![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
The Effects of Cue Utilization and Cognitive Load in the Detection of Phishing Emails
Phishing emails represent a major threat to online information security. While the prevailing research is focused on users’ susceptibility, few studies have considered the decision making strategies that accou...
-
Chapter and Conference Paper
Sharpening the BLADE: Missing Data Imputation Using Supervised Machine Learning
Incomplete data are quite common which can deteriorate statistical inference, often affecting evidence-based policymaking. A typical example is the Business Longitudinal Analysis Data Environment (BLADE), an A...
-
Chapter and Conference Paper
Exploring Novel Methodology for Classifying Cognitive Workload
This paper describes our work in extracting useful cognitive load classification information from a relatively simple and non-invasive physiological measurement technique, with application in a range of Human ...
-
Chapter and Conference Paper
Mouse Behavior as an Index of Phishing Awareness
Phishing attacks are one of the most common security challenges faced by individuals and organizations today. Although many techniques exist to filter out phishing emails, they are not always effective leaving...
-
Chapter and Conference Paper
Optimising Pump Scheduling for Water Distribution Networks
Energy costs can be a major component of operational costs for water utilities. Operational efficiencies including optimising energy costs while maintaining continuity of supply is one area to reduce overall o...
-
Chapter and Conference Paper
Social Engineering and Organisational Dependencies in Phishing Attacks
Phishing emails are a widespread cybersecurity attack method. Their breadth and depth have been on the rise as they target individuals and organisations with increased sophistication. In particular, social en...
-
Chapter
Do I Trust a Machine? Differences in User Trust Based on System Performance
Trust plays an important role in various user-facing systems and applications. It is particularly important in the context of decision support systems, where the system’s output serves as one of the inputs for...
-
Article
Water pipe condition assessment: a hierarchical beta process approach for sparse incident data
Prediction of water pipe condition through statistical modelling is an important element for the risk management strategy of water distribution systems. In this work a hierarchical nonparametric model has been...
-
Chapter
Designing Cognition-Adaptive Human–Computer Interface for Mission-Critical Systems
With applications of new information and communication technologies, computer-based information systems are becoming more and more sophisticated and complex. This is particularly true in large incident and eme...
-
Chapter and Conference Paper
Integrating Semantics into Multimodal Interaction Patterns
A user experiment on multimodal interaction (speech, hand position and hand shapes) to study two major relationships: between the level of cognitive load experienced by users and the resulting multimodal inter...
-
Chapter and Conference Paper
Wizard of Oz for Multimodal Interfaces Design: Deployment Considerations
The use of Wizard of Oz (WOz) techniques for the acquisition of multimodal interaction patterns is common, but often relies on highly or fully simulated functionality. This paper suggests that a more operation...
-
Chapter and Conference Paper
GEOMI: GEOmetry for Maximum Insight
This paper describes the GEOMI system, a visual analysis tool for the visualisation and analysis of large and complex networks. GEOMI provides a collection of network analysis methods, graph layout algorithms ...