Follow
Matthew Canham
Matthew Canham
CEO, Beyond Layer Seven, LLC
Verified email at belay7.com - Homepage
Title
Cited by
Cited by
Year
Effects of knowledge and display design on comprehension of complex graphics
M Canham, M Hegarty
Learning and instruction 20 (2), 155-166, 2010
3942010
Thinking about the weather: How display salience and knowledge affect performance in a graphic inference task.
M Hegarty, MS Canham, SI Fabrikant
Journal of Experimental Psychology: Learning, Memory, and Cognition 36 (1), 37, 2010
2642010
Naïve cartography: How intuitions about display configuration can hurt performance
M Hegarty, HS Smallman, AT Stull, MS Canham
Cartographica: The International Journal for Geographic Information and …, 2009
1422009
When diversity in training improves dyadic problem solving
MS Canham, J Wiley, RE Mayer
Applied Cognitive Psychology 26 (3), 421-430, 2012
382012
Phishing for long tails: Examining organizational repeat clickers and protective stewards
M Canham, C Posey, D Strickland, M Constantino
SAGE Open 11 (1), 2158244021990656, 2021
192021
Phish derby: Shoring the human shield through gamified phishing attacks
M Canham, C Posey, M Constantino
Frontiers in Education 6, 807277, 2022
122022
HUMAN FACTORS AND ERGONOMICS IN DESIGN OF A 3 : AUTOMATION, AUTONOMY, AND ARTIFICIAL INTELLIGENCE
BD Sawyer, DB Miller, M Canham, W Karwowski
Handbook of human factors and ergonomics, 1385-1416, 2021
122021
Confronting information security’s elephant, the unintentional insider threat
M Canham, C Posey, PS Bockelman
Augmented Cognition. Human Cognition and Behavior: 14th International …, 2020
112020
When time flies: A comparison of flow states in expert and novice rock climbers
M Canham, J Wiley
Cognitive Technology 8, 24-33, 2003
92003
The enduring mystery of the repeat clickers
M Canham, M Constantino, I Hudson, SM Fiore, B Caulkins, ...
Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). USENIX …, 2019
72019
A computational social science approach to examine the duality between productivity and cybersecurity policy compliance within organizations
C Posey, M Canham
International Conference on Social Computing, Behavioral-Cultural Modeling …, 2018
72018
Individual Deep Fake Recognition Skills are Affected by Viewer’s Political Orientation, Agreement with Content and Device Used
S Sütterlin, TF Ask, S Mägerle, S Glöckler, L Wolf, J Schray, A Chandi, ...
International Conference on Human-Computer Interaction, 269-284, 2023
52023
Ambiguous Self-Induced Disinformation (ASID) Attacks
M Canham, S Sütterlin, TF Ask, BJ Knox, L Glenister, RG Lugo
Journal of Information Warfare 21 (3), 43-58, 2022
52022
Neurosecurity
M Canham, BD Sawyer
American Intelligence Journal 36 (2), 40-47, 2019
52019
When time flies: Effects of skilled memory on time transformation in rock climbers
M Canham, J Wiley
Cognitive Technology 8, 24-32, 2003
52003
On the Relationship between Health Sectors’ Digitalization and Sustainable Health Goals: A Cyber Security Perspective
S Sütterlin, BJ Knox, K Maennel, M Canham, RG Lugo
Good Health and Well-Being, 133, 2022
42022
Planting a poison SEAD: Using social engineering active defense (SEAD) to counter cybercriminals
M Canham, J Tuthill
International Conference on Human-Computer Interaction, 48-57, 2022
32022
Influences of knowledge on eye fixations while interpreting weather maps
M Canham, M Hegarty
Proceedings of the Annual Meeting of the Cognitive Science Society 26 (26), 2004
32004
Cognitive diversity in distributed problem solving groups
MS Canham
University of California, Santa Barbara, 2008
22008
Effects of visual salience and knowledge on inferences from weather maps
MS Canham, M Hegarty
Proceedings of the Annual Meeting of the Cognitive Science Society 28 (28), 2006
12006
The system can't perform the operation now. Try again later.
Articles 1–20