scispace - formally typeset
K

Keith S. Jones

Researcher at Texas Tech University

Publications -  102
Citations -  1746

Keith S. Jones is an academic researcher from Texas Tech University. The author has contributed to research in topics: Phishing & The Internet. The author has an hindex of 13, co-authored 100 publications receiving 1552 citations. Previous affiliations of Keith S. Jones include Kansas State University & University of Cincinnati.

Papers
More filters
Journal ArticleDOI

Brain-computer interfaces based on the steady-state visual-evoked response

TL;DR: The Air Force Research Laboratory has implemented and evaluated two brain-computer interfaces that translate the steady-state visual evoked response into a control signal for operating a physical device or computer program.
Journal ArticleDOI

The Effects of Signal Salience and Caffeine on Performance, Workload, and Stress in an Abbreviated Vigilance Task

TL;DR: The results parallel those obtained with long-duration tasks and support a resource-depletion model of the vigilance decrement, and show that performance on the abbreviated task can be enhanced by caffeine - a drug that benefits long- duration tasks.
Journal ArticleDOI

What Is an Affordance

TL;DR: Gibson as mentioned in this paper presented an analysis of the evolution of J. J. Gibson's thinking on this issue, from some of his earliest writings (i.e., J.J. Gibson & Crooks, 1938) through his most recent writings.
Journal ArticleDOI

GAS ontology: an ontology for collaboration among ubiquitous computing devices

TL;DR: The results demonstrated that participants receiving limited instruction selected targets with impenetrable borders faster than participants who selected objects with a penetrable border, however, an exploratory comparison suggests that only 50% of participants who received limited instruction actually detected the impenettable border.
Journal ArticleDOI

The Core Cyber-Defense Knowledge, Skills, and Abilities That Cybersecurity Students Should Learn in School: Results from Interviews with Cybersecurity Professionals

TL;DR: Overall, the data suggest that KSAs related to networks, vulnerabilities, programming, and interpersonal communication should be prioritized in cybersecurity curricula.