My Research Archive

Jeremiah Still, PhD

2023

Sato, T., Islam, S., Still, J. D., Scerbo, M. W., & Yamani, Y. (2023). Task priority reduces an adverse effect of task load on automation trust: A multitasking flight simulator study. Journal of Cognition, Technology & Work, 25, 1-13.

The present study examined how task priority influences operators’ scanning patterns and trust ratings toward imperfect automation. Previous research demonstrated that participants display lower trust and fixate less frequently toward a visual display for the secondary task assisted with imperfect automation when the primary task demanded more attention. One account for this phenomenon is that the increased primary task demand induced the participants to prioritize the primary task than the secondary task. The present study asked participants to perform a tracking task, system monitoring task, and resource management task simultaneously using the Multi-Attribute Task Battery (MATB) II. Automation assisted the system monitoring task with 70% reliability. Task load was manipulated via difficulty of the tracking task. Participants were explicitly instructed to either prioritize the tracking task over all other tasks (tracking priority condition) or reduce tracking performance (equal priority condition). The results demonstrate the effects of task load on attention distribution, task performance and trust ratings. Furthermore, participants under the equal priority condition reported lower performance-based trust when the tracking task required more frequent manual input (tracking condition), while no effect of task load was observed under the tracking priority condition. Task priority can modulate automation trust by eliminating the adverse effect of task load in a dynamic multitasking environment.

Morris, T.W., & Still, J.D. (2023). Cybersecurity hygiene: Blending home and work computing. In W. Patterson (Ed.), New Perspectives in Behavioral Cybersecurity. Boca Raton, FL: CRC Press.

Cybersecurity hygiene is explored within the context of the growing hybrid home-work computing environment. The concepts of cyber hygiene and the hybrid home-work computing environment are examined and abstractly defined. In this chapter, an analogy between physical security and cybersecurity reveals how learning good cybersecurity behaviors differ from learning good physical security behaviors. Some proposed solutions to potential problems in the home-work environment are also scrutinized since these technology-focused solutions do not address the human element. Users need to be a part of the cybersecurity informational loop. We present how behavioral interventions (e.g., nudge, warning, and training) and good design practices can improve cyber hygiene. And, offer an initial set of practical cyber hygiene recommendations unique to home-work computer users. Future research in the home-work computing environment is discussed.

Proaps, A. B. & Still, J. D. (2023). Redesigning educational countermeasures to increase Virginia drivers’ road-sharing safety knowledge. Proceedings of Human Factors and Ergonomics Society International Conference, 67,1245-1250.

The lack of alignment between drivers’ and cyclists’ road-sharing knowledge results in unsafe interactions. To address this issue, educational countermeasures must clearly present and apply evidence-based practices to increase the likelihood that drivers will learn how to share the road safely with cyclists. In this study, we redesigned an existing Virginia road-sharing safety educational handbook to support a series of experiments. The redesign was based on established principles of instructional, organizational, and visual design. Virginia drivers completed a comprehension test after reviewing road-sharing educational material online. Results showed that reviewing the redesigned brochure did not improve global comprehension, law-based knowledge, and procedural knowledge about sharing the road with cyclists. However, the improved design of the educational material enhanced drivers’ declarative knowledge of road-sharing laws and safety. Further research is needed to determine the effectiveness of transferring these design choices to other transportation domains, so policymakers and instructors can effectively prioritize approaches for improving road safety.

Edwards, M. E., Morris, T., Chen. J. & Still, J. D. (2023). SMiShing Attack Vector: Surveying end-user behavior, experience, and knowledge. Proceedings of Human Factors and Ergonomics Society International Conference, 67, 1911-1915.

Phishing attacks steal sensitive and valuable information from end-users. Human Factors researchers have extensively studied Phishing over decades, revealing numerous psychological vulnerabilities. A greater understanding of the interaction between attackers and end-users has produced more effective: policies, models, training, and defensive mechanisms. The Human Factors literature lacks information about non-technical users’ knowledge, experience, and behaviors in response to SMiShing. The current survey collected pilot data from college students with average cyber hygiene scores. Our results suggest that while users do not clearly understand the term SMiShing, they report knowing the danger. While all participants reported that using links within text messages from unknown senders can lead to security vulnerabilities, most reported using the links anyway. Users vet messages based on the sender’s phone number and typos, rather than delivery time and other message recipients. These descriptive findings can be used to support future work attempting to defend against SMiShing attacks.

Still, J. D. (2023, Nov.). Quantifying the influence of visual saliency in interface displays. Talk presented at the 64th Annual Psychonomics Society Meeting, San Francisco, CA.

Although it can be easy to recognize a salient object within a visually homogeneous display determining relative salience becomes much more difficult within real-world displays. Visual saliency models provide a means to capture those stimulus-driven properties that are not available through introspection. Along these lines, computational models have been successfully employed to predict the deployment of attention within interfaces. By quantifying visual salience, designers gain insight into user actions like design patterns or affordances. This talk explores some initial discoveries that help us understand theunique influence salience has on search efficiency across a variety of interfaces. Our initial findings represent an effort to help designers create easier-to-search displays. Translating historically cognitive laboratory findings into useful design theory is challenging. Future needs and gaps in this endeavor will be highlighted.

 

2022

Garcia, K. R., Mishler, S., Xiao, Y., Wang, C., Hu, B., Still, J. D., & Chen. J. (2022). Drivers’ understanding of artificial intelligence in automated driving systems: A study of a malicious stop sign. Journal of Cognitive Engineering and Decision Making, 16, 237-251.

Automated Driving Systems (ADS), like many other systems people use today, depend on successful Artificial Intelligence (AI) for safe roadway operations. In ADS, an essential function completed by AI is the computer vision techniques for detecting roadway signs by vehicles. The AI, though, is not always reliable and sometimes requires the human’s intelligence to complete a task. For the human to collaborate with the AI, it is critical to understand the human’s perception of AI. In the present study, we investigated how human drivers perceive the AI’s capabilities in a driving context where a stop sign is compromised and how knowledge, experience, and trust related to AI play a role. We found that participants with more knowledge of AI tended to trust AI more, and those who reported more experience with AI had a greater understanding of AI. Participants correctly deduced that a maliciously manipulated stop sign would be more difficult for AI to identify. Nevertheless, participants still overestimated the AI’s ability to recognize the malicious stop sign. Our findings suggest that the public do not yet have a sufficiently accurate understanding of specific AI systems, which leads them to over-trust the AI in certain conditions.

Pacailler, M., Yahoodik, S., Sato, T., Ammon, J., & Still, J. D. (2022). Human-centered artificial intelligence: Beyond a two-dimensional framework. Proceedings of the 24th Annual International Conference on Human-Computer Interaction, 471-482.

Shneiderman’s Human-Centered Artificial Intelligence (HCAI) framework suggests that high human control of automation is necessary to create reliable, safe, and trustworthy systems. The HCAI framework demonstrates that there is no need to sacrifice human control when incorporating higher levels of automation. We propose that Shneiderman’s two-dimensional framework is static and unable to incorporate contextual factors such as the decision for a human-in-the-loop system, cognitive limitations of the user, and user characteristics. The HCAI framework, while an essential foundation, ought to reflect the flexibility of AI systems, while meeting individual differences and situational requirements

 

2021

Mator, J. D., Lehman, W. E., McManus, W., Powers, S., Tiller, L., Unverricht, J. R., & Still, J. D. (2021). Usability: Adoption, measurement, value. Journal of Human Factors,63 ,956-973.https://doi.org/10.1177/0018720819895098

Objective
We searched for the application of usability in the literature with a focus on adoption, measurements employed, and demonstrated value. Five human factors domains served as a platform for our reflection, which included the last 20 years.

Background
As usability studies continue to accumulate, there has been only a little past reflection on usability and contributions across a variety of applications. Our research provides a background for general usability, and we target specific usability research subareas within transportation, aging populations, autistic populations, telehealth, and cybersecurity.

