Open Access. Powered by Scholars. Published by Universities.®

Psychology Commons

Open Access. Powered by Scholars. Published by Universities.®

Old Dominion University

Computer Sciences

Keyword
Publication Year
Publication
Publication Type

Articles 1 - 30 of 32

Full-Text Articles in Psychology

Auditory Vigilance Decrement In Drivers Of A Partially Automated Vehicle: A Pilot Study Using A High-Fidelity Driving Simulator, Luca Brooks, Jeffrey Glassman, Yusuke Yamani Mar 2024

Auditory Vigilance Decrement In Drivers Of A Partially Automated Vehicle: A Pilot Study Using A High-Fidelity Driving Simulator, Luca Brooks, Jeffrey Glassman, Yusuke Yamani

Undergraduate Research Symposium

Vigilance decrement is the decline in the ability to monitor and detect behaviorally important signals over time, a phenomenon that can arise even after 30 minutes of watch (Mackworth, 1948). Recently, McCarley & Yamani (2021) found bias shifts, sensitivity losses, and attentional lapses contribute to vigilance decrement, but when each effect is isolated, there was little evidence that sensitivity loss affected vigilance decrement. With the introduction of partially autonomous vehicles, vigilance decrement may be problematic for drivers who must monitor the autonomous system for failures and takeover requests. Thus, this pilot study aims to extend McCarley and Yamani (2021) and …


Identifying Patterns For Neurological Disabilities By Integrating Discrete Wavelet Transform And Visualization, Soo Yeon Ji, Sampath Jayarathna, Anne M. Perrotti, Katrina Kardiasmenos, Dong Hyun Jeong Jan 2024

Identifying Patterns For Neurological Disabilities By Integrating Discrete Wavelet Transform And Visualization, Soo Yeon Ji, Sampath Jayarathna, Anne M. Perrotti, Katrina Kardiasmenos, Dong Hyun Jeong

Computer Science Faculty Publications

Neurological disabilities cause diverse health and mental challenges, impacting quality of life and imposing financial burdens on both the individuals diagnosed with these conditions and their caregivers. Abnormal brain activity, stemming from malfunctions in the human nervous system, characterizes neurological disorders. Therefore, the early identification of these abnormalities is crucial for devising suitable treatments and interventions aimed at promoting and sustaining quality of life. Electroencephalogram (EEG), a non-invasive method for monitoring brain activity, is frequently employed to detect abnormal brain activity in neurological and mental disorders. This study introduces an approach that extends the understanding and identification of neurological disabilities …


Murder On The Vr Express: Studying The Impact Of Thought Experiments At A Distance In Virtual Reality, Andrew Kissel, Krzysztof J. Rechowicz, John B. Shull Jan 2023

Murder On The Vr Express: Studying The Impact Of Thought Experiments At A Distance In Virtual Reality, Andrew Kissel, Krzysztof J. Rechowicz, John B. Shull

Philosophy Faculty Publications

Hypothetical thought experiments allow researchers to gain insights into widespread moral intuitions and provide opportunities for individuals to explore their moral commitments. Previous thought experiment studies in virtual reality (VR) required participants to come to an on-site laboratory, which possibly restricted the study population, introduced an observer effect, and made internal reflection on the participants’ part more difficult. These shortcomings are particularly crucial today, as results from such studies are increasingly impacting the development of artificial intelligence systems, self-driving cars, and other technologies. This paper explores the viability of deploying thought experiments in commercially available in-home VR headsets. We conducted …


Boring But Demanding: Using Secondary Tasks To Counter The Driver Vigilance Decrement For Partially Automated Driving, Scott Mishler, Jing Chen Jan 2023

Boring But Demanding: Using Secondary Tasks To Counter The Driver Vigilance Decrement For Partially Automated Driving, Scott Mishler, Jing Chen

Psychology Faculty Publications

Objective

We investigated secondary–task–based countermeasures to the vigilance decrement during a simulated partially automated driving (PAD) task, with the goal of understanding the underlying mechanism of the vigilance decrement and maintaining driver vigilance in PAD.

