Publications

Results 1–25 of 41

Search results

Jump to search filters

Physiological and Cognitive Factors Related to Human Performance During the Grand Canyon Rim-to-Rim Hike

Journal of Human Performance in Extreme Environments

Avina, Glory E.; Divis, Kristin; Anderson-Bergman, Clifford I.; Abbott, Robert G.; Laros, James H.

More Details

Tailoring of cyber security technology adoption practices for operational adoption in complex organizations

Avina, Glory E.; Bogner, Kathleen; Carter, James; Friedman, Art; Gordon, Susanna P.; Haney, Julie; Hart, Linda; Kittinger, Robert; Lakkaraju, Kiran L.; Mccann, In K.; Rhyne, Ed; Wolf, Dan

As concerns with cyber security and network protection increase, there is a greater need for organizations to deploy state-of-the-art technology to keep their cyber information safe. However, foolproof cyber security and network protection are a difficult feat since a security breach can be caused simply by a single employee who unknowingly succumbs to a cyber threat. It is critical for an organization’s workforce to holistically adopt cyber technologies that enable enhanced protection, help ward off cyber threats, and are efficient at encouraging human behavior towards safer cyber practices. It is also crucial for the workforce, once they have adopted cyber technologies, to remain consistent and thoughtful in their use of these technologies to keep resistance strong against cyber threats and vulnerabilities. Adoption of cyber technology can be difficult. Many organizations struggle with their workforce adopting newly-introduced cyber technologies, even when the technologies themselves have proven to be worthy solutions. Research, especially in the domain of cognitive science and the human dimension, has sought to understand how technology adoption works and can be leveraged. This paper reviews what empirical literature has found regarding cyber technology adoption, the current research gaps, and how non-research based efforts can influence adoption. Focusing on current efforts accomplished by a government-sponsored activity entitled “ACT” (Adoption of Cybersecurity Technologies), the aim of this paper is to empirically study cyber technology adoption to better understand how to influence operational adoption across the government-sector as well as how what can be done to develop a model that enables cyber technology adoption.

More Details

Rim-to-Rim wearables at the canyon for health (R2R WATCH): Experimental design and methodology

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Avina, Glory E.; Abbott, Robert G.; Anderson-Bergman, Clifford I.; Branda, Catherine B.; Divis, Kristin; Jelinkova, Lucie; Laros, James H.; Pearce, Emily; Femling, Jon

The Rim-to-Rim Wearables At The Canyon for Health (R2R WATCH) study examines metrics recordable on commercial off the shelf (COTS) devices that are most relevant and reliable for the earliest possible indication of a health or performance decline. This is accomplished through collaboration between Sandia National Laboratories (SNL) and The University of New Mexico (UNM) where the two organizations team up to collect physiological, cognitive, and biological markers from volunteer hikers who attempt the Rim-to-Rim (R2R) hike at the Grand Canyon. Three forms of data are collected as hikers travel from rim to rim: physiological data through wearable devices, cognitive data through a cognitive task taken every 3 hours, and blood samples obtained before and after completing the hike. Data is collected from both civilian and warfighter hikers. Once the data is obtained, it is analyzed to understand the effectiveness of each COTS device and the validity of the data collected. We also aim to identify which physiological and cognitive phenomena collected by wearable devices are the most relatable to overall health and task performance in extreme environments, and of these ascertain which markers provide the earliest yet reliable indication of health decline. Finally, we analyze the data for significant differences between civilians’ and warfighters’ markers and the relationship to performance. This is a study funded by the Defense Threat Reduction Agency (DTRA, Project CB10359) and the University of New Mexico (The main portion of the R2R WATCH study is funded by DTRA. UNM is currently funding all activities related to bloodwork. DTRA, Project CB10359; SAND2017-1872 C). This paper describes the experimental design and methodology for the first year of the R2R WATCH project.

More Details

Analysis of social interaction narratives in unaffected siblings of children with ASD through latent Dirichlet allocation

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Laros, James H.; Solis, Isabel; Avina, Glory E.; McClain, Jonathan T.; Ciesielski, Kristina T.R.

Children with autism spectrum disorders (ASD) and their unaffected siblings (US) are frequent targets of social bullying, which leads to severe physical, emotional, and social consequences. Understanding the risk factors is essential for developing preventative measures. We suggest that one such risk factor may be a difficulty to discriminate different biological body movements (BBM), a task that requires fast and flexible processing and interpretation of complex visual cues, especially during social interactions. Deficits in cognition of BBM have been reported in ASD. Since US display an autism endophenotype we expect that they will also display deficits in social interpretation of BBM. Methods. Participants: 8 US, 8 matched TD children, age 7-14; Tasks/Measurements: Social Blue Man Task: Narrative interpretation with a Latent Dirichlet Allocation [LDA] analysis; Social Experience Questionnaires with children and parents. Results. The US displayed as compared to TD: (i) low self-awareness of social bullying in contrast to high parental reports; (ii) reduced speed in identifying social cues; (iii) lower quality and repetitious wording in social interaction narratives (LDA). Conclusions. US demonstrate social endophenotype of autism reflected in delayed identification, interpretation and verbalization of social cues; these may constitute a high risk factor for becoming a victim of social bullying.

More Details

The art of research: Opportunities for a science-based approach

Lecture Notes in Computer Science

Silva, Austin R.; Avina, Glory E.; Tsao, Jeffrey Y.

Research, the manufacture of knowledge, is currently practiced largely as an “art,” not a “science.” Just as science (understanding) and technology (tools) have revolutionized the manufacture of other goods and services, it is natural, perhaps inevitable, that they will ultimately also be applied to the manufacture of knowledge. In this article, we present an emerging perspective on opportunities for such application, at three different levels of the research enterprise. At the cognitive science level of the individual researcher, opportunities include: overcoming idea fixation and sloppy thinking, and balancing divergent and convergent thinking. At the social network level of the research team, opportunities include: overcoming strong links and groupthink, and optimally distributing divergent and convergent thinking between individuals and teams. At the research ecosystem level of the research institution and the larger national and international community of researchers, opportunities include: overcoming GPA and performance fixation, overcoming narrow measures of research impact, and overcoming (or harnessing) existential/social stress.

More Details
Results 1–25 of 41
Results 1–25 of 41