Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Cybersecurity (2)
- 2FA (1)
- Account recovery (1)
- Adaptive task (1)
- Bayesian bootstrap (1)
-
- Brand familiarity (1)
- Cognitive (1)
- Communication patterns (1)
- Discourse organization (1)
- Display (1)
- Eye movement (1)
- Framing effect (1)
- Human computer interaction (1)
- Human factors (1)
- Human-computer communication (1)
- Human-computer interfaces (1)
- Information technology (1)
- Information workspace (1)
- Machine learning (1)
- Mediation (1)
- Missing data (1)
- Mobile applications (1)
- Moderated mediation (1)
- Perceptual cues (1)
- Structural equation modeling (1)
- Subjective organization (1)
- Time pressure (1)
- Two-factor authentication (1)
- Usability (1)
- Virtual environment (1)
Articles 1 - 7 of 7
Full-Text Articles in Physical Sciences and Mathematics
The Effects Of Security Framing, Time Pressure, And Brand Familiarity On Risky Mobile Application Downloads, Cody Parker
The Effects Of Security Framing, Time Pressure, And Brand Familiarity On Risky Mobile Application Downloads, Cody Parker
Psychology Theses & Dissertations
The current study examined the effects of security system framing, time pressure, and brand familiarity on mobile application download behaviors, with an emphasis on risk taking. According to the Prospect Theory, people tend to engage in irrational decision making, and make qualitatively different decisions when information is framed in terms of gains and losses (i.e., the framing effect). Past research has used this framing effect to guide the design of a risk display for mobile applications (apps), with the purpose of communicating the potential risks and minimizing insecure app selections. Time pressure has been shown to influence the framing effect …
Account Recovery Methods For Two-Factor Authentication (2fa): An Exploratory Study, Lauren Nicole Tiller
Account Recovery Methods For Two-Factor Authentication (2fa): An Exploratory Study, Lauren Nicole Tiller
Psychology Theses & Dissertations
System administrators have started to adopt two-factor authentication (2FA) to increase user account resistance to cyber-attacks. Systems with 2FA require users to verify their identity using a password and a second-factor authentication device to gain account access. This research found that 60% of users only enroll one second-factor device to their account. If a user’s second factor becomes unavailable, systems are using different procedures to ensure its authorized owner recovers the account. Account recovery is essentially a bypass of the system’s main security protocols and needs to be handled as an alternative authentication process (Loveless, 2018). The current research aimed …
Multiple Imputation Of Missing Data In Structural Equation Models With Mediators And Moderators Using Gradient Boosted Machine Learning, Robert J. Milletich Ii
Multiple Imputation Of Missing Data In Structural Equation Models With Mediators And Moderators Using Gradient Boosted Machine Learning, Robert J. Milletich Ii
Psychology Theses & Dissertations
Mediation and moderated mediation models are two commonly used models for indirect effects analysis. In practice, missing data is a pervasive problem in structural equation modeling with psychological data. Multiple imputation (MI) is one method used to estimate model parameters in the presence of missing data, while accounting for uncertainty due to the missing data. Unfortunately, commonly used MI methods are not equipped to handle categorical variables or nonlinear variables such as interactions. In this study, we introduce a general MI framework that uses the Bayesian bootstrap (BB) method to generate posterior inferences for indirect effects and gradient boosted machine …
Perceptual Cues And Subjective Organization In A Virtual Information Workspace, Todd M. Eischeid
Perceptual Cues And Subjective Organization In A Virtual Information Workspace, Todd M. Eischeid
Psychology Theses & Dissertations
The key to effectively using the immense body of data on the Internet is an efficient method of organizing relevant information. Researchers and designers are beginning to promote the advantages of three-dimensional (3D) models of information storage and retrieval; however, the potential benefits of perceptual depth cues have not been systematically studied.
The present study used a computer task to examine the effectiveness of three types of virtual desktops. A two-dimensional (2D) virtual desktop display, lacking in the cues that give the illusion of depth, was compared to two different 3D virtual desktops, both of which used perceptual cues to …
Analyzing The Effects Of Display Characteristics And Cognitive Variables On Performance Using Keystroke And Eye Movement Data, Orhan E. Beckman
Analyzing The Effects Of Display Characteristics And Cognitive Variables On Performance Using Keystroke And Eye Movement Data, Orhan E. Beckman
Psychology Theses & Dissertations
Information about how operators use their eyes while interacting with visual displays is often an overlooked aspect of human-computer interaction. Such information is fundamental to assessing the quality of software interfaces and understanding the cognitive processes that underlie operator behavior. Other research evaluating information displays evolved from using reaction time and subjective data as dependent variables to using oculometric measures. In the current research conventional performance measures are coupled with oculometric measures to evaluate the influence display characteristics and cognitive variables have on performance.
Twelve subjects used a software program to complete a series of specified tasks. Subjects were asked …
The Effects Of Human-Computer Communication Mode, Task Complexity, And Desire For Control On Performance And Discourse Organization In An Adaptive Task, Cristina Bubb-Lewis
The Effects Of Human-Computer Communication Mode, Task Complexity, And Desire For Control On Performance And Discourse Organization In An Adaptive Task, Cristina Bubb-Lewis
Psychology Theses & Dissertations
The present study examined how different communication patterns affected task performance with an adaptive interface. A Wizard-of-Oz simulation (Gould, Conti, & Hovanyecz, 1983) was used to create the impression of a talking and listening computer that acted as a teammate to help participants interact with a computer application.
Four levels of communication mode were used which differed in the level of restriction placed on human-computer communication. In addition, participants completed two sets of tasks (simple and complex). Further, a personality trait, Desire for Control (DC), was measured and participants were split into high and low groups for analysis. Dependent measures …
Computer Use In The Scientific Office, Douglas L. Miller
Computer Use In The Scientific Office, Douglas L. Miller
Psychology Theses & Dissertations
Over the past two decades computers in research and development organizations have become a complex and integral part of the work process. Yet to date only a handful of systematic investigations have addressed issues involving scientists' or other professionals' use of computers, and very little is known about factors influencing use (Bikson and Gutek, 1983; Blacker and Brown, 1986; Collopy, 1988; Gasser, 1986; Helander, 1985; Nickolson, 1985; Pope, 1985). As a result, this research was designed to address four objectives. The first was to develop and evaluate a descriptive model of variables influencing scientists' computer use. The second objective was …