scispace - formally typeset
Search or ask a question
Author

Keith S. Jones

Bio: Keith S. Jones is an academic researcher from Texas Tech University. The author has contributed to research in topics: Phishing & The Internet. The author has an hindex of 13, co-authored 100 publications receiving 1552 citations. Previous affiliations of Keith S. Jones include Kansas State University & University of Cincinnati.


Papers
More filters
Journal ArticleDOI
01 Jun 2000
TL;DR: The Air Force Research Laboratory has implemented and evaluated two brain-computer interfaces that translate the steady-state visual evoked response into a control signal for operating a physical device or computer program.
Abstract: The Air Force Research Laboratory has implemented and evaluated two brain-computer interfaces (BCI's) that translate the steady-state visual evoked response into a control signal for operating a physical device or computer program. In one approach, operators self-regulate the brain response; the other approach uses multiple evoked responses.

655 citations

Journal ArticleDOI
TL;DR: The results parallel those obtained with long-duration tasks and support a resource-depletion model of the vigilance decrement, and show that performance on the abbreviated task can be enhanced by caffeine - a drug that benefits long- duration tasks.
Abstract: In 2 experiments, a 12-min computerized vigilance task was demonstrated to reproduce the vigilance decrement, high workload (NASA-TLX), and stressful character (Dundee Stress State Questionnaire) of vigilance tasks lasting 30 min or more. In Experiment 1, the abbreviated task was also shown to duplicate the signal salience effect, a major finding associated with long-duration vigilance tasks. Moreover, Experiment 2 showed that performance on the abbreviated task can be enhanced by caffeine - a drug that benefits long-duration tasks. This enhancement effect was limited to performance, however, suggesting that caffeine influences factors that control signal detection but not those that control task-induced stress. The results parallel those obtained with long-duration tasks and support a resource-depletion model of the vigilance decrement. The abbreviated task might be useful in situations in which long-duration tasks are precluded (e.g., performance assessment batteries, neuropsychological testing, and brain imaging).

264 citations

Journal ArticleDOI
TL;DR: Gibson as mentioned in this paper presented an analysis of the evolution of J. J. Gibson's thinking on this issue, from some of his earliest writings (i.e., J.J. Gibson & Crooks, 1938) through his most recent writings.
Abstract: What should and should not be considered an affordance is still an open issue. At the 2002 North American meeting of the International Society for Ecological Psychology, a symposium was held concerning this topic. The articles in this special issue are expanded versions of the papers presented at that symposium. To set the stage for those discussions, this article presents an analysis of the evolution of J. J. Gibson's thinking on this issue, from some of his earliest writings (i.e., J. J. Gibson & Crooks, 1938) through his most recent writings (i.e., J. J. Gibson, 1979/1986). It is hoped that this forum will stimulate thinking concerning this important ecological concept.

195 citations

Journal ArticleDOI
TL;DR: The results demonstrated that participants receiving limited instruction selected targets with impenetrable borders faster than participants who selected objects with a penetrable border, however, an exploratory comparison suggests that only 50% of participants who received limited instruction actually detected the impenettable border.
Abstract: Walker and Smelcer (Proceedings of the CHI 90, ACM, New York, 1990, pp. 221-225) found that menus could be selected faster if they were placed against the edge of the screen. Doing so creates an impenetrable border between the menu and the edge of the screen that the mouse cursor cannot penetrate. This changes how users move the mouse, so that selection times quicken compared to menus with a penetrable border. Experiment 1 investigated the effect that practice has on the acquisition of objects with and without impenetrable borders. The findings suggest that excessive practice was not necessary to demonstrate border type differences; thus, the advantage of having impenetrable borders seems to be relatively instantaneous. However, it was not readily apparent whether or not participants would realize the advantages of impenetrable borders without instruction. Thus, the primary purpose of Experiment 2 was to assess whether or not users would discover the benefits of impenetrable borders spontaneously. Participants were assigned to either the penetrable or impenetrable border condition. Additionally, participants received either full instruction concerning the benefits of the target placement, or limited instruction that simply informed the participant about the nature of the task. The results demonstrated that participants receiving limited instruction selected targets with impenetrable borders faster than participants who selected objects with a penetrable border. However, an exploratory comparison suggests that only 50% of participants who received limited instruction actually detected the impenetrable border. An additional comparison suggests that with practice the participants who were successful at detecting the impenetrable border selected the targets as quickly as participants who received full instruction concerning the benefits of impenetrable borders. The findings suggest that with full instruction, all users will perform reduced selection times. Given that not all participants discovered the impenetrable border it suggests that, whenever possible, users should receive instruction pertaining to the benefits of the impenetrable borders.