Background

Partial driving automation requires a human driver to monitor the roadway, but humans are notoriously bad at monitoring tasks over long periods of time, demonstrating the vigilance decrement in such tasks. The overload explanations of the vigilance decrement predict the decrement to be worse with added secondary tasks due to increased task demands and depleted attentional resources, whereas the underload explanations predict the vigilance …


Emotion Detection Using An Ensemble Model Trained With Physiological Signals And Inferred Arousal-Valence States, Matthew Nathanael Gray Aug 2022

Emotion Detection Using An Ensemble Model Trained With Physiological Signals And Inferred Arousal-Valence States, Matthew Nathanael Gray

Electrical & Computer Engineering Theses & Dissertations

Affective computing is an exciting and transformative field that is gaining in popularity among psychologists, statisticians, and computer scientists. The ability of a machine to infer human emotion and mood, i.e. affective states, has the potential to greatly improve human-machine interaction in our increasingly digital world. In this work, an ensemble model methodology for detecting human emotions across multiple subjects is outlined. The Continuously Annotated Signals of Emotion (CASE) dataset, which is a dataset of physiological signals labeled with discrete emotions from video stimuli as well as subject-reported continuous emotions, arousal and valence, from the circumplex model, is used for …


Objective Measure Of Working Memory Capacity Using Eye Movements, James Owens, Gavindya Jayawardena, Yasasi Abeysinghe, Vikas G. Ashok, Sampath Jayarathna Mar 2022

Objective Measure Of Working Memory Capacity Using Eye Movements, James Owens, Gavindya Jayawardena, Yasasi Abeysinghe, Vikas G. Ashok, Sampath Jayarathna

Undergraduate Research Symposium

Human-autonomy teaming (HAT) has become an important area of research due to the autonomous systems being developed for different applications, such as remotely controlled aircraft. Many remotely controlled vehicles will be controlled by automated systems, with a human monitor that may be monitoring multiple vehicles simultaneously. The attention and working memory capacity of operators of remote-controlled vehicles must be maintained at appropriate levels during operation. However, there is currently no direct method of determining working memory capacity, which is important because it is a measure for how memory is being stored for a short term and interacting with long term …


Eye Movement And Pupil Measures: A Review, Bhanuka Mahanama, Yasith Jayawardana, Sundararaman Rengarajan, Gavindya Jayawardena, Leanne Chukoskie, Joseph Snider, Sampath Jayarathna Jan 2022

Eye Movement And Pupil Measures: A Review, Bhanuka Mahanama, Yasith Jayawardana, Sundararaman Rengarajan, Gavindya Jayawardena, Leanne Chukoskie, Joseph Snider, Sampath Jayarathna

Computer Science Faculty Publications

Our subjective visual experiences involve complex interaction between our eyes, our brain, and the surrounding world. It gives us the sense of sight, color, stereopsis, distance, pattern recognition, motor coordination, and more. The increasing ubiquity of gaze-aware technology brings with it the ability to track gaze and pupil measures with varying degrees of fidelity. With this in mind, a review that considers the various gaze measures becomes increasingly relevant, especially considering our ability to make sense of these signals given different spatio-temporal sampling capacities. In this paper, we selectively review prior work on eye movements and pupil measures. We first …


Precursors Of Email Response To Cybersecurity Scenarios: Factor Exploration And Scale Development, Miguel A. Toro-Jarrin, Pilar Pazos-Lago, Miguel Padilla Jan 2022

Precursors Of Email Response To Cybersecurity Scenarios: Factor Exploration And Scale Development, Miguel A. Toro-Jarrin, Pilar Pazos-Lago, Miguel Padilla

