test Of Big Five Personality-Based Messages, Shelia Kennison, Eric Chan-Tin
Nudging Students To Use Stronger Passwords: A Test Of Big Five Personality-Based Messages, Shelia Kennison, Eric Chan-Tin
Computer Science: Faculty Publications and Other Works
Cybersecurity breaches can occur when one uses an easily hacked password. Prior research has investigated 1) possible steps to encourage users to use strong passwords and 2) how personality is related to users using strong passwords.
We investigated whether personality-based nudging messages based on Big Five traits could nudge people to create stronger passwords (c.f., Jones et al., 2021). We also examined how personal characteristics, such as gender, age, personality traits, password knowledge, attitudes, and behavior, and need for cognition, were related to password strength.
We tested the hypothesis that passwords created following messages matching participants’ personality would be stronger …
Tweets R Us: Predicting Personality From Language And Emoji Use On Twitter, Maxwell Meckling, Sarah Shoup, D. E. Chan-Tin, Shelia Kennison
Tweets R Us: Predicting Personality From Language And Emoji Use On Twitter, Maxwell Meckling, Sarah Shoup, D. E. Chan-Tin, Shelia Kennison
Computer Science: Faculty Publications and Other Works
The research investigated the suggestion from prior research that language and emojis use on Twitter and other social media platforms can predict users’ personality and gender (Adali et al., 2014; Golbeck et al., 2011; Li et al., 2019; Moreno et al., 2019; Raess, 2018). Some studies have also analyzed Twitter language to identify individuals with specific health conditions (e.g., alcohol recovery, Golbeck, 2012; sleep problems, Suarez et al., 2018).
If strategies to predict Twitter users’ characteristics prove to be successful, future efforts to direct persuasive messages related to recommended practices in public health and/or cybersecurity will be possible. Commercial applications …
Who Creates Strong Passwords When Nudging Fails, Shelia M. Kennison, Ian T. Jones, Victoria H. Spooner, D. Eric Chan-Tin
Who Creates Strong Passwords When Nudging Fails, Shelia M. Kennison, Ian T. Jones, Victoria H. Spooner, D. Eric Chan-Tin
Computer Science: Faculty Publications and Other Works
The use of strong passwords is viewed as a recommended cybersecurity practice, as the hacking of weak passwords led to major cybersecurity breaches. The present research investigated whether nudging with messages based on participants’ self-schemas could lead them to create stronger passwords. We modeled our study on prior health-related research demonstrating positive results using messages based on self-schema categories (i.e., True Colors categories -compassionate, loyal, intellectual, and adventurous). We carried out an online study, one with 256 (185 women, 66 men, 5 other) undergraduates and one with 424 (240 men, 179 women, 5 other) Amazon Mechanical Turk (MTurk) workers, in …
Impact Of Personality Types And Matching Messaging On Password Strength, Anna Bakas, Anne Wagner, Spencer Johnston, Shelia Kennison, Eric Chan-Tin
Impact Of Personality Types And Matching Messaging On Password Strength, Anna Bakas, Anne Wagner, Spencer Johnston, Shelia Kennison, Eric Chan-Tin
Computer Science: Faculty Publications and Other Works
People often create passwords for their accounts that are insecure. An insecure password is often easy to guess– thus, hackers can easily access their victims’ accounts. It is important for users to know how to create and manage secure passwords so they can better protect themselves from hackers. It is well-known that different users have different personality types, such as Big Five and True Colors. This research examines if there is any link between personality types and password security behavior. Each participant was shown either a matching or mismatching message based on their personality type, and it was measured whether …
Research Design And Statistical Applications, Grayson Holmbeck, Kathy Zebracki, Katie Mcgoron
Research Design And Statistical Applications, Grayson Holmbeck, Kathy Zebracki, Katie Mcgoron
Psychology: Faculty Publications and Other Works
What is the role of research in the field of pediatric psychology? To answer this question, it is useful to imagine what clinical practice would be like if we had no research foundation for our work. Without such a foundation, practitioners would have no basis for suggesting specific interventions or understanding why some interventions are successful and why others fail. Similarly, without a research foundation, assessments conducted with children would be based on unstandardized assessment methods, and no normative data would be available. Clearly, most of us would agree that scientific research is the foundation of pediatric psychology, including all …