by admin | Dec 15, 2020
Cyber security operators in the military and civilian sector face a lengthy repetitive work assignment with few critical signal occurrences under conditions in which they have little control over what transpires. In this sense, their task is similar to vigilance tasks...
by admin | Dec 15, 2020
The threat of drunk drivers on our nation’s highways has led to the proliferation of court-mandated ignition interlock devices (IIDs), which test the driver for alcohol consumption before ignition and during operation of the vehicle. Previous research has...
by admin | Dec 15, 2020
The IBM Academic Initiative Project is an online resource for educators to discover and download courserelated software. The present interface utilizes two systems for cataloging materials; the Repository acts as warehouse for thousands of pieces of available...
by admin | Dec 15, 2020
In evaluating Google Glass, our team created a novel dependent variable collection strategy in which time-synchronized devices reported time-stamps for each user action, permitting precise temporal targeting of events in a simulated driving task. This device...
by admin | Dec 15, 2020
Email-delivered cyber-attacks which penetrate first-line algorithmic defenses must then face a human operator’s decision: engage, or ‘reject and report’ the threat. Relatively little research exists into the factors that affect these outcomes, and what does is...