Engineering Management & Systems Engineering Faculty Publications

In the last decade, information security research has further expanded to include human factors as key elements of the organization's cybersecurity infrastructure. Numerous factors from several theories have been explored to explain and predict the multitude of information security-related behaviors in organizations. Lately, there has been a call for the study of specific cybersecurity behaviors in contextualized scenarios that reflect specific and realistic situations of a potential cyber-attack. This paper focuses on precursors of email response in situations that can be the origin of cybersecurity incidents in organizations (i.e., phishing attacks, ransomware, etc.). This study explores participants' intentions to follow …


Human Ergonomic Simulation To Support The Design Of An Exoskeleton For Lashing/De-Lashing Operations Of Containers Cargo, Francesco Longo, Antonio Padovano, Vittorio Solina, Virginia D' Augusta, Stefan Venzl, Roberto Calbi, Michele Bartuni, Ornella Anastasi, Rafael Diaz Jan 2022

Human Ergonomic Simulation To Support The Design Of An Exoskeleton For Lashing/De-Lashing Operations Of Containers Cargo, Francesco Longo, Antonio Padovano, Vittorio Solina, Virginia D' Augusta, Stefan Venzl, Roberto Calbi, Michele Bartuni, Ornella Anastasi, Rafael Diaz

VMASC Publications

Lashing and de-lashing operations of containers cargo on board containerships are considered as quite strenuous activities in which operators are required to work continuously over a 6 or 8 hours shift with very limited break. This is mostly because containerships need to leave the port as soon as possible and containers loading and unloading operations must be executed with very high productivity (stay moored in a port is a totally unproductive time for a ship and a loss-making business for a shipping company). Operators performing lashing and de-lashing operations are subjected to intense ergonomic stress and uncomfortable working postures. To …


The Effects Of Antecedents And Mediating Factors On Cybersecurity Protection Behavior, Ling Li, Li Xu, Wu He Jan 2022

The Effects Of Antecedents And Mediating Factors On Cybersecurity Protection Behavior, Ling Li, Li Xu, Wu He

Information Technology & Decision Sciences Faculty Publications

This paper identifies opportunities for potential theoretical and practical improvements in employees' awareness of cybersecurity and their motivational behavior to protect themselves and their organizations from cyberattacks using the protection motivation theory. In addition, it contributes to the literature by examining additional variables and mediators besides the core constructs of the Protection Motivation Model (PMT). This article uses empirical data and structural equation modeling to test the antecedents and mediators of employees' cybersecurity motivational behavior. The study offers theoretical and pragmatic guidance for cybersecurity programs. First, the model developed in this study can partially explain how people may change their …


The Maritime Domain Awareness Center– A Human-Centered Design Approach, Gary Gomez Nov 2021

The Maritime Domain Awareness Center– A Human-Centered Design Approach, Gary Gomez

Political Science & Geography Faculty Publications

This paper contends that Maritime Domain Awareness Center (MDAC) design should be a holistic approach integrating established knowledge about human factors, decision making, cognitive tasks, complexity science, and human information interaction. The design effort should not be primarily a technology effort that focuses on computer screens, information feeds, display technologies, or user interfaces. The existence of a room with access to vast amounts of information and wall-to-wall video screens of ships, aircraft, weather data, and other regional information does not necessarily correlate to possessing situation awareness. Fundamental principles of human-centered information design should guide MDAC design and technology selection, and …


Analysis Of Reading Patterns Of Scientific Literature Using Eye-Tracking Measures, Gavindya Jayawardena, Sampath Jayarathna, Jian Wu Apr 2021

Analysis Of Reading Patterns Of Scientific Literature Using Eye-Tracking Measures, Gavindya Jayawardena, Sampath Jayarathna, Jian Wu

College of Sciences Posters

Scientific literature is crucial for researchers to inspire novel research ideas and find solutions to various problems. This study presents a reading task for novice researchers using eye-tracking measures. The study focused on the scan paths, fixation, and pupil dilation frequency of the participants. In this study, 3 participants were asked to read a pre-selected research paper while wearing an eye-tracking device (PupilLabs Core 200Hz). We specified sections of the research paper as areas of interest (title, abstract, motivation, methodology, conclusion)to analyze the eye-movements. Then we extracted eye-movements data from the recordings and processed them using an eye-movement processing pipeline. …


