Jeremiah D. Still, Ph.D.
My Vita (.pdf)
Dr. Still

My research reveals implicit cognitive processes that can be used to help designers develop intuitive interfaces. The PoD lab is currently developing models to predict eye movements within interfaces. Helping designers guide users effectively through interfaces. We are also improving and inventing usable authentication methods. Making logging into a system easier and safer by designing interactions that exploit users' natural cognitive abilities.

Visit the Lab to Learn More:


Liberal Arts and Sciences Council of Chairpersons Award for 2012

Dr. James V. Mehl Outstanding Faculty Scholarship Award for 2011 {one faculty member is selected from the university yearly for this award}

Exceptional Teaching in a Small Enrollment Course Award, awarded 2008, Department of Psychology at Iowa State University

Design Cognition Best Paper Prize at the Third International Conference on Design Computing and Cognition (2008, Georgia Institute of Technology)

Human-Computer Interaction Student of the Year, awarded 2008, Iowa State University [ Video ]

Glenn D. Dolence Recognition Award “Distinguished Contributions to the University Community”, awarded 2004, Missouri Southern State University – Joplin

Select Publications: Main Focus:
My Archive:

Grgic, J., Still, M. L., & Still, J. D. (2016). Effects of cognitive load on affordance-based interactions. Journal of Applied Cognitive Psychology, 30, 1042-1051. [ Article ]

Still, J. D. (2016). Cybersecurity needs you! ACM Interactions (May + June: Feature), 23(3), 54-58. [ Article ]

Still, J. D., Still, M. L., & Grgic, J. (2015). Designing intuitive interactions: Exploring performance and reflection measures. Interacting with Computers, 27, 271-286. [ Article ]

Schuster, D., Still, M. L., Still, J. D., Lim, J. J., Feria, C., & Rohrer, C. (2015). Opinions or algorithms: An investigation of trust in people versus automation in app store security. Proceedings of the 3rd Human Aspects of Information Security, Privacy, and Trust held at the 17th International Conference on Human-Computer Interaction, 415-425. Article ]

Still, J. D. & Dark, V. J. (2013). Cognitively describing and designing affordances. Journal of Design Studies, 34(3), 285-301. [ Article ]

Still, J. D. & Masciocchi, C. M. (2012). Considering the influence of visual saliency during interface searches. In Alkhalifa, E. M. & Gaid, K. (Eds.), Cognitively Informed Intelligent Interfaces: Systems Design and Development (pp. 84-97). Hershey, PA: Information Science. [ Article

Still, J. D. (2011, May + June). Experimental design: Does external validity trump internal validity? ACM Interactions: Feature18(13), 66-68. [ Article ]

Still, J. D ., & Dark, V. J. (2010). Examining working memory load and congruency effects on affordances and conventions. International Journal of Human-Computer Studies, 68(9), 561-571. [ Article ] 

Modeling overt attention within interfaces

Masciocchi, C. M. & Still, J. D. (2013). Alternatives to eye tracking for predicting stimulus-driven attentional selection within interfaces. Journal of Human-Computer Interaction, 34, 285-301. [ Article ]

Still, J. D. & Masciocchi, C. M. (2010). A saliency model predicts fixations in web interfaces. Proceedings of the Computer-Human Interaction Conference, 5th International Workshop on Model-Driven Development of Advanced User Interfaces, Atlanta, GA.  [ Article ]

Human-Centered Cybersecurity

Cain, A. A., & Still, J. D. (2016). A rapid serial visual presentation method for graphical authentication. In D. Nicholson (Ed.), Advances in Human Factors Cybersecurity (pp. 3-12). Walt Disney World, Florida, USA: Springer.

Cain, A. A., Chiu, L., Santiago, F., & Still, J. D. (2016). Swipe authentication: Exploring over-the-shoulder attack performance. In D. Nicholson (Ed.), Advances in Human Factors Cybersecurity (pp. 327-336). Walt Disney World, Florida, USA: Springer.

Lee, L. & Still, J. D. (2015). Re-designing permission requirements to encourage BYOD policy adherence.Proceedings of the 3rd Human Aspects of Information Security, Privacy, and Trust held at the 17th International Conference on Human-Computer Interaction, 369-378. [ Article ]







Preferred Contact: jstill[at]odu.edu123