100 research outputs found

    Designing Emergency Response Applications for Better Performance

    Get PDF
    Emergency responders often work in time pressured situations and depend on fast access to key information. One of the problems studied in human-computer interaction (HCI) research is the design of interfaces to improve user information selection and processing performance. Based on prior research findings this study proposes that information selection of target information in emergency response applications can be improved by using supplementary cues. The research is motivated by cue-summation theory and research findings on parallel and associative processing. Color-coding and location-ordering are proposed as relevant cues that can improve ERS processing performance by providing prioritization heuristics. An experimental ERS is developed users’ performance is tested under conditions of varying complexity and time pressure. The results suggest that supplementary cues significantly improve performance, with the best results obtained when both cues are used. Additionally, the use of these cues becomes more beneficial as time pressure and complexity increase

    An Empirical Investigation of Trusting Bases in Intitial Trust Formation with National Identity Systems

    Get PDF
    Recent research indicates that trust is important in helping users overcome perceptions of risk and uncertainty as well as promoting the acceptance of a specific technology. While prior studies have investigated different underlying bases of trust, little research has empirically tested all bases in one comprehensive model and evaluated the relative effect of various bases on subsequent trusting intentions. This research empirically investigates these trusting bases within an extended initial trust model in the context of a national identity (NID) system. Research on understanding the role of initial trust will not only be of assistance to the successful implementation of an NID system, but also provide guidance for understanding the role of initial trust in the deployment of other types of information systems

    Designing Emergency Response Dispatch Systems for Better Dispatcher Performance

    Get PDF
    Emergency response systems are a relatively new and important area of research in the information systems community. While there is a growing body of literature in this research stream, human-computer interaction (HCI) issues concerning the design of emergency response system interfaces have received limited attention. Emergency responders often work in time pressured situations and depend on fast access to key information. One of the problems studied in HCI research is the design of interfaces to improve user information selection and processing performance. Based on cue-summation theory and research findings on parallel processing, associative processing, and hemispheric differences in information processing, this study proposes that information selection of target information in an emergency response dispatch application can be improved by using supplementary cues. Color-coding and sorting are proposed as relevant cues that can improve processing performance by providing prioritization heuristics. An experimental emergency response dispatch application is developed, and user performance is tested under conditions of varying complexity and time pressure. The results suggest that supplementary cues significantly improve performance, with better results often obtained when both cues are used. Additionally, the use of these cues becomes more beneficial as time pressure and task complexity increase

    The Effects of Visualization and Interactivity on Calibration in Financial Decision-Making

    Get PDF
    This study examines how visualization and interactivity affect accuracy, confidence, and calibration in a financial decisionmakingcontext. Decision-makers are typically overconfident and this research proposes that visualization and interactivitycan reduce calibration, increasing overconfidence. An experiment was conducted with 157 participants and the resultsshowed that visualization and interactivity features can increase decision-maker confidence independently. However,interactive visualization, both interface features, are required to increase accuracy. As a result, when interactivity andvisualization are offered individually, decision-makers become overconfident, less calibrated. Implications for designers arediscussed

    Negotiation in strategy making teams : group support systems and the process of cognitive change

    Get PDF
    This paper reports on the use of a Group Support System (GSS) to explore at a micro level some of the processes manifested when a group is negotiating strategy-processes of social and psychological negotiation. It is based on data from a series of interventions with senior management teams of three operating companies comprising a multi-national organization, and with a joint meeting subsequently involving all of the previous participants. The meetings were concerned with negotiating a new strategy for the global organization. The research involved the analysis of detailed time series data logs that exist as a result of using a GSS that is a reflection of cognitive theory

    Mitigation of Cognitive Bias with a Serious Game: Two Experiments Testing Feedback Timing and Source

    Get PDF
    One of the benefits of using digital games for education is that games can provide feedback for learners to assess their situation and correct their mistakes. We conducted two studies to examine the effectiveness of different feedback design (timing, duration, repeats, and feedback source) in a serious game designed to teach learners about cognitive biases. We also compared the digital game-based learning condition to a professional training video. Overall, the digital game was significantly more effective than the video condition. Longer durations and repeats improve the effects on bias-mitigation. Surprisingly, there was no significant difference between just-in-time feedback and delayed feedback, and computer-generated feedback was more effective than feedback from other players

    Mitigation of Cognitive Bias with a Serious Game: Two Experiments Testing Feedback Timing and Source

    Get PDF
    One of the benefits of using digital games for education is that games can provide feedback for learners to assess their situation and correct their mistakes. We conducted two studies to examine the effectiveness of different feedback design (timing, duration, repeats, and feedback source) in a serious game designed to teach learners about cognitive biases. We also compared the digital game-based learning condition to a professional training video. Overall, the digital game was significantly more effective than the video condition. Longer durations and repeats improve the effects on bias-mitigation. Surprisingly, there was no significant difference between just-in-time feedback and delayed feedback, and computer-generated feedback was more effective than feedback from other players

    The Behavioral Roots of Information Systems Security:Exploring Key Factors Related to Unethical IT Use

    Get PDF
    Unethical information technology (IT) use, related to activities such as hacking, software piracy, phishing, and spoofing, has become a major security concern for individuals, organizations, and society in terms of the threat to information systems (IS) security. While there is a growing body of work on this phenomenon, we notice several gaps, limitations, and inconsistencies in the literature. In order to further understand this complex phenomenon and reconcile past findings, we conduct an exploratory study to uncover the nomological network of key constructs salient to this phenomenon, and the nature of their interrelationships. Using a scenario-based study of young adult participants, and both linear and nonlinear analyses, we uncover key nuances of this phenomenon of unethical IT use. We find that unethical IT use is a complex phenomenon, often characterized by nonlinear and idiosyncratic relationships between the constructs that capture it. Overall, ethical beliefs held by the individuals, along with economic, social, and technological considerations are found to be relevant to this phenomenon. In terms of practical implications, these results suggest that multiple interventions at various levels may be required to combat this growing threat to IS security
    corecore