1,392 research outputs found

    What’s it worth to you? Applying risk tradeoff paradigms to explain user interactions with interruptive security messages

    Get PDF
    Attacks on information security continue to result in large losses for organizations. Oftentimes, the breaches occur because organizational insiders fail to adhere to commonplace system security messages. This could be because, faced with the challenges and time demands of everyday stressors, security policy compliance can be costly for individuals; security actions require time and distract attention from other primary tasks. To defend against these attacks, user interactions with security messages need to be better understood. This study reports the results of a 110-participant MTurk field study that examines user interactions with interruptive security messages through the lens of a risk tradeoff paradigm. First, a gap in the information security literature is identified, wherein findings about low security-message attention are contrasted against studies that assume attention and information processing. Three competing hypotheses are proposed that describe different patterns of risk analysis that users may engage in when interacting with an interruptive security message: (1) very little to no elaboration over the risk-taking decision due to perniciously low attention, (2) consistent security message risk-taking decision elaboration, and (3) a bimodal situation where elaboration depends on the information security risk-reward tradeoff balance. Multiple behavioral dependent variables are corroborated to support the third hypothesis, suggesting the existence of a bimodal risk tradeoff paradigm for user interactions with interruptive security messages. The relevance of the findings for research and practice are discussed

    Dressing for Altitude: U.S. Aviation Pressure Suits--Wiley Post to Space Shuttle

    Get PDF
    Since its earliest days, flight has been about pushing the limits of technology and, in many cases, pushing the limits of human endurance. The human body can be the limiting factor in the design of aircraft and spacecraft. Humans cannot survive unaided at high altitudes. There have been a number of books written on the subject of spacesuits, but the literature on the high-altitude pressure suits is lacking. This volume provides a high-level summary of the technological development and operational use of partial- and full-pressure suits, from the earliest models to the current high altitude, full-pressure suits used for modern aviation, as well as those that were used for launch and entry on the Space Shuttle. The goal of this work is to provide a resource on the technology for suits designed to keep humans alive at the edge of space. Hopefully, future generations will learn from the hard-fought lessons of the past. NASA is committed to the future of aerospace, and a key component of that future is the workforce. Without these men and women, technological advancements would not be possible. Dressing for Altitude is designed to provide the history of the technology and to explore the lessons learned through years of research in creating, testing, and utilizing today s high-altitude suits. It is our hope that this information will prove helpful in the development of future suits. Even with the closeout of the Space Shuttle and the planned ending of the U-2 program, pressure suits will be needed for protection as long as humans seek to explore high frontiers. The NASA Aeronautics Research Mission Directorate is committed to the training of the current and future aerospace workforce. This book and the other books published by the NASA Aeronautics Research Mission Directorate are in support of this commitment. Hopefully, you will find this book a valuable resource for many years to come

    X-15: Extending the Frontiers of Flight

    Get PDF
    A history of the design and achievements of the high-speed, 1950s-era X-15 airplane is presented. The following chapters are included: A New Science; A Hypersonic Research Airplane; Conflict and Innovation; The Million-Horsepower Engine; High Range and Dry Lakes; Preparations; The Flight Program; and the Research Program. Selected biographies, flight logs and physical characteristics of the X-15 Airplane are included in the appendices

    Thinking Fast or slow? Understanding Answering Behavior Using Dual-Process Theory through Mouse Cursor Movements

    Get PDF
    Users’ underlying cognitive states govern their behaviors online. For instance, an extreme cognitive burden during live system use would negatively influence important user behaviors such as using the system and purchasing a product. Thus, inferring the user's cognitive state has practical significance for the commercialized systems. We use Dual-Process Theory to explain how the mouse cursor movements can be an effective measure of cognitive load. In an experimental study with five hundred and thirty-four subjects, we induced cognitive burden then monitored mouse cursor movements when the participants answered questions in an online survey. We found that participants' mouse cursor movements slow down when they are engaged in cognitively demanding tasks. With the newly derived measures, we were able to infer the state of heightened cognitive load with an overall accuracy of 70.22%. The results enable researchers to measure users' cognitive load with more granularity and present a new, theoretically sound method to assess the user's cognitive state

    Improving the Quality of Survey Data: Using Answering Behavior as an Alternative Method for Detecting Biased Respondents

    Get PDF
    Online surveys are used for collecting self-report data. Despite their prevalent use, data quality problems persist due to various response biases. Here, we demonstrate how participant answering behaviors can be used to identify biased responses. We administered an online survey where participants reported their personality dimensions of neuroticism and extraversion—two personality dimensions that have been previously shown to be correlated with a propensity to deceive—and were later presented with a scenario to exhibit deceptive behavior. We then generated models to predict deception using the neuroticism and extraversion constructs. Using respondents’ fine-grained mouse movement data when answering these questions, we generated time, behavior, and navigation-based metrics to identify biased participants. By removing these outliers, model performance improved by 93% for neuroticism and 10% for extraversion. This approach aids in gaining a clearer understanding of how some types of response biases influence model performanc
    • 

    corecore