49 research outputs found

    The algebraic decay of equatorial Rossby waves in a shear flow

    Full text link
    Through numerical integration, we show that equatorial Rossby waves, like their midlatitude counterparts, decay algebraically in the limit t --> [infinity] in a linear shear flow. For small times, the growth expected for some components does not translate into any growth of the wave disturbance as a whole when the initial conditions has a broad Fourier spectrum. The conclusion is that Rossby waves will amplify with time only when the mean flow has an inflection point or when the initial eddy field is strongly concentrated in long waves tilted against the shear.Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/26587/1/0000128.pd

    Exploring Older Adult Susceptibility to Fraudulent Computer Pop-Up Interruptions

    Get PDF
    © 2019, Springer International Publishing AG, part of Springer Nature. The proliferation of Internet connectivity and accessibility has been accompanied by an increase in cyber-threats, including fraudulent communications. Fake computer updates, which attempt to persuade people to download malicious software by mimicking trusted brands and/or instilling urgency, are one way in which fraudsters try to infiltrate systems. A recent study of young university students (M 18.52-years) found that when such pop-ups interrupt a demanding cognitive task, participants spent little time viewing them and were more likely to miss suspicious cues and accept these updates compared to when they were viewed without the pressure to resume a suspended task [1]. The aim of the current experiment was to test an older adult sample (N = 29, all >60 years) using the same paradigm. We predicted that they would be more susceptible to malevolent pop-ups [2]; trusting them more than younger adults (e.g., [3]), and would attempt to resume the interrupted task faster to limit forgetting of encoded items. Phase 1 involved serial recall memory trials interrupted by genuine, mimicked, and low authority pop-ups. During phase 2, participants rated messages with unlimited time and gave reasons for their decisions. It was found that more than 70% of mimicked and low authority pop-ups were accepted in Phase 1 vs ~80% genuine pop-ups (and these were all approximately 10% higher than [1]). This was likely due to a greater tendency to ignore or miss suspicious content when performing under pressure, despite spending longer with messages and reporting high awareness of scam techniques than younger adults. Older adult participants were more suspicious during Phase 2 performing comparably to the younger adults in [1]. Factors that may impact older adult decisions relating to fraudulent computer communications are discussed, as well as theoretical and practical implications

    Seven HCI Grand Challenges

    Get PDF
    This article aims to investigate the Grand Challenges which arise in the current and emerging landscape of rapid technological evolution towards more intelligent interactive technologies, coupled with increased and widened societal needs, as well as individual and collective expectations that HCI, as a discipline, is called upon to address. A perspective oriented to humane and social values is adopted, formulating the challenges in terms of the impact of emerging intelligent interactive technologies on human life both at the individual and societal levels. Seven Grand Challenges are identified and presented in this article: Human-Technology Symbiosis; Human-Environment Interactions; Ethics, Privacy and Security; Well-being, Health and Eudaimonia; Accessibility and Universal Access; Learning and Creativity; and Social Organization and Democracy. Although not exhaustive, they summarize the views and research priorities of an international interdisciplinary group of experts, reflecting different scientific perspectives, methodological approaches and application domains. Each identified Grand Challenge is analyzed in terms of: concept and problem definition; main research issues involved and state of the art; and associated emerging requirements
    corecore