Matching Items (62)
157421-Thumbnail Image.png
Description
Human-robot interaction has expanded immensely within dynamic environments. The goals of human-robot interaction are to increase productivity, efficiency and safety. In order for the integration of human-robot interaction to be seamless and effective humans must be willing to trust the capabilities of assistive robots. A major priority for human-robot interaction

Human-robot interaction has expanded immensely within dynamic environments. The goals of human-robot interaction are to increase productivity, efficiency and safety. In order for the integration of human-robot interaction to be seamless and effective humans must be willing to trust the capabilities of assistive robots. A major priority for human-robot interaction should be to understand how human dyads have been historically effective within a joint-task setting. This will ensure that all goals can be met in human robot settings. The aim of the present study was to examine human dyads and the effects of an unexpected interruption. Humans’ interpersonal and individual levels of trust were studied in order to draw appropriate conclusions. Seventeen undergraduate and graduate level dyads were collected from Arizona State University. Participants were broken up into either a surprise condition or a baseline condition. Participants individually took two surveys in order to have an accurate understanding of levels of dispositional and individual levels of trust. The findings showed that participant levels of interpersonal trust were average. Surprisingly, participants who participated in the surprise condition afterwards, showed moderate to high levels of dyad trust. This effect showed that participants became more reliant on their partners when interrupted by a surprising event. Future studies will take this knowledge and apply it to human-robot interaction, in order to mimic the seamless team-interaction shown in historically effective dyads, specifically human team interaction.
ContributorsShaw, Alexandra Luann (Author) / Chiou, Erin (Thesis advisor) / Cooke, Nancy J. (Committee member) / Craig, Scotty (Committee member) / Arizona State University (Publisher)
Created2019
156469-Thumbnail Image.png
Description
The 21st-century professional or knowledge worker spends much of the working day engaging others through electronic communication. The modes of communication available to knowledge workers have rapidly increased due to computerized technology advances: conference and video calls, instant messaging, e-mail, social media, podcasts, audio books, webinars, and much more. Professionals

The 21st-century professional or knowledge worker spends much of the working day engaging others through electronic communication. The modes of communication available to knowledge workers have rapidly increased due to computerized technology advances: conference and video calls, instant messaging, e-mail, social media, podcasts, audio books, webinars, and much more. Professionals who think for a living express feelings of stress about their ability to respond and fear missing critical tasks or information as they attempt to wade through all the electronic communication that floods their inboxes. Although many electronic communication tools compete for the attention of the contemporary knowledge worker, most professionals use an electronic personal information management (PIM) system, more commonly known as an e-mail application and often the ubiquitous Microsoft Outlook program. The aim of this research was to provide knowledge workers with solutions to manage the influx of electronic communication that arrives daily by studying the workers in their working environment. This dissertation represents a quest to understand the current strategies knowledge workers use to manage their e-mail, and if modification of e-mail management strategies can have an impact on productivity and stress levels for these professionals. Today’s knowledge workers rarely work entirely alone, justifying the importance of also exploring methods to improve electronic communications within teams.
ContributorsCounts, Virginia (Author) / Parrish, Kristen (Thesis advisor) / Allenby, Braden (Thesis advisor) / Landis, Amy (Committee member) / Cooke, Nancy J. (Committee member) / Arizona State University (Publisher)
Created2018
156622-Thumbnail Image.png
Description
Reasoning about the activities of cyber threat actors is critical to defend against cyber

attacks. However, this task is difficult for a variety of reasons. In simple terms, it is difficult

to determine who the attacker is, what the desired goals are of the attacker, and how they will

carry out their attacks.

Reasoning about the activities of cyber threat actors is critical to defend against cyber

attacks. However, this task is difficult for a variety of reasons. In simple terms, it is difficult

to determine who the attacker is, what the desired goals are of the attacker, and how they will

carry out their attacks. These three questions essentially entail understanding the attacker’s

use of deception, the capabilities available, and the intent of launching the attack. These

three issues are highly inter-related. If an adversary can hide their intent, they can better

deceive a defender. If an adversary’s capabilities are not well understood, then determining

what their goals are becomes difficult as the defender is uncertain if they have the necessary

tools to accomplish them. However, the understanding of these aspects are also mutually

supportive. If we have a clear picture of capabilities, intent can better be deciphered. If we

understand intent and capabilities, a defender may be able to see through deception schemes.

In this dissertation, I present three pieces of work to tackle these questions to obtain

a better understanding of cyber threats. First, we introduce a new reasoning framework

to address deception. We evaluate the framework by building a dataset from DEFCON

capture-the-flag exercise to identify the person or group responsible for a cyber attack.

We demonstrate that the framework not only handles cases of deception but also provides

transparent decision making in identifying the threat actor. The second task uses a cognitive

learning model to determine the intent – goals of the threat actor on the target system.

