A long history of research has revealed many neurophysiological changes and concomitant behavioral impacts of sleep deprivation, sleep restriction, and circadian rhythms. Little research, however, has been conducted in the area of computational cognitive modeling to understand the information processing mechanisms through which neurobehavioral factors operate to produce degradations in human performance. Our approach to understanding this relationship is to link predictions of overall cognitive functioning, or alertness, from existing biomathematical models to information processing parameters in a cognitive architecture, leveraging the strengths from each to develop a more comprehensive explanation. The integration of these methodologies is used to account for changes in human performance on a sustained attention task across 88 h of total sleep deprivation. The integrated model captures changes due to time awake and circadian rhythms, and it also provides an account for underlying changes in the cognitive processes that give rise to those effects. The results show the potential for developing mechanistic accounts of how fatigue impacts cognition, and they illustrate the increased explanatory power that is possible by combining theoretical insights from multiple methodologies.
End users are typically seen as the weakest link in ensuring security and privacy in computing environments. Our own prior work suggested that end users may have difficulty differentiating between privacy/security problems and other hardware/software concerns. However, a survey of a broad group of internet users showed that, in fact, these users believe that they can not only differentiate between these two sets of concerns, but that in fact users are more concerned with security/privacy concerns than they are with other types of computer problems.
The goal of the research study reported here was to investigate policy authors' ability to take descriptions of changes to policy situations and author high-quality, complete policy rules that would parse with high accuracy. As a part of this research, we investigated ways in which we could assist policy authors in writing policies. This paper presents the results of a user study on the effectiveness of providing syntax highlighting in a natural language policy authoring interface. While subjects liked the new interface, they showed no improvement in accuracy when writing rules. We discuss our results in terms of a three phase authoring process that users move through when authoring or modifying policies. We describe this process, discuss why and how our interface failed to support it and make recommendations to designers on how to better support this process.
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This paper challenges this view as derogatory and unconstructive, arguing that users, as agents of organizations, often have sophisticated strategies regarding sensitive data, and are quite cautious. Existing work on user security practice has failed to consider how users view security; this paper provides content on and analysis of end user perspectives on security management. We suggest that properly designed systems would bridge the knowledge gap (where necessary) and mask levels of detail (where possible), allowing users to manage their security needs in synchrony with the needs of the organization. The evidence for our arguments comes from a set of in-depth interviews with users with no special training on, knowledge of, or interest in computer security. We conclude with guidelines for security and privacy tools that better leverage existing users knowledge.
Programming is a process of formalizing and codifying knowledge, and, as a result, programming languages are designed for generalists trained in this process of formalization. Artists, whose training focuses on skill and tacit knowledge, are marginalized by existing tools. By designing visual languages that take advantage of an artist's skills in visual perception and expression, we can allow that artist to take advantage of the expressive potential that modern computing offers. In particular, this paper will look at lighting design for interactive, virtual environments, and augmenting an existing programming language to allow artists to leverage their skills in the pragmatics of that medium.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.