Martha Crosby - Academia.edu (original) (raw)
Papers by Martha Crosby
Lecture Notes in Computer Science, 2014
Lecture Notes in Computer Science, 2018
While new generations of students tend to isolate themselves from the world by surrounding themse... more While new generations of students tend to isolate themselves from the world by surrounding themselves with electronics, companies demand that their employees be people-oriented with a high degree of social skills. In a world where the reliance on distance education further fosters isolation, Studio-Based Learning may be the tool to provide students with the much demanded 21st century skills.
Lecture Notes in Computer Science, 2019
The human factor is a key component of any computing network just as are other tools and devices ... more The human factor is a key component of any computing network just as are other tools and devices within it. At the same time, human emotion is highly responsive to the environment and this manifests in psychophysiological changes even when no physical reaction is observable. Therefore, a digital record of the state of body and mind can to one degree or another reflect the state of other components in a given network while the person is a part of it. Meanwhile, as the digital and physical worlds continue to converge cybersecurity is increasingly a day-to-day concern. Many crimes are now committed, mediated or witnessed through a digital device, and many operational artifacts of computing systems have later proved useful as evidence in digital investigations. Psychophysiological signals though unharnessed in this regard, could be a rich resource—in detecting occurrence, timing and duration of adverse incidents—owing to high human emotional responsiveness to the environment. Further, psychophysiological signals are hard to manipulate and so they are likely to provide a truer reflection of events. This is not only promising for investigations but as a potential feedback channel for monitoring safety and security in digital spaces, independent of human decision-making. This paper proceeds a dissertation study investigating psychophysiological signals for markers of digital incidents. Understanding and harnessing psychophysiological markers of digital incidents can enable designing of safer computing spaces through triggering appropriate controls to adaptively manage threats—such as cyberbullying and insiders threats.
International Conference on Human-Computer Interaction, 1997
Lecture Notes in Computer Science, 2018
Cybercrime investigation is reliant on availability of adequate and valid digital artifacts useab... more Cybercrime investigation is reliant on availability of adequate and valid digital artifacts useable for reconstructing security incidents or triangulating other available information to make it useful. Various operational artifacts of computer systems, networks and software have been studied and gradually applied as forensic evidence. However the scope of studies on human-generated artifacts as forensic evidence has been limited mostly focusing on surveillance images, with DNA deposits being widely studied via older forensic fields. We present the case that further focus on human-centric evidence in form of physiological measurements is useful in triangulating other evidence as well as in making some direct inferences. In this concept paper: we pair electroencephalography (EEG) with change point detection algorithms to conceptually model the acquisition and processing of EEG signals into forensic artifacts; propose continuous data reduction and packaging to keep the system forensic-ready; suggest a schema for validating such artifacts towards their applicability as forensic evidence; and model a study to be used in testing the conceptual model. This work contributes to cybersecurity research by highlighting human-generated artifacts as a forensic big data resource and presenting a methodology for harnessing the data to turn it into useful information.
Lecture Notes in Computer Science, 2018
Individual security behavior plays a central role in achieving secure computing. However, secure ... more Individual security behavior plays a central role in achieving secure computing. However, secure usage is difficult to guarantee in an open-ended context where different users have different perceptions of security as well as different cognitive loads when using security tools. In designing secure systems, it is not only necessary to define secure behavior but also to provide built-in support for such behavior in order to enable users to be complaint. In this work, we explore the viability of augmented cognition as a modality that can be used to support security-oriented behavior in authentication systems. Specifically, we explore how transformations of password character properties such as font and weight can improve password recall and recognition and reduce insecure habits, such as writing down passwords. In a previous study, we tested the accuracy of recall and recognition in an augmented password system. The system was designed to make use of character property transformations to minimize the need for complex passwords while not compromising security. Here we repeat the study, incorporating the use of neurophysiological measures to study human physiological responses during recognition and recall of character sets with different types of transformation. The results suggest that cognitive effort in recall of complex passwords can be alleviated with the performance of the augmented password task. This finding has important implications for future research.
