Active exploration in virtual reality (VR) involves users navigating immersive virtual environments, going from one place to another. While navigating, users often engage in secondary tasks that require attentional resources, as in the case of distracted driving. Inspired by research generally studying the effects of task demands on cybersickness (CS), we investigated how the attentional demands specifically associated with secondary tasks performed during exploration affect CS.
View Article and Find Full Text PDFCybersickness (CS) is one of the challenges that has hindered the widespread adoption of Virtual Reality (VR). Consequently, researchers continue to explore novel means to mitigate the undesirable effects associated with this affliction, one that may require a combination of remedies as opposed to a solitary stratagem. Inspired by research probing into the use of distractions as a means to control pain, we investigated the efficacy of this countermeasure against CS, studying how the introduction of temporally time-gated distractions affects this malady during a virtual experience featuring active exploration.
View Article and Find Full Text PDFObjective: The present study investigated if the same users are vulnerable to phishing emails, scam text messages, and fake news headlines and if there are universal predictors of susceptibility for all three tasks.
Background: Theoretical research provides support for the notion that the same users likely fall for multiple forms of online deception. However, no research has directly compared susceptibility for various online deceptions (eg phishing, disinformation, scam text messages) within the same group of users.
Atten Percept Psychophys
August 2022
The present studies investigated how three core aspects of executive functioning may be influenced by the presence of depth information. Specifically, participants were assigned to one of three executive functioning tasks: working memory (i.e.
View Article and Find Full Text PDFMost previous phishing interventions have employed discrete training approaches, such as brief instructions aimed at improving phishing detection. However, these discrete interventions have demonstrated limited success. The present studies focused on developing an alternative to discrete training by providing college-age adults with a persistent classification aid that guided them on what characteristics a phishing email might include.
View Article and Find Full Text PDFAs target-background similarity increases, search performance declines, but this pattern can be attenuated with training. In the present study we (1) characterized training and transfer effects in visual search for camouflaged targets in naturalistic scenes, (2) evaluated whether transfer effects are preserved 3 months after training, (3) tested the suitability of the perceptual learning hypothesis (i.e.
View Article and Find Full Text PDFObjective: The present studies examine how task factors (e.g., email load, phishing prevalence) influence email performance.
View Article and Find Full Text PDFObjective: To determine if there are age-related differences in phishing vulnerability and if those differences exist under various task conditions (e.g., framing and time pressure).
View Article and Find Full Text PDFThis study explored distinct perceptual and decisional contributions to spam email mental construal. Participants classified spam emails according to pairings of three stimulus features - presence or absence of awkward prose, abnormal message structure, and implausible premise. We examined dimensional interactions within general recognition theory (GRT; a multidimensional extension of signal detection theory).
View Article and Find Full Text PDFAtten Percept Psychophys
April 2019
The present studies explored how performance in multidimensional displays varies as a function of visual working memory load, item distribution across depths, and individual capacity differences. In Experiment 1, the benefit of depth information (one depth vs. two depths) was examined across seven set sizes within a change-detection paradigm.
View Article and Find Full Text PDF