Effects of knowledge and display design on comprehension of complex graphics M Canham, M Hegarty Learning and instruction 20 (2), 155-166, 2010 | 397 | 2010 |
Thinking about the weather: How display salience and knowledge affect performance in a graphic inference task. M Hegarty, MS Canham, SI Fabrikant Journal of Experimental Psychology: Learning, Memory, and Cognition 36 (1), 37, 2010 | 265 | 2010 |
Naïve cartography: How intuitions about display configuration can hurt performance M Hegarty, HS Smallman, AT Stull, MS Canham Cartographica: The International Journal for Geographic Information and …, 2009 | 140 | 2009 |
When diversity in training improves dyadic problem solving MS Canham, J Wiley, RE Mayer Applied Cognitive Psychology 26 (3), 421-430, 2012 | 39 | 2012 |
Phishing for long tails: Examining organizational repeat clickers and protective stewards M Canham, C Posey, D Strickland, M Constantino SAGE Open 11 (1), 2158244021990656, 2021 | 23 | 2021 |
Phish derby: Shoring the human shield through gamified phishing attacks M Canham, C Posey, M Constantino Frontiers in Education 6, 807277, 2022 | 15 | 2022 |
HUMAN FACTORS AND ERGONOMICS IN DESIGN OF A 3 : AUTOMATION, AUTONOMY, AND ARTIFICIAL INTELLIGENCE BD Sawyer, DB Miller, M Canham, W Karwowski Handbook of human factors and ergonomics, 1385-1416, 2021 | 12 | 2021 |
Confronting information security’s elephant, the unintentional insider threat M Canham, C Posey, PS Bockelman Augmented Cognition. Human Cognition and Behavior: 14th International …, 2020 | 12 | 2020 |
When time flies: A comparison of flow states in expert and novice rock climbers M Canham, J Wiley Cognitive Technology 8 (1), 24-33, 2003 | 10 | 2003 |
Individual deep fake recognition skills are affected by viewer’s political orientation, agreement with content and device used S Sütterlin, TF Ask, S Mägerle, S Glöckler, L Wolf, J Schray, A Chandi, ... International Conference on Human-Computer Interaction, 269-284, 2023 | 8 | 2023 |
The enduring mystery of the repeat clickers M Canham, M Constantino, I Hudson, SM Fiore, B Caulkins, ... Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). USENIX …, 2019 | 8 | 2019 |
A computational social science approach to examine the duality between productivity and cybersecurity policy compliance within organizations C Posey, M Canham International Conference on Social Computing, Behavioral-Cultural Modeling …, 2018 | 8 | 2018 |
On the relationship between health sectors’ digitalization and sustainable health goals: A cyber security perspective S Sütterlin, BJ Knox, K Maennel, M Canham, RG Lugo Good Health and Well-Being 133, 2022 | 6 | 2022 |
Ambiguous Self-Induced Disinformation (ASID) Attacks M Canham, S Sütterlin, TF Ask, BJ Knox, L Glenister, RG Lugo Journal of Information Warfare 21 (3), 43-58, 2022 | 5 | 2022 |
Neurosecurity M Canham, BD Sawyer American Intelligence Journal 36 (2), 40-47, 2019 | 5 | 2019 |
When time flies: Effects of skilled memory on time transformation in rock climbers M Canham, J Wiley Cognitive Technology 8, 24-32, 2003 | 5 | 2003 |
Repeat clicking: a lack of awareness is not the problem M Canham International Conference on Human-Computer Interaction, 325-342, 2023 | 3 | 2023 |
Planting a poison SEAD: Using social engineering active defense (SEAD) to counter cybercriminals M Canham, J Tuthill International Conference on Human-Computer Interaction, 48-57, 2022 | 3 | 2022 |
Influences of knowledge on eye fixations while interpreting weather maps M Canham, M Hegarty Proceedings of the Annual Meeting of the Cognitive Science Society 26 (26), 2004 | 3 | 2004 |
Developing Training Research to Improve Cyber Defense of Industrial Control Systems M Canham, SM Fiore, BD Caulkins Proceedings of the Human Factors and Ergonomics Society Annual Meeting 62 (