51 research outputs found

    Impact of framing and base size of computer security risk information on user behavior

    Get PDF
    This research examines the impact of framing and base size of computer security risk information on users\u27 risk perceptions and behavior (i.e., download intention and download decision). It also examines individual differences (i.e., demographic factors, computer security awareness, Internet structural assurance, self-efficacy, and general risk-taking tendencies) associated with users\u27 computer security risk perceptions. This research draws on Prospect Theory, which is a theory in behavioral economics that addresses risky decision-making, to generate hypotheses related to users\u27 decision-making in the computer security context. A 2 x 3 mixed factorial experimental design (N = 178) was conducted to assess the effect of framing and base size on users\u27 download intentions and decisions. The results show that framing and base size of computer security risk information are associated with users\u27 perceived risk and risk-taking behavior. More specifically, negative framing and large base size increase users\u27 perceived risk and reduce users\u27 risk-taking behavior. Moreover, users who have greater general risk-taking tendencies and perceive higher Internet structural assurance exhibited lower risk perceptions and greater risk-taking behavior in the computer security context. The findings from this research suggest that using negative framing and large base size to communicate computer security risk information is an effective way to lower risk-taking behavior of users --Abstract, page iii

    How Does AI Fail Us? A Typological Theorization of AI Failures

    Get PDF
    AI incidents, often resulting from the complex interplay of algorithms, human agents, and situations, violate norms and can cause minor or catastrophic errors. This study systematically examines these incidents by developing a typology of AI failure and linking these modes to AI task types. Using a computationally intensive grounded theory approach, we analyzed 466 unique reported real-world AI incidents from 2013 to 2023. Our findings reveal an AI failure typology with six modes, including artifact malfunction, artifact misuse, algorithmic bias, agency oversight, situational unresponsiveness, and value misalignment. Furthermore, we explore the relationship between these failure modes and the tasks performed by AI, uncovering four propositions that provide a framework for future research. Our study contributes to the literature by offering a more holistic perspective on the challenges faced by AI-powered systems, beyond the critical challenges of fairness, transparency, and responsibility noted by the literature

    Trade-offs between Monetary Gain and Risk Taking in Cybersecurity Behavior

    Get PDF
    Cyber-attack and privacy threats are very common on the Internet. Mainstream browsers like Google Chrome, Safari, and Firefox provide different types of warning systems when users are at risk of facing cyber security threats. Users are expected to assess cybersecurity risks and make rational decisions when they are conducting online transactions, accessing URLs, and downloading files from the Internet. However, as the “weakest link in the security chain” (Sasse et al., p. 122), people sometimes fail to detect threats. Previous research has explored the effectiveness of physical and structural cues and miscues (Darwish and Bataineh, 2012; Smith et al., 2016). They focused on Internet users’ ability to notice and interpret cues and miscues which are embedded in webpages or emails. Researchers have also looked at the impact of human factors on users’ ability to recognize fraudulent messages. They found that gender differences, human cognitive limitations, and individual differences affect our susceptibility to phishing and cyber-attacks (Dhamija et al., 2006; Downs et al., 2006). Although awareness and vigilance of cyber threats among Internet users has increased, hackers and phishers have become more sophisticated and are able better able to fabricate content. As a result, some phishing websites can easily evade filters (Dong et al., 2010). Phishers and hackers also exploit users’ susceptibility to deception by providing incentives such as monetary gains or rewards. Wright et al. (2014) found that phishers framed their phishing messages as gains or benefits to induce users’ vigilance. However, few studies have taken risks into consideration in examining how Internet users make trade-off decisions between the offered rewards and the risks involved. Therefore, this research is expected to fill an important gap in the literature by quantifying users’ perceived risks of cyber security threats

    Effect of Attapulgite Nanorods and Calcium Sulfate Microwhiskers on the Reaction-Induced Phase Separation of Epoxy/PES Blends

    Get PDF
    The influence of two kinds of mesoscale inorganic rod fillers, nanoscale attapulgite and micron-sized CaSO4 whisker, on the reaction-induced phase separation of epoxy/aromatic amine/poly- (ether sulfone) (PES) blends has been investigated by optical microscopy (OM), scanning electron microscopy (SEM), and time resolved light scattering (TRLS). By varying the PES concentration and curing temperature, we found that the incorporation of attapulgite and CaSO4 had dramatic impact on the phase separation process and the final phase morphology of blends. In blends at higher content than critical concentration, the process of phase separation was retarded by the incorporation of nanoscale fillers but accelerated by that of the micron-sized fillers, mainly due to the enhanced viscoelastic effect and the preferential wettable effect, respectively. Meanwhile both mesoscale fillers could change the cocontinuous phase structure of blends with lower PES content than critical concentration into PES-rich dispersed structure due to the surface affinity of fillers to epoxy matrix

    Karriere-Handbuch

    Get PDF
    We design and synthesize four fused-ring electron acceptors based on 6,6,12,12-tetrakis(4-hexylphenyl)- indacenobis(dithieno[3,2-b;2′,3′-d]thiophene) as the electron- rich unit and 1,1-dicyanomethylene-3-indanones with 0− 2 fluorine substituents as the electron-deficient units. These four molecules exhibit broad (550−850 nm) and strong absorption with high extinction coefficients of (2.1−2.5) × 105 M−1 cm−1. Fluorine substitution downshifts the LUMO energy level, red-shifts the absorption spectrum, and enhances electron mobility. The polymer solar cells based on the fluorinated electron acceptors exhibit power conversion efficiencies as high as 11.5%, much higher than that of their nonfluorinated counterpart (7.7%). We investigate the effects of the fluorine atom number and position on electronic properties, charge transport, film morphology, and photovoltaic properties
    • …
    corecore