Human Factors, Ergonomics And Industry 4.0 In The Oil & Gas Industry: A Bibliometric Analysis, Francesco Longo, Antonio Padovano, Lucia Gazzaneo, Jessica Frangella, Rafael Diaz Jan 2021

Human Factors, Ergonomics And Industry 4.0 In The Oil & Gas Industry: A Bibliometric Analysis, Francesco Longo, Antonio Padovano, Lucia Gazzaneo, Jessica Frangella, Rafael Diaz

VMASC Publications

Over the last few years, the Human Factors and Ergonomics (HF/E) discipline has significantly benefited from new human-centric engineered digital solutions of the 4.0 industrial age. Technologies are creating new socio-technical interactions between human and machine that minimize the risk of design-induced human errors and have largely contributed to remarkable improvements in terms of process safety, productivity, quality, and workers’ well-being. However, despite the Oil&Gas (O&G) sector is one of the most hazardous environments where human error can have severe consequences, Industry 4.0 aspects are still scarcely integrated with HF/E. This paper calls for a holistic understanding of the changing …


Assessment And Learning In Knowledge Spaces (Aleks) Adaptive System Impact On Students' Perception And Self-Regulated Learning Skills, Honda Harati, Laura Sujo-Montes, Chih-Hsiung Tu, Shadow J.W. Armfield, Cherng-Jyh Yen Jan 2021

Assessment And Learning In Knowledge Spaces (Aleks) Adaptive System Impact On Students' Perception And Self-Regulated Learning Skills, Honda Harati, Laura Sujo-Montes, Chih-Hsiung Tu, Shadow J.W. Armfield, Cherng-Jyh Yen

Educational Foundations & Leadership Faculty Publications

Adaptive learning is an educational method that uses computer algorithms and artificial intelligence (AI) to customize learning materials and activities based on each user's model. Adaptive learning has been used for more than 20 years. However, it is still unique, and no other system could bring more or even similar capabilities than the ones adaptive technology offers, including the application of AI, psychology, psychometrics, machine learning, and providing a personalized learning environment. However, there are not many studies on its practicality, usefulness, improving students' learning skills, students' perception, etc., due to the limited number of institutes investing in this new …


Leverage Psychological Factors Associated With Lapses In Cybersecurity In Organizational Management, Chad Holm Jan 2021

Leverage Psychological Factors Associated With Lapses In Cybersecurity In Organizational Management, Chad Holm

Cybersecurity Undergraduate Research Showcase

With computers being a standard part of life now with the evolution of the internet, many aspects of our lives have changed, and new ways of thinking must come. One of the biggest challenges in most cyber security problems is not related to the software or the hardware; it is the people that are using the computers to access the data and communicate with others, where the hackers could simply find a weak entry point that naturally exists and a weak link caused by human hands. The human factor as an “insider threat” will affect unauthorized access, credentials stealing, and …


Interactive Agent-Based Simulation For Experimentation: A Case Study With Cooperatve Game Theory, Andrew J. Collins, Sheida Etemadidavan Jan 2021

Interactive Agent-Based Simulation For Experimentation: A Case Study With Cooperatve Game Theory, Andrew J. Collins, Sheida Etemadidavan

Engineering Management & Systems Engineering Faculty Publications

Incorporating human behavior is a current challenge for agent-based modeling and simulation (ABMS). Human behavior includes many different aspects depending on the scenario considered. The scenario context of this paper is strategic coalition formation, which is traditionally modeled using cooperative game theory, but we use ABMS instead; as such, it needs to be validated. One approach to validation is to compare the recorded behavior of humans to what was observed in our simulation. We suggest that using an interactive simulation is a good approach to collecting the necessary human behavior data because the humans would be playing in precisely the …


The Effects Of Security Framing, Time Pressure, And Brand Familiarity On Risky Mobile Application Downloads, Cody Parker Dec 2020

