@inproceedings{mcgough_mayhorn_2023, title={Exploring strategies to improve performance accuracy on vigilance-based tasks}, booktitle={Proceedings of the Human Factors and Ergonomics Society 67th Annual Meeting}, author={McGough, O. and Mayhorn, C.B.}, year={2023} } @article{goodman_mayhorn_2023, title={It's not what you say but how you say it: Examining the influence of perceived voice assistant gender and pitch on trust and reliance}, volume={106}, ISSN={0003-6870}, url={http://dx.doi.org/10.1016/j.apergo.2022.103864}, DOI={10.1016/j.apergo.2022.103864}, abstractNote={Voice assistants (VA) are virtual agents used to aid information seeking. Cues contained in speech, such as perceived gender and vocal pitch, may influence attitudes towards, and interactions with these agents. Given expansion of telehealth efforts and the potential for VA to advise patients on health-related topics outside of formal healthcare settings, the influence of VA vocal characteristics is examined in the context of medication instructions. Participants rated trust and reliance on VA after viewing medication labels and hearing recommendations from male and female agents with varying pitch. Results suggest agents perceived as female were rated as more trustworthy, while vocal pitch did not significantly influence trust. However, a trend of lower reliance with increasing pitch was observed. Additionally, participants relied significantly more on VA advice than medication labels when making decisions. Post-hoc analyses revealed trust and reliance primarily varied between participants. Pitch and gender explained only a small portion of within-participant variance. We found suggestive evidence for social categorizations distilled from vocal cues influencing interactions with agents delivering health-critical information. Future work should explore additional samples, vocal cues, and participant-level sources of variation.}, journal={Applied Ergonomics}, publisher={Elsevier BV}, author={Goodman, Kylie L. and Mayhorn, Christopher B.}, year={2023}, month={Jan}, pages={103864} } @article{clark_mayhorn_2022, title={Are Roundabouts Safer for Pedestrians?}, volume={66}, ISSN={2169-5067 1071-1813}, url={http://dx.doi.org/10.1177/1071181322661059}, DOI={10.1177/1071181322661059}, abstractNote={ Pedestrians continue to be killed and injured at the meeting points with motor vehicles. The current study explored how drivers managed the cognitive load of negotiating roundabouts. One hundred fifty-five undergraduates at a large university in the southeastern United States were recruited. Participants were given some training on driving rules concerning roundabouts and were then presented with a 25 question, multiple-choice test that served as a check on learning. The participants who passed the learning check were then presented with 80 visual stimuli of driving situations commonly encountered at roundabouts. The stimuli were presented in Qualtrics as seven traffic situations that were randomized. Results supported the hypothesis that pedestrians are not noticed at roundabouts a significant amount of time making the pedestrian/automobile interaction at roundabouts a safety hazard. Participants failed to notice pedestrians most often in roundabout entering vignettes but also failed to notice pedestrians in roundabout exiting vignettes. Results suggest participants did not notice pedestrians attempting to cross the street in crosswalks at roundabouts. Additional research is needed to study how to increase visibility of pedestrian crossing in roundabouts. The findings of this study will raise awareness of the increased need for pedestrian safety measures at roundabouts. }, number={1}, journal={Proceedings of the Human Factors and Ergonomics Society Annual Meeting}, publisher={SAGE Publications}, author={Clark, Ralph O and Mayhorn, Christopher B.}, year={2022}, month={Sep}, pages={1746–1750} } @inproceedings{mcgough_mayhorn_2022, title={Cognitive factors influencing sustained attention in a college sample}, booktitle={Proceedings of the Human Factors and Ergonomics Society 66th Annual Meeting}, author={McGough, O. and Mayhorn, C.B.}, year={2022} } @misc{masot_cox_mold_sund-levander_tingstrom_christelle boersema_botigue_daltrey_hughes_mayhorn_et al._2022, title={Decision support-tools for early detection of infection in older people (aged> 65 years): a scoping review}, volume={22}, ISSN={["1471-2318"]}, DOI={10.1186/s12877-022-03218-w}, abstractNote={Abstract}, number={1}, journal={BMC GERIATRICS}, author={Masot, Olga and Cox, Anna and Mold, Freda and Sund-Levander, Martha and Tingstrom, Pia and Christelle Boersema, Geertien and Botigue, Teresa and Daltrey, Julie and Hughes, Karen and Mayhorn, Christopher B. and et al.}, year={2022}, month={Jul} } @article{wilson_mayhorn_2022, title={Examination of Within-Headset Sports Media Experiences}, volume={66}, ISSN={2169-5067 1071-1813}, url={http://dx.doi.org/10.1177/1071181322661085}, DOI={10.1177/1071181322661085}, abstractNote={ With the many varied options for media presentation available within virtual reality devices today, it is important to start comparing these different formats to determine how different they are from each other. This project examined the differences between 180-Degree and 2D presentations of sports media within virtual reality headsets (HMD). Additionally, it also examined how much including individual differences helped explain participant experiences of presence, suspense, and enjoyment. Participants were asked to watch a piece of sports media footage presented either in 180-Degree or 2D formats within their own headset and then complete surveys on presence, suspense, enjoyment, team disposition, and fanship post-watching the video clip. This data was analyzed using a MANOVA and hierarchical linear regression. Results showed that there were no differences between the two types of media presentation, but fanship did help to understand more of the variance within participants’ enjoyment. }, number={1}, journal={Proceedings of the Human Factors and Ergonomics Society Annual Meeting}, publisher={SAGE Publications}, author={Wilson, Ragan and Mayhorn, Christopher B.}, year={2022}, month={Sep}, pages={1952–1956} } @article{wilson_ferreri_mayhorn_2022, title={Game On}, DOI={10.1201/9780429343513-12}, abstractNote={Accessibility in digital games is established to remove barriers that cause exclusion of the target audience. It has the objective to provide an equivalent user-experience (UX). The general objective of this article is to analyze how accessibility features, linked to hearing in digital games, are related to the principles of the Universal Design and Jakob Nielsen’s usability heuristics in order to provide deaf players a good user-experience. As a hypothesis, this analysis makes it possible to notice the strengths that the digital games industry has developed in this area and it will be possible to identify gaps to be explored. As for the methodology, a cross will be made between the found accessibility features and principles of accessibility and usability. It was found that the games industry has invested a lot in resources related to a few principles of Universal Design, while it does not worry about developing functionalities related to another range of principles, which are equally important. It is possible to conclude that this work has potential for future studies, and it opens space for the discussion about inclusion in digital games.}, journal={Handbook of Usability and User Experience}, publisher={CRC Press}, author={Wilson, Ragan and Ferreri, Nina and Mayhorn, Christopher B.}, year={2022}, month={Apr}, pages={157–170} } @article{ferrell_crowson_mayhorn_2022, title={How We Perceive and Trust Advice from Virtual Humans: The Influence of Voice Quality}, volume={66}, ISSN={2169-5067 1071-1813}, url={http://dx.doi.org/10.1177/1071181322661440}, DOI={10.1177/1071181322661440}, abstractNote={ Due to the increase in virtual humans as a pedagogical agent, this study investigates how perceptions of virtual humans are affected by voice quality in understanding a budgeting scenario where trust is essential to learning and application. Eighty-six participants were randomly assigned to three conditions where voice quality for a virtual human varied (human voice, low quality text-to-speech, high quality text-to-speech) when narrating a financial literacy course. Measures of trust and course comprehension were collected. Results of the learning assessment suggest no difference in comprehension based on voice quality of a virtual human. No differences were observed between the voice quality groups in participants' perception of trust, the abilities to facilitate learning, credibility of the agent, human-likeness of the agent, or how engaging the agent was. This is possibly due to the lower age demographic who have become increasingly exposed to virtual human voices through popular platforms such as Tik-Tok.). }, number={1}, journal={Proceedings of the Human Factors and Ergonomics Society Annual Meeting}, publisher={SAGE Publications}, author={Ferrell, Tara and Crowson, Aaron and Mayhorn, Christopher}, year={2022}, month={Sep}, pages={1189–1193} } @article{ferreri_mayhorn_2022, title={Identifying and understanding individual differences in frustration with technology}, volume={7}, ISSN={["1464-536X"]}, DOI={10.1080/1463922X.2022.2095458}, abstractNote={Abstract Individual differences in user responses to malfunctions with technology are of primary interest, as this influences how a product can be improved and has not been examined extensively. Previously, individual differences in responses to technology failures have been examined in self-reported studies, but not in an experimental design. The current study expanded the findings from previous research with a mixed factorial design. Seventy-two (N = 72) undergraduate students were recruited to participate in this online study. They were asked to complete a shopping task and complete a survey about their experience. To examine individual differences in responses to technology failures, several repeated measures ANOVAs, multiple regressions, and hierarchical regressions were conducted to assess the effects of expectation and malfunction on frustration and performance. Results revealed individuals with a greater tendency to be neurotic or extraverted also tended to be more frustrated by a technology malfunction. Additionally, openness was the strongest predictor of less frustration with technology failures, while extraversion was the strongest predictor of more frustration with technology failures.}, journal={THEORETICAL ISSUES IN ERGONOMICS SCIENCE}, publisher={Informa UK Limited}, author={Ferreri, Nina R. and Mayhorn, Christopher B.}, year={2022}, month={Jun} } @inproceedings{watson_mayhorn_2022, title={Impact of fear vs. reward-oriented social media information on Covid-19 vaccine decision-making behavior}, booktitle={Proceedings of the Human Factors and Ergonomics Society 66th Annual Meeting}, author={Watson, A. and Mayhorn, C.B.}, year={2022} } @article{spain_bailey_goldberg_sail_carmody_ficke_bayro_jeong_kim_hong yeo_et al._2022, title={Me and My VE 2022: Human Factors Applications Using Virtual Reality, Mixed Reality, and Virtual Environments}, volume={66}, ISSN={2169-5067 1071-1813}, url={http://dx.doi.org/10.1177/1071181322661001}, DOI={10.1177/1071181322661001}, abstractNote={ This abstract is a companion piece to the ninth iteration of the “Me and My VE” interactive session. The purpose of this alternative format session is to allow human factors researchers to demonstrate how they use virtual reality, mixed reality, and virtual environments to support end-user research. The session begins with each presenter providing a brief introduction of their virtual reality, mixed reality, or virtual environment application. After this introduction, attendees engage with the presenters and their virtual environments in an interactive demonstration period. This year’s demonstrations include applications ranging from designing virtual environments for accessibility to using virtual and extended reality to support medical and aviation training, content validation, and human-computer interaction studies. The goal of the session is to allow attendees to experience how human factors professionals use virtual environments to support human factors-oriented research and to learn about the exciting work being conducted in this field. }, number={1}, journal={Proceedings of the Human Factors and Ergonomics Society Annual Meeting}, publisher={SAGE Publications}, author={Spain, Randall and Bailey, Shannon K.T. and Goldberg, Benjamin and Sail, Robert and Carmody, Kendall and Ficke, Cherrise and Bayro, Allison and Jeong, Heejin and Kim, Jihoon and Hong Yeo, W. and et al.}, year={2022}, month={Sep}, pages={2188–2192} } @article{ferreri_mayhorn_2021, title={Individual Differences in Frustration and Performance with Online Shopping Activities}, volume={65}, ISSN={2169-5067 1071-1813}, url={http://dx.doi.org/10.1177/1071181321651054}, DOI={10.1177/1071181321651054}, abstractNote={ Individual differences in user responses and interactions with technology are important to consider when examining frustration and expectations for technology performance. This research expanded on Ferreri and Mayhorn (2021) and Hadlington and Scase (2018) by examining individual differences in responses to failures in digital technology (RFDT) when exposed to a malfunction (present vs. absent) and given an expectation (no vs. low vs. high) about the technology capabilities. A preliminary sample of 30 undergraduate students was obtained to complete an online shopping task. Following the task, participants reported the items they were asked to purchase, as well as their responses to failures in digital technology, technology acceptance attitudes, personality dimensions, and current mood (pre vs. post). Several correlations revealed consistent findings with previous research and indicate potentially significant findings with the full dataset. It is anticipated that those with low expectation and scoring high in neuroticism will report the most frustration. }, number={1}, journal={Proceedings of the Human Factors and Ergonomics Society Annual Meeting}, publisher={SAGE Publications}, author={Ferreri, Nina and Mayhorn, Christopher B.}, year={2021}, month={Sep}, pages={148–153} } @article{goodman_mayhorn_2021, title={Pitch Perfect: Influence of Perceived Voice Agent Gender and Vocal Pitch on Trust and Reliance}, volume={65}, ISSN={2169-5067 1071-1813}, url={http://dx.doi.org/10.1177/1071181321651126}, DOI={10.1177/1071181321651126}, number={1}, journal={Proceedings of the Human Factors and Ergonomics Society Annual Meeting}, publisher={SAGE Publications}, author={Goodman, Kylie L. and Mayhorn, Christopher B.}, year={2021}, month={Sep}, pages={1529–1530} } @article{ferreri_mayhorn_2021, title={That's Not What We Expected: Examining Technology Expectations and Malfunctions on Frustration}, volume={4}, ISSN={["2169-5083"]}, DOI={10.1177/10648046211007709}, abstractNote={ Technology malfunctions and expectations for technology performance influence user attitudes and behaviors regarding that technology. An empirical study explored how these factors interact to influence attitudes and performance on a task when exposed to a malfunction and certain expectations for technology performance. Unlike previous research, an interaction was found between malfunction and expectation such that individuals exposed to a malfunction with high expectations were more likely to complain about the incident to the responsible company. This is especially informative for industry customer service as it informs why users complain and what product features should be addressed to remedy the issues. }, journal={ERGONOMICS IN DESIGN}, publisher={SAGE Publications}, author={Ferreri, Nina and Mayhorn, Christopher B.