Proceedings of the Human Factors and Ergonomics Society ... Annual Meeting, Oct 1, 1995
This paper describes an experiment in reading graphic data models which differ in graphic style. ... more This paper describes an experiment in reading graphic data models which differ in graphic style. Computer science students participated in an experiment to determine if graphic style influences data model comprehension. Models with embedded graphic symbols, graphically separated symbols, or list structures were used. Protocol data, which consisted of verbal reports and eye-movements, was collected. Detailed analysis of this data provided insight into how students viewed the four types of data models. Results from this study suggest that the graphic style of the model effects the ease with which they are read and understood.
Lecture Notes in Computer Science, 1995
... Icon rich model types, illustrated here by the NIAM model type, appear to make a model more d... more ... Icon rich model types, illustrated here by the NIAM model type, appear to make a model more difficult to interpret than models with fewer icon types supplemented by list ... 3. E1Masri,IL andSBNavathe, Fundamentals of Database Systems,2.ed. Benjamin Cummings 1994. ...
Augmented Cognition, 2021
Augmented Cognition, 2021
Authentication serves the gatekeeping function in computing systems. Methods used in authenticati... more Authentication serves the gatekeeping function in computing systems. Methods used in authentication fall into three major paradigms: ‘what you know’, ‘who you are’ and ‘what you have’ of which the first is still the most commonly applied in the form of passwords authentication. Recall and recognition are the cognitive functions central to the ‘what you know’ authentication paradigm. Studies have shown that more secure passwords are harder to recall and this often leads to habits that facilitate recollection at the expense of security. Combining the uniqueness of physiological measures, such as brainwave patterns, with memorable augmented passwords shows the promise of providing a secure and memorable authentication process. In this paper, we discuss authentication and related problems and considerations in literature. We then test a password system designed to make use of character property transformations such as color and font to minimize the need for complex passwords while not c...
Developmental Neuropsychology, Apr 24, 2008
Differences between the enumeration of very small (1-3) versus larger (4-6) numerosities were exa... more Differences between the enumeration of very small (1-3) versus larger (4-6) numerosities were examined by investigating where people fixate when they are enumerating different numbers of items. Overall, fixations were more likely to be located in regions of the array that contained target items when the array contained 4 or more targets than when it contained 3 or fewer, a result that is consistent with previous research indicating that the enumeration of very small sets is less dependent on attentional processing than is the enumeration of larger sets. However, both the pattern of fixations across different distractor conditions and an analysis of the temporal course of fixations in the absence of distractors were inconsistent with a dichotomous distinction between pre-attentive and attentional forms of enumeration. Rather, our results suggest that, irrespective of numerosity, enumeration entails some attentional processing of target items, but attentional processing plays a markedly greater role in the enumeration of 4 or more items than in the enumeration of 3 or fewer.
Proceedings of the Human Factors and Ergonomics Society ... Annual Meeting, Oct 1, 2003
The present research investigated how visual processing differs when individuals subitize versus ... more The present research investigated how visual processing differs when individuals subitize versus count. We obtained the negligible slopes characteristic of subitizing only in the conditions in which viewers were expected to subitize (scenes presented either without distractors or with only simple distractors). We observed non-linear viewing times. Differences in fixation patterns across scene types became greater as the number of target items increased, rather than vanishing for large numerosities as would be expected from the traditional view of subitizing. Inspection of patterns of fixation supported the idea that pre-attentive processes play a substantial role in processing when targets are few in number, easy to locate, and easy to discriminate from each other.
The Mind's Eye, 2003
Publisher Summary This chapter describes several studies that investigate the ways in which spati... more Publisher Summary This chapter describes several studies that investigate the ways in which spatial presentations of data can facilitate the process of integrating quantitative information. Linear representations are used in many computer interfaces. The scroll bar is an interesting example. The further the marker moves down the scroll bar, the further one's position is from the beginning of the document. The chapter explains that what is represented is not an absolute magnitude but a ratio—the ratio between the portion of a document that is above one's current position and the portion that is below it. Because users are not generally concerned with either the ratio properties of their document or those of the scroll bar, the fact that the information represented is fundamentally proportional has little impact on the effectiveness of the scroll bar display. However, people have a great deal of difficulty reasoning effectively about ratios and proportions when their properties are critical. Therefore, on many tasks, the format in which ratio information is conveyed may have an enormous impact on performance. Several researchers have investigated different aspects of the way people make proportion judgments. Schwartz and Moore, for instance, examined the assumption that rather than people first understanding a situation and then choosing computations to apply to the situation, mathematics can be a tool to help people construct an understanding of a situation.