The Effects Of Security Framing, Time Pressure, And Brand Familiarity On Risky Mobile Application Downloads, Cody Parker

Psychology Theses & Dissertations

The current study examined the effects of security system framing, time pressure, and brand familiarity on mobile application download behaviors, with an emphasis on risk taking. According to the Prospect Theory, people tend to engage in irrational decision making, and make qualitatively different decisions when information is framed in terms of gains and losses (i.e., the framing effect). Past research has used this framing effect to guide the design of a risk display for mobile applications (apps), with the purpose of communicating the potential risks and minimizing insecure app selections. Time pressure has been shown to influence the framing effect …


Account Recovery Methods For Two-Factor Authentication (2fa): An Exploratory Study, Lauren Nicole Tiller Apr 2020

Account Recovery Methods For Two-Factor Authentication (2fa): An Exploratory Study, Lauren Nicole Tiller

Psychology Theses & Dissertations

System administrators have started to adopt two-factor authentication (2FA) to increase user account resistance to cyber-attacks. Systems with 2FA require users to verify their identity using a password and a second-factor authentication device to gain account access. This research found that 60% of users only enroll one second-factor device to their account. If a user’s second factor becomes unavailable, systems are using different procedures to ensure its authorized owner recovers the account. Account recovery is essentially a bypass of the system’s main security protocols and needs to be handled as an alternative authentication process (Loveless, 2018). The current research aimed …


A Survey Of Attention Deficit Hyperactivity Disorder Identification Using Psychophysiological Data, S. De Silva, S. Dayarathna, G. Ariyarathne, D. Meedeniya, Sampath Jayarathna Jan 2019

A Survey Of Attention Deficit Hyperactivity Disorder Identification Using Psychophysiological Data, S. De Silva, S. Dayarathna, G. Ariyarathne, D. Meedeniya, Sampath Jayarathna

Computer Science Faculty Publications

Attention Deficit Hyperactivity Disorder (ADHD) is one of the most common neurological disorders among children, that affects different areas in the brain that allows executing certain functionalities. This may lead to a variety of impairments such as difficulties in paying attention or focusing, controlling impulsive behaviours and overreacting. The continuous symptoms may have a severe impact in the long-term. This paper explores the ADHD identification studies using eye movement data and functional Magnetic Resonance Imaging (fMRI). This study discusses different machine learning techniques, existing models and analyses the existing literature. We have identified the current challenges and possible future directions …


Transfer Learning Approach To Multiclass Classification Of Child Facial Expressions, Megan A. Witherow, Manar D. Samad, Khan M. Iftekharuddin Jan 2019

Transfer Learning Approach To Multiclass Classification Of Child Facial Expressions, Megan A. Witherow, Manar D. Samad, Khan M. Iftekharuddin

Electrical & Computer Engineering Faculty Publications

The classification of facial expression has been extensively studied using adult facial images which are not appropriate ground truths for classifying facial expressions in children. The state-of-the-art deep learning approaches have been successful in the classification of facial expressions in adults. A deep learning model may be better able to learn the subtle but important features underlying child facial expressions and improve upon the performance of traditional machine learning and feature extraction methods. However, unlike adult data, only a limited number of ground truth images exist for training and validating models for child facial expression classification and there is a …


Gender Difference And Employees' Cybersecurity Behaviors, Mohd Anwar, Wu He, Ivan Ash, Xiaohong Yuan, Ling Li, Li Xu Jan 2017

Gender Difference And Employees' Cybersecurity Behaviors, Mohd Anwar, Wu He, Ivan Ash, Xiaohong Yuan, Ling Li, Li Xu

Information Technology & Decision Sciences Faculty Publications

Security breaches are prevalent in organizations and many of the breaches are attributed to human errors. As a result, the organizations need to increase their employees' security awareness and their capabilities to engage in safe cybersecurity behaviors. Many different psychological and social factors affect employees' cybersecurity behaviors. An important research question to explore is to what extent gender plays a role in mediating the factors that affect cybersecurity beliefs and behaviors of employees. In this vein, we conducted a cross-sectional survey study among employees of diverse organizations. We used structural equation modelling to assess the effect of gender as a …