Method
“Usability” research was explored across five different domains within human factors. The goal was not to perform an exhaustive review but, rather, sample usability practices within several specific subareas. We focused on answering three questions: How was usability adopted? How was it measured? How was it framed in terms of value?

Conclusion
We found that usability is very domain specific. Usability benchmarking studies and empirical standards are rare. The value associated with improving usability ranged widely—from monetary benefits to saving lives. Thus, researchers are motivated to further improve usability practices. A number of data collection and interpretation challenges still call for solutions.

Application
Findings offer insight into the development of usability, as applied across a variety of subdomains. Our reflection ought to inform future theory development efforts. We are concerned about the lack of established benchmarks, which can help ground data interpretation. Future research should address this gap in the literature. We note that our findings can be used to develop better training materials for future usability researchers.

Still, J. D. & Tiller, L. N. (accepted). Exploring understanding and usage of two-factor authentication account recovery. Proceedings of the 7th International Conference on Human Factors in Cybersecurity

Users employ strategies that make passwords weaker than they appear. Companies have started requiring users to adopt two-factor authentication (2FA) to increase security, making regaining account access difficult. A potential solution is to provide users with an account recovery method used as a failsafe for 2FA in the event of a lost, broken, or stolen second factor. However, limited research evaluates users’ employment of different types of 2FA account recovery methods. Our exploratory study surveyed 103 students. We found only 40% of the sample have more than one 2FA device enrolled per personal account. The majority opt to use 2FA devices that are executed using their phone, 81% use a mobile app, and 51% receive an SMS text message. Our findings suggest regaining account access could be challenging for users when their phone becomes unavailable. If companies do not adequately prepare for such occurrences, it will become costly and disruptive.

Still, M. L. & Still, J. D. (accepted). How bike lane markings shape motorist expectations of cyclist placement at intersections. Proceedings of the International Cycling Safety Conference.

Intersections are dangerous areas for cyclists. Most accidents at intersections involve motor vehicles, which increases the odds of serious injury for cyclists. Unfortunately, only a few studies formally investigate the differences in bicycle-specific intersection. We examined how motorists interpret bike lane markings at a four-way intersection. Specifically, a traditional bike lane was compared to a novel merge bike lane. Motorists’ interpretation of the bike lane was indexed by asking them to indicate where they would stop their bike to wait for the light to change. They were also asked to rate how difficult it was to make the position judgment and their associated feeling of safety at that position. The results indicate a strong tendency to position cyclists on the right side of the road at the intersection. However, if a merge lane treatment was present, they were more likely to integrate the cyclist into traffic. An examination of individual participant responses suggested some motorists adopt simple heuristics to determine bicycle position, such as always stay right or always stay in the bike lane. Others adopted more complex strategies such as using the bicycle lane or taking the lane unless traffic was present. Motorists rated the merge bike lane scenarios as being less safe and as being more difficult to select compared to a traditional bike lane. Overall, it appears motorists understand the merge bike lane treatment but felt “taking the lane” was worrisome.

Still, M. L. & Still, J. D. (2021). How signs, markings, and hazards impact motorist assessment of cyclist lane placement. Proceedings of the International Conference of Human Factors and Ergonomics Society, 64, 1943-1947. [ Article ]

Human factors research has led to safer interactions between motorists through redesigned signage, roadway designs, and training. Similar efforts are needed to understand and improve interactions between cyclists and motorists. One challenge to safe motorist-cyclist interactions are expectations about where cyclists should be on the road. In this study, we utilize more directive signage and additional lane markings to clarify where cyclists should ride in the travel lane. The impact of these signifiers was examined by having motorists indicate where cyclists should ride in the lane, how difficult it was to determine the correct lane position, and how safe they would feel if they were in that lane position. Results indicate that more directive signage – “bicycles take the lane” - and painted hazard signifiers can change motorists’ expectations, so they are more aligned with safer cyclist positioning in the lane.

 

2020

Still, J. D. & Hicks, J. M. (2020). Mobile interface attentional priority model. Springer Nature: Computer Science, 142, 1-11. https://doi.org/10.1007/s42979-020-00166-3 [ Article ]

Mobile devices are now the most popular computing technology for accessing the Internet. This has resulted in designers devoting more of their time to improving users’ mobile experiences. This can be achieved in part by helping users find content quickly and easily. Understanding what supports or harms a user’s visual search is key to creating displays that meet usability efficiency requirements. Broadly, searches are guided by a combination of visual salience and previous experiences. We recommend revealing these influences by employing a computational saliency model and by employing our mobile spatial convention map. The research presented extends the previous attentional priority (AP) modeling work, from web pages to mobile interfaces. Notably, we reveal that users typically search a mobile web page by using a “railroad-like” viewing pattern rather than the “F” pattern that is typically described in web page research. Also, we propose a mobile web page-specific attentional priority (AP) model. The AP model combines our experience-based spatial convention map with a saliency model map. We examined the predictive performance of a saliency model, compared to the mobile-specific convention map. It was discovered that the convention map better predicted the initial deployment of attention, and the saliency map better accounted for later selection.

Still, J. D., Hicks, J. M., & Cain, A. A. (2020). Examining the influence of saliency within mobile interface displays. Journal of AIS Transactions on Human-Computer Interaction, 12, 28-44. https://doi.org/10.17705/1thci.00127 [ Article ]

Designers spend more resources to develop better mobile experiences today than ever before. Researchers commonly use visual search efficiency as a usability measure to determine the time or effort it takes someone to perform a task. Previous research has shown that a computational visual saliency model can predict attentional deployment in stationary desktop displays. Designers can use this salience awareness to co-locate important task information with higher salience regions. Research has shown that placing targets in higher salience regions in this way improves interface efficiency. However, researchers have not tested the model in key mobile technology design dimensions such as small displays and touch screens. In two studies, we examined the influence of saliency in a mobile application interface. In the first study, we explored a saliency model’s ability to predict fixations in small mobile interfaces at three different display sizes under free-viewing conditions. In the second study, we examined the influence that visual saliency had on search efficiency while participants completed a directed search for either an interface element associated with high or low salience. We recorded reaction time to touch the targeted element on the tablet. We experimentally blocked high and low saliency interactions and subjectively measured cognitive workload. We found that a saliency model predicted fixations. In the search task, participants found highly salient targets about 900 milliseconds faster than low salient targets. Interestingly, participants did not perceive a lighter cognitive workload associated with the increase in search efficiency.

 

2019

Still, J. D. & Still, M. L. (2019). Influence of visual salience on webpage product searches. Journal of ACM Transactions on Applied Perception [ Article ]

Visual salience can increase search efficiency in complex displays but does that influence persist when completing a specific search? In two experiments, participants were asked to search webpages for the prices of specific products. Those products were located near an area of high visual salience or low visual salience. In Experiment 1, participants were read the name of the product before searching; in Experiment 2, participants were shown an image of the exact product before searching. In both cases, participants completed their search more quickly in the high-salience condition. This was true even when there was no ambiguity about the visual characteristics of the product. Our findings suggest that salience guides users through complex displays under realistic, goal-driven task conditions. Designers can use this knowledge to create interfaces that are easier to search by aligning salience and task-critical elements.

Cain, A. A. & Still, J. D. (2019). Graphical authentication passcode memorability: Context, length, and number. Proceedings of the International Conference of Human Factors and Ergonomics Society, 63, 447-451. https://journals.sagepub.com/doi/10.1177/1071181319631077

Authentication verifies users’ identities to protect against costly attacks. Graphical authentication schemes utilize pictures as passcodes rather than strings of characters, numbers, and symbols. Pictures are more memorable than alphanumeric passwords. Two studies investigated the memorability of graphical passcodes when users need to remember multiple passcodes or longer passcodes. Longer passcodes provide advantages to security by protecting against brute force attacks, and multiple passcodes need to be investigated as users need to authenticate for numerous accounts. It was found that participants have strong item retention for passcodes of up to eight images and for up to eight accounts. Also, these studies examined whether context can facilitate memorability. The impact of context was not found as assumed in the literature. Overall, memorability was still higher for all the number and length passcode conditions compared with alphanumeric passwords. These studies take steps toward understanding the readiness of graphical schemes as an authentication option.

