In two equivalence experiments, a "think aloud" procedure modeled after Ericsson and Simon's (1980) protocol analysis was implemented to examine subjects' covert verbal responses during matching to s...
详细信息
In two equivalence experiments, a "think aloud" procedure modeled after Ericsson and Simon's (1980) protocol analysis was implemented to examine subjects' covert verbal responses during matching to sample. The purpose was to identify variables that might explain individual differences in equivalence class formation. The results from Experiment 1 suggested that subjects who formed equivalence classes described the relations among stimuli, whereas those not showing equivalence described sample and comparison stimuli as unitary compounds. Because Experiment 1 only demonstrated a correlation between describing stimulus compounds and the absence of equivalence classes, a second study was conducted. In Experiment 2, equivalence class formation was brought under experimental control through pretraining manipulations that facilitated responding either to stimulus compounds or to relations among stimuli. The results demonstrated that a history of describing stimulus compounds, when compared with describing the relations among the stimuli, interfered with the emergence of stimulus equivalence. These findings clarify individual differences in stimulus equivalence. They also demonstrate the utility of analyzing verbal reports to identify possible variables that can be manipulated experimentally.
This article suggests that artificial intelligence (AI) can automate protocol analysis, a form of data analysis in cognitive psychology for inferring the information processes used by individuals from their verbal beh...
详细信息
This article suggests that artificial intelligence (AI) can automate protocol analysis, a form of data analysis in cognitive psychology for inferring the information processes used by individuals from their verbal behavior while solving a problem. We propose a framework to employ think-aloud protocols (TaP) and thematic analysis in qualitative accounting research. Specifically, we use the TaP methodology to explore the impact of legal conflict and the lack of international financial reporting standards (IFRS) knowledge on implementing these accounting standards in a developing country (i.e., Iraq). The article analyzes 32 semi-structured in-depth phone interviews with external auditors, preparers, the capital market, national professional accounting and auditing associations, and academics. The results indicate that the lack of an AI framework, IFRS knowledge, and legislation conflict may adversely interact with standard implementation. This article explores how protocol analysis can benefit from AI support and provide design features. protocol analysis can provide opportunities for future article, design, and action.
This paper explores the problem-solving behavior of people in design activities through a protocol analysis of verbal reports on the interior work design process simulated by an interactive evolutionary computation (...
详细信息
This paper explores the problem-solving behavior of people in design activities through a protocol analysis of verbal reports on the interior work design process simulated by an interactive evolutionary computation (IEC). The protocol analysis method was used to explore the ways of thinking of the participants throughout the process. The analysis reveals that different parts of the interior scene have different effects on the evaluations, and people tend to use the same evaluation criteria continuously on several images. This kind of behavior is consistent with that of professional designers in past studies and is revealed applicable to nonprofessionals in the current research.
Librarians at Springfield College conducted usability testing of Endeavor's federated search tool, ENCompass for Resource Access. The purpose of the testing was to make informed decisions prior to customizing the ...
详细信息
Although IPv6 protocol has considered and implemented many security mechanisms compared with IPv4, there are still many security threatens in IPv6 Networks. In this paper, we has designed and implemented a network for...
详细信息
ISBN:
(纸本)9781612846835;9781612846828
Although IPv6 protocol has considered and implemented many security mechanisms compared with IPv4, there are still many security threatens in IPv6 Networks. In this paper, we has designed and implemented a network forensics prototype 6Foren in IPv6 environment based on the protocol analysis technology, its functions include packet capture, data reconstruct and messages replay etc. the 6Foren can be used as the online digital forensics which support the online forensic of HTTP, FTP, SMTP and POP3 protocols.
This paper processes protocol analysis for Very Small Aperture Terminal (VSAT) control channel without knowing detailed protocol specifications. analysis methods including flooding algorithm, bits statistics and clust...
详细信息
ISBN:
(纸本)9781509007295
This paper processes protocol analysis for Very Small Aperture Terminal (VSAT) control channel without knowing detailed protocol specifications. analysis methods including flooding algorithm, bits statistics and clustering are applied to respectively conduct frame structure analysis and protocol timing analysis on FOW (Forward Order Wire) and ROW (Return Order Wire) for obtaining the critical information and partial transition relationship of control protocol.