Lecture Notes in Computer Science, 2014
Lecture Notes in Computer Science, 2018
While new generations of students tend to isolate themselves from the world by surrounding themse... more While new generations of students tend to isolate themselves from the world by surrounding themselves with electronics, companies demand that their employees be people-oriented with a high degree of social skills. In a world where the reliance on distance education further fosters isolation, Studio-Based Learning may be the tool to provide students with the much demanded 21st century skills.
Lecture Notes in Computer Science, 2019
The human factor is a key component of any computing network just as are other tools and devices ... more The human factor is a key component of any computing network just as are other tools and devices within it. At the same time, human emotion is highly responsive to the environment and this manifests in psychophysiological changes even when no physical reaction is observable. Therefore, a digital record of the state of body and mind can to one degree or another reflect the state of other components in a given network while the person is a part of it. Meanwhile, as the digital and physical worlds continue to converge cybersecurity is increasingly a day-to-day concern. Many crimes are now committed, mediated or witnessed through a digital device, and many operational artifacts of computing systems have later proved useful as evidence in digital investigations. Psychophysiological signals though unharnessed in this regard, could be a rich resource—in detecting occurrence, timing and duration of adverse incidents—owing to high human emotional responsiveness to the environment. Further, psychophysiological signals are hard to manipulate and so they are likely to provide a truer reflection of events. This is not only promising for investigations but as a potential feedback channel for monitoring safety and security in digital spaces, independent of human decision-making. This paper proceeds a dissertation study investigating psychophysiological signals for markers of digital incidents. Understanding and harnessing psychophysiological markers of digital incidents can enable designing of safer computing spaces through triggering appropriate controls to adaptively manage threats—such as cyberbullying and insiders threats.
International Conference on Human-Computer Interaction, 1997
Lecture Notes in Computer Science, 2018
Cybercrime investigation is reliant on availability of adequate and valid digital artifacts useab... more Cybercrime investigation is reliant on availability of adequate and valid digital artifacts useable for reconstructing security incidents or triangulating other available information to make it useful. Various operational artifacts of computer systems, networks and software have been studied and gradually applied as forensic evidence. However the scope of studies on human-generated artifacts as forensic evidence has been limited mostly focusing on surveillance images, with DNA deposits being widely studied via older forensic fields. We present the case that further focus on human-centric evidence in form of physiological measurements is useful in triangulating other evidence as well as in making some direct inferences. In this concept paper: we pair electroencephalography (EEG) with change point detection algorithms to conceptually model the acquisition and processing of EEG signals into forensic artifacts; propose continuous data reduction and packaging to keep the system forensic-ready; suggest a schema for validating such artifacts towards their applicability as forensic evidence; and model a study to be used in testing the conceptual model. This work contributes to cybersecurity research by highlighting human-generated artifacts as a forensic big data resource and presenting a methodology for harnessing the data to turn it into useful information.
Lecture Notes in Computer Science, 2018
Individual security behavior plays a central role in achieving secure computing. However, secure ... more Individual security behavior plays a central role in achieving secure computing. However, secure usage is difficult to guarantee in an open-ended context where different users have different perceptions of security as well as different cognitive loads when using security tools. In designing secure systems, it is not only necessary to define secure behavior but also to provide built-in support for such behavior in order to enable users to be complaint. In this work, we explore the viability of augmented cognition as a modality that can be used to support security-oriented behavior in authentication systems. Specifically, we explore how transformations of password character properties such as font and weight can improve password recall and recognition and reduce insecure habits, such as writing down passwords. In a previous study, we tested the accuracy of recall and recognition in an augmented password system. The system was designed to make use of character property transformations to minimize the need for complex passwords while not compromising security. Here we repeat the study, incorporating the use of neurophysiological measures to study human physiological responses during recognition and recall of character sets with different types of transformation. The results suggest that cognitive effort in recall of complex passwords can be alleviated with the performance of the augmented password task. This finding has important implications for future research.
Proceedings of the Human Factors and Ergonomics Society ... Annual Meeting, Oct 1, 1995
This paper describes an experiment in reading graphic data models which differ in graphic style. ... more This paper describes an experiment in reading graphic data models which differ in graphic style. Computer science students participated in an experiment to determine if graphic style influences data model comprehension. Models with embedded graphic symbols, graphically separated symbols, or list structures were used. Protocol data, which consisted of verbal reports and eye-movements, was collected. Detailed analysis of this data provided insight into how students viewed the four types of data models. Results from this study suggest that the graphic style of the model effects the ease with which they are read and understood.