80 citations

Journal ArticleDOI
TL;DR: Overall, the data suggest that KSAs related to networks, vulnerabilities, programming, and interpersonal communication should be prioritized in cybersecurity curricula.
Abstract: Our cybersecurity workforce needs surpass our ability to meet them. These needs could be mitigated by developing relevant curricula that prioritize the knowledge, skills, and abilities (KSAs) most important to cybersecurity jobs. To identify the KSAs needed for performing cybersecurity jobs, we administered survey interviews to 44 cyber professionals at the premier hacker conferences Black Hat 2016 and DEF CON 24. Questions concerned 32 KSAs related to cyber defense. Participants rated how important each KSA was to their job and indicated where they had learned that KSA. Fifteen of these KSAs were rated as being of higher-than-neutral importance. Participants also answered open-ended questions meant to uncover additional KSAs that are important to cyber-defense work. Overall, the data suggest that KSAs related to networks, vulnerabilities, programming, and interpersonal communication should be prioritized in cybersecurity curricula.

54 citations


Cited by
More filters
01 Jan 2016
TL;DR: The using multivariate statistics is universally compatible with any devices to read, allowing you to get the most less latency time to download any of the authors' books like this one.
Abstract: Thank you for downloading using multivariate statistics. As you may know, people have look hundreds times for their favorite novels like this using multivariate statistics, but end up in infectious downloads. Rather than reading a good book with a cup of tea in the afternoon, instead they juggled with some harmful bugs inside their laptop. using multivariate statistics is available in our digital library an online access to it is set as public so you can download it instantly. Our books collection saves in multiple locations, allowing you to get the most less latency time to download any of our books like this one. Merely said, the using multivariate statistics is universally compatible with any devices to read.

14,604 citations

Journal ArticleDOI
TL;DR: With adequate recognition and effective engagement of all issues, BCI systems could eventually provide an important new communication and control option for those with motor disabilities and might also give those without disabilities a supplementary control channel or a control channel useful in special circumstances.

6,803 citations

Journal Article
TL;DR: Caffeine is the most widely consumed behaviorally active substance in the world and almost all caffeine comes from dietary sources (beverages and food).
Abstract: Caffeine is the most widely consumed behaviorally active substance in the world. Almost all caffeine comes from dietary sources (beverages and food), most of it from coffee and tea. Acute and, especially, chronic caffeine intake appear to have only minor negative consequences on health. For this

2,395 citations

Journal ArticleDOI
TL;DR: The brain's electrical signals enable people without muscle control to physically interact with the world through the use of their brains' electrical signals.
Abstract: The brain's electrical signals enable people without muscle control to physically interact with the world.

2,361 citations

Journal ArticleDOI
TL;DR: In this paper, the authors offer a new book that enPDFd the perception of the visual world to read, which they call "Let's Read". But they do not discuss how to read it.
Abstract: Let's read! We will often find out this sentence everywhere. When still being a kid, mom used to order us to always read, so did the teacher. Some books are fully read in a week and we need the obligation to support reading. What about now? Do you still love reading? Is reading only for you who have obligation? Absolutely not! We here offer you a new book enPDFd the perception of the visual world to read.

2,250 citations