Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    The Effects of Cue Utilization and Cognitive Load in the Detection of Phishing Emails

    Phishing emails represent a major threat to online information security. While the prevailing research is focused on users’ susceptibility, few studies have considered the decision making strategies that accou...

    George Nasser, Ben W. Morrison in Financial Cryptography and Data Security (2020)

  2. No Access

    Chapter and Conference Paper

    Sharpening the BLADE: Missing Data Imputation Using Supervised Machine Learning

    Incomplete data are quite common which can deteriorate statistical inference, often affecting evidence-based policymaking. A typical example is the Business Longitudinal Analysis Data Environment (BLADE), an A...

    Marcus Suresh, Ronnie Taib, Yanchang Zhao in AI 2019: Advances in Artificial Intelligen… (2019)

  3. No Access

    Chapter and Conference Paper

    Exploring Novel Methodology for Classifying Cognitive Workload

    This paper describes our work in extracting useful cognitive load classification information from a relatively simple and non-invasive physiological measurement technique, with application in a range of Human ...

    Seth Siriya, Martin Lochner, Andreas Duenser in Intelligent Technologies for Interactive E… (2019)

  4. Chapter and Conference Paper

    Mouse Behavior as an Index of Phishing Awareness

    Phishing attacks are one of the most common security challenges faced by individuals and organizations today. Although many techniques exist to filter out phishing emails, they are not always effective leaving...

    Kun Yu, Ronnie Taib, Marcus A. Butavicius in Human-Computer Interaction – INTERACT 2019 (2019)

  5. No Access

    Chapter and Conference Paper

    Optimising Pump Scheduling for Water Distribution Networks

    Energy costs can be a major component of operational costs for water utilities. Operational efficiencies including optimising energy costs while maintaining continuity of supply is one area to reduce overall o...

    Yanchang Zhao, Bin Liang, Yang Wang in AI 2019: Advances in Artificial Intelligen… (2019)

  6. Chapter and Conference Paper

    Social Engineering and Organisational Dependencies in Phishing Attacks

    Phishing emails are a widespread cybersecurity attack method. Their breadth and depth have been on the rise as they target individuals and organisations with increased sophistication. In particular, social en...

    Ronnie Taib, Kun Yu, Shlomo Berkovsky in Human-Computer Interaction – INTERACT 2019 (2019)

  7. No Access

    Chapter

    Do I Trust a Machine? Differences in User Trust Based on System Performance

    Trust plays an important role in various user-facing systems and applications. It is particularly important in the context of decision support systems, where the system’s output serves as one of the inputs for...

    Kun Yu, Shlomo Berkovsky, Dan Conway, Ronnie Taib in Human and Machine Learning (2018)

  8. Article

    Water pipe condition assessment: a hierarchical beta process approach for sparse incident data

    Prediction of water pipe condition through statistical modelling is an important element for the risk management strategy of water distribution systems. In this work a hierarchical nonparametric model has been...

    Zhidong Li, Bang Zhang, Yang Wang, Fang Chen, Ronnie Taib in Machine Learning (2014)

  9. No Access

    Chapter

    Designing Cognition-Adaptive Human–Computer Interface for Mission-Critical Systems

    With applications of new information and communication technologies, computer-based information systems are becoming more and more sophisticated and complex. This is particularly true in large incident and eme...

    Yu Shi, Eric Choi, Ronnie Taib, Fang Chen in Information Systems Development (2010)

  10. No Access

    Chapter and Conference Paper

    Integrating Semantics into Multimodal Interaction Patterns

    A user experiment on multimodal interaction (speech, hand position and hand shapes) to study two major relationships: between the level of cognitive load experienced by users and the resulting multimodal inter...

    Ronnie Taib, Natalie Ruiz in Machine Learning for Multimodal Interaction (2008)

  11. No Access

    Chapter and Conference Paper

    Wizard of Oz for Multimodal Interfaces Design: Deployment Considerations

    The use of Wizard of Oz (WOz) techniques for the acquisition of multimodal interaction patterns is common, but often relies on highly or fully simulated functionality. This paper suggests that a more operation...

    Ronnie Taib, Natalie Ruiz in Human-Computer Interaction. Interaction Design and Usability (2007)

  12. Chapter and Conference Paper

    GEOMI: GEOmetry for Maximum Insight

    This paper describes the GEOMI system, a visual analysis tool for the visualisation and analysis of large and complex networks. GEOMI provides a collection of network analysis methods, graph layout algorithms ...

    Adel Ahmed, Tim Dwyer, Michael Forster, **aoyan Fu, Joshua Ho in Graph Drawing (2006)