}, year={2021}, month={Apr} } @article{rachmatullah_mayhorn_wiebe_2021, title={The effects of prior experience and gender on middle school students? computer science learning and monitoring accuracy in the Use-Modify-Create progression}, volume={86}, ISSN={["1873-3425"]}, DOI={10.1016/j.lindif.2021.101983}, abstractNote={This study investigated middle school students' computer science (CS) learning and monitoring accuracy in the Use-Modify-Create (UMC) progression. This study also examined the effects of prior experience and gender on CS learning and monitoring accuracy measured with sensitivity (proportion of confidence in correct answers) and specificity (proportion of uncertainty in incorrect answers). A total of 255 middle school students participated in this study. A one-group pretest-posttest design was used, and the data were analyzed using multilevel modeling and repeated-measures correlation tests. The results show a non-significant interaction effect of prior experience and gender on students' CS learning and monitoring accuracy. We found that gender significantly interacted with students' CS learning and monitoring accuracy, primarily specificity. In particular, UMC progression was able to reduce the gender gap in CS performance, and improved male monitoring accuracy. The results also showed a significant positive correlation between students' CS performance and sensitivity, and negative correlation with specificity. We discuss the results around the potential advantage of using a UMC progression strategy to reduce gender gaps in CS education, as well as the extent to which UMC can facilitate better instructional environments for serving students with a range of prior experiences.}, journal={LEARNING AND INDIVIDUAL DIFFERENCES}, author={Rachmatullah, Arif and Mayhorn, Christopher B. and Wiebe, Eric N.}, year={2021}, month={Feb} } @article{wogalter_mayhorn_laughery_2021, title={WARNINGS AND HAZARD COMMUNICATIONS}, DOI={10.1002/9781119636113.ch24}, abstractNote={Warnings are safety communications used to inform people about hazards and to provide instructions to avoid or minimize undesirable consequences such as injury or death. Warnings are used in a variety of contexts to address environmental and product-related hazards. In the broad field of safety, particularly injury prevention, there is the concept of hazard control. Hazard control involves a set of methods that differ in reliability and effectiveness, and thus preference and priority, yielding a hierarchy of hazard control. The hazards could be those in the public environment, in over-the-counter products in a drugstore, or on a shelf of a hardware store. Warnings located close to the hazard both physically and in time will increase the likelihood of attention switch. Auditory warnings are frequently used to attract attention. Visual warnings formatted to be aesthetically pleasing are more likely to hold attention than a single chunk of very dense text.}, journal={HANDBOOK OF HUMAN FACTORS AND ERGONOMICS}, publisher={Wiley}, author={Wogalter, Michael S. and Mayhorn, Christopher B. and Laughery, Kenneth R.}, year={2021}, month={Aug}, pages={644–667} } @article{lawson_pearson_crowson_mayhorn_2020, title={Email phishing and signal detection: How persuasion principles and personality influence response patterns and accuracy}, volume={86}, ISSN={["1872-9126"]}, DOI={10.1016/j.apergo.2020.103084}, abstractNote={Phishing is a social engineering tactic where a malicious actor impersonates a trustworthy third party with the intention of tricking the user into divulging sensitive information. Previous social engineering research in a real-world setting has shown an interaction between the personality of the target and the persuasion principle used. This study investigated whether this interaction is present in the realm of email phishing. Additionally, a signal detection theory framework was used to evaluate how the various persuasion principles influence accuracy, sensitivity (d’), and response criterion placement. A personality inventory and an email identification task (phishing or legitimate) were used. These data support previous findings that high extroversion is predictive of increased susceptibility to phishing attacks. The various persuasions principles elicited diverse response criterions and sensitivities, though all investigated persuasion principles resulted in a liberal decision criterion, except one. These findings are interpreted and discussed.}, journal={APPLIED ERGONOMICS}, publisher={Elsevier BV}, author={Lawson, Patrick and Pearson, Carl J. and Crowson, Aaron and Mayhorn, Christopher B.}, year={2020}, month={Jul} } @article{ferreri_mayhorn_2020, title={Examining frustration and performance when priming user expectations and providing a technology malfunction}, volume={64}, ISSN={2169-5067 1071-1813}, url={http://dx.doi.org/10.1177/1071181320641444}, DOI={10.1177/1071181320641444}, abstractNote={ As digital technology develops, users create expectations for performance that may be violated when malfunctions occur. This project examined how priming expectations of technology performance (high v. low v. no) and experiences of technology malfunction (present v. not present) can influence feelings of frustration and performance on a task. A preliminary sample of 42 undergraduate participants completed a QR code scavenger hunt using the augmented reality mobile app, ARIS. Following the task, participants reported what they found for each scavenger hunt clue, their responses to failures in digital technology, and technology acceptance attitudes. Several factorial ANOVAs revealed a main effect for expectation on adaptive items of the RFDT scale and a main effect for malfunction on performance level. This suggests a potential contradiction between attitudes and behaviors when considering a common scenario involving technology. }, number={1}, journal={Proceedings of the Human Factors and Ergonomics Society Annual Meeting}, publisher={SAGE Publications}, author={Ferreri, Nina and Mayhorn, Christopher B.}, year={2020}, month={Dec}, pages={1846–1850} } @article{mayhorn_wogalter_2020, title={Forensic human factors and ergonomics: theory in practice}, volume={21}, ISSN={["1464-536X"]}, DOI={10.1080/1463922X.2020.1731860}, abstractNote={ABSTRACT This lead article of the special issue on Forensic Human Factors and Ergonomics (guest edited by Michael S. Wogalter and Christopher B Mayhorn) introduces the readership to the topic then describes the five articles included.}, number={3}, journal={THEORETICAL ISSUES IN ERGONOMICS SCIENCE}, publisher={Informa UK Limited}, author={Mayhorn, Christopher B. and Wogalter, Michael S.}, year={2020}, month={May}, pages={259–265} } @article{litaker_mayhorn_2020, title={Influences of Stress on Interactions with Decision Support}, volume={64}, ISSN={2169-5067 1071-1813}, url={http://dx.doi.org/10.1177/1071181320641454}, DOI={10.1177/1071181320641454}, abstractNote={ People regularly interact with automation to make decisions. Research shows that reliance on recommendations can depend on user trust in the decision support system (DSS), the source of information (i.e. human or automation), and situational stress. This study explored how information source and stress affect trust and reliance on a DSS used in a baggage scanning task. A preliminary sample of sixty-one participants were given descriptions for a DSS and reported trust before and after interaction. The DSS gave explicit recommendations when activated and participants could choose to rely or reject the choice. Results revealed a bias towards self-reliance and a negative influence of stress on trust, particularly for participants receiving help from automation. Controlling for perceived reliability may have eliminated trust biases prior to interaction, while stress may have influenced trust during the task. Future research should address potential differences in task motivation and include physiological measures of stress. }, number={1}, journal={Proceedings of the Human Factors and Ergonomics Society Annual Meeting}, publisher={SAGE Publications}, author={Litaker, Kylie and Mayhorn, Christopher B.}, year={2020}, month={Dec}, pages={1886–1890} } @article{wilson_mayhorn_2020, title={On The Field: Examining Differences in Video Format in Sports Media Viewing}, volume={64}, ISSN={2169-5067 1071-1813}, url={http://dx.doi.org/10.1177/1071181320641181}, DOI={10.1177/1071181320641181}, abstractNote={ With virtual reality’s emerging popularity and the subsequent push for more sports media experiences, there is a need to evaluate virtual reality’s use into more video watching experiences. This research explores differences in experiences between Monitor (2D) video and HMD (360-Degree) video footage by measuring user perceptions of presence, suspense, and enjoyment. Furthermore, this study examines the relationship between presence, game attractiveness, suspense, and enjoyment as explored by Kim, Cheong, and Kim (2016). Differences were assessed via a MANOVA examining specifically presence, suspense, and enjoyment while the relationships were explored via a confirmatory factor analysis. Results suggest that there was a difference between Monitor (2D) video and HMD (360-Degree) in regard to spatial presence, engagement, suspense, and enjoyment, but the previous model from Kim et al. (2016) was not a good fit to this study’s data. }, number={1}, journal={Proceedings of the Human Factors and Ergonomics Society Annual Meeting}, publisher={SAGE Publications}, author={Wilson, Ragan and Mayhorn, Christopher B.}, year={2020}, month={Dec}, pages={781–785} } @article{crowson_pugh_wilkinson_mayhorn_2020, title={Who is in the Room? Notification for Intrusions While in Virtual Reality}, volume={64}, ISSN={2169-5067 1071-1813}, url={http://dx.doi.org/10.1177/1071181320641118}, DOI={10.1177/1071181320641118}, abstractNote={ The development of head-mounted display virtual reality systems (e.g., Oculus Rift, HTC Vive) has resulted in an increasing need to represent the physical world while immersed in the virtual. Current research has focused on representing static objects in the physical room, but there has been little research into notifying VR users of changes in the environment. This study investigates how different sensory modalities affect noticeability and comprehension of notifications designed to alert head-mounted display users when a person enters his/her area of use. In addition, this study investigates how the use of an orientation type notification aids in perception of alerts that manifest outside a virtual reality users’ visual field. Results of a survey indicated that participants perceived the auditory modality as more effective regardless of notification type. An experiment corroborated these findings for the person notifications; however, the visual modality was in practice more effective for orientation notifications. }, number={1}, journal={Proceedings of the Human Factors and Ergonomics Society Annual Meeting}, publisher={SAGE Publications}, author={Crowson, Aaron and Pugh, Zachary H. and Wilkinson, Michael and Mayhorn, Christopher B.}, year={2020}, month={Dec}, pages={521–525} } @article{lawson_crowson_mayhorn_2019, title={Baiting the Hook: Exploring the Interaction of Personality and Persuasion Tactics in Email Phishing Attacks}, volume={822}, ISBN={["978-3-319-96076-0"]}, ISSN={["2194-5365"]}, DOI={10.1007/978-3-319-96077-7_42}, abstractNote={Phishing is a social engineering tactic where a malicious actor impersonates a trustworthy third party with the intention of tricking the user into divulging sensitive information. Previous social engineering research has shown an interaction between personality and the persuasion principle used to generate non-electronic messages. This study investigates whether this interaction is present in the realm of email phishing. To investigate this, we used a personality inventory and an email identification task (phishing or legitimate). Our data confirms previous findings that high extroversion is predictive of increased susceptibility to phishing attacks. However, extraversion was also found to be associated with increased susceptibility to phishing emails that utilize specific persuasion principles such as liking. Findings are discussed in terms of potential approaches to anti-phishing interventions within organizations.}, journal={PROCEEDINGS OF THE 20TH CONGRESS OF THE INTERNATIONAL ERGONOMICS ASSOCIATION (IEA 2018), VOL V: HUMAN SIMULATION AND VIRTUAL ENVIRONMENTS, WORK WITH COMPUTING SYSTEMS (WWCS), PROCESS CONTROL}, author={Lawson, Patrick A. and Crowson, Aaron D. and Mayhorn, Christopher B.}, year={2019}, pages={401–406} } @article{wilson_mayhorn_2019, title={Examining the Role of Video in Sports Media Viewing}, volume={63}, ISSN={2169-5067 1071-1813}, url={http://dx.doi.org/10.1177/1071181319631424}, DOI={10.1177/1071181319631424}, abstractNote={ As virtual reality becomes more prevalent in society, there has been a renewed focus on developing experiences for consumers to enjoy (Hartl and Berger, 2017). The current research project explores the relationship between presence, game attractiveness, suspense, and enjoyment in watching mediated sports content and exploring the differences between these constructs in 2D presentation versus 360 video presentation. Participants were asked to provide demographic information, watch a video presented either on a traditional monitor screen or in 360-degree video on the Oculus Rift and then complete surveys to assess their experience watching the clip. This data will be analyzed via confirmatory factor analysis to determine if presence, game attractiveness, suspense, and enjoyment are linked. Furthermore, 2D and 360 video conditions were also compared through MANOVA to determine if there are differences between conditions in regard to presence, suspense, and enjoyment. }, number={1}, journal={Proceedings of the Human Factors and Ergonomics Society Annual Meeting}, publisher={SAGE Publications}, author={Wilson, Ragan and Mayhorn, Christopher B.}, year={2019}, month={Nov}, pages={1978–1982} } @inproceedings{mayhorn_2019, title={Personality and persuasion tactics: Exploring vulnerability to email phishing attacks}, booktitle={Proceedings of 14th Ergonomics Society of South Africa Conference}, author={Mayhorn, C.B.}, year={2019} } @article{wilkinson_pugh_crowson_feng_mayhorn_gillan_2019, title={Seeing in Slow Motion: Manipulating Arousal in Virtual Reality}, volume={63}, ISSN={2169-5067 1071-1813}, url={http://dx.doi.org/10.1177/1071181319631512}, DOI={10.1177/1071181319631512}, abstractNote={ The only evidence that seeing in slow-motion exists comes from retrospective interviews. An ongoing debate is whether this phenomenon exists as a figment of memory or a true function of visual perception. Testing these speculations is difficult given slow-motion experience is often associated with intense, stressful, and even threatening situations that dramatically heighten arousal. Virtual reality systems might provide an opportunity to study the experience online, thus offering insights into the speculated mechanisms. This study explores the feasibility to induce heightened arousal and its possible implications on perceptual encoding of information. Participants were exposed to various situations designed to influence arousal as measured by heart rate, and an implicit memory task was used for each situation to test perceptual processing. This study did not reveal performance gains associated with increased physiological arousal. }, number={1}, journal={Proceedings of the Human Factors and Ergonomics Society Annual Meeting}, publisher={SAGE Publications}, author={Wilkinson, Michael and Pugh, Zachary H. and Crowson, Aaron and Feng, Jing and Mayhorn, Christopher B. and Gillan, Douglas J.