Hicks, J. M. & Still, J. D. (2019). Examining the effects of clutter and target salience in an e-commerce visual search task. Proceedings of the International Conference of Human Factors and Ergonomics Society, 1761-1765. [ Article ]

For web page designers it is important to consider how the visual components of a page affect how easy it is to use. Visual salience and clutter are two bottom-up factors of stimuli that have been shown to affect attentional guidance. Visual salience is a measure of how much a given item or region in the visual field stands out relative to its surroundings and clutter is a measure of how much visual information is present and its organization. In this study, we examined the effects of visual salience and clutter in a visual search task in e-commerce pages. Clutter was manipulated by adding grids of varying densities to the background of stimuli. On each trial, participants searched for an item that was either the most or least salient of the items on the page as determined by a computational model of visual salience (Itti, Koch, & Niebur, 1998). The results showed that the high salient targets were found faster than the low salient targets and search times also increased as clutter increased, but these two factors did not interact. We conclude that designers should consider both factors when possible.

Still, J. D. & Cain, A. A.(2019). Over-the-Shoulder attack resistant graphical authentication schemes impact on working memory. Proceedings of the 5th International Conference on Human Factors in Cybersecurity [ Article ]

Alphanumeric passwords are the most commonly employed authentication scheme. However, technical security requirements often make alphanumeric authentication difficult to use. Researchers have developed graphical authentication schemes to help strike a balance between security requirements and usability. However, replacing characters with pictures has introduced both negative (security vulnerabilities) and positive (memorability benefits) outcomes. We are aware of the noteworthy long-term memory advantages of graphical passcodes, but little is known about the impact on users’ limited working memory resources. Authentication is always a secondary task, which probably consumes working memory. This pilot study examines the impact graphical authentication schemes (Convex-Hull Click; Use Your Illusion; What You See is Where you Enter) have on working memory (Verbal; Spatial; Central Executive). Our findings suggest that graphical authentication schemes impact on working memory varies. This work shows that further investigation is needed to understand the complex relationship between scheme design and working memory.

Tiller, L., Angelini, C., Leibner, S., & Still, J. D. (2019). Explore-a-Nation: Combining graphical and alphanumeric authentication. Proceedings of the 1st International Conference on HCI for Cybersecurity, Privacy, and Trust [ Article ]

Graphical authentication has been a proposed solution to the usability and memorability issues seen with traditional alphanumeric passwords. However, graphical authentication schemes are often criticized for their susceptibility to Over-the-Shoulder Attacks (OSAs). This research proposes and evaluates Explore-a-Nation (EaN), a unique hybrid authentication scheme that attempts to bridge the gap between graphical authentication passcodes and strong alphanumeric passwords. EaN takes advantage of the known security and efficiency associated with passwords along with the enhanced recognition benefit of graphical schemes. The EaN scheme provides users with a static image consisting of a map wherein an icon passcode path is hidden amongst other distractor icons. Following the icon path allows users to generate their strong password. This study compared our EaN prototype to alphanumeric password standards and to Use Your Illusion (UYI) across the dimensions of efficiency, accuracy, OSA resistance, and subjective usability. User login times for both EaN and UYI met the efficiency usability standards established by alphanumeric passwords. Results for UYI (99%) login accuracy were significantly better than EaN (91%). And, UYI obtained a significantly higher Subjective Usability Survey score than EaN, with both schemes exceeding our usability requirement. Notably, EaN was shown to be resistant to OSAs while UYI was not. We suggest EaN might prove to be an effective next-generation authentication scheme for both frequent and intermittent users.

Still, M. L. & Still, J. D.(2019). Sharing the road: Experienced cyclist and motorist knowledge and perceptions. Proceedings of the 7th International Conference on Human Factors in Transportation [ Article ]

Bicycling is an increasingly popular activity, but safely sharing the road with motorists presents challenges. This study explores two factors that may contribute to negative interactions on Virginia roadway: insufficient understanding of cycling-specific laws and differential hazard perception for cyclists and motorists. Surveyed motorists reported not knowing bicycle-related laws and demonstrated some misunderstanding that was concerning. The results unexpectedly indicate that motorists rate potential road hazards as riskier to cyclists than cyclists rate the same hazards. This suggests that motorists recognize the vulnerability of cyclists on the roadway. But, our findings also highlight that motorist do not actively monitor for the same hazards as cyclists. A lack of similar hazard awareness could be leading to the regular close calls cyclists are reporting. It may also be this lack of fundamental knowledge that contributes to motorist frustration during cyclist encounters.

Still, M. L. & Still, J. D.(2019). Cognitively describing intuitive interactions. In A. Blackler (Ed), Intuitive interaction: research and applications. (pp.88-98). (pp. 41-61). Boca Raton, Florida, USA: Taylor and Francis.[ Article ]

This chapter explains how understanding a set of basic cognitive processes—implicit and incidental learning, knowledge representation, familiarity, transfer, and automaticity—can help. It explains how an interaction can be intuitive or become intuitive over time. Still, Still, and Grgic (2015) suggest that an interaction will be intuitive if the mental representation of the interaction is similar to one already stored in memory and the action associated with the stored representation is automatically applied to the current situation. In order to predict a priori what interactions will be familiar, some understanding of the mental representations supporting the interaction is required. But, as Cleary, Langley, and Seiler note, "little is known about the types of features that may actually be present in human memory traces. Interaction consistency is the key to producing automatization, which leads to a lighter working memory load, controlled processing of interface interactions results in a user's awareness of the actions (Posner & Snyder, 1975).

Tiller, L., Cain, A., Potter, L., & Still, J. D. (2019).Graphical authentication schemes: Balancing amount of image distortion. In Ahram T., Nicholson D.(Eds), Advances in Human Factors in Cybersecurity (pp.88-98). Orlando, Florida, USA: Springer.[ Article ]

Graphical authentication schemes offer a more memorable alternative to conventional passwords. One common criticism of graphical passcodes is the risk for observability by unauthorized onlookers. This type of threat is referred to as an Over-the-Shoulder Attack (OSA). A strategy to prevent casual OSAs is to distort the images, making them difficult for onlookers to recognize. Critically, the distortion should not harm legitimate users’ ability to recognize their passcode images. If designers select the incorrect amount of distortion, the passcode images could become vulnerable to attackers or images could become unrecognizable by users rendering the system useless for authentication. We suggest graphical authentication designers can distort images at brushstroke size 10 for a 112 × 90-pixel image to maintain user recognition and decrease casual OSAs. Also, we present mathematical equations to explicitly communicate the image distortion process to facilitate implementation of this OSA resistant approach.

 

2018

Cain, A, A., Edwards, M. E., & Still, J.D. (2018). An exploratory study of cyber hygiene behaviors and knowledge. Journal of Information Security and Applications, 42, 36-45.[ Article ]

End users’ cyber hygiene often plays a large role in cybersecurity breaches. Therefore, we need a deeper understanding of the user differences that are associated with either good or bad hygiene and an updated perspective on what users do to promote good hygiene (e.g., employ firewall and anti-virus applications). Those individuals with good cyber hygiene follow best practices for security and protect their personal information. This exploratory study of cyber hygiene knowledge and behavior offers information that designers and researchers can employ to improve users’ hygiene practices. We surveyed 268 participants about their knowledge of concepts, their knowledge of threats, and their behaviors related to cyber hygiene. Further, we asked participants about their previous training and experiences. Notably, the participants represent a large cross section from age 18 to 55+. We addressed inconsistencies in the literature, we provide up-to-date information on behaviors and on users’ knowledge about password usage and phishing, and we explored the impact of age, gender, victim history, perceived expertise, and training on cyber hygiene.