Multiple Imputation Of Missing Data In Structural Equation Models With Mediators And Moderators Using Gradient Boosted Machine Learning, Robert J. Milletich Ii Oct 2016

Multiple Imputation Of Missing Data In Structural Equation Models With Mediators And Moderators Using Gradient Boosted Machine Learning, Robert J. Milletich Ii

Psychology Theses & Dissertations

Mediation and moderated mediation models are two commonly used models for indirect effects analysis. In practice, missing data is a pervasive problem in structural equation modeling with psychological data. Multiple imputation (MI) is one method used to estimate model parameters in the presence of missing data, while accounting for uncertainty due to the missing data. Unfortunately, commonly used MI methods are not equipped to handle categorical variables or nonlinear variables such as interactions. In this study, we introduce a general MI framework that uses the Bayesian bootstrap (BB) method to generate posterior inferences for indirect effects and gradient boosted machine …


Potential Of Cognitive Computing And Cognitive Systems, Ahmed K. Noor Jan 2015

Potential Of Cognitive Computing And Cognitive Systems, Ahmed K. Noor

Computational Modeling & Simulation Engineering Faculty Publications

Cognitive computing and cognitive technologies are game changers for future engineering systems, as well as for engineering practice and training. They are major drivers for knowledge automation work, and the creation of cognitive products with higher levels of intelligence than current smart products. This paper gives a brief review of cognitive computing and some of the cognitive engineering systems activities. The potential of cognitive technologies is outlined, along with a brief description of future cognitive environments, incorporating cognitive assistants - specialized proactive intelligent software agents designed to follow and interact with humans and other cognitive assistants across the environments. The …


Investigating Intrinsic And Extrinsic Variables During Simulated Internet Search, Molly M. Liechty, Poornima Madhaven Jan 2011

Investigating Intrinsic And Extrinsic Variables During Simulated Internet Search, Molly M. Liechty, Poornima Madhaven

Psychology Faculty Publications

Using an eye tracker we examined decision-making processes during an internet search task. Twenty experienced homebuyers and twenty-five undergraduates from Old Dominion University viewed homes on a simulated real estate website. Several of the homes included physical properties that had the potential to negatively impact individual perceptions. These negative externalities were either easy to change (Level 1) or impossible to change (Level 2). Eye movements were analyzed to examine the relationship between participants' "stated preferences"[verbalized preferences], "revealed preferences" [actual decisions[, and experience. Dwell times, fixation durations/counts, and saccade counts/amplitudes were analyzed. Results revealed that experienced homebuyers demonstrated a more refined …


Assessing The Format Of The Presentation Of Text In Developing A Reading Strategy Assessment Tool (R-Sat), Sara Gilliam, Joseph P. Magliano, Keith K. Millis, Irwin Levinstein, Chutima Boonthum Jan 2007

Assessing The Format Of The Presentation Of Text In Developing A Reading Strategy Assessment Tool (R-Sat), Sara Gilliam, Joseph P. Magliano, Keith K. Millis, Irwin Levinstein, Chutima Boonthum

Computer Science Faculty Publications

We are constructing a new computerized test of reading comprehension called the Reading Strategy Assessment Tool (R-SAT). R-SAT elicits and analyzes verbal protocols that readers generate in response to questions as they read texts. We examined whether the amount of information available to the reader when reading and answering questions influenced the extent to which R-SAT accounts for comprehension. We found that R-SAT was most predictive of comprehension when the readers did not have access to the text as they answered questions.