}, year={2019}, month={Nov}, pages={1649–1653} } @article{pearson_mayhorn_2019, title={Who Should I Trust (Human vs. Automation)? The Effects of Pedigree in a Dual Advisor Context}, volume={822}, ISBN={["978-3-319-96076-0"]}, ISSN={["2194-5365"]}, DOI={10.1007/978-3-319-96077-7_2}, abstractNote={Source type bias (human vs automation) may influence the development of trust in decision aids. Situations involving two decision-aids may depend on the influence of pedigree (perceived expertise) such that decision making or reliance behavior is affected. In this task, the Convoy Leader decision-making paradigm developed by Lyons and Stokes (2012) was adapted to address advisor pedigree such that the human and automated information sources could be of high or low pedigree. Two hundred participants were asked to make eight decisions regarding the route taken by a military convoy based on intelligence (e.g., past insurgent attacks, Improvised Explosive Devices (IEDs) detected, etc.) provided by two information sources (human and automation) of varying degrees of pedigree. In two of these eight decisions, the decision-aids provided conflicting information. Results indicated that participants were likely to demonstrate a bias such that they were more likely to trust the information coming from the human advisor regardless of pedigree. This bias towards the human was only reversed when the automated decision aid was presented as having far greater pedigree. Measures of trust attitudes were highly indicative of decision making behaviors. The findings are addressed in terms of design within a dual-advisor context where human operators may receive conflicting information from advisors of different source types.}, journal={PROCEEDINGS OF THE 20TH CONGRESS OF THE INTERNATIONAL ERGONOMICS ASSOCIATION (IEA 2018), VOL V: HUMAN SIMULATION AND VIRTUAL ENVIRONMENTS, WORK WITH COMPUTING SYSTEMS (WWCS), PROCESS CONTROL}, author={Pearson, Carl J. and Mayhorn, Christopher B.}, year={2019}, pages={10–17} } @article{pearson_geden_mayhorn_2019, title={Who's the real expert here? Pedigree's unique bias on trust between human and automated advisers}, volume={81}, ISSN={["1872-9126"]}, DOI={10.1016/j.apergo.2019.102907}, abstractNote={We assessed the effects of source type bias (human or automation) on adviser trust in a dual adviser decision-making task.Source type and reliability's effects on adviser trust have been studied in a dual-adviser context, but the influence of pedigree (perceived expertise) across source types lacked robust investigation. As situations with two decision-aids of uneven pedigree can easily arise, it is critical to understand how operators are biased towards a decision-aid of a certain source type and pedigree.A decision-making task similar to the paradigm of Convoy Leader (Lyons and Stokes, 2012) was given to participants, where a military convoy route had to be selected in the presence of IEDs and insurgent activity. We measured behavioral reliance and trust attitudes. Pedigree was manipulated via controlled adviser descriptions, in a manner consistent with past investigations (Madhavan and Wiegmann, 2007a).We found a trust bias towards the human adviser, reversed only when there is a far greater pedigree in the automated adviser. Trust attitudes were also strongly indicative of reliance behaviors.Pedigree is a strong influencer of trust in a decision-aid and biased towards human advisers. Trust is highly predictive of reliance decisions.System designers must take care with how "expert" automation is portrayed, particularly if it is used in conjunction with other human advisers (e.g.: conflicting advice from air-traffic control and an onboard system).}, journal={APPLIED ERGONOMICS}, publisher={Elsevier BV}, author={Pearson, Carl J. and Geden, Michael and Mayhorn, Christopher B.}, year={2019}, month={Nov} } @misc{mayhorn_wogalter_2018, title={Case of the Baby Sitter with No Restraint}, url={http://dx.doi.org/10.1201/9780429462269-6}, DOI={10.1201/9780429462269-6}, journal={Forensic Human Factors and Ergonomics}, publisher={CRC Press}, author={Mayhorn, Christopher B. and Wogalter, Michael S.}, year={2018}, month={Sep}, pages={91–104} } @article{smith-jackson_bisantz_mayhorn_kleiner_babski-reeves_mcbride_2018, title={Embracing The Grind: Why We Chose Higher Education Administration; Maybe You Should Too}, volume={62}, ISSN={2169-5067 1071-1813}, url={http://dx.doi.org/10.1177/1541931218621080}, DOI={10.1177/1541931218621080}, abstractNote={ Newspapers, broadcast agencies, and social media outlets frequently feature stories about higher education administrators who are terminated, forced to resign, or otherwise removed from their posts. While the events are based in reality, many across the nation, especially the public, faculty and students, might develop a very negative view of what it means to be a leader in higher education administration. Yet, higher education administration could be one of the most rewarding and growth-contributing careers for many. This panel consists of faculty from various universities who made the selfless choice to serve in challenging administrative roles. They will share their experiences; good, bad, and in-between. Discussions will include lessons learned and how to prepare for these positions, with applications to those with academic experience and those who may come from government or industry occupations that afford a degree skills and knowledge transfer to academia. Information will be provided about work-life balance as well. }, number={1}, journal={Proceedings of the Human Factors and Ergonomics Society Annual Meeting}, publisher={SAGE Publications}, author={Smith-Jackson, Tonya and Bisantz, Ann and Mayhorn, Christopher B. and Kleiner, Brian M. and Babski-Reeves, Kari and McBride, Maranda}, year={2018}, month={Sep}, pages={346–348} } @article{wogalter_laughery_mayhorn_2018, title={Heavier Than Air}, DOI={10.1201/9780429462269-13}, abstractNote={During the course of the lawsuit's development stages, the plaintiff learned that Boysin manufactured and sold a nonflammable cement sealer product. The nonflammable product is called Boysin Hard Clear Water-Based sealer. Both products contain the same resin used to seal cement floors, and, according to the manufacturer and its representatives, the water-based product produces the same sealing performance as the solvent-based product. A fundamental principle of safety is that manufacturers should analyze their products to determine whether there are foreseeable hazards associated with their uses and misuses. When Mr. Tobosky purchased the Boysin Clear Volatile Organic Compound (VOC) product on May 18, 2010, the principal safety information he relied on was the label attached to the five-gallon container. The alternate warning addresses several of the shortcomings of the label on the Boysin Clear VOC product. While it is not comprehensive, it demonstrates what could be done fairly simply and quickly. It is more understandable than the original.}, journal={Forensic Human Factors and Ergonomics}, publisher={CRC Press}, author={Wogalter, Michael S. and Laughery, Kenneth R. and Mayhorn, Christopher B.}, year={2018}, month={Sep}, pages={197–213} } @article{zielinska_mayhorn_wogalter_2017, title={Connoted hazard and perceived importance of fluorescent, neon, and standard safety colors}, volume={65}, ISSN={["1872-9126"]}, DOI={10.1016/j.apergo.2017.07.011}, abstractNote={The perceived hazard and rated importance of standard safety, fluorescent, and neon colors are investigated.Colors are used in warnings to enhance hazard communication. Red has consistently been rated as the highest in perceived hazard. Orange, yellow, and black are the next highest in connoted hazard; however, there is discrepancy in their ordering. Safety standards, such as ANSI Z535.1, also list colors to convey important information, but little research has examined the perceived importance of colors. In addition to standard safety colors, fluorescent colors are more commonly used in warnings. Understanding hazard and importance perceptions of standard safety and fluorescent colors is necessary to create effective warnings.Ninety participants rated and ranked a total of 33 colors on both perceived hazard and perceived importance.Rated highest were the safety red colors from the American National Standard Institute (ANSI), International Organization for Standardization (ISO), and Federal Highway Administration (FHWA) together with three fluorescent colors (orange, yellow, and yellow-green) from 3 M on both dimensions. Rankings were similar to ratings except that fluorescent orange was the highest on perceived hazard, while fluorescent orange and safety red from the ANSI were ranked as the highest in perceived importance.Fluorescent colors convey hazard and importance levels as high as the standard safety red colors.Implications for conveying hazard and importance in warnings through color are discussed.}, journal={APPLIED ERGONOMICS}, publisher={Elsevier BV}, author={Zielinska, O. A. and Mayhorn, C. B. and Wogalter, M. S.}, year={2017}, month={Nov}, pages={326–334} } @article{mayhorn_wogalter_2017, title={Health-Related Warning Message Processing}, DOI={10.1093/acrefore/9780190228613.013.544}, abstractNote={Warnings are risk communication messages that can appear in a variety of situations within the healthcare context. Potential target audiences for warnings can be very diverse and may include health professionals such as physicians or nurses as well as members of the public. In general, warnings serve three distinct purposes. First, warnings are used to improve health and safety by reducing the likelihood of events that might result in personal injury, disease, death, or property damage. Second, they are used to communicate important safety-related information. In general, warnings likely to be effective should include a description of the hazard, instructions on how to avoid the hazard, and an indication of the severity of consequences that might occur as a result of not complying with the warning. Third, warnings are used to promote safe behavior and reduce unsafe behavior. Various regulatory agencies within the United States and around the globe may take an active role in determining the content and formatting of warnings.}, journal={Oxford Research Encyclopedia of Communication}, publisher={Oxford University Press}, author={Mayhorn, Christopher B. and Wogalter, Michael S.}, year={2017}, month={Jun} } @article{lawson_zielinska_pearson_mayhorn_2017, title={Interaction of Personality and Persuasion Tactics in Email Phishing Attacks}, volume={61}, ISSN={2169-5067 1071-1813}, url={http://dx.doi.org/10.1177/1541931213601815}, DOI={10.1177/1541931213601815}, abstractNote={ Phishing is a social engineering tactic where a malicious actor impersonates a trustworthy third party with the intention of tricking the user into divulging sensitive information. Previous social engineering research has shown an interaction between personality and the persuasion principle used. This study was conducted to investigate whether this interaction is present in the realm of email phishing. To investigate this, we used a personality inventory and an email identification task (phishing or legitimate). The emails used in the identification task utilize four of Cialdini’s persuasion principles. Our data confirms previous findings that high extroversion is predictive of increased susceptibility to phishing attacks. In addition, we identify multiple interactions between personality and specific persuasion principles. We also report the overarching efficacy of various persuasion principles on phishing email identification accuracy. }, number={1}, journal={Proceedings of the Human Factors and Ergonomics Society Annual Meeting}, publisher={SAGE Publications}, author={Lawson, Patrick and Zielinska, Olga and Pearson, Carl and Mayhorn, Christopher B.}, year={2017}, month={Sep}, pages={1331–1333} } @inproceedings{pearson_welk_mayhorn_2017, title={Leading the convoy: What happens when they know what they are doing?}, booktitle={Proceedings of HotSoS: Symposium and Bootcamp on the Science of Security}, author={Pearson, C. and Welk, A.K. and Mayhorn, C.B.}, year={2017} } @article{pearson_mayhorn_2017, title={The Effects of Pedigree and Source Type on Trust in a Dual Adviser Context}, volume={61}, ISSN={2169-5067 1071-1813}, url={http://dx.doi.org/10.1177/1541931213601561}, DOI={10.1177/1541931213601561}, abstractNote={ In a world with increasing ubiquity of automated decision aids, human decision makers often find themselves receiving input from automation and another human simultaneously. Previous research has shown how certain characteristics of a human or automated decision aid affect the development of trust. Little research has investigated how these factors of trust development are involved when more than one adviser is present. This study explored how pedigree (perceived expertise) and source type (human or automated) was related to trust and reliance in a decision-making task with conflicting information from two advisers. Results from this study indicate the pedigree is an influential factor across both human and automated decision aids. This study also found a relationship between trust attitudes and behavioral reliance. These findings are relevant for designing decision support systems that involve multiple advisers or for informing the effects of introducing decision aids in a manner with respect to decision aid pedigree. }, number={1}, journal={Proceedings of the Human Factors and Ergonomics Society Annual Meeting}, publisher={SAGE Publications}, author={Pearson, Carl J. and Mayhorn, Christopher B.}, year={2017}, month={Sep}, pages={319–323} } @inbook{mayhorn_wogalter_2017, place={New York, NY}, title={Using the Communication-Human Information Processing (C-HIP) model to map how users process health-related warnings}, booktitle={Encyclopedia of Health and Risk Message Design and Processing}, publisher={Oxford University Press}, author={Mayhorn, C.B. and Wogalter, M.S.}, editor={Parrott, R.Editor}, year={2017} } @inbook{wogalter_mayhorn_2017, place={New York, NY}, title={Warning design}, booktitle={Gower Handbook of Information Design}, publisher={Gower Publishing Ltd}, author={Wogalter, M.S. and Mayhorn, C.B.}, editor={Black, A. and Shepherd, B.Editors}, year={2017}, pages={331–348} } @article{zielinska_welk_mayhorn_murphy-hill_2016, title={A Temporal Analysis of Persuasion Principles in Phishing Emails}, volume={60}, ISSN={2169-5067 1071-1813}, url={http://dx.doi.org/10.1177/1541931213601175}, DOI={10.1177/1541931213601175}, abstractNote={ Eight hundred eighty-seven phishing emails from Arizona State University, Brown University, and Cornell University were assessed by two reviewers for Cialdini’s six principles of persuasion: authority, social proof, liking/similarity, commitment/consistency, scarcity, and reciprocation. A correlational analysis of email characteristics by year revealed that the persuasion principles of commitment/consistency and scarcity have increased over time, while the principles of reciprocation and social proof have decreased over time. Authority and liking/similarity revealed mixed results with certain characteristics increasing and others decreasing. Results from this study can inform user training of phishing emails and help cybersecurity software to become more effective. }, number={1}, journal={Proceedings of the Human Factors and Ergonomics Society Annual Meeting}, publisher={SAGE Publications}, author={Zielinska, Olga A. and Welk, Allaire K. and Mayhorn, Christopher B. and Murphy-Hill, Emerson}, year={2016}, month={Sep}, pages={765–769} } @inbook{mayhorn_rogers_echt_2016, place={New York, NY}, title={Designing Technology for Older Adults: Augmenting Usefulness and Usability via Cognitive Support}, url={http://dx.doi.org/10.1891/9780826128898.0019}, DOI={10.1891/9780826128898.0019}, booktitle={Gerontechnology: Research, Practice, and Principles in the Field of Technology and Aging}, publisher={Springer Publishing Company}, author={Mayhorn, Christopher B. and Rogers, Wendy A. and Echt, Katharina V.