Visible to the public Biblio

Filters: Author is Prairie Rose Goodwin  [Clear All Filters]
2015-04-07
Robert St. Amant, Prairie Rose Goodwin, Ignacio Dominguez, David L. Roberts.  2015.  Toward Expert Typing in ACT-R. Proceedings of the 2015 International Conference on Cognitive Modeling (ICCM 15).
2016-10-05
Ignacio X. Dominguez, Prairie Rose Goodwin, David L. Roberts, Robert St. Amant.  2016.  Human Subtlety Proofs: Using Computer Games to Model Cognitive Processes for Cybersecurity. International Journal of Human–Computer Interaction. :null.

AbstractThis article describes an emerging direction in the intersection between human-computer interaction and cognitive science: the use of cognitive models to give insight into the challenges of cybersecurity. The article gives a brief overview of work in different areas of cybersecurity where cognitive modeling research plays a role, with regard to direct interaction between end users and computer systems and with regard to the needs of security analysts working behind the scenes. The problem of distinguishing between human users and automated agents (bots) interacting with computer systems is introduced, as well as ongoing efforts toward building Human Subtlety Proofs, persistent and unobtrusive windows into human cognition with direct application to cybersecurity. Two computer games are described, proxies to illustrate different ways in which cognitive modeling can potentially contribute to the development of HSPs and similar cybersecurity applications.

2016-10-11
Ignacio X. Dominguez, Prairie Rose Goodwin, David L. Roberts, Robert St. Amant.  2016.  Human Subtlety Proofs: Using Computer Games to Model Cognitive Processes for Cybersecurity. International Journal of Human–Computer Interaction.

This article describes an emerging direction in the intersection between human-computer interaction and cognitive science: the use of cognitive models to give insight into the challenges of cybersecurity. The article gives a brief overview of work in different areas of cybersecurity where cognitive modeling research plays a role, with regard to direct interaction between end users and computer systems and with regard to the needs of security analysts working behind the scenes. The problem of distinguishing between human users and automated agents (bots) interacting with computer systems is introduced, as well as ongoing efforts toward building Human Subtlety Proofs, persistent and unobtrusive windows into human cognition with direct application to cybersecurity. Two computer games are described, proxies to illustrate different ways in which cognitive modeling can potentially contribute to the development of HSPs and similar cybersecurity applications.