The third task looks at understanding the capabilities of threat actors to target systems by

identifying at-risk systems from hacker discussions on darkweb websites. To achieve this

task we gather discussions from more than 300 darkweb websites relating to malicious

hacking.
ContributorsNunes, Eric (Author) / Shakarian, Paulo (Thesis advisor) / Ahn, Gail-Joon (Committee member) / Baral, Chitta (Committee member) / Cooke, Nancy J. (Committee member) / Arizona State University (Publisher)
Created2018
157297-Thumbnail Image.png
Description
The purpose of this research was to determine if students who are enrolled in a professional flight program exhibit significantly higher rates of depression, stress, and anxiety. This study compared professional flight students to non-professional flight students to determine whether professional flight students have higher rates of depression and anxiety.

The purpose of this research was to determine if students who are enrolled in a professional flight program exhibit significantly higher rates of depression, stress, and anxiety. This study compared professional flight students to non-professional flight students to determine whether professional flight students have higher rates of depression and anxiety. In addition, this study sought to determine if there were higher depression, anxiety, and stress levels in upperclassmen (juniors and seniors) than in lowerclassmen (freshman and sophomore). Finally, upperclassmen and underclassmen within professional flight programs were compared to test if upperclassmen professional flight students exhibit higher rates for depression, anxiety and stress. These groups were compared to each other by using a survey that measures depression, anxiety, and stress. There were no statistically significant results. No singular group is more or less prone to depression, anxiety, or stress.
ContributorsJacobs, Destry (Author) / Niemczyk, Mary (Thesis advisor) / Cooke, Nancy J. (Thesis advisor) / Nullmeyer, Robert (Committee member) / Cline, Paul (Committee member) / Arizona State University (Publisher)
Created2019
157253-Thumbnail Image.png
Description
Reading partners’ actions correctly is essential for successful coordination, but interpretation does not always reflect reality. Attribution biases, such as self-serving and correspondence biases, lead people to misinterpret their partners’ actions and falsely assign blame after an unexpected event. These biases thus further influence people’s trust in their partners, including

Reading partners’ actions correctly is essential for successful coordination, but interpretation does not always reflect reality. Attribution biases, such as self-serving and correspondence biases, lead people to misinterpret their partners’ actions and falsely assign blame after an unexpected event. These biases thus further influence people’s trust in their partners, including machine partners. The increasing capabilities and complexity of machines allow them to work physically with humans. However, their improvements may interfere with the accuracy for people to calibrate trust in machines and their capabilities, which requires an understanding of attribution biases’ effect on human-machine coordination. Specifically, the current thesis explores how the development of trust in a partner is influenced by attribution biases and people’s assignment of blame for a negative outcome. This study can also suggest how a machine partner should be designed to react to environmental disturbances and report the appropriate level of information about external conditions.
ContributorsHsiung, Chi-Ping (M.S.) (Author) / Chiou, Erin (Thesis advisor) / Cooke, Nancy J. (Thesis advisor) / Zhang, Wenlong (Committee member) / Arizona State University (Publisher)
Created2019
157345-Thumbnail Image.png
Description
The prospects of commercially available autonomous vehicles are surely tantalizing, however the implementation of these vehicles and their strain on the social dynamics between motorists and pedestrians remains unknown. Questions concerning how autonomous vehicles will communicate safety and intent to pedestrians remain largely unanswered. This study examines the efficacy of

The prospects of commercially available autonomous vehicles are surely tantalizing, however the implementation of these vehicles and their strain on the social dynamics between motorists and pedestrians remains unknown. Questions concerning how autonomous vehicles will communicate safety and intent to pedestrians remain largely unanswered. This study examines the efficacy of various proposed technologies for bridging the communication gap between self-driving cars and pedestrians. Displays utilizing words like “safe” and “danger” seem to be effective in communicating with pedestrians and other road users. Future research should attempt to study different external notification interfaces in real-life settings to more accurately gauge pedestrian responses.
ContributorsMuqolli, Endrit (Author) / Cooke, Nancy J. (Thesis advisor) / Chiou, Erin (Committee member) / Gray, Rob (Committee member) / Arizona State University (Publisher)
Created2019
157003-Thumbnail Image.png
Description
Future autonomous vehicle systems will be diverse in design and functionality since they will be produced by different brands. In the automotive industry, trustworthiness of a vehicle is closely tied to its perceived safety. Trust involves dependence on another agent in an uncertain situation. Perceptions of system safety, trustworthiness, and

Future autonomous vehicle systems will be diverse in design and functionality since they will be produced by different brands. In the automotive industry, trustworthiness of a vehicle is closely tied to its perceived safety. Trust involves dependence on another agent in an uncertain situation. Perceptions of system safety, trustworthiness, and performance are important because they guide people’s behavior towards automation. Specifically, these perceptions impact how reliant people believe they can be on the system to do a certain task. Over or under reliance can be a concern for safety because they involve the person allocating tasks between themselves and the system in inappropriate ways. If a person trusts a brand they may also believe the brand’s technology will keep them safe. The present study measured brand trust associations and performance expectations for safety between twelve different automobile brands using an online survey.