}, editor={Kwon, SunkyoEditor}, year={2016}, month={Aug} } @misc{pearson_welk_boettcher_mayer_streck_simons-rudolph_mayhorn_2016, title={Differences in trust between human and automated decision aids}, url={http://dx.doi.org/10.1145/2898375.2898385}, DOI={10.1145/2898375.2898385}, abstractNote={Humans can easily find themselves in high cost situations where they must choose between suggestions made by an automated decision aid and a conflicting human decision aid. Previous research indicates that humans often rely on automation or other humans, but not both simultaneously. Expanding on previous work conducted by Lyons and Stokes (2012), the current experiment measures how trust in automated or human decision aids differs along with perceived risk and workload. The simulated task required 126 participants to choose the safest route for a military convoy; they were presented with conflicting information from an automated tool and a human. Results demonstrated that as workload increased, trust in automation decreased. As the perceived risk increased, trust in the human decision aid increased. Individual differences in dispositional trust correlated with an increased trust in both decision aids. These findings can be used to inform training programs for operators who may receive information from human and automated sources. Examples of this context include: air traffic control, aviation, and signals intelligence.}, journal={Proceedings of the Symposium and Bootcamp on the Science of Security}, publisher={ACM}, author={Pearson, Carl J. and Welk, Allaire K. and Boettcher, William A. and Mayer, Roger C. and Streck, Sean and Simons-Rudolph, Joseph M. and Mayhorn, Christopher B.}, year={2016}, month={Apr} } @article{pearson_welk_mayhorn_2016, title={In Automation We Trust? Identifying Varying Levels of Trust in Human and Automated Information Sources}, volume={60}, ISSN={2169-5067 1071-1813}, url={http://dx.doi.org/10.1177/1541931213601045}, DOI={10.1177/1541931213601045}, abstractNote={ Humans can easily find themselves in high cost situations where they must choose between suggestions made by an automated decision aid and a conflicting human decision aid. Previous research indicates that trust is an antecedent to reliance, and often influences how individuals prioritize and integrate information presented from a human and/or automated information source. Expanding on previous work conducted by Lyons and Stokes (2012), the current experiment measured how trust in automated or human decision aids differs along with perceived risk and workload. The simulated task required 126 participants to choose the safest route for a military convoy; they were presented with conflicting information regarding which route was safest from an automated tool and a human. Results demonstrated that as workload increased, trust in automation decreased. As the perceived risk increased, trust in the human decision aid increased. Individual differences in dispositional trust correlated with an increased trust in both decision aids. These findings can be used to inform training programs and systems for operators who may receive information from human and automated sources. Examples of this context include: air traffic control, aviation, and signals intelligence. }, number={1}, journal={Proceedings of the Human Factors and Ergonomics Society Annual Meeting}, publisher={SAGE Publications}, author={Pearson, Carl J. and Welk, Allaire K. and Mayhorn, Christopher B.}, year={2016}, month={Sep}, pages={201–205} } @article{zielinska_welk_mayhorn_murphy-hill_2016, title={The persuasive phish}, DOI={10.1145/2898375.2898382}, abstractNote={Phishing is a social engineering tactic used to trick people into revealing personal information [Zielinska, Tembe, Hong, Ge, Murphy-Hill, & Mayhorn 2014]. As phishing emails continue to infiltrate users' mailboxes, what social engineering techniques are the phishers using to successfully persuade victims into releasing sensitive information? Cialdini's [2007] six principles of persuasion (authority, social proof, liking/similarity, commitment/consistency, scarcity, and reciprocation) have been linked to elements of phishing emails [Akbar 2014; Ferreira, & Lenzini 2015]; however, the findings have been conflicting. Authority and scarcity were found as the most common persuasion principles in 207 emails obtained from a Netherlands database [Akbar 2014], while liking/similarity was the most common principle in 52 personal emails available in Luxemborg and England [Ferreira et al. 2015]. The purpose of this study was to examine the persuasion principles present in emails available in the United States over a period of five years. Two reviewers assessed eight hundred eighty-seven phishing emails from Arizona State University, Brown University, and Cornell University for Cialdini's six principles of persuasion. Each email was evaluated using a questionnaire adapted from the Ferreira et al. [2015] study. There was an average agreement of 87% per item between the two raters. Spearman's Rho correlations were used to compare email characteristics over time. During the five year period under consideration (2010--2015), the persuasion principles of commitment/consistency and scarcity have increased over time, while the principles of reciprocation and social proof have decreased over time. Authority and liking/similarity revealed mixed results with certain characteristics increasing and others decreasing. The commitment/consistency principle could be seen in the increase of emails referring to elements outside the email to look more reliable, such as Google Docs or Adobe Reader (rs(850) = .12, p =.001), while the scarcity principle could be seen in urgent elements that could encourage users to act quickly and may have had success in eliciting a response from users (rs(850) = .09, p =.01). Reciprocation elements, such as a requested reply, decreased over time (rs(850) = -.12, p =.001). Additionally, the social proof principle present in emails by referring to actions performed by other users also decreased (rs(850) = -.10, p =.01). Two persuasion principles exhibited both an increase and decrease in their presence in emails over time: authority and liking/similarity. These principles could increase phishing rate success if used appropriately, but could also raise suspicions in users and decrease compliance if used incorrectly. Specifically, the source of the email, which corresponds to the authority principle, displayed an increase over time in educational institutes (rs(850) = .21, p <.001), but a decrease in financial institutions (rs(850) = -.18, p <.001). Similarly, the liking/similarity principle revealed an increase over time of logos present in emails (rs(850) = .18, p <.001) and decrease in service details, such as payment information (rs(850) = -.16, p <.001). The results from this study offer a different perspective regarding phishing. Previous research has focused on the user aspect; however, few studies have examined the phisher perspective and the social psychological techniques they are implementing. Additionally, they have yet to look at the success of the social psychology techniques. Results from this study can be used to help to predict future trends and inform training programs, as well as machine learning programs used to identify phishing messages.}, journal={Proceedings of the Symposium and Bootcamp on the Science of Security}, publisher={ACM}, author={Zielinska, Olga and Welk, Allaire and Mayhorn, Christopher B. and Murphy-Hill, Emerson}, year={2016}, month={Apr} } @article{welk_mayhorn_2015, title={All Signals Go}, volume={59}, ISSN={2169-5067 1071-1813}, url={http://dx.doi.org/10.1177/1541931215591065}, DOI={10.1177/1541931215591065}, abstractNote={ Signals intelligence analysts play a critical role in the United States government by providing information regarding potential national security threats to government leaders. Analysts perform complex decision-making tasks that involve gathering, sorting, and analyzing information. The current study evaluated how individual differences and training influence performance on an Internet search-based medical diagnosis task designed to simulate a signals analyst task. The implemented training emphasized the extraction and organization of relevant information and deductive reasoning. The individual differences of interest included working memory capacity and previous experience with elements of the task, specifically health literacy, prior experience using the Internet, and prior experience conducting Internet searches. Preliminary results indicated that the implemented training did not significantly affect performance, however, working memory significantly predicted performance on the implemented task. These results support previous research and provide additional evidence that working memory capacity influences performance on cognitively complex decision-making tasks, whereas experience with elements of the task may not. These findings suggest that working memory capacity should be considered when screening individuals for signals intelligence positions. Future research should aim to generalize these findings within a broader sample, and ideally utilize a task that directly replicates those performed by signals analysts. }, number={1}, journal={Proceedings of the Human Factors and Ergonomics Society Annual Meeting}, publisher={SAGE Publications}, author={Welk, Allaire K. and Mayhorn, Christopher B.}, year={2015}, month={Sep}, pages={312–316} } @misc{welk_mayhorn_2015, title={All signals go}, url={http://dx.doi.org/10.1145/2746194.2746204}, DOI={10.1145/2746194.2746204}, abstractNote={Signals intelligence analysts play a critical role in the United States government by providing essential information regarding potential threats to national security to government leaders. Analysts perform complex decision-making tasks that involve gathering, sorting, and analyzing information. The current study aimed to evaluate how individual differences influence performance in an Internet search-based medical diagnosis task designed to simulate a signals analyst task. The individual differences of interest included working memory capacity and previous experience with elements of the task, specifically health literacy, prior experience using the Internet, and prior experience conducting Internet searches. Preliminary results indicated that working memory significantly predicted performance on this medical diagnosis task; conversely, medical literacy, prior experience using the Internet, and Internet search experience were not significanant predictors of performance. These results support previous research and provide additional evidence that working memory capacity greatly influences performance on cognitively complex decision-making tasks, whereas experience with elements of the task may not. These findings suggest that working memory capacity should be considered when screening individuals for signals intelligence analyst positions. Future research should aim to generalize these findings within a broader sample of individuals, ideally utilizing a task that directly replicates those performed by intelligence analysts.}, journal={Proceedings of the 2015 Symposium and Bootcamp on the Science of Security}, publisher={ACM}, author={Welk, Allaire K. and Mayhorn, Christopher B.}, year={2015}, month={Apr} } @inbook{mayhorn_wogalter_laughery_2015, place={Boca Raton, FL}, title={Analysis and Design of Warnings in the Workplace}, ISBN={9780429098895}, url={http://dx.doi.org/10.1201/b18362-23}, DOI={10.1201/b18362-23}, booktitle={Evaluation of Human Work}, publisher={CRC Press}, author={Mayhorn, C. B. and Wogalter, M.S. and Laughery, K. R.}, editor={Wilson, J. and Sharples, S.Editors}, year={2015}, month={Apr}, pages={364–391} } @inproceedings{mayhorn_welk_zielinska_murphy-hill_2015, title={Assessing individual differences in a phishing detection task}, booktitle={Proceedings of the 19th World Congress of the International Ergonomics Association}, author={Mayhorn, C.B. and Welk, A.K. and Zielinska, O.A. and Murphy-Hill, E.}, year={2015} } @article{zielinska_welk_mayhorn_murphy-hill_2015, title={Exploring Expert and Novice Mental Models of Phishing}, volume={59}, ISSN={2169-5067 1071-1813}, url={http://dx.doi.org/10.1177/1541931215591165}, DOI={10.1177/1541931215591165}, abstractNote={ Experience influences actions people take in protecting themselves against phishing. One way to measure experience is through mental models. Mental models are internal representations of a concept or system that develop with experience. By rating pairs of concepts on the strength of their relationship, networks can be created through Pathfinder, showing an in-depth analysis of how information is organized. Researchers had novice and expert computer users rate three sets of terms related to phishing. The terms were divided into three categories: prevention of phishing, trends and characteristics of phishing attacks, and the consequences of phishing. Results indicated that expert mental models were more complex with more links between concepts. Specifically, experts had sixteen, thirteen, and fifteen links in the networks describing the prevention, trends, and consequences of phishing, respectively; however, novices only had eleven, nine, and nine links in the networks describing prevention, trends, and consequences of phishing, respectively. These preliminary results provide quantifiable network displays of mental models of novices and experts that cannot be seen through interviews. This information could provide a basis for future research on how mental models could be used to determine phishing vulnerability and the effectiveness of phishing training. }, number={1}, journal={Proceedings of the Human Factors and Ergonomics Society Annual Meeting}, publisher={SAGE Publications}, author={Zielinska, Olga A. and Welk, Allaire K. and Mayhorn, Christopher B. and Murphy-Hill, Emerson}, year={2015}, month={Sep}, pages={1132–1136} } @article{zielinska_welk_mayhorn_murphy-hill_2015, title={Exploring expert and novice mental models of phishing}, DOI={10.1145/2746194.2746216}, abstractNote={Mental models are internal representations of a concept or system that develop with experience. By rating pairs of concepts on the strength of their relationship, networks can be created showing an in-depth analysis of how information is organized. We asked novice and expert computer users to rate 10 terms related to the prevention of phishing. Expert mental models were more complex with more links between concepts. Relatedness ratings provide quantifiable network displays of mental models of novices and experts that cannot be seen through interviews. This information could provide a basis for future research on how mental models could be used to determine phishing vulnerability and the effectiveness of phishing training.