Despite the increasing popularity of electronic commerce, there appears to be little evidence of the methodical evaluation of the usability of commercial web sites. The usability of a web site defines how well and how...
详细信息
Despite the increasing popularity of electronic commerce, there appears to be little evidence of the methodical evaluation of the usability of commercial web sites. The usability of a web site defines how well and how easily a visitor, without formal training, can interact with the site. This paper reports the results of a research project, which applies a systematic qualitative technique known as protocol analysis or think aloud method, to examine the usability of a commercial web site. About 15 usability principles and 3 evaluation parameters (content, navigation and interactivity) were used as a framework to analyze the verbal protocols of a sample of users interacting with a greeting card web site. The protocols provided evidence of usability problems caused by crowded content, poor navigation and cumbersome interactivity. These results underscore the importance of two crucial usability goals for commercial web sites: clear path to products and transparency of the ordering process. (C) 2001 Elsevier Science B.V. All rights reserved.
This paper discusses issues and ways of measuring the reliability of segmenting verbal protocols of design activity, a central focus of design research. Reliability is an important issue in distinguishing 'design ...
详细信息
This paper discusses issues and ways of measuring the reliability of segmenting verbal protocols of design activity, a central focus of design research. Reliability is an important issue in distinguishing 'design moves'. In the present study, seven students working for a master in design degree, one graduated designer and two professors segment a 30 min protocol of a product design process into design moves. The intra and inter reliability was calculated for these observers using alpha coefficients. Neither the students', designer's nor professors' segmentation reached the desired cut-off value of 0.8. This negative finding questions the clarity of existing conceptions and urges more concise definitions, better training of analysts, and formulating more decisive instructions. (c) 2013 Elsevier Ltd. All rights reserved.
Despite best efforts, general-purpose computing platforms and servers continue to be insecure. Due to their complexity, furthermore, it seems unlikely that a completely secure system can be built in the foreseeable fu...
详细信息
Despite best efforts, general-purpose computing platforms and servers continue to be insecure. Due to their complexity, furthermore, it seems unlikely that a completely secure system can be built in the foreseeable future. Fortunately, a promising alternative exists: the use of trusted cryptographic devices and subsystems. Like smart cards, such devices hold and use secret cryptographic keys on behalf of a larger general-purpose system. Because such devices are small, specialized, and have relatively simple functionality, it might be feasible to develop subsystems that are actually secure. If so, these trusted devices could be 'boot-strapped' into acting as trusted monitors or policy enforcers on an enterprise's systems or as a party's universally trusted proxy in a distributed system. In other words, this technology could allow enterprises to leverage trust (in a specific device's interface) into trust (of larger systems and networks). However, trust in the interface must be established via a security analysis of some sort. In this paper, the author suggests adapting protocol analysis techniques to this purpose.
We are interested in the design of automated procedures for analyzing the (in)security of cryptographic protocols in the Dolev-Yao model for a bounded number of sessions when we take into account some algebraic proper...
详细信息
We are interested in the design of automated procedures for analyzing the (in)security of cryptographic protocols in the Dolev-Yao model for a bounded number of sessions when we take into account some algebraic properties satisfied by the operators involved in the protocol. This leads to a more realistic model in comparison to what we get under the perfect cryptography assumption, but it implies that protocol analysis deals with terms modulo some equational theory instead of terms in a free algebra. The main goal of this paper is to setup a general approach that works for a whole class of monoidal theories which contains many of the specific cases that have been considered so far in an ad-hoc way (e.g. exclusive or, Abelian groups, exclusive or in combination with the homomorphism axiom). We follow a classical schema for cryptographic protocol analysis which proves first a locality result and then reduces the insecurity problem to a symbolic constraint solving problem. This approach strongly relies on the correspondence between a monoidal theory E and a semiring S-E which we use to deal with the symbolic constraints. We show that the well-defined symbolic constraints that are generated by reasonable protocols can be solved provided that unification in the monoidal theory satisfies some additional properties. The resolution process boils down to solving particular quadratic Diophantine equations that are reduced to linear Diophantine equations, thanks to linear algebra results and the well-definedness of the problem. Examples of theories that do not satisfy our additional properties appear to be undecidable, which suggests that our characterization is reasonably tight. (C) 2007 Elsevier Inc. All rights reserved.
暂无评论