Cain, A. A., & Still, J. D. (2018). Usability comparison of over-the-shoulder attack resistant authentication schemes. Journal of Usability Studies, 13, 196-219. [ Article ]

Graphical authentication schemes offer a more memorable alternative to alphanumeric passwords. However, they have been criticized for being susceptible to over-the-shoulder attacks (OSA). To solve this shortcoming, schemes have specifically been designed to be resistant to OSA. Common strategies used to decrease the ease of OSAs are grouping targets among distractors, translating them to another location, disguising the appearance of targets, and using gaze-based input. We are the first to provide a direct comparison of the common strategies regarding usability and OSA resistance. Specifically, we examined three OSA resistant graphical schemes, an eye tracker scheme, and a traditional alphanumeric password. To capture usability performance, we measured login times, learnability, memorability, satisfaction, acceptability, and error rates. OSA performance was examined to determine the relative resistance of each scheme. We found that graphical schemes are memorable after three weeks, and they were resistant to OSAs. Login time was acceptable for some schemes and not others. Learnability and satisfaction were disappointing, and error rates were high likely due to the novelty of these graphical schemes. Alphanumeric passwords offer the best learnability.

Still, J. D. (2018). Web page visual hierarchy: Examining Faraday's guidelines for entry points. Journal of Computers in Human Behavior, 84, 352-359. [ Article ]

Designers want to avoid creating “flat” visual experiences that do not communicate importance within an interface. Faraday's visual hierarchy model is often employed to predict the deployment of attention within web page interfaces (i.e., provide an importance ranking). However, only limited empirical evidence is available to validate its use. Across two studies, the model's predictive ability to determine entry points, as determined by the initial search phase, was examined. In Study 1, simple web pages were artificially manipulated to offer entry points as predicted by the model. In Study 2, current web pages containing greater complexity were coded for entry points. Across both studies, fixations were recorded while participants viewed the web pages. It was discovered that the model does a poor job predicting entry points. Moreover, it demonstrated a lack of sophistication by mainly selecting entry points on element size alone. It was found that both spatial position and distinctiveness can predict earlier attention engagement. Therefore, any updated visual hierarchy model ought to consider user expectations and visual salience. Critically, designers ought to stop employing this visual hierarchy model as its predictions can be misleading.

Still, J. D. & Bell, J. (2018). Incognito: Shoulder-Surfing resistant selection method. Journal of Information Security and Applications, 40, 1-8. [ Article ]

Authentication methods need to, at minimum, prevent casual attackers with limited resources from gaining access to our private information. Although, Personal Identification Numbers (PIN) have been ubiquitously implemented to validate a user's identity, it is surprisingly easy for PINs to be stolen by casual shoulder-surfing attackers. We offer Incognito, a selection technique, which is resistant to casual shoulder-surfing and extendable to emerging graphical authentication methods. This was achieved by employing indirect interactions and masking standard cursor feedback. We show this selection technique effectively prevents casual shoulder-surfing attacks. The users controlled Incognito with either a mouse or eye tracker. We examined its usability by measuring effectiveness, performance, and user satisfaction in contrast with a conventional PIN approach. Our results show marginal login performance differences between the conventional method and Incognito with mouse-based interactions, but not for eye tracker based interactions. Incognito shows promise as a viable selection technique within public spaces.

Hicks, J. M., Duplantis, P., Fakulujo, A., & Still, J. D. (2018, April). Does relative item luminance affect how well e-commerce products are remembered? Poster presented at Southeastern Human Factors Applied Research Conference, Clemson, SC.

Designers attempt to make their products memorable to affect how much users like them and how likely they are to purchase them. Research has shown that items that are more visually salient are remembered better than those that are less salient (Fine & Minnery, 2009). One important component of visual salience is luminance (c.f., Itti, Koch, & Niebur, 1998). This study manipulated luminance in e-commerce pages by creating a subtle dusting effect on the entire display except for one target item that remained at its original luminance. Participants viewed pages for five seconds and were later shown individuals items and asked if that item was one they had previously seen. We examined whether items that were higher in relative luminance were remembered better than items with no change in relative luminance.

Hicks, J. M., Edwards, M., Brayton, M., Harrell, G., & Still, J. D. (2018, April). Can the relative luminance of e-commerce products affect how quickly they are found? Poster presented at Southeastern Human Factors Applied Research Conference, Clemson, SC.

It is important for designers to create displays that guide users toward critical information. Designers have attempted to guide user attention by making visual web elements’ colors brighter and adding motion. However, past research has shown users find these web elements manipulations annoying or they ignore them altogether. We suggest designers use more subtle manipulations in nature. For example, changing the relative visual salience as revealed by a salience model (Itti, Koch & Niebur, 1998). Recently, it has been shown that salient interface elements can guide attention (Hicks, Cain & Still, 2017) and are found faster than low salient items (Still, Hicks, Cain & Billman, 2017). This study manipulated relative luminance of targets by creating a subtle, undetectable darkening of all areas on a target display except for the target itself. This is unique approach as rather than considering individual visual elements the entire displays is manipulated. We examined whether there was a difference in how quickly participants could find targets on displays with changes to relative target luminance compared to displays that remained unchanged.

Still, M. L., & Still, J. D. (2018). Subliminal Techniques: Considerations and recommendations for analyzing feasibility. International Journal of Human-Computer Interaction, 13,226-237.[ Article ]

In an attempt to provide users with more information while maintaining a calm ubiquitous environment, researchers have investigated the possibility of presenting information “subliminally”. We explore the historical issues associated with examining perception without awareness with special emphasis on the difficulty associated with ensuring stimuli have been presented below the participant’s subjective threshold of awareness. It may be possible to circumvent this issue by taking a results-oriented approach. However, the advancement of subliminal techniques requires stronger experimental evidence that information is actually being presented below the subject threshold of awareness and gaining the desired effect on user performance. We offer three considerations that help designers weigh the costs and benefits of employing a subliminal technique. We also offer three recommendations that help designers’ present information below the subjective threshold of awareness and measure their users’ awareness of the information.

2017

Cain, A. A., & Still, J. D. (2017). RSVP a temporal method for graphical authentication. Journal of Information Privacy and Security, 13, 226-237.

We present a Rapid, Serial, Visual Presentation method (RSVP) for recognition-based graphical authentication. It presents a stream of rapid, degraded images, which makes the object recognition process difficult for casual attackers. Three studies investigated success rates for authenticating, RSVP’s resistance to over-the-shoulder attacks (OSAs), approaches for facilitating learnability, and effects of resetting a passcode. We found that participants could successfully authenticate and could not complete OSAs. Learnability was promoted by the presentation of degraded versions of the images during the memorization phase. When a passcode was reset, participants successfully retrained themselves even when the previous passcode was recycled as distractors.

Still, J. D. (2017). Web page attentional priority modelCognition, Technology, & Work, 19, 363-374.

Designing an interface that is both information rich and easy to search is challenging. Successfully finding a solution depends on understanding an interface’s explicit and implicit influences. A cognitively inspired computational approach is taken to make the implicit influences apparent to designers. A saliency model has already been shown to predict the deployment of attention within web page interfaces. It predicts regions likely to be salient, based on local contrast stemming from the bottom-up channels (e.g., color, orientation). This research replicates these previous findings and extends the work by proposing a web page-specific attentional priority (AP) model. This AP model includes previous interaction experience history, manifested as conventions, within the already valuable saliency model. These sources of influence automatically nudge our attention to regions that usually contain useful visual information. This research shows that, by integrating spatial conventions with a saliency model, designers can better predict the deployment of attention within web page interfaces.

Still, J. D., Cain, A. A., & Schuster, D. (2017). Human-Centered authentication guidelines. Journal of Information and Computer Security,25, 437-453. 