Istart 2: Improvements For Efficiency And Effectiveness, Irwin B. Levinstein, Chutima Boonthum, Srinivasa P. Pillarisetti, Courtney Bell, Danielle S. Mcnamara Jan 2007

Istart 2: Improvements For Efficiency And Effectiveness, Irwin B. Levinstein, Chutima Boonthum, Srinivasa P. Pillarisetti, Courtney Bell, Danielle S. Mcnamara

Computer Science Faculty Publications

iSTART (interactive strategy training for active reading and thinking) is a Web-based reading strategy trainer that develops students' ability to self-explain difficult text as a means to improving reading comprehension. Its curriculum consists of modules presented interactively by pedagogical agents: an introduction to the basics of using reading strategies in the context of self-explanation, a demonstration of self-explanation, and a practice module in which the trainee generates self-explanations with feedback on the quality of reading strategies contained in the self-explanations. We discuss the objectives that guided the development of the second version of iSTART toward the goals of increased efficiency …


Modeling The Decision Process Of A Joint Task Force Commander, John Anthony Sokolowski Apr 2003

Modeling The Decision Process Of A Joint Task Force Commander, John Anthony Sokolowski

Computational Modeling & Simulation Engineering Theses & Dissertations

The U.S. military uses modeling and simulation as a tool to help meet its warfighting needs. A key element within military simulations is the ability to accurately represent human behavior. This is especially true in a simulation's ability to emulate realistic military decisions. However, current decision models fail to provide the variability and flexibility that human decision makers exhibit. Further, most decision models are focused on tactical decisions and ignore the decision process of senior military commanders at the operational level of warfare. In an effort to develop a better decision model that would mimic the decision process of a …


Perceptual Cues And Subjective Organization In A Virtual Information Workspace, Todd M. Eischeid Jan 2001

Perceptual Cues And Subjective Organization In A Virtual Information Workspace, Todd M. Eischeid

Psychology Theses & Dissertations

The key to effectively using the immense body of data on the Internet is an efficient method of organizing relevant information. Researchers and designers are beginning to promote the advantages of three-dimensional (3D) models of information storage and retrieval; however, the potential benefits of perceptual depth cues have not been systematically studied.

The present study used a computer task to examine the effectiveness of three types of virtual desktops. A two-dimensional (2D) virtual desktop display, lacking in the cues that give the illusion of depth, was compared to two different 3D virtual desktops, both of which used perceptual cues to …


Analyzing The Effects Of Display Characteristics And Cognitive Variables On Performance Using Keystroke And Eye Movement Data, Orhan E. Beckman Jul 1998

Analyzing The Effects Of Display Characteristics And Cognitive Variables On Performance Using Keystroke And Eye Movement Data, Orhan E. Beckman

Psychology Theses & Dissertations

Information about how operators use their eyes while interacting with visual displays is often an overlooked aspect of human-computer interaction. Such information is fundamental to assessing the quality of software interfaces and understanding the cognitive processes that underlie operator behavior. Other research evaluating information displays evolved from using reaction time and subjective data as dependent variables to using oculometric measures. In the current research conventional performance measures are coupled with oculometric measures to evaluate the influence display characteristics and cognitive variables have on performance.

Twelve subjects used a software program to complete a series of specified tasks. Subjects were asked …


The Effects Of Human-Computer Communication Mode, Task Complexity, And Desire For Control On Performance And Discourse Organization In An Adaptive Task, Cristina Bubb-Lewis Jan 1997

The Effects Of Human-Computer Communication Mode, Task Complexity, And Desire For Control On Performance And Discourse Organization In An Adaptive Task, Cristina Bubb-Lewis

Psychology Theses & Dissertations

The present study examined how different communication patterns affected task performance with an adaptive interface. A Wizard-of-Oz simulation (Gould, Conti, & Hovanyecz, 1983) was used to create the impression of a talking and listening computer that acted as a teammate to help participants interact with a computer application.

Four levels of communication mode were used which differed in the level of restriction placed on human-computer communication. In addition, participants completed two sets of tasks (simple and complex). Further, a personality trait, Desire for Control (DC), was measured and participants were split into high and low groups for analysis. Dependent measures …