The literature and results of the present study suggest perceived trustworthiness for safety of the automation and the brand of the automation, could together impact trust. Results revelated that brands closely related to the trust-based attributes, Confidence, Secure, Integrity, and Trustworthiness were expected to produce autonomous vehicle technology that performs in a safer way. While, brands more related to the trust-based attributes Harmful, Deceptive, Underhanded, Suspicious, Beware, and Familiar were expected to produce autonomous vehicle technology that performs in a less safe way.

These findings contribute to both the fields of Human-Automation Interaction and Consumer Psychology. Typically, brands and automation are discussed separately however, this work suggests an important relationship may exist. A deeper understanding of brand trust as it relates to autonomous vehicles can help producers understand potential for over or under reliance and create safer systems that help users calibrate trust appropriately. Considering the impact on safety, more research should be conducted to explore brand trust and expectations for performance between various brands.
ContributorsCelmer, Natalie (Author) / Branaghan, Russell (Thesis advisor) / Chiou, Erin (Thesis advisor) / Cooke, Nancy J. (Committee member) / Arizona State University (Publisher)
Created2018
155132-Thumbnail Image.png
Description
This research evaluates a cyber test-bed, DEXTAR (Defense Exercises for Team Awareness Research), and examines the relationship between good and bad team performance in increasingly difficult scenarios. Twenty-one computer science graduate students (seven three-person teams), with experience in cybersecurity, participated in a team-based cyber defense exercise in the context of

This research evaluates a cyber test-bed, DEXTAR (Defense Exercises for Team Awareness Research), and examines the relationship between good and bad team performance in increasingly difficult scenarios. Twenty-one computer science graduate students (seven three-person teams), with experience in cybersecurity, participated in a team-based cyber defense exercise in the context of DEXTAR, a high fidelity cybersecurity testbed. Performance measures were analyzed in addition to team process, team behavior, and workload to examine the relationship between good and bad teams. Lessons learned are reported that will inform the next generation of DEXTAR.
ContributorsBradbury, Aaron (Author) / Cooke, Nancy J. (Thesis advisor) / Branaghan, Russell (Committee member) / Roscoe, Rod (Committee member) / Arizona State University (Publisher)
Created2016
154998-Thumbnail Image.png
Description
Intelligence analysts’ work has become progressively complex due to increasing security threats and data availability. In order to study “big” data exploration within the intelligence domain the intelligence analyst task was abstracted and replicated in a laboratory (controlled environment). Participants used a computer interface and movie database to

Intelligence analysts’ work has become progressively complex due to increasing security threats and data availability. In order to study “big” data exploration within the intelligence domain the intelligence analyst task was abstracted and replicated in a laboratory (controlled environment). Participants used a computer interface and movie database to determine the opening weekend gross movie earnings of three pre-selected movies. Data consisted of Twitter tweets and predictive models. These data were displayed in various formats such as graphs, charts, and text. Participants used these data to make their predictions. It was expected that teams (a team is a group with members who have different specialties and who work interdependently) would outperform individuals and groups. That is, teams would be significantly better at predicting “Opening Weekend Gross” than individuals or groups. Results indicated that teams outperformed individuals and groups in the first prediction, under performed in the second prediction, and performed better than individuals in the third prediction (but not better than groups). Insights and future directions are discussed.
ContributorsBuchanan, Verica (Author) / Cooke, Nancy J. (Thesis advisor) / Maciejewski, Ross (Committee member) / Craig, Scotty D. (Committee member) / Arizona State University (Publisher)
Created2016
155239-Thumbnail Image.png
Description
Civilian and military use of remotely piloted aircraft (RPA) has significantly increased in recent years. Specifically, the United States Air Force (USAF) has an insatiable demand for RPA operations, that are responsible for fulfilling critical demands in every theater 24 hours a day, 365 days a year (United States Air

Civilian and military use of remotely piloted aircraft (RPA) has significantly increased in recent years. Specifically, the United States Air Force (USAF) has an insatiable demand for RPA operations, that are responsible for fulfilling critical demands in every theater 24 hours a day, 365 days a year (United States Air Force, 2015). Around the clock operations have led to a manning shortage of RPA pilots in the USAF. The USAF MQ-9 “Reaper” Weapons School trains tactical experts and leaders of Airmen skilled in the art of integrated battle-space dominance (United States Air Force, 2015). Weapons Officers for the MQ-9 platform are also critically under-manned, with only 17% of allocated slots filled (B. Callahan, personal communication, January 28, 2016). Furthermore, the leading cause of training attrition has been attributed to lack of critical thinking and problem solving skills (B. Callahan, personal communication, January 28, 2016); skills not directly screened for prior to entering the RPA pilot career field. The proposed study seeks to discover patterns of student behaviors in the brief and debrief process in Weapons School, with the goal of identifying the competencies that distinguish the top students in Weapons School.
ContributorsDriggs, Jade B (Author) / Cooke, Nancy J. (Thesis advisor) / Niemczyk, Mary (Committee member) / Roscoe, Rod (Committee member) / Arizona State University (Publisher)
Created2017