Cybersecurity research and development has mainly focused on technical solutions to increase security. However, the greatest weakness of many systems is the user. We argue that authentication schemes with poor usability are inherently insecure, as users will inadvertently weaken the security in their efforts to use the system. We propose that designers need to consider the human factors that impact end-user behavior. Development from this perspective will address the greatest weakness in most security systems by increasing end-user compliance.

Hicks, J. M., Cain, A. A., & Still, J. D. (2017). Visual saliency predicts fixations in low clutter web pages. HFES Conference Proceedings,1114-1118. 

Previous research has shown a computational model of visual saliency can predict where people fixate in cluttered web pages (Masciocchi & Still, 2013). Over time, web site designers are moving towards simpler, less cluttered webpages to improve aesthetics and to make searches more efficient. Even with simpler interfaces, determining a saliency ranking among interface elements is a difficult task. Also, it is unclear whether the traditionally employed saliency model (Itti, Koch, & Niebur, 1998) can be applied to simpler interfaces. To examine the model’s ability to predict fixations in simple web pages we compared a distribution of observed fixations to a conservative measure of chance performance (a shuffled distribution). Simplicity was determined by using two visual clutter models (Rosenholz, Li, & Nakano, 2007). We found under free-viewing conditions that the saliency model was able to predict fixations within less cluttered web pages.

Still, M. L. & Still, J. D. (2017). Subliminal techniques: Considerations and recommendations for analyzing feasibilityInternational Journal of Human-Computer Interaction, 

In an attempt to provide users with more information while maintaining a calm ubiquitous environment, researchers have investigated the possibility of presenting information “subliminally”. We explore the historical issues associated with examining perception without awareness with special emphasis on the difficulty associated with ensuring stimuli have been presented below the participant’s subjective threshold of awareness. It may be possible to circumvent this issue by taking a results-oriented approach. However, the advancement of subliminal techniques requires stronger experimental evidence that information is actually being presented below the subject threshold of awareness and gaining the desired effect on user performance. We offer three considerations that help designers weigh the costs and benefits of employing a subliminal technique. We also offer three recommendations that help designers’ present information below the subjective threshold of awareness and measure their users’ awareness of the information.

Cain, A. A., Werner, S., & Still, J. D. (2017). Graphical authentication resistance to over-the-shoulder-attacksCHI Extended Astracts Proceedings,2416-2422. 

Graphical passwords offer advantages for memorability over conventional alphanumeric passwords, but in some cases they have been vulnerable to over-the-shoulder-attacks (OSA). Thus, many second-generation graphic based schemes are specifically designed to be resistant to OSA. This is often achieved by not having users select targets directly, but by adding cognitive operations to create seemingly random response patterns. This study takes the first step to directly compare three prototypical graphical password schemes to determine their relative resistance to OSAs employing a within-subjects design. We found that schemes requiring cognitive operations in response to target patterns were superior to direct selection of targets. Convex Hull Click was most secure, followed by What You See is What You Enter, while Use Your Illusion showed high vulnerability to OSA. In addition, we discuss a diversity of previous measurements, which are meant to examine security strength of new approaches. We highlight the need for standard OSA resistance measures depending on threat model needs.

Still, J. D., Hicks, J. M., Cain, A. A., & Billman, D. (2017). Predicting stimulus-driven attentional selection within mobile interfacesProceedings of the 8th International Conference on Cognitive and Neuroergonomics,255-261 

Masciocchi and Still [1] suggested that biologically inspired computational saliency models could predict attentional deployment within webpages.Their stimuli were presented on a large desktop monitor. We explored whether a saliency model’s predictive performance can be applied to small mobile interface displays. We asked participants to free-view screenshots of NASA’s mobile application Playbook. The Itti et al. [2] saliency model was employed to produce the predictive stimulus-driven maps. The first six fixations were used to select values to form the saliency maps’ bins, which formed the observed distribution. This was compared to the shuffled distribution, which offers a very conservative chance comparison as it includes predictable spatial biases by using a within-subjects bootstrapping technique. The observed distribution values were higher than the shuffled distribution. This suggests that a saliency model was able to predict the deployment of attention within small mobile application interfaces.

2016

Grgic, J., Still, M. L., & Still, J. D. (2016). Effects of cognitive load on affordance-based interactionsJournal of Applied Cognitive Psychology, 30, 1042-1051.

Affordances are design clues that allow users to effortlessly determine how objects should be used. Since their introduction to the human–computer interaction design community, their use within interfaces has become a staple. But, despite work to understand how affordances make an interface's available actions transparent, few empirical studies have examined the cognitive origins of this interaction type. Therefore, we explored the impact of cognitive load on affordance-based interactions. Participants were asked to perform a series of affordance-based interactions while under different types of working memory load (no load, verbal, spatial, and central executive). Affordance-based interactions were consistently slowed under central executive load, but never when under verbal load. We conclude that affordance-based interactions do require cognitive resources, but resource costs may only manifest under heavy load. With this knowledge, designers may be able to better predict when an affordance will (or will not) act as if it is resource free.

Still, J. D., Hicks, J. M., & Gall, J. (2016, November). Using Computational Models to Quantify Stimulus-Driven Influences in Web Pages. Poster presented at the 57th Annual Meeting of the Psychonomic Society, Boston, MA.

One critical factor in whether a search will be fast and effortless is visual saliency. If we are searching for an object, it is easier to find one that is visually salient than one that is not. Although many researchers have examined the performance of stimulus-driven computational models within natural scenes, relatively few have explored interfaces. Still and Masciocchi (2010) suggested that the classic Itti, Koch, and Niebur (1998) Saliency model is capable of predicting the initial fixations in webpages. The present study expands on that research by comparing the performance of popular saliency models across a variety of webpages (i.e., mostly images, half text and images, mostly text). Results of this study reveal the strengths and weaknesses of each model within these atypical stimuli. These findings ought to help interface designers create easier to search interfaces by making implicit stimulus-driven information that guides attention visible.

Cain, A. A., Chiu, L., Santiago, Felicia, S., & Still, J. D. (2016). Swipe authentication: Exploring over-the-shoulder attack performance. In D. Nicholson (Ed.), Advances in Human Factors Cybersecurity (pp. 327-336). Walt Disney World, Florida, USA: Springer.

Swipe passwords are a popular method for authenticating on mobile phones. In public, these passwords may become visible to attackers who engage in shoulder surfing. There is a need for strategies that protect swipe passwords from over-the-shoulder attacks (OSAs). We empirically explored the impact of providing gesture visual feedback on OSA performance during successful and unsuccessful swipe login attempts on mobile phones. We found evidence that entry visual feedback facilitates OSAs. As users are biased towards symmetrical swipe patterns, we investigated their impact on attack performance. We found that symmetrical swipe patterns were less vulnerable than asymmetrical patterns; possibly due to the speed of entry. As users tend toward simple patterns, we investigated the impact that nonadjacent, diagonal knight moves have on OSAs. We found that knight moves significantly decreased OSA performance. We recommend users turn off gesture entry visual feedback and use knight moves for greater password security.

 

Cain, A. A., & Still, J. D. (2016). A rapid serial visual presentation method for graphical authentication. In D. Nicholson (Ed.), Advances in Human Factors Cybersecurity (pp. 3-12). Walt Disney World, Florida, USA: Springer.

We propose a Rapid Serial Visual Presentation (RSVP) graphical authentication method that is suited for multi-touch mobile devices. This method presents degraded pictures of everyday objects in a temporal stream. Considering all the other authentication methods employ a spatial visual search, our method is unique (i.e., searching across time versus space). A temporal method of presentation is used to decreases login times down to 14 seconds and to allow login with a simple touch of the screen. By degrading the images, over-the-shoulder attackers are prevented from easily capturing the passcode. This study shows that all participants could successfully login at least once when allowed up to three attempts. After becoming familiar with the RSVP authentication method, participants took on the role of an attacker. Notably, no one was able to identify the passcode. The RSVP method offers a memorable, usable, quick, and secure alternative for authentication on multi-touch mobile devices.