Lecture Notes in Computer Science, 1995
... Icon rich model types, illustrated here by the NIAM model type, appear to make a model more d... more ... Icon rich model types, illustrated here by the NIAM model type, appear to make a model more difficult to interpret than models with fewer icon types supplemented by list ... 3. E1Masri,IL andSBNavathe, Fundamentals of Database Systems,2.ed. Benjamin Cummings 1994. ...
Augmented Cognition, 2021
Augmented Cognition, 2021
Authentication serves the gatekeeping function in computing systems. Methods used in authenticati... more Authentication serves the gatekeeping function in computing systems. Methods used in authentication fall into three major paradigms: ‘what you know’, ‘who you are’ and ‘what you have’ of which the first is still the most commonly applied in the form of passwords authentication. Recall and recognition are the cognitive functions central to the ‘what you know’ authentication paradigm. Studies have shown that more secure passwords are harder to recall and this often leads to habits that facilitate recollection at the expense of security. Combining the uniqueness of physiological measures, such as brainwave patterns, with memorable augmented passwords shows the promise of providing a secure and memorable authentication process. In this paper, we discuss authentication and related problems and considerations in literature. We then test a password system designed to make use of character property transformations such as color and font to minimize the need for complex passwords while not c...
Developmental Neuropsychology, Apr 24, 2008
Differences between the enumeration of very small (1-3) versus larger (4-6) numerosities were exa... more Differences between the enumeration of very small (1-3) versus larger (4-6) numerosities were examined by investigating where people fixate when they are enumerating different numbers of items. Overall, fixations were more likely to be located in regions of the array that contained target items when the array contained 4 or more targets than when it contained 3 or fewer, a result that is consistent with previous research indicating that the enumeration of very small sets is less dependent on attentional processing than is the enumeration of larger sets. However, both the pattern of fixations across different distractor conditions and an analysis of the temporal course of fixations in the absence of distractors were inconsistent with a dichotomous distinction between pre-attentive and attentional forms of enumeration. Rather, our results suggest that, irrespective of numerosity, enumeration entails some attentional processing of target items, but attentional processing plays a markedly greater role in the enumeration of 4 or more items than in the enumeration of 3 or fewer.
Proceedings of the Human Factors and Ergonomics Society ... Annual Meeting, Oct 1, 2003
The present research investigated how visual processing differs when individuals subitize versus ... more The present research investigated how visual processing differs when individuals subitize versus count. We obtained the negligible slopes characteristic of subitizing only in the conditions in which viewers were expected to subitize (scenes presented either without distractors or with only simple distractors). We observed non-linear viewing times. Differences in fixation patterns across scene types became greater as the number of target items increased, rather than vanishing for large numerosities as would be expected from the traditional view of subitizing. Inspection of patterns of fixation supported the idea that pre-attentive processes play a substantial role in processing when targets are few in number, easy to locate, and easy to discriminate from each other.
The Mind's Eye, 2003
Publisher Summary This chapter describes several studies that investigate the ways in which spati... more Publisher Summary This chapter describes several studies that investigate the ways in which spatial presentations of data can facilitate the process of integrating quantitative information. Linear representations are used in many computer interfaces. The scroll bar is an interesting example. The further the marker moves down the scroll bar, the further one's position is from the beginning of the document. The chapter explains that what is represented is not an absolute magnitude but a ratio—the ratio between the portion of a document that is above one's current position and the portion that is below it. Because users are not generally concerned with either the ratio properties of their document or those of the scroll bar, the fact that the information represented is fundamentally proportional has little impact on the effectiveness of the scroll bar display. However, people have a great deal of difficulty reasoning effectively about ratios and proportions when their properties are critical. Therefore, on many tasks, the format in which ratio information is conveyed may have an enormous impact on performance. Several researchers have investigated different aspects of the way people make proportion judgments. Schwartz and Moore, for instance, examined the assumption that rather than people first understanding a situation and then choosing computations to apply to the situation, mathematics can be a tool to help people construct an understanding of a situation.