Jeremiah D. Still, Ph.D.
My Vita (.pdf)
Dr. Still

My research reveals implicit cognitive processes that can be used to help designers develop intuitive interfaces. The PoD lab is currently developing models to predict eye movements within interfaces. Helping designers guide users effectively through interfaces. We are also improving and inventing usable authentication methods. Making logging into a system easier and safer by designing interactions that exploit users' natural cognitive abilities.

Visit the Lab to Learn More:


Liberal Arts and Sciences Council of Chairpersons Award for 2012

Dr. James V. Mehl Outstanding Faculty Scholarship Award for 2011 {one faculty member is selected from the university yearly for this award}

Exceptional Teaching in a Small Enrollment Course Award, awarded 2008, Department of Psychology at Iowa State University

Design Cognition Best Paper Prize at the Third International Conference on Design Computing and Cognition (2008, Georgia Institute of Technology)

Human-Computer Interaction Student of the Year, awarded 2008, Iowa State University [ Video ]

Glenn D. Dolence Recognition Award “Distinguished Contributions to the University Community”, awarded 2004, Missouri Southern State University – Joplin

Select Publications: Main Focus:
My Archive:

Still, J. D. (accepted). Cybersecurity needs you! ACM Interactions: Feature

Still, M. L. & Still, J. D. (2015). Contrasting traditional in-class exams with frequent online testing. Journal of Teaching and Learning with Technology, 4, 30-40. [ Download ]

Still, J. D., Still, M. L., & Grgic, J. (2015). Designing intuitive interactions: Exploring performance and reflection measures. Interacting with Computers, 27, 271-286. [ Article ]

Schuster, D., Still, M. L., Still, J. D., Lim, J. J., Feria, C., & Rohrer, C. (2015). Opinions or algorithms: An investigation of trust in people versus automation in app store security. Proceedings of the 3rd Human Aspects of Information Security, Privacy, and Trust held at the 17th International Conference on Human-Computer Interaction, 415-425. Article ]

Still, J. D. & Dark, V. J. (2013). Cognitively describing and designing affordances. Journal of Design Studies, 34(3), 285-301. [ Article ]

Still, J. D. & Masciocchi, C. M. (2012). Considering the influence of visual saliency during interface searches. In Alkhalifa, E. M. & Gaid, K. (Eds.), Cognitively Informed Intelligent Interfaces: Systems Design and Development (pp. 84-97). Hershey, PA: Information Science. [ Article

Still, J. D. (2011, May + June). Experimental design: Does external validity trump internal validity? ACM Interactions: Feature18(13), 66-68. [ Article ]

Still, J. D ., & Dark, V. J. (2010). Examining working memory load and congruency effects on affordances and conventions. International Journal of Human-Computer Studies, 68(9), 561-571. [ Article ] 

Modeling overt attention within interfaces

Masciocchi, C. M. & Still, J. D. (2013). Alternatives to eye tracking for predicting stimulus-driven attentional selection within interfaces. Journal of Human-Computer Interaction, 34, 285-301. [ Article ]

Still, J. D. & Masciocchi, C. M. (2010). A saliency model predicts fixations in web interfaces. Proceedings of the Computer-Human Interaction Conference, 5th International Workshop on Model-Driven Development of Advanced User Interfaces, Atlanta, GA.  [ Article ]

Human-Centered Cybersecurity

Cain, A. & Still, J. D. (accepted). A rapid serial visual presentation approach to graphical authentication. 2nd International Conference on Human Factors in Cybersecurity

Cain, A., Chiu, L., Santiago, F., & Still, J. D. (accepted). Swipe authentication: Exploring over-the-shoulder-attack performance. 2nd International Conference on Human Factors in Cybersecurity

McEvoy, P., & Still, J. D. (accepted). Contextualizing mnemonic phrase passwords. 2nd International Conference on Human Factors in Cybersecurity

Lee, L. & Still, J. D. (2015). Re-designing permission requirements to encourage BYOD policy adherence.Proceedings of the 3rd Human Aspects of Information Security, Privacy, and Trust held at the 17th International Conference on Human-Computer Interaction, 369-378. [ Article ]







Preferred Contact: jstill[at]odu.edu123