 

Long, S. K., Karpinsky, N. D., Doner, H., & Still, J. D. (2016). Using a mobile application to help visually impaired individuals explore the outdoors. In G. Di Bucchianico and P. Kercher (Eds.), Advances in Design for Inclusion (pp. 213-226). Walt Disney World, Florida, USA: Springer.

Visually impaired individuals face a variety of challenges when navigating outdoors, including uneven terrain, unexpected obstacles, safety concerns, and reliance on others for information. The goal of this study was to understand further the navigational needs of visually impaired individuals and to develop a mid-fidelity prototype to address these needs. Through interviews with visually impaired users and accessibility professionals, researchers found that present technology leads to an incomplete understanding of the trail and harmful situations. Currently, there is no known technology available that integrates real-time updates with static trail information for individuals navigating outdoors. In response, a mobile prototype was proposed, integrating user-provided updates with static trail information in a format that caters to all users. Our usability testing showed visually impaired users made few errors using the prototype and were satisfied with their experience.

 

McEvoy, P., & Still, J. D. (2016). Contextualizing mnemonic phrase passwords. In D. Nicholson (Ed.), Advances in Human Factors Cybersecurity (pp. 295-304). Walt Disney World, Florida, USA: Springer.

Our society depends on password-based authentication methods for accessing valuable information. However, the use of weak passwords is placing us at risk. Cyber security systems encourage users to employ strong passwords often by increasing requirements. Unfortunately, using a strong password requires more cognitive effort. This increase in effort pushes users to find workarounds that directly harm security. The paradox between security and usability has often resulted in simply blaming users rather than seeking a Human-Centered Design perspective. We introduce a strategy for developing strong passwords that embed contextual cues within mnemonic phrase passwords.  Using this strategy participants were able to create strong passwords and better remember them compared with a traditional mnemonic strategy.

 

Still, J. D. (2016). Cybersecurity needs you! ACM Interactions (May + June: Feature), 23(3), 54-58.

 

2015

Still, J. D., Still, M. L., & Grgic, J. (2015). Designing intuitive interactions: Exploring performance and reflection measuresInteracting with Computers, 27, 271-286. Impact Factor: 1.4

Intuitive interactions are supported by users’ implicit and explicit learning experiences. But, determining user knowledge can be difficult. With many options available for eliciting that knowledge, we tested the effectiveness of two methods—performance and reflection. Users were presented with simple interactions that had varying levels of intuitiveness (affordance, convention, bias). They were asked to perform the interaction or to describe how the interaction should be designed. These methods of knowledge elicitation produced inconsistent results; sometimes they produced the same result (affordance-based interactions), sometimes the opposite (convention-based interactions). Furthermore, when both methods were used, results obtained from the second measure were often contaminated by completion of the first measure. Carryover effects were present regardless of which measure was completed first. These results indicate that the method used to elicit knowledge should be selected based on the type of interaction that is being investigated and multiple measures should be used with caution.

Still, M. L. & Still, J. D. (2015). Contrasting traditional in-class exams with frequent online testingJournal of Teaching and Learning with Technology, 4, 30-40.

Although there are clear practical benefits to using online exams compared to in-class exams (e.g., reduced cost, increased scalability, flexible scheduling), the results of previous studies provide mixed evidence for the effectiveness of online testing. This uncertainty may discourage instructors from using online testing. To further investigate the effectiveness of online exams in a
naturalistic situation, we compared student learning outcomes associated with traditional in-class exams compared to frequent online exams. Online exams were administered more frequently in an attempt to mitigate potential negative effects associated with open-book testing. All students completed in-class and online exams with order of testing condition counterbalanced (in-class first, or online first) between students. We found no difference in long-term retention for material
that had originally been tested using frequent online or traditional in-class exams and no difference in self-reported study time. Overall, our results suggest that frequent online assessments do not harm student learning in comparison to traditional in-class exams and may impart positive subjective outcomes for students.

Lee, L. & Still, J. D. (2015). Re-designing warning messages to encourage BYOD policy adherenceProceedings of the 3rd Human Aspects of Information Security, Privacy, and Trust held at the 17th International Conference on Human-Computer Interaction, 369-378.

Many corporations and organizations support a Bring Your Own Device (BYOD) policy, which allows employees to use their personal smartphones for work-related purposes. Access to proprietary company data and information from an employee’s smartphone raises serious privacy and security concerns. Companies are vulnerable to data breaches if employees are unable to discern which applications are safe to install. Situating privacy requirements ought to encourage safer application install decisions and decrease risker ones. This study examines the use of context-relevant warning messages, which alert employees to be cautious when the company’s BYOD policy may be violated. We also explore the impact of presenting permission requirements before and after making the install decision. We provide evidence that the presence of warnings, despite the timing of when they were presented, facilitated a lower number of risky installations. In situations when it was safe to install an application, warning messages presented before the install decision drastically encouraged installations compared to when there were no warnings. Interestingly, the opposite pattern was found when warning messages were presented after the decision. Overall, better privacy and security decisions will be made if permission requirements are displayed with relevant warning messages. In addition, safe installations will be encouraged through the placement of these meaningful warnings on the description page of a mobile application before a user has decided to install it.

Schuster, D., Still, M. L., Still, J. D., Lim, J. J., Feria, C., & Rohrer, C. (2015). Opinions or algorithms: An investigation of trust in people versus automation in app store securityProceedings of the 3rd Human Aspects of Information Security, Privacy, and Trust held at the 17th International Conference on Human-Computer Interaction, 415-425.

Mobile application (app) stores are a critical source of information about risk in an uncertain environment. App stores ought to assess and communicate the risk associated with an installation so that users are discouraged from installing risky or harmful apps in app stores. However, only a limited number of studies offer designers information about how to communicate risk effectively. We focused on the user’s trust associated with security information stemming from crowd-sourced evaluations compared to those generated from an automated system. Both of these sources of security information are pervasively used to indicate possible risk associated with an app. We investigated whether biases exist for a particular source of information given similar amount of security information being available. We found that participants preferred to install apps rated by automation to those rated by humans despite equivalence in stated risk. Further, we found evidence of a gender difference in trust in automation.

 

2014

Still, J. D., Masciocchi, C. & Still, M. L. (2014, November). Stimulus- and Goal-Driven Influences on Visual Searches in Webpages. Poster to be presented at the 55th Annual Meeting of the Psychonomic Society, Long Beach, CA.

Although many studies have examined the processes that guide visual search, relatively few have used realistic tasks. This is problematic because, although it is assumed both stimulus-driven features and search goals contribute to "real world" visual search, the iteraction between these two influences is ill defined. This makes predicting where users will look during naturalistic visual searches difficult for interface designers. Masciocchi and Still (2013) began addressing this issue by tracking participants' eye movements while they free viewed webpages. They found that visual salience predicted users' initial fixations, demonstrating that stimulus-driven features pull attention even in complex, naturalistic displays. The present study expands on that research by having participants perform a realistic task - searching for specific items on webpages - while
manipulating the saliency of the target's location (high versus low). Results of this study thus address the interaction between stimulus-driven and goal-driven processes within realistic tasks and stimuli.

Still, J. D., Still, M. L., & Bell, J. (2014, August). Closing the knowledge gap with intuitive flat designs. UX Magazine: Feature, Article 1297, ISSN: 2168-5681.

Shokrpour, A., Palma, A., Gomez, M., Santiago, F., & Still, J. D. (2014, May). Swipe authentication: Exploring over-the-shoulder-attack performance. Poster presented at the 57th Annual Spartan Psychological Association Research Conference, San Jose, CA.

Swipe gestures are a popular method for authentication, because they are easier to enter than text based passwords on touch screen devices.Unfortunately, gesture-based authentication may fall prey to over-the-shoulder-attacks. Research based guidelines surround the creation of strong character-based passwords, but not for gesture-based passwords. In this study, we start to empirically explore the impact of providing gesture visual feedback and symmetry on over-the-shoulder-attacks performance. Participants viewed 64 swipe authentication videos. We captured their memory of the gesture seconds later using pencil and paper. This study showed that gesture authentication with visual feedback improves over-the-shoulder-attack performance.

