skip to main content


Search for: All records

Creators/Authors contains: "Crosby, M."

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. psychology, and cognition has progressed sufficiently that the technology exists to develop a mutually beneficial exchange of information between a human and an AI. Dubbed “AI Symbiosis,” this process enables positive feedback between humans and adaptive computer algorithms in which both human and AI would “learn” how to perform tasks more efficiently than either could alone. Several new technologies and inventions al-low a vast array of augmented input and/or output between humans and AI, in-cluding mental activity wirelessly operating computers, manipulation of targeted neurons with or without implants, non-invasive, surface-level implants the size of a coin transmitting real-time neural activity of senses, real-time video feed of human mental images, and estimation of thoughts and emotions. A research pro-ject is planned to study students’ divided attention when they are learning content in on-line environments. The research will target eye-tracking, click timing, and task performance data to determine the levels of impact divided attention has on student learning. We believe that this line of research will also inform best prac-tices in on-line instructional settings. 
    more » « less
  2. An inter-collegiate research team completed initial research analysis of 166 professional cybersecurity workers from government and industry to identify talent profiles aligned four roles within the Protect and Defend (PD) NICE Workforce Framework: Cybersecurity Defense Analyst, Cybersecurity Defense Infrastructure Responder, Cybersecurity Incident Responder and Cybersecurity Vulnerability Assessment Analyst. Anonymized data collected from multiple teams with performance assessments to build a statistically validated profiles of high potential PD cybersecurity candidates. The World of Work Inventory (WOWI) a multi-dimensional on-line career tool, assesses career training potential, job satisfaction indicators and career interests. Anonymized, aggregated ranked data described profiles of existing high performing candidates working in the field. Utilization of a statistically validated methodology to identify cybersecurity talent at different phases of an individual’s career life cycle supports recruitment of high potential talent from diverse backgrounds to increase the numbers of candidates entering cybersecurity education and training programs. 
    more » « less