}, journal={Proceedings of the 2015 Symposium and Bootcamp on the Science of Security}, publisher={ACM}, author={Zielinska, Olga and Welk, Allaire and Mayhorn, Christopher B. and Murphy-Hill, Emerson}, year={2015}, month={Apr} } @article{zielinska_mayhorn_2015, title={Manipulating the Display of Probability Rates on Web Health Searches}, volume={59}, ISSN={2169-5067 1071-1813}, url={http://dx.doi.org/10.1177/1541931215591116}, DOI={10.1177/1541931215591116}, abstractNote={The Internet offers many benefits to people seeking health information, such as the convenience of accessing information at any time, and the protection of viewing information anonymously; however, such information is unregulated and can be misinterpreted (Raine et al., 2000; Starcevic & Berle, 2013). Escalation, the observed increase in medical severity of search terms within a single search session, could occur. For example, escalation occurs when an initial search for “headache” leads to a later search for “brain tumor”. Researchers have recommended including incidence rates to reduce escalation; however, this phenomenon has yet to be tested empirically. The purpose of the current research is to investigate the effects of adding probability rates to Internet health search results. One-hundred-and-fifty undergraduates were randomly assigned to one of three presentation groups (control, pictorial, and numeric) where they evaluated four search results pages. Incidence rates were not displayed in the control whereas participants in the pictorial condition saw incidence rates displayed as bar graphs and those in the numeric condition saw incidence rates displayed as percentages. Escalation was evaluated using the severity and susceptibility measures from the Risk Behavior Diagnosis Scale. Severity was defined as the magnitude of harm expected from a threat or the significance or seriousness of a threat (Witte, Meyer, & Martell, 2001). The Risk Behavior Diagnosis Scale evaluated severity in three questions: (Symptom) is a serious threat; (Symptom) is harmful; and (Symptom) is a severe threat. Susceptibility is the likelihood that a specific person will experience a threat, the degree of vulnerability, or risk of experience a threat. In the current study, three questions were used to assess susceptibility: If I have (symptom), I am at risk for having (serious condition); It is likely that I have (serious condition) if I experience (symptom); (Symptom) is nothing to worry about. Four symptoms were evaluated and each symptom was paired with four conditions: two benign and two serious. Results indicated that participants believed symptoms were more severe after reviewing search result pages than before reviewing search result pages ( p<.001); however, there were no display group differences in perceived severity. Participants also believed that they were the most susceptible to benign conditions when incidence rates were shown numerically, followed by pictorially, and the least susceptible when there were no incidence rates present. The numeric group was significantly higher than the control group ( p=.002); however, there were no differences between the numeric and pictorial group, and between the control and pictorial group ( p<.10). Similarly in the serious condition, the highest ratings were in the numeric group, followed by pictorial, and the lowest perceived susceptibility was in the control. Numeric was significantly higher than the control ( p=.003) and pictorial (p=.028), but there was no difference between the pictorial group and the control ( p<.10). Although susceptibility was higher when incidence rates were present for both benign and serious conditions, rates were higher for benign conditions than the serious conditions (p<.001) suggesting that people are not escalating. These results also fall in line with the statistical results shown on the search result’s page. Previous escalation studies suggested this phenomenon (Aiken et al., 2012; Starcevic & Berle, 2013; White & Horvitz, 2009), but it has not been tested up until this point. It would be beneficial to replicate the study with a more diverse population to obtain more generalizable results; however, the findings from this study could be helpful in understanding how patients comprehend healthcare information and could conceivably provide direction for how health care professionals distribute information to their patients.}, number={1}, journal={Proceedings of the Human Factors and Ergonomics Society Annual Meeting}, publisher={SAGE Publications}, author={Zielinska, Olga A. and Mayhorn, Christopher B.}, year={2015}, month={Sep}, pages={537–537} } @inproceedings{mcdougald_mayhorn_2015, title={Persuasive technology: An investigation of efficacy using process tracing}, booktitle={Proceedings of the 19th World Congress of the International Ergonomics Association}, author={McDougald, B.R. and Mayhorn, C.B.}, year={2015} } @article{witschey_zielinska_welk_murphy-hill_mayhorn_zimmermann_2015, title={Quantifying Developers' Adoption of Security Tools}, DOI={10.1145/2786805.2786816}, abstractNote={Security tools could help developers find critical vulnerabilities, yet such tools remain underused. We surveyed developers from 14 companies and 5 mailing lists about their reasons for using and not using security tools. The resulting thirty-nine predictors of security tool use provide both expected and unexpected insights. As we expected, developers who perceive security to be important are more likely to use security tools than those who do not. But that was not the strongest predictor of security tool use, it was instead developers' ability to observe their peers using security tools.}, journal={2015 10TH JOINT MEETING OF THE EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND THE ACM SIGSOFT SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE 2015) PROCEEDINGS}, publisher={ACM}, author={Witschey, Jim and Zielinska, Olga and Welk, Allaire and Murphy-Hill, Emerson and Mayhorn, Chris and Zimmermann, Thomas}, year={2015}, pages={260–271} } @article{vilar_rebelo_noriega_teles_mayhorn_2015, title={Signage Versus Environmental Affordances: Is the Explicit Information Strong Enough to Guide Human Behavior During a Wayfinding Task?}, volume={25}, ISSN={["1520-6564"]}, DOI={10.1002/hfm.20557}, abstractNote={Abstract}, number={4}, journal={HUMAN FACTORS AND ERGONOMICS IN MANUFACTURING & SERVICE INDUSTRIES}, author={Vilar, Elisangela and Rebelo, Francisco and Noriega, Paulo and Teles, Julia and Mayhorn, Christopher}, year={2015}, pages={439–452} } @article{mayhorn_murphy-hill_zielinska_welk_2015, title={The social engineering behind phishing}, volume={21}, number={1}, journal={The Next Wave}, author={Mayhorn, C.B. and Murphy-Hill, E. and Zielinska, O.A. and Welk, A.K.}, year={2015}, pages={32–39} } @article{wogalter_mayhorn_zielinska_2015, title={Use of color in warnings}, DOI={10.1017/cbo9781107337930.019}, abstractNote={A summary is not available for this content so a preview has been provided. Please use the Get access link above for information on how to access this content.}, journal={Handbook of Color Psychology}, publisher={Cambridge University Press}, author={Wogalter, Michael S. and Mayhorn, Christopher B. and Zielinska, Olga A.}, year={2015}, pages={377–400} } @article{wogalter_mayhorn_zielinska_2015, title={Use of color in warnings}, journal={Handbook of Color Psychology}, author={Wogalter, M. S. and Mayhorn, C. B. and Zielinska, O. A.}, year={2015}, pages={377–400} } @article{welk_hong_zielinska_tembe_murphy-hill_mayhorn_2015, title={Will the “Phisher-Men” Reel You In?}, volume={5}, ISSN={2155-7136 2155-7144}, url={http://dx.doi.org/10.4018/ijcbpl.2015100101}, DOI={10.4018/ijcbpl.2015100101}, abstractNote={Phishing is an act of technology-based deception that targets individuals to obtain information. To minimize the number of phishing attacks, factors that influence the ability to identify phishing attempts must be examined. The present study aimed to determine how individual differences relate to performance on a phishing task. Undergraduate students completed a questionnaire designed to assess impulsivity, trust, personality characteristics, and Internet/security habits. Participants performed an email task where they had to discriminate between legitimate emails and phishing attempts. Researchers assessed performance in terms of correctly identifying all email types (overall accuracy) as well as accuracy in identifying phishing emails (phishing accuracy). Results indicated that overall and phishing accuracy each possessed unique trust, personality, and impulsivity predictors, but shared one significant behavioral predictor. These results present distinct predictors of phishing susceptibility that should be incorporated in the development of anti-phishing technology and training.}, number={4}, journal={International Journal of Cyber Behavior, Psychology and Learning}, publisher={IGI Global}, author={Welk, Allaire K. and Hong, Kyung Wha and Zielinska, Olga A. and Tembe, Rucha and Murphy-Hill, Emerson and Mayhorn, Christopher B.}, year={2015}, month={Oct}, pages={1–17} } @article{zielinska_wogalter_mayhorn_2014, title={A Perceptual Analysis of Standard Safety, Fluorescent, and Neon Colors}, volume={58}, ISSN={2169-5067 1071-1813}, url={http://dx.doi.org/10.1177/1541931214581393}, DOI={10.1177/1541931214581393}, abstractNote={ Twenty-six standard safety colors specified by the American National Standards Institute (ANSI), International Standards Organization (ISO), and the Federal Highway Association (FHWA) were compared to seven fluorescent and neon colors on perceived hazard and perceived importance. Results indicated that the fluorescent orange, ANSI red, fluorescent yellow, FHWA red, fluorescent yellow green, and ISO red were the highest rated colors on perceived hazard. ANSI red, FHWA red, ISO red, fluorescent orange, fluorescent yellow, and fluorescent yellow green were rated the highest on perceived importance. The implications of these findings and the potential use of fluorescent colors in product warnings are discussed. }, number={1}, journal={Proceedings of the Human Factors and Ergonomics Society Annual Meeting}, publisher={SAGE Publications}, author={Zielinska, Olga A. and Wogalter, Michael S. and Mayhorn, Christopher B.}, year={2014}, month={Sep}, pages={1879–1883} } @article{mclaughlin_mayhorn_2014, title={Designing effective risk communications for older adults}, volume={61}, ISSN={["1879-1042"]}, DOI={10.1016/j.ssci.2012.05.002}, abstractNote={Older adults make daily decisions concerning risk communications about product use, activities, or emergency situations. Appropriate compliance with warnings and notifications depends on comprehension of the hazard. Unfortunately, risk communications are often designed without considering the physical and cognitive changes that can accompany aging. This article details age-related changes and their relation to risk communication and includes examples and recommendations for design. It is proposed that designers consider these age-related changes within the larger system of the risk environment and risk communication demands. Iterative design is stressed.}, journal={SAFETY SCIENCE}, publisher={Elsevier BV}, author={McLaughlin, Anne Collins and Mayhorn, Christopher B.}, year={2014}, month={Jan}, pages={59–65} } @article{vilar_rebelo_noriega_duarte_mayhorn_2014, title={Effects of competing environmental variables and signage on route-choices in simulated everyday and emergency wayfinding situations}, volume={57}, ISSN={["1366-5847"]}, DOI={10.1080/00140139.2014.895054}, abstractNote={This study examined the relative influence of environmental variables (corridor width and brightness) and signage (directional and exit signs), when presented in competition, on participants' route-choices in two situational variables (everyday vs. emergency), during indoor wayfinding in virtual environments. A virtual reality-based methodology was used. Thus, participants attempted to find a room (everyday situation) in a virtual hotel, followed by a fire-related emergency egress (emergency situation). Different behaviours were observed. In the everyday situation, for no-signs condition, participants choose mostly the wider and brighter corridors, suggesting a heavy reliance on the environmental affordances. Conversely, for signs condition, participants mostly complied with signage, suggesting a greater reliance on the signs rather than on the environmental cues. During emergency, without signage, reliance on environmental affordances seems to be affected by the intersection type. In the sign condition, the reliance on environmental affordances that started strong decreases along the egress route. Practitioner Summary: Virtual reality was used to study relative influence of environmental variables and signage, when in competition, on participants' route-choices in everyday and emergency situations. For everyday no-signs condition, findings suggested a reliance on environmental variables. For emergency sign condition, higher reliance on environmental variables was found for first three intersections.}, number={4}, journal={ERGONOMICS}, author={Vilar, Elisangela and Rebelo, Francisco and Noriega, Paulo and Duarte, Emilia and Mayhorn, Christopher B.}, year={2014}, month={Apr}, pages={511–524} } @article{kim_mayhorn_2014, title={Exploring the Relationship between Planning and Prospective Memory}, volume={58}, ISSN={2169-5067 1071-1813}, url={http://dx.doi.org/10.1177/1541931214581210}, DOI={10.1177/1541931214581210}, abstractNote={ Articulatory suppression / manipulations of working memory (i.e., poetic language) were examined in relation to planning and prospective memory, memory for actions to be performed in the future. Two experiments were conducted to explore these individual difference measures. Experiment 1 required participants to answer 90 trivia questions and complete embedded time- and event-based prospective memory tasks. The 36 participants were divided into three equal groups: no working memory (WM) load, low WM load, and high WM load. Results from that experiment were surprising because prospective memory performance did not vary by type (event-based versus time-based) and WM load did not influence prospective performance. Experiment 2 required participants to do an errand-planning task and complete embedded time- and event-based prospective memory tasks. The 36 participants, who did not participate in Experiment 1, were also divided into three groups that varied by WM load: no WM load, low WM load, and high WM load. One interesting finding was prospective memory performance correlated with a measure of planning: the Tower of Hanoi task. These experiments, their findings, and general implications are discussed. }, number={1}, journal={Proceedings of the Human Factors and Ergonomics Society Annual Meeting}, publisher={SAGE Publications}, author={Kim, Paul Y. and Mayhorn, Christopher B.}, year={2014}, month={Sep}, pages={1004–1008} } @article{zielinska_tembe_hong_ge_murphy-hill_mayhorn_2014, title={One Phish, Two Phish, How to Avoid the Internet Phish}, volume={58}, ISSN={2169-5067 1071-1813}, url={http://dx.doi.org/10.1177/1541931214581306}, DOI={10.1177/1541931214581306}, abstractNote={ Phishing is a social engineering tactic that targets internet users in an attempt to trick them into divulging personal information. When opening an email, users are faced with the decision of determining if an email is legitimate or an attempt at phishing. Although software has been developed to assist the user, studies have shown they are not foolproof, leaving the user vulnerable. Multiple training programs have been developed to educate users in their efforts to make informed decisions; however, training that conveys the real world consequences of phishing or training that increases a user’s fear level have not been developed. Conveying real world consequences of a situation and increasing a user’s fear level have been proven to enhance the effects of training in other fields. Ninety-six participants were recruited and randomly assigned to training programs with phishing consequences, training programs designed to increase fear, or a control group. Preliminary results indicate that training helped users identify phishing emails; however, little difference was seen among the three groups. Future analysis will include a factor analysis of personality and individual differences that influence training efficacy. }, number={1}, journal={Proceedings of the Human Factors and Ergonomics Society Annual Meeting}, publisher={SAGE Publications}, author={Zielinska, Olga A. and Tembe, Rucha and Hong, Kyung Wha and Ge, Xi and Murphy-Hill, Emerson and Mayhorn, Christopher B.}, year={2014}, month={Sep}, pages={1466–1470} } @misc{tembe_zielinska_liu_hong_murphy-hill_mayhorn_ge_2014, title={Phishing in international waters}, url={http://dx.doi.org/10.1145/2600176.2600178}, DOI={10.1145/2600176.2600178}, abstractNote={One hundred-sixty four participants from the United States, India and China completed a survey designed to assess past phishing experiences and whether they engaged in certain online safety practices (e.g., reading a privacy policy). The study investigated participants' reported agreement regarding the characteristics of phishing attacks, types of media where phishing occurs and the consequences of phishing. A multivariate analysis of covariance indicated that there were significant differences in agreement regarding phishing characteristics, phishing consequences and types of media where phishing occurs for these three nationalities. Chronological age and education did not influence the agreement ratings; therefore, the samples were demographically equivalent with regards to these variables. A logistic regression analysis was conducted to analyze the categorical variables and nationality data. Results based on self-report data indicated that (1) Indians were more likely to be phished than Americans, (2) Americans took protective actions more frequently than Indians by destroying old documents, and (3) Americans were more likely to notice the "padlock" security icon than either Indian or Chinese respondents. The potential implications of these results are discussed in terms of designing culturally sensitive anti-phishing solutions.}, journal={Proceedings of the 2014 Symposium and Bootcamp on the Science of Security}, publisher={ACM}, author={Tembe, Rucha and Zielinska, Olga and Liu, Yuqi and Hong, Kyung Wha and Murphy-Hill, Emerson and Mayhorn, Chris and Ge, Xi}, year={2014}, month={Apr} } @article{mayhorn_wogalter_laughery_2014, title={Special issue on warnings: Advances in delivery, application, and methods}, volume={45}, DOI={10.1016/j.apergo.2014.02.012}, abstractNote={This special issue of Applied Ergonomics concerns the topic of warnings, safety communications designed to decrease harm to people and property. The field has evolved over time, and with it there has been advancement in knowledge and application. The current special issue contains 14 articles that reflect three distinguishable areas within the warnings literature where such changes are taking place in the laboratories and workplaces of our international colleagues: (1) multimodality of warning delivery, (2) emerging application areas, and (3) new methodology. This special issue brings together a set of studies investigating various factors that might impact safety behavior in diverse settings and domains where warnings are likely to be encountered. It is our hope that the special issue will motivate to development and exploration of new ideas regarding warning design and their use in a variety of applications that improve safety.}, number={5}, journal={Applied Ergonomics}, publisher={Elsevier BV}, author={Mayhorn, Christopher B. and Wogalter, Michael S. and Laughery, Kenneth R.}, year={2014}, month={Sep}, pages={1267–1269} } @article{mayhorn_mclaughlin_2014, title={Warning the world of extreme events: A global perspective on risk communication for natural and technological disaster}, volume={61}, ISSN={["1879-1042"]}, DOI={10.1016/j.ssci.2012.04.014}, abstractNote={Due to a variety of factors such as population growth, globalization, and environmental change, mankind is increasingly susceptible to both natural and technological disasters. To prevent the unnecessary loss of life, human suffering, and property loss, nations around the world now recognize that warning systems are an integral part of risk communication. The current work reviews a number of theoretical frameworks that describe how the public responds to warnings. It seeks to identify the components of effective warnings and evaluative techniques that can be used to judge successful implementation of warning systems. Our goal is to describe the variables that influence disaster warnings in general before discussing terrorism as a case study in disaster warning. Lastly, implications for future research in the area of international disaster warnings are discussed.}, journal={SAFETY SCIENCE}, publisher={Elsevier BV}, author={Mayhorn, Christopher B. and McLaughlin, Anne Collins}, year={2014}, month={Jan}, pages={43–50} } @article{tembe_hong_murphy-hill_mayhorn_kelley_2013, title={American and Indian Conceptualizations of Phishing}, ISSN={["2325-1689"]}, DOI={10.1109/stast.2013.10}, abstractNote={Using Amazon's Mechanical Turk, fifty American and sixty-one Indian participants completed a survey that assessed characteristics of phishing attacks, asked participants to describe their previous phishing experiences, and report phishing consequences. The results indicated that almost all participants had been targets, yet Indian participants were twice as likely to be successfully phished as American participants. Part of the reason appears to be that American participants reported more frequent efforts to protect themselves online such as by looking for the padlock icon in their browser. Statistical analyses indicated that American participants agreed more with items for characteristics of phishing, consequences of phishing and the types of media where phishing occurs, suggesting more cautiousness and awareness of phishing.}, journal={2013 THIRD WORKSHOP ON SOCIO-TECHNICAL ASPECTS IN SECURITY AND TRUST (STAST 2013)}, publisher={IEEE}, author={Tembe, Rucha and Hong, Kyung Wha and Murphy-Hill, Emerson and Mayhorn, Christopher B. and Kelley, Christopher M.}, year={2013}, pages={37–45} } @article{wogalter_mayhorn_2013, title={Cell Phone Safety Beliefs Index}, DOI={10.1037/t21960-000}, journal={PsycTESTS Dataset}, publisher={American Psychological Association (APA)}, author={Wogalter, Michael S. and Mayhorn, Christopher B.}, year={2013}, month={Jul} } @article{mayhorn_wogalter_goldsworthy_mcdougal_2013, title={Creating Inclusive Warnings}, DOI={10.1201/b15563-6}, journal={Cultural Ergonomics}, publisher={CRC Press}, author={Mayhorn, Christopher and Wogalter, Michael and Goldsworthy, Richard and McDougal, Brannan}, year={2013}, month={Nov}, pages={97–128} } @inproceedings{tembe_hong_mayhorn_murphy-hill_kelley_2013, title={Exploring cross-cultural conceptions and experiences of phishing}, booktitle={Proceedings of the Third International Workshop on the Socio-Technical Aspects of Security and Trust}, author={Tembe, R. and Hong, K.W. and Mayhorn, C.B. and Murphy-Hill, E. and Kelley, C.M.}, year={2013} } @article{hong_kelley_tembe_murphy-hill_mayhorn_2013, title={Keeping Up With The Joneses}, volume={57}, ISSN={2169-5067 1071-1813}, url={http://dx.doi.org/10.1177/1541931213571226}, DOI={10.1177/1541931213571226}, abstractNote={ Most prior research on preventing phishing attacks focuses on technology to identify and prevent the delivery of phishing emails. The current study supports an ongoing effort to develop a user-profile that predicts when phishing attacks will be successful. We sought to identify the behavioral, cognitive and perceptual attributes that make some individuals more vulnerable to phishing attack than others. Fifty-three participants responded to a number of self-report measures ( e.g., dispositional trust) and completed the ‘Bob Jones’ email task that was designed to empirically evaluate phishing susceptibility. Over 92% of participants were to some extent vulnerable to phishing attacks. Additionally, individual differences in gender, trust, and personality were associated with phishing vulnerability. Application and implications for future research are discussed. }, number={1}, journal={Proceedings of the Human Factors and Ergonomics Society Annual Meeting}, publisher={SAGE Publications}, author={Hong, Kyung Wha and Kelley, Christopher M. and Tembe, Rucha and Murphy-Hill, Emerson and Mayhorn, Christopher B.}, year={2013}, month={Sep}, pages={1012–1016} } @article{wogalter_mayhorn_2013, title={Perceived Need for New Cellular Phone Laws Measure}, DOI={10.1037/t21961-000}, journal={PsycTESTS Dataset}, publisher={American Psychological Association (APA)}, author={Wogalter, Michael S. and Mayhorn, Christopher B.}, year={2013}, month={Jul} } @inproceedings{luong_london_mayhorn_2013, place={Santa Monica, CA}, title={Picture passwords: Effects of salient image features on password predictability}, booktitle={Proceedings of the Human Factors and Ergonomics Society 57th Annual Meeting}, publisher={Human Factors and Ergonomics Society}, author={Luong, M.G. and London, J.E. and Mayhorn, C.B.}, year={2013} } @article{stough_mayhorn_2013, title={Population Segments with Disabilities}, volume={31}, ISSN={0280-7270 2753-5703}, url={http://dx.doi.org/10.1177/028072701303100306}, DOI={10.1177/028072701303100306}, number={3}, journal={International Journal of Mass Emergencies & Disasters}, publisher={SAGE Publications}, author={Stough, Laura M. and Mayhorn, Christopher B.}, year={2013}, month={Nov}, pages={384–402} } @book{mayhorn_2013, title={Psychology in the Fastlane: Applying Behavioral Principles in the Real World}, publisher={ByPass Publishing}, author={Mayhorn, C.B.}, year={2013} } @article{vilar_rebelo_noriega_teles_mayhorn_2013, title={The influence of environmental features on route selection in an emergency situation}, volume={44}, ISSN={["1872-9126"]}, DOI={10.1016/j.apergo.2012.12.002}, abstractNote={Understanding the influence of external information at a lower level of awareness during the processes of route selection could be a key factor to predict user's movements within complex buildings, avoiding wayfinding problems and improving egress in emergency situations. This study aims to verify whether corridor intersection configuration attributes, such as width and brightness, act as factors of attraction to improve the affordance of indoor hallways during an emergency egress situation, using a VR-based methodology. The main hypotheses are that users tend to move along either, wider or brighter corridors. Thirty volunteers participated in this study, moving along 57 different corridors, according to the experimental conditions of the study. The results suggest that people prefer to follow brighter pathways in “T-type” and “F-type” intersections, and wider corridors in “T-type” intersections. In situations where these variables are in conflict, there is a preference for brighter paths in both intersection configurations.}, number={4}, journal={APPLIED ERGONOMICS}, publisher={Elsevier BV}, author={Vilar, Elisangela and Rebelo, Francisco and Noriega, Paulo and Teles, Julia and Mayhorn, Christopher}, year={2013}, month={Jul}, pages={618–627} } @book{mayhorn_walker_king_2012, place={Raleigh, NC}, title={A survey of the users and customers of the specialized furniture carriers division of the American Home Furnishing Association}, number={2012-01}, institution={North Carolina State University}, author={Mayhorn, C.B. and Walker, S. and King, R.E.}, year={2012} } @article{mayhorn_carpenter_2012, title={Age differences and transfer on control solution testing with blood glucometers}, volume={41}, DOI={10.3233/wor-2012-0184-370}, abstractNote={The elderly are at an increased risk for being diagnosed with diabetes. While previous studies have examined technique errors when a patient used his or her current blood glucometer or a single novel glucometer, no study has measured errors as a patient transferred to using a second, novel experimental glucometer. Results support findings that older adults perform more slowly and less accurately than younger adults when transferring between pieces of equipment. Implications for future blood glucometer design and training are discussed.}, journal={Work}, publisher={IOS Press}, author={Mayhorn, Christopher B. and Carpenter, Eric D.}, year={2012}, pages={370–373} } @book{thompson_mayhorn_2012, title={Aging Workers and Technology}, DOI={10.1093/oxfordhb/9780195385052.013.0113}, journal={Oxford Handbooks Online}, publisher={Oxford University Press}, author={Thompson, Lori Foster and Mayhorn, Christopher B.}, year={2012}, month={Sep} } @article{o’brien_bass_bliss_cooke_kalsher_mayhorn_2012, title={Improving Public Response to Disaster Warnings: A Discussion Panel}, volume={56}, ISSN={2169-5067 1071-1813}, url={http://dx.doi.org/10.1177/1071181312561425}, DOI={10.1177/1071181312561425}, abstractNote={Stories about substantial human and property losses caused by natural disasters made headlines in 2011 throughout the U.S. and around the world. Many of these stories described problems with the disaster warnings themselves as well as with human responses to these warnings, both of which may have increased the number of casualties. Although human factors research has made significant contributions to the design of product warnings in general, studies focused specifically on disaster warnings and associated responses are sparse (Cooke & Winner, 2007). Furthermore, disseminating warnings and supplemental information to guide decision making by the general public is increasingly challenging due to the rapid adoption of heterogeneous mobile technologies, particularly those providing Internet access. These technologies facilitate access to even more information during these time-sensitive situations, but the information may not be presented in ways that support effective decision-making. In this panel, we will discuss opportunities for human factors research to improve the public’s preparation and response to disaster warnings. Panelists will discuss their research on individual differences in warning design and response, training effects on warning response, social media and emergency communications, communication and coordination among ad hoc disaster response teams, and decision making by weather forecasters. From these discussions, we hope to identify research areas with high potential for short-term impact.}, number={1}, journal={Proceedings of the Human Factors and Ergonomics Society Annual Meeting}, publisher={SAGE Publications}, author={O’Brien, Marita A. and Bass, Ellen J. and Bliss, James P. and Cooke, Nancy J. and Kalsher, Michael J. and Mayhorn, Christopher B.}, year={2012}, month={Sep}, pages={2036–2039} } @article{o'brien_bass_bliss_cooke_kalsher_mayhorn_2012, title={Improving public response to disaster warnings: A discussion panel}, DOI={10.1037/e572172013-423}, journal={PsycEXTRA Dataset}, publisher={American Psychological Association (APA)}, author={O'Brien, Marita A. and Bass, Ellen J. and Bliss, James P. and Cooke, Nancy J. and Kalsher, Michael J. and Mayhorn, Christopher B.}, year={2012} } @article{baldwin_spence_bliss_brill_wogalter_mayhorn_ferris_2012, title={Multimodal Cueing: The Relative Benefits of the Auditory, Visual, and Tactile Channels in Complex Environments}, volume={56}, ISSN={2169-5067 1071-1813}, url={http://dx.doi.org/10.1177/1071181312561404}, DOI={10.1177/1071181312561404}, abstractNote={ Determining the most effective modality or combination of modalities for presenting time sensitive information to operators in complex environments is critical to effective display design. This panel of display design experts will briefly review the most important empirical research regarding the key issues to be considered including the temporal demands of the situation, the complexity of the information to be presented, and issues of information reliability and trust. Included in the discussion will be a focus on the relative benefits and potential costs of providing information in one modality versus another and under what conditions it may be preferable to use a multisensory display. Key issues to be discussed among panelists and audience members will be the implications of the existing knowledge for facilitating the design of alerts and warnings in complex environments such as aviation, driving, medicine and educational settings. }, number={1}, journal={Proceedings of the Human Factors and Ergonomics Society Annual Meeting}, publisher={SAGE Publications}, author={Baldwin, Carryl L. and Spence, Charles and Bliss, James P. and Brill, J. Christopher and Wogalter, Michael S. and Mayhorn, Christopher B. and Ferris, Thomas K.}, year={2012}, month={Sep}, pages={1431–1435} } @book{stough_mayhorn_2012, place={Birmingham, AL}, title={Population segments with disabilities}, institution={Weather Ready Nation Workshop funded by NOAA/NSF}, author={Stough, L.M. and Mayhorn, C.B.}, year={2012} } @article{kelley_hong_mayhorn_murphy-hill_2012, title={Something Smells Phishy: Exploring Definitions, Consequences, and Reactions to Phishing}, volume={56}, ISSN={2169-5067 1071-1813}, url={http://dx.doi.org/10.1177/1071181312561447}, DOI={10.1177/1071181312561447}, abstractNote={ One hundred fifty-five participants completed a survey on Amazon’s Mechanical Turk that assessed characteristics of phishing attacks and requested participants to describe their previous experiences and the related consequences. Results indicated almost all participants had been targets of a phishing with 22% reporting these attempts were successful. Participants reported actively engaging in efforts to protect themselves online by noticing the “padlock icon” and seeking additional information to verify the legitimacy of e-retailers. Moreover, participants indicated that phishers most frequently pose as members of organizations and that phishing typically occurs via email yet they are aware that other media might also make them susceptible to phishing scams. The reported consequences of phishing attacks go beyond financial loss, with many participants describing social ramifications such as embarrassment and reduced trust. Implications for research in risk communication and design roles by human factors/ergonomics (HF/E) professionals are discussed. }, number={1}, journal={Proceedings of the Human Factors and Ergonomics Society Annual Meeting}, publisher={SAGE Publications}, author={Kelley, Christopher M. and Hong, Kyung Wha and Mayhorn, Christopher B. and Murphy-Hill, Emerson}, year={2012}, month={Sep}, pages={2108–2112} } @article{kelley_hong_mayhorn_murphy-hill_2012, title={Something smells phishy: Exploring definitions, consequences, and reactions to phishing}, DOI={10.1037/e572172013-438}, journal={PsycEXTRA Dataset}, publisher={American Psychological Association (APA)}, author={Kelley, Christopher M. and Hong, Kyung Wha and Mayhorn, Christopher B. and Murphy-Hill, Emerson}, year={2012} } @article{mayhorn_nyeste_2012, title={Training users to counteract phishing}, volume={41}, DOI={10.3233/wor-2012-1054-3549}, abstractNote={Phishing is an increasingly more prevalent form of online, social engineered scams that escalate costs and risks to society year to year.This study demonstrates an association between anti-phishing training techniques used in previous research and individual differences which could affect phishing susceptibility.Results indicated that anti-phishing training in both a simple comic and more complex video game form is helpful in decreasing phishing susceptibility as measured by Miss rates for all individuals including college aged and computer savvy participants.Based on the results of the present study, implications for future efforts to combat phishing are discussed.}, journal={Work}, publisher={IOS Press}, author={Mayhorn, Christopher B. and Nyeste, Patrick G.}, year={2012}, pages={3549–3552} } @inproceedings{reis_duarte_rebelo_noriega_mayhorn_2012, title={Using virtual reality to study the effectiveness of technology-based warnings for older adults: Background, trends, and challenges}, booktitle={Proceedings of the 18th World Congress of the International Ergonomics Association}, author={Reis, L. and Duarte, E. and Rebelo, F. and Noriega, P. and Mayhorn, C.B.}, year={2012} } @inproceedings{mayhorn_2012, title={Warning the elderly: Understanding and overcoming barriers to risk communication}, booktitle={SUPDET 2012: National Fire Protection Association Conference}, author={Mayhorn, C.B.}, year={2012} } @article{wogalter_laughery_mayhorn_2012, title={Warnings and Hazard Communications}, DOI={10.1002/9781118131350.ch29}, abstractNote={Warnings are safety communications that are used to inform people about hazards and to provide instructions so as to avoid or minimize undesirable consequences such as injury of death. Warnings are used in a variety of contexts to address environmental and product-related hazards. In the United States, interest in warnings is also associated with litigation concerns . The adequacy of warnings has become a prevalent issue in product liability and personal injury litigation. According to the Res tatement of Torts (second) and to the Theory of Strict Liability, if a product needs a warning and the warning is absent or defective , then the product is defective (see, e.g. , Madden , 1999). Regulations, standards, and guidelines as to when and how to warn have been developed more extensively in the last three decades. Also, there has been a substantial increase in research activity on the topic during this time. Human factors specialists, or ergonomist s, have}, journal={Handbook of Human Factors and Ergonomics}, publisher={Wiley}, author={Wogalter, Michael S. and Laughery, Kenneth R. and Mayhorn, Christopher B.}, year={2012}, month={Mar}, pages={868–894} } @article{mclaughlin_mayhorn_2011, title={Avoiding harm on the farm: Human factors}, volume={10}, DOI={10.4017/gt.2011.10.01.002.00}, abstractNote={The high accident rate in agricultural work, especially for older farmers, indicates a need for increased safety and prevention research. This can contribute to increased safety on the farm, from engineering to human factors and ergonomics. Methods The current set of studies used two distinctly different research approaches to identify areas most linked to agricultural safety incidents. Focus groups including older farmers and an analysis of archived data produced descriptions of where, when, and how accidents occur, and what hazards contributed to these accidents. The database used was the Fatality Assessment and Control Evaluation (FACE) database of fatal farm-related accidents. This database contains a structured narrative account of each accident. Cases were coded to capture the demographics of the victim, the environmental conditions during the accident, the machinery involved, and other variables related to the accident. The average age of farmers involved in fatal accidents was over fifty years and many of them were using decades-old equipment when they died. These data are presented in terms of frequencies and a cluster analysis was performed to identify patterns of accident types. Focus group discussions identified the knowledge and attitudes of older farmers related to their work and equipment. Results In general, older farmers understood that they had slower reaction times than when they were younger; however, the prevailing attitude was that a task must be accomplished by any means necessary. This included working in poor visual conditions, past the point of fatigue, and using equipment for tasks other than for which it was designed. Last, older farmers were aware of numerous accidents related to their profession and expressed an acceptance of risk as well as the attitude that those who had accidents were not careful enough. Conclusion The findings from these studies can be used to motivate influential safety research. Older farmers stand to benefit greatly from applied work in this area once their general behavior patterns with farming technology are understood. The goal of the current studies was to link the information from farming accidents with the knowledge, attitudes, and behaviors of older farmers to direct the solving of safety problems through engineering, human factors, and industrial design.}, number={1}, journal={Gerontechnology}, publisher={International Society for Gerontechnology (ISG)}, author={McLaughlin, A.C. and Mayhorn, C.B.}, year={2011}, month={Jan} } @inbook{wogalter_laughery_mayhorn_2011, place={Boca Raton, FL}, title={Communication-Human Information Processing Stages in Consumer Product Warnings}, ISBN={9781420046243 9781420046250}, ISSN={2155-8604}, url={http://dx.doi.org/10.1201/b10949-5}, DOI={10.1201/b10949-5}, abstractNote={3.1 InLroducLion .......................................... ....... .......... ................................... .............................. 33 3.2 Issues Assoc iated with the Hierarchy ................ ....... ........................................................ ...... 34 3.3 Alternative Designs ................................. ....................... .......................... ...... ................... ..... 34 3.4 Factors Lhat Influence Safe ty Decisions .................................................................................. 35 3.5 Warning versus Alternative Design versus Guarding ................. ....... ........... ......................... 36 3.6 Final Comments .................................................................................... ....................... .... ....... 38 References .......................... ..................... ......... ............ ........ ........... .................. ..... ......... ................. 38}, booktitle={Human Factors and Ergonomics in Consumer Product Design}, publisher={CRC Press}, author={Wogalter, Michael and Laughery, Kenneth and Mayhorn, Christopher}, editor={Karwowski, Waldemar and Soares, Marcelo M. and Stanton, Neville A.Editors}, year={2011}, month={Jun}, pages={41–67} } @article{carpenter_mayhorn_2011, title={Effect of transfer with younger and older adults on control solution testing using two blood glucometers}, DOI={10.1037/e578902012-035}, journal={PsycEXTRA Dataset}, publisher={American Psychological Association (APA)}, author={Carpenter, Eric D. and Mayhorn, Christopher B.}, year={2011} } @article{carpenter_mayhorn_2011, title={Effect of transfer with younger and older adults on control solution testing using two blood glucometers}, volume={55}, ISSN={1541-9312}, url={http://dx.doi.org/10.1177/1071181311551035}, DOI={10.1177/1071181311551035}, abstractNote={As of 2005, 5.5% of the American population had some form of diabetes, with an increasing rate of diagnosis. Adults 65 years of age and over are at an increased risk for developing diabetes. Sixty-four participants completed 10 trials of control solution testing. MANOVA results indicated main effects of participant age and order of glucometer use on dependent variables. Follow-up ANOVAs revealed a main effect of age on task time, errors during training, and near transfer errors, and a main effect of glucometer use on rate of near and far transfer errors committed. Results and avenues of further investigation are discussed.}, number={1}, journal={Proceedings of the Human Factors and Ergonomics Society Annual Meeting}, publisher={SAGE Publications}, author={Carpenter, E. D. and Mayhorn, C. B.}, year={2011}, month={Sep}, pages={167–171} } @article{mcdougald_carpenter_mayhorn_2011, title={Emoticons: What does this one mean?}, DOI={10.1037/e578902012-415}, journal={PsycEXTRA Dataset}, publisher={American Psychological Association (APA)}, author={McDougald, Brannan R. and Carpenter, Eric D. and Mayhorn, Christopher B.}, year={2011} } @article{mcdougald_carpenter_mayhorn_2011, title={Emoticons: What does this one mean?}, volume={55}, ISSN={1541-9312}, url={http://dx.doi.org/10.1177/1071181311551406}, DOI={10.1177/1071181311551406}, abstractNote={Emoticons are graphic signs illustrated with ASCII characters to accompany text-based computer-mediated communication (Dresner & Herring, 2010). The effects of using emoticons has begun to be investigated, but little effort has been put forth to determine how well people are able to interpret the meaning of emoticons. Preliminary data from the current research effort is reported to indicate how well 34 undergraduate students were able to correctly interpret 50 distinct emoticons from Yahoo Messenger. Results suggest that correct interpretation varied widely between emoticons, and the reported frequency of use was positively correlated with emoticon interpretability. Research and design implications are discussed, as well as questions for future research.}, number={1}, journal={Proceedings of the Human Factors and Ergonomics Society Annual Meeting}, publisher={SAGE Publications}, author={McDougald, B. R. and Carpenter, E. D. and Mayhorn, C. B.}, year={2011}, month={Sep}, pages={1948–1951} } @article{mayhorn_2010, title={Chapters Hold WUD Events}, volume={53}, number={1}, journal={HFES Bulletin}, author={Mayhorn, C.B.}, year={2010} } @inproceedings{mendel_mayhorn_hardee_west_pak_2010, place={Santa Monica, CA}, title={Cybertrust: Compliance in computer security dialogs}, booktitle={Proceedings of the Human Factors and Ergonomics Society 54th Annual Meeting}, publisher={Human Factors and Ergonomics Society}, author={Mendel, J. and Mayhorn, C.B. and Hardee, J.B. and West, R.T. and Pak, R.}, year={2010} } @inproceedings{goldsworthy_mayhorn_2010, title={Direct to consumer (DTC) prescription drug advertising: Exploring self reports of media exposure and associated behaviors}, booktitle={Proceedings of the Third Applied Human Factors and Ergonomics International Conference}, author={Goldsworthy, R.C. and Mayhorn, C.B.}, year={2010} } @article{kim_mayhorn_2010, title={Exploring Age-Related Differences in Prospective Memory Inside and Outside of the Lab}, DOI={10.1037/e578632012-006}, journal={PsycEXTRA Dataset}, publisher={American Psychological Association (APA)}, author={Kim, Paul Y. and Mayhorn, Christopher B.}, year={2010} } @article{kim_mayhorn_2010, title={Exploring Age-Related Differences in Prospective Memory Inside and outside of the Lab}, volume={54}, ISSN={2169-5067 1071-1813}, url={http://dx.doi.org/10.1177/154193121005400206}, DOI={10.1177/154193121005400206}, abstractNote={ Age differences in the performance of two prospective memory tasks (activity-based and event-based) were investigated both in laboratory and naturalistic settings. Forty young and 40 older adults participated. First, the participants came to the lab and answered ninety trivia questions with embedded prospective memory tasks. Second, they were required to come to a local mall (naturalistic setting) a few days later to complete various prospective memory tasks. Results indicated that both age groups performed the event-based task followed by activity-based task better in the lab than in the naturalistic setting. The young performed the tasks better than their older counterparts in both contexts, though the effects failed to reach statistical significance. An interesting finding was that older participants performed the naturalistic event-based task better than the young participants. These findings suggest that converting activity-based tasks into event-based tasks may help people accomplish their daily prospective memory tasks more successfully. }, number={2}, journal={Proceedings of the Human Factors and Ergonomics Society Annual Meeting}, publisher={SAGE Publications}, author={Kim, Paul Y. and Mayhorn, Christopher B.}, year={2010}, month={Sep}, pages={165–169} } @article{mayhorn_goldsworthy_2010, title={Messages and Medical Behaviors: DTCA's Influence on Healthcare Consumer Thinking and Doing, and How We Can Help}, volume={54}, ISSN={2169-5067 1071-1813}, url={http://dx.doi.org/10.1177/154193121005402112}, DOI={10.1177/154193121005402112}, abstractNote={ Pharmaceutical direct-to-consumer advertising (DTCA) has grown exponentially and is suggested to increase perceived medication needs and patient drug requests. However, its impact on healthcare consumer safety is not well-understood. This effort sought to examine DTCA healthcare consumer effects and their public health and practical implications. During spring 2008, 2767 individuals were asked, through public intercept interviews, about pharmaceutical DTCA: recalled products, exposure frequency, exposure medium, and impact on a range of health-related behaviors and beliefs. Consumers report inundation with DTCA, with 8 of 10 respondents indicating exposure to messaging within the past 30 days. Television was the medium with the most noted impressions; direct mail, the least (although still >35%). Most impressions reported were for Viagra and Claritin. One of four participants reported cognitive or behavioral changes as a result of viewing DTCA: advertisements prompted people to believe they had an illness/condition, to seek more information, to schedule provider visits, and to ask providers about symptoms or medications during regular visits. Moreover, almost 1 in 5 reported an increased willingness to share their prescription medication with others if they saw it in DTCA, indicating that DTCA exposure may increase this risky behavior. DTCA are nearly ubiquitous yet consumers remained attuned to the message content. The effects of DTCA are complex and range from beneficial (e.g., information-seeking) to detrimental (e.g. medication-sharing). Interestingly, participants do not readily differentiate prescription versus over-the-counter DTCA. Increased attention to understanding DTCA appears worthwhile, perhaps targeting provider awareness of message effect, further regulation and modification of DTCA messaging, and enhancing DTCA media literacy as a component of health literacy. Human factors professionals have the right toolset to play an active role in these efforts. }, number={21}, journal={Proceedings of the Human Factors and Ergonomics Society Annual Meeting}, publisher={SAGE Publications}, author={Mayhorn, Christopher B. and Goldsworthy, Richard C.}, year={2010}, month={Sep}, pages={1885–1889} } @article{mayhorn_goldsworthy_2010, title={Messages and medical behaviors: DTCA's influence on healthcare consumer thinking and doing, and how we can help}, DOI={10.1037/e578822012-013}, journal={PsycEXTRA Dataset}, publisher={American Psychological Association (APA)}, author={Mayhorn, Christopher B. and Goldsworthy, Richard C.}, year={2010} } @article{kim_wogalter_mayhorn_2010, title={Older and Younger Drivers' Beliefs about Motor Vehicle Features to Benefit Their Safe Driving}, DOI={10.1037/e578632012-005}, journal={PsycEXTRA Dataset}, publisher={American Psychological Association (APA)}, author={Kim, Soyun and Wogalter, Michael S. and Mayhorn, Christopher B.}, year={2010} } @article{kim_wogalter_mayhorn_2010, title={Older and Younger Drivers' Beliefs about Motor Vehicle Features to Benefit Their Safe Driving}, volume={54}, ISSN={2169-5067 1071-1813}, url={http://dx.doi.org/10.1177/154193121005400205}, DOI={10.1177/154193121005400205}, abstractNote={ Because there are age-related perceptual, motor, and cognitive declines and because people are living longer, there has been increased concern about older drivers' ability to operate motor vehicles safely. This research examined older and younger adults' perceptions regarding a set of 28 motor vehicle features/aspects according to the extent to which they believed it may help their safe driving. Several features were judged as more important than others regarding safe driving. Although both age groups predominately gave similar evaluations, some features/aspects differed significantly between the two age groups. Older adults believed that vehicle door openings should be easier to get into and out of, preferred analog displays, and labels on the dashboard that were bigger and brighter, and held less strong beliefs that current vehicle controls and displays are easy to use than did younger adults. Implications and design recommendations are discussed. A list of vehicle features that are potentially beneficial to older drivers is presented. }, number={2}, journal={Proceedings of the Human Factors and Ergonomics Society Annual Meeting}, publisher={SAGE Publications}, author={Kim, Soyun and Wogalter, Michael S. and Mayhorn, Christopher B.}, year={2010}, month={Sep}, pages={160–164} } @inproceedings{mayhorn_wogalter_conzola_2010, title={Perceptions of sport utility vehicle (SUV) safety by SUV-drivers and non-drivers}, booktitle={Proceedings of the Third Applied Human Factors and Ergonomics International Conference}, author={Mayhorn, C.B. and Wogalter, M.S. and Conzola, V.C.}, year={2010} } @book{mayhorn_2010, edition={4th}, title={Pre-test/Post-test Supplement for Coon & Mitterer’s Journey in Psychology: The Mysteries of Human Behavior}, publisher={Thomson-Wadsworth Press}, author={Mayhorn, C.B.}, year={2010} } @article{mayhorn_wogalter_2010, title={Preface to the Special Issue: Considering the Warning Context - New Research Methodologies and Advances}, volume={20}, ISSN={["1090-8471"]}, DOI={10.1002/hfm.20238}, abstractNote={In the last two decades, a large body of research has been published on warnings. There have been hundreds of research-based articles written in various journals as well as several comprehensive books. This special issue of Human Factors and Ergonomics in Manufacturing & Service Industries (HFEMSI) concerns the topic of warnings. Although there have been special issues on warnings in several human factors/ ergonomics journals, this is the first for HFEMSI. Warnings are relevant in the sectors of manufacturing and service because hazards are embedded in most contexts today. For example, in manufacturing, there are dangers in the production side of product and equipment, as well as hazards involved in the actual use. There are diverse contexts in which warnings are used as a means to disseminate safety information for the purpose of reducing hazard-related harm to people and property. Examples include warning labels on products, signage in environments, and admonitions in operator’s manuals for industrial equipment. Co-occurring with the growing body of warning research has been the development of models to conceptualize the cognitive processing involved when people encounter effective warnings (e.g., Edworthy & Adams, 1996; Lehto & Miller, 1986; Rogers, Lamson, & Rousseau, 2000). A recent iteration of the communication-human information processing (C-HIP) model (see Wogalter, 2006) can be used to conceptualize much of the body of research on warnings. The C-HIP model depicted in Figure 1 has two main sections, each with several component stages. The first section of the framework uses a communications}, number={6}, journal={HUMAN FACTORS AND ERGONOMICS IN MANUFACTURING & SERVICE INDUSTRIES}, author={Mayhorn, Christopher B. and Wogalter, Michael S.}, year={2010}, pages={481–483} } @article{brill_andre_beith_boehm-davis_gawron_mayhorn_2010, title={The Future of Human Factors Education: Practices and Needs from the Perspectives of Academia, Government, and Industry}, volume={54}, ISSN={2169-5067 1071-1813}, url={http://dx.doi.org/10.1177/154193121005400801}, DOI={10.1177/154193121005400801}, abstractNote={ This paper is intended to reflect the thoughts and opinions of panel discussants on the status and future of formal education in human factors and ergonomics. Major themes include the need for students to develop analytic abilities within the context of the scientist-practitioner model and the continued splintering within the field of Human Factors/Ergonomics (HF/E) by area of practice. Suggestions for meeting market demands include developing increasingly flexible curricula while encouraging students gain domain-specific knowledge and skills. Others support the “tried and true” scientist-practitioner model. }, number={8}, journal={Proceedings of the Human Factors and Ergonomics Society Annual Meeting}, publisher={SAGE Publications}, author={Brill, J. Christopher and Andre, Anthony D. and Beith, Barry and Boehm-Davis, Deborah A. and Gawron, Valerie J. and Mayhorn, Christopher B.}, year={2010}, month={Sep}, pages={652–656} } @inbook{west_mayhorn_hardee_mendel_2010, title={The Weakest Link: A Psychological Perspective on Why Users Make Poor Security Decisions}, url={http://dx.doi.org/10.4018/978-1-60566-036-3.ch004}, DOI={10.4018/978-1-60566-036-3.ch004}, abstractNote={The goal of this chapter is to raise awareness of cognitive and human factors issues that influence user behavior when interacting with systems and making decisions with security consequences. This chapter is organized around case studies of computer security incidents and known threats. For each case study, we provide an analysis of the human factors involved based on a system model approach composed of three parts: the user, the technology, and the environment. Each analysis discusses how the user interacted with the technology within the context of the environment to actively contribute to the incident. Using this approach, we introduce key concepts from human factors research and discuss them within the context of computer security. With a fundamental understanding of the causes that lead users to make poor security decisions and take risky actions, we hope designers of security systems are better equipped to mitigate those risks. }, booktitle={Social and Human Elements of Information Security}, publisher={IGI Global}, author={West, Ryan and Mayhorn, Christopher and Hardee, Jefferson and Mendel, Jeremy}, editor={Gupta, Manish and Sharman, RajEditors}, year={2010}, month={May}, pages={43–60} } @article{mendel_mayhorn_hardee_west_pak_2010, title={The effect of warning design and personalization on user compliance in computer security dialogs}, DOI={10.1037/e578842012-013}, journal={PsycEXTRA Dataset}, publisher={American Psychological Association (APA)}, author={Mendel, Jeremy and Mayhorn, Christopher B. and Hardee, Jefferson B. and West, Ryan T. and Pak, Richard}, year={2010} } @article{brill_andre_beith_boehm-davis_gawron_mayhorn_2010, title={The future of human factors education: Practices and needs from the perspectives of academia, government, and industry}, DOI={10.1037/e578692012-001}, journal={PsycEXTRA Dataset}, publisher={American Psychological Association (APA)}, author={Brill, J. Christopher and Andre, Anthony D. and Beith, Barry and Boehm-Davis, Deborah A. and Gawron, Valerie J. and Mayhorn, Christopher B.}, year={2010} } @article{nyeste_mayhorn_2010, title={Training Users to Counteract Phishing}, volume={54}, ISSN={2169-5067 1071-1813}, url={http://dx.doi.org/10.1177/154193121005402311}, DOI={10.1177/154193121005402311}, abstractNote={ Phishing is becoming more prevalent year to year with escalating costs and risks to society. The present study attempts to show a relationship between established anti-phishing training techniques and individual differences that include cognitive abilities and personality factors which could affect the probability of getting phished. At present, a subset of the data from a proposed factorial design has been collected from twenty participants. Preliminary results from a computerized assessment of phishing susceptibility are described using signal detection terminology. }, number={23}, journal={Proceedings of the Human Factors and Ergonomics Society Annual Meeting}, publisher={SAGE Publications}, author={Nyeste, Patrick G and Mayhorn, Christopher B}, year={2010}, month={Sep}, pages={1956–1960} } @article{nyeste_mayhorn_2010, title={Training users to counteract phishing}, DOI={10.1037/e578842012-012}, journal={PsycEXTRA Dataset}, publisher={American Psychological Association (APA)}, author={Nyeste, Patrick G. and Mayhorn, Christopher B.}, year={2010} } @article{kim_mayhorn_wogalter_2010, title={Use of Information Sources Referenced in and Attitudes about Televised DTC Prescription Drug Advertisements}, volume={54}, ISSN={2169-5067 1071-1813}, url={http://dx.doi.org/10.1177/154193121005402111}, DOI={10.1177/154193121005402111}, abstractNote={ Unlike most advertising, direct-to-consumer (DTC) prescription drug advertising on television frequently contains warnings. Because of the brevity of the warning message, a follow-up source with more detailed information is given. This research examined the reported likelihood of using several follow-up sources as well as their beliefs about the completeness/accuracy and ease of access of those sources. Also examined were various other beliefs and attitudes associated with DTC prescription drug television advertising. Participants reported that they would more likely to use certain follow-up sources such as the Internet more than other sources such as an advertisement in a particular magazine and believed that certain sources provide more complete/accurate and more accessible information than other sources. The results indicate that the Internet is a growing information source that people use to find out more about prescription drugs viewed in advertisements. Participants' responses indicate skepticism about the goals and content of DTC prescription drug advertising, although the responses also indicate that they believe that there are potential benefits of such advertising. Implications for research in risk communication and warnings are discussed. }, number={21}, journal={Proceedings of the Human Factors and Ergonomics Society Annual Meeting}, publisher={SAGE Publications}, author={Kim, Soyun and Mayhorn, Christopher B. and Wogalter, Michael S.}, year={2010}, month={Sep}, pages={1880–1884} } @article{kim_mayhorn_wogalter_2010, title={Use of information sources referenced in and attitudes about televised DTC prescription drug advertisements}, DOI={10.1037/e578822012-012}, journal={PsycEXTRA Dataset}, publisher={American Psychological Association (APA)}, author={Kim, Soyun and Mayhorn, Christopher B. and Wogalter, Michael S.}, year={2010} } @article{goldsworthy_mayhorn_meade_2010, title={Warnings in Manufacturing: Improving Hazard-Mitigation Messaging through Audience Analysis}, volume={20}, ISSN={["1520-6564"]}, DOI={10.1002/hfm.20163}, abstractNote={Abstract}, number={6}, journal={HUMAN FACTORS AND ERGONOMICS IN MANUFACTURING & SERVICE INDUSTRIES}, publisher={Wiley}, author={Goldsworthy, Richard C. and Mayhorn, Christopher B. and Meade, Adam W.}, year={2010}, pages={484–499} } @article{mayhorn_goldsworthy_2009, title={Borrowing prescription medication: Implications for healthcare warnings and communications}, DOI={10.1037/e578542012-015}, journal={PsycEXTRA Dataset}, publisher={American Psychological Association (APA)}, author={Mayhorn, Christopher B. and Goldsworthy, Richard C.}, year={2009} } @inproceedings{mayhorn_goldsworthy_2009, title={Direct-to-consumer advertising: A one-sided health communication "experiment"?}, booktitle={137th American Public Health Association Annual Meeting and Exposition}, author={Mayhorn, C.B. and Goldsworthy, R.C.}, year={2009} } @inproceedings{mayhorn_goldsworthy_2009, title={Exploring the impact of prescription medication sharing}, booktitle={Proceedings of the 17th World Congress of the International Ergonomics Association}, author={Mayhorn, C.B. and Goldsworthy, R.C.}, year={2009} } @article{mayhorn_2009, title={Human factors/ergonomics: An international perspective}, volume={52}, number={10}, journal={HFES Bulletin}, author={Mayhorn, C.B.}, year={2009}, month={Oct} } @article{mayhorn_goldsworthy_2009, title={New and Improved: The Role of Text Augmentation and the Application of Response Interpretation Standards (Coding Schemes) in a Final Iteration of Birth Defects Warnings Development}, volume={85}, ISSN={["1542-0760"]}, DOI={10.1002/bdra.20601}, abstractNote={Abstract}, number={10}, journal={BIRTH DEFECTS RESEARCH PART A-CLINICAL AND MOLECULAR TERATOLOGY}, author={Mayhorn, Christopher B. and Goldsworthy, Richard C.}, year={2009}, month={Oct}, pages={864–871} } @article{goldsworthy_mayhorn_2009, title={On warning symbols, text, and 'getting it right': The iterative refinement of a teratogenic pharmaceutical label}, DOI={10.1037/e578542012-014}, journal={PsycEXTRA Dataset}, publisher={American Psychological Association (APA)}, author={Goldsworthy, Richard C. and Mayhorn, Christopher B.}, year={2009} } @inproceedings{nyeste_mayhorn_2009, title={Perceptions of cybersecurity: An exploratory analysis}, booktitle={Proceedings of the 17th World Congress of the International Ergonomics Association}, author={Nyeste, P.G. and Mayhorn, C.B.}, year={2009} } @article{goldsworthy_mayhorn_2009, title={Prescription Medication Sharing Among Adolescents: Prevalence, Risks, and Outcomes}, volume={45}, ISSN={["1879-1972"]}, DOI={10.1016/j.jadohealth.2009.06.002}, abstractNote={