 

2013

Still, J. D. & Dark, V. J. (2013). Cognitively describing and designing affordances. Journal of Design Studies, 13, 285-301.

The term affordance carries different meanings within design communities. Traditionally, affordances were discussed within a Gibsonian framework in which affordances arise from direct perception. Some authors now describe affordances as being mostly perceptual while others describe them as being culturally bound. We suggest that both of these descriptions are correct and that they can be explained from a cognitive conceptualization of perceived affordances. We suggest that perceived affordances are supported by automatic perceptual processes in the user developed over time through consistent interactions with the environment. Design consistency is critical for producing effortless usage, because interaction consistency facilitates the formation of long-term memory structures. We explore the underlying mechanisms that could explain how affordances arise and affect the cognitive system.

 

Steinhoff, C. & Still, J. D. (2013). Priming categorization in a card sort. Proceedings of the 15th
International Conference on Human-Computer Interaction
, 8004, 265-272.

When using the card sorting technique, the goal of a user experience researcher is to determine the user’s expected information architecture. Card sorting is a knowledge elicitation method where users are given labeled cards and are asked to place them into groups. This method is commonly used to determine a natural navigation structure for a group of users. We examine the impact of priming, an implicit memory effect in which exposure to a stimulus influences response to a later stimulus, on this popular user-centered design method. A control group did the card sort only, while the experimental group watched a short presentation before performing their card sorts. The dependent measure was the percentage of agreement of each card sort against the typical sort. The primed group sort was significantly more similar to the typical response than the control group. This study provides evidence that card sorting can be modulated by priming.

 

Masciocchi, C. M. & Still, J. D. (2013). Alternatives to eye tracking for predicting stimulus-driven attentional selection within interfacesJournal of Human-Computer Interaction, 34, 285-301.

The visual properties of a design contribute to the formation of regions with differing amounts of uniqueness, or salience, producing an initial stimulus-driven attentional bias. The colocation of salient regions and critical information should be maximized as this increases the interface's usability by decreasing search times. The determination of salient locations, however, is often difficult. In web page design, eye tracking has traditionally been used to measure where users attend, therefore indicating the salient regions. But, eye tracking as a descriptive technique has many known costs. We propose two alternative methods to eye tracking that can be used to predict which regions of a web page will draw users' stimulus-driven attention: interest point recording and saliency model predictions. Through an empirical investigation we show that the predictions of both methods correlate with the locations fixated by a separate group of participants, and thus these methods are effective alternatives to eye tracking during formative design testing.

 

2012

Still, M. L. & Still, J. D. (2012). Practical Recommendations for Examining Subliminal Techniques in Ubiquitous Computing [abstract]. Proceedings of the Effects of Subliminal Perception in Ubiquitous Computing Environments Workshop at the 14th International Conference on Ubiquitous Computing, Pittsburgh, PA.

In an attempt to provide users with more information while maintaining a calm ubiquitous environment, designers have investigated the possibility of presenting information “subliminally”. We explore the historical issues associated with examining perception without awareness; one of those issues is the difficulty associated with ensuring stimuli have been presented below the participant’s subjective threshold of awareness. It may be possible to circumvent this issue by taking a results-oriented approach. We make five recommendations for designers interested in using subliminal techniques. In these recommendations we provide methods to gauge participant awareness and encourage designers to examine the importance of perception without awareness within their specific ubiquitous information sources. Before we can continue the advance of insightful uses of subliminal techniques, we need to explore whether or not information presented below the subjective threshold of awareness will have a practical effect on user performance.

 

Still, J. D., & Masciocchi, C. M. (2012). Considering the influence of visual saliency during interface searches [abstract]. Book Chapter in Cognitively Informed Interfaces

In this chapter we highlight the influence of visual saliency, or local contrast, on users’ searches of interfaces. Designers have traditionally focused on the importance of goals and expectations (top-down processes) for the navigation of interfaces with little consideration for the influence of saliency (bottom-up processes). The Human-Computer Interaction literature does not discuss the influence of bottom-up processing, potentially neglecting an important aspect of interface-based searches. We review studies that demonstrate how a user’s attention is rapidly drawn to visually salient locations in a variety of tasks and scenes, including web pages.

 

2011

Still, J. D. & Still, M. L. (2011, May). No cost or benefit from frequent online quizzes compared to traditional exams. Poster presented at the Annual Meeting of the Society for the Teaching of Psychology, Chicago, IL.

Online examinations were explored as a viable replacement for in-class examinations. The goal was to save limited resources without jeopardizing academic integrity in an Introductory Psychology course. This study uniquely employed a within-subjects design to explore possible differences between frequent online examinations and traditional, less frequent in-class examinations. We hoped the use of multiple online examinations would promote student learning by encouraging spaced studying. One hundred and thirty nine students participated in this study; they were from two sections of the same course taught by the same instructor. Assignment to online and in-class examinations was counterbalanced across the two sections to minimize nuisance variables such as content difficulty. We found no difference in student study time for online or in-class examinations. Further, there was no evidence that spaced studying increased long-term retention. Although no study habit or comprehension differences were found, students reported a preference for online exams. In addition, the use of online assessments freed class time and minimized printing and grading costs. Our results suggest that online assessments do not harm student learning and may provide some positive, practical outcomes.

Wynn, J. & Still, J. D. (2011). Motivating change and reducing cost with the discount video data
analysis technique
. Proceedings of the 14th International Conference on Human-Computer
Interaction
, 6770, 321-328.

Testing the usability of an interface is a critical phase of product development. However, it is often reported that analyzing the data from such testing consumes too many limited resources. We attempted to reduce this consumption by proposing a new technique, Discount Video Data Analysis (DVDA). We compared it with another popular accelerated analysis technique, Instant Data Analysis (IDA). Using IDA, evaluators analyze data after a series of usability tests, whereas DVDA calls for analyzing the data after every test in the series. Immediate analysis decreases the chance that subsequent test data will negatively interfere with evaluators’ recall. Additionally, DVDA produces a video of the testing allowing the users’ emotional responses (e.g., frustration) to be shared with developers who may be resistant to interface modifications. We found evaluators using DVDA identified more usability issues and provided more supportive evidence for each issue than evaluators using IDA.

Still, J. D. (2011). Experimental design: Does external validity trump internal validity? ACM
Interactions (May + June: Feature), 18(13), 66-68.

 

2010

Still, J. D., & Dark, V. J. (2010). Examining working memory load and congruency effects on
affordances and conventions
. International Journal of Human-Computer Studies, 68(9),
561-571.

Although there is a debate about whether designers should draw a distinction between perceptual affordances and cultural conventions, there are few behavioral studies. We examined the impact of working memory load and expected button-to-action mapping congruency on affordances and conventions. The findings suggest both sides of the debate are correct. Learned conventions were found to structure responses towards expected actions, just like affordances, but affordance-based interactions were not affected by memory load while convention-based actions were. Therefore, designers ought to employ perceptual affordances when possible and when not feasible they ought to reuse established conventions. Additionally, evidence is presented that violating expected affordance-based and convention-based button-to-action mappings caused a similar performance cost. We believe that after the initial learning period, conventions play a critical role in the perception of a design’s available actions just as perceptual affordances do.

Grgic, J. & Still, J. D. (2010, May). Affordance interactions are affected by spatial working memory load. Poster presented at the meeting of the Midwestern Psychological Association, Chicago, IL.

According to Gibson (1979), affordances are available through direct perception of the environment. Interaction designers interpret this as meaning affordances are executable without cognitive cost. We provide evidence that this commonly accepted belief is not true. Affordance interaction performance was decreased by loading working memory with spatial information.

Still, J. D. & Masciocchi, C. M. (2010, April). A saliency model predicts fixations in web interfaces. Paper presented at the Computer-Human Interaction Conference, 5th International Workshop on Model-Driven Development of Advanced User Interfaces, Atlanta, GA.

User interfaces are visually rich and complex. Consequently, it is difficult for designers to predict which locations will be attended to first within a display. Designers currently depend on eye tracking data to determine fixated locations, which are naturally associated with the allocation of attention. A computational saliency model can make predictions about where individuals are
likely to fixate. Thus, we propose that the saliency model may facilitate successful interface development during the iterative design process by providing information about an interface’s stimulus-driven properties. To test its predictive power, the saliency model was used to render 50 web page screenshots; eye tracking data were gathered from participants on the same images. We found that the saliency model predicted fixated locations within web page interfaces. Thus, using computational models to determine regions high in visual saliency during web page development may be a cost effective alternative to eye tracking.

Wellman, D., Vey, M. & Still, J. D. (2010, March). Visual saliency and website design. Poster presented at the Great Plains Conference, St. Joseph, MO.

Wynn, J. S. & Still, J. D. (2010, March). Comparison of two accelerated usability test data analysis techniques. Poster presented at the Great Plains Conference, St. Joseph, MO.

Chowdhury, S. K. & Still, J. D. (2010, March). Effect of opacity of stimulus in deployment of interest in an interface. Poster presented at the Great Plains Conference, St. Joseph, MO. {*Awarded 1st Place*}

Grgic, J. E., Masciocchi, C. & Still, J. D. (2010, March). Designing human-centered notifications. Poster presented at the Great Plains Conference, St. Joseph, MO. {*Awarded 3rd Place*}

 

2009

Still, J. D., & Dark, V. J. (2009, April). The cost of violating design affordances and conventions. Poster presented at the Emerging Technologies Conference, Ames, IA.

Three Takeaways for Designers:
1. Perceptual affordances ought to be used when possible.
2. Violating a learned convention is just as costly as violating a perceptual affordance.
3. If implementing a perceptual affordance is not feasible, established conventions should be reused.

 

2008

Still, J. D ., & Dark, V. J. (2008). An empirical investigation of affordances and conventionsProceedings of the Third International Conference on Design Computing and Cognition, 457-472. {Awarded Best Paper}

Still, J. D., Dark, V. J. & Parkhurst, D. J. (2008). Dense Regions of View-Invariant Features Promote Object Recognition [abstract]. Poster presented at the 16th annual meeting of the Object Perception, Attention & Memory Conference, Chicago, IL.

Still, J. D., Dark, V. J., & Parkhurst, D. J. (2008). What determines where you look in photographs of complex objects? [abstract]. Paper presented at the meeting of the Midwestern Psychological Association, Chicago, IL.

Using SIFT (Scale Invariant Feature Transform), a computer vision algorithm, Still, Dark, and Parkhurst (2007) showed that eye fixations are linked to regions containing high proportions of SIFT view-invariant features. We examined whether regions of invariance affect object naming accuracy. Participants named fragmented images displaying 20%, 40%, 60%, or 80% of the pixels of photographs of complex objects. Displayed pixels were chosen based either on random or view-invariant features. Object naming accuracy was better when regions of invariance were shown, especially with 40% or fewer pixels. Regions of invariance appear to play a role in human object recognition.

Dohse, K. C., Dohse, T., Still, J. D., & Parkhurst, D. J. (2008). Enhancing multi-use interaction with multi-touch tabletop displays using hand tracking [abstract]. Paper presented at the meeting of the First International Conference on Advances in Computer-Human Interaction, Sainte Luce, Martinique.

A rear-projection multi-touch tabletop display was augmented with hand tracking utilizing computer vision techniques. Touch detection by frustrated total internal reflection is useful for achieving interaction with tabletop displays, but the technique is not always reliable when multiple users in close proximity simultaneously interact with the display. To solve this problem, we combine touch detection and hand tracking techniques in order to allow multiple users to simultaneously interact with the display without interference. Our hope is that by considering activities occurring on and above a tabletop display, multiuser interaction will become more natural and useful, which should ultimately support collaborative work.

Watch our Demo Video (over 18,000 views):

http://youtu.be/NNJS5zPhHTo

 

2007

Still, J. D., Dark, V. J., & Parkhurst, D. J. (2007). Viewpoint Invariant Object Features Attract Overt Visual Attention [abstract]. Poster presented at the meeting of the Vision Sciences Society, Sarasota, FL.

     Previous research suggests that salient image features attract overt shifts of attention when participants freely view complex artificial and natural scenes (Parkhurst, Law & Niebur, Vision Research, 2002). This evidence is consistent with the influence of a bottom-up stimulus-driven mechanism of attentional guidance. Attention to salient image features is a plausible default information selection strategy, especially in the absence of a well-defined task.

     Given that object recognition is necessary for most natural visual tasks, a plausible alternative default strategy is to preferentially select information likely to be important for object recognition. Object recognition depends in part on the presence of visual features that remain invariant across viewpoints (Biederman, Psychological Review, 1987). Thus, it is possible that viewpoint invariant features of objects will attract visual attention.

     To examine this possibility, the eye movements made by 12 participants freely viewing images of objects were recorded. Within each image, the Scale Invariant Feature Transform (SIFT) algorithm was used to identify highly invariant features (Lowe, I nternational Conference on Computer Vision, 1999) and the Saliency model was used to identifiy salient features (Itti, Koch & Niebur, IEEE Transactions on Pattern Analysis and Machine Intelligence, 1998). Because the predictions of the two models can be highly correlated, we selected images of 100 different objects from the Amsterdam Library of Object Images (Geusebroek, Burghouts & Smeulders, International Journal of Computer Vision, 2005) that maximally decorrelated the predictions.

     Both models performed significantly better than chance. The SIFT model performed signifcantly better than the Saliency model. These results suggest viewpoint invariant features of objects attract attention as reflected in eye movements. They also support the hypothesis that the default attentional selection strategy is biased to select visual features likely to be important for object recognition.

 

2006

Attentional Blink Posters:

Early eye fixations recorded during free viewing of photographs of natural objects were better described as regions with a high proportion of invariant features than as regions with highly salient features. This suggests that low level visual processing is biased towards visual features likely to be important for object recognition.

Tan, W. P., Still, J. D., & Dark, V. J. (2006). Measuring the AB Effect in an Irregular RVSP Stream [abstract].
Poster presented at the meeting of the Midwestern Psychological Association, Chicago, IL.

When the intervals between distractors in RSVP streams were irregular, attentional blink (AB) magnitude varied with lag (time between T1 and T2) but not number of distractors. Target identification was lower with irregular compared to regular intervals. Distractor regularity modulated AB; current AB models cannot account for this finding.

Tan, W. P., Still, J. D., & Dark, V. J. (2006). Attenuating the Attentional Blink by Including Salient Temporal Events in the RSVP Stream [abstract]. Poster presented at the meeting of the Psychonomic Society, Houston, TX.

We examined the effect on the attentional blink (AB) of changes in temporal dynamics among items presented in a rapid serial visual presentation (RSVP) stream. Manipulation of interstimulus intervals produced faster item presentation rates at different points in the stream. AB did not attenuate when the change occurred just prior to the onset of either the first target (T1) or the second (T2), or just after T2 offset. AB was attenuated when the change occurred just after T1 offset. AB attenuation did not vary with changes in T1 identification rate. These findings are latter varied with changes in item presentation rate. These findings are inconsistent with two-stage processing models of AB; however, they are consistent with attentional control models, in which AB occurs when transference of attentional control from T1 to T2 is inefficient. AB attenuation produced by rate change after T1 offset may indicate that the change facilitated disengagement of attention from T1.

 

2004

Undergraduate Independent Project Paper

Hands-Free Cellular Phones: Greatest Hidden Public Hazard on the Roadway

 

 

 

 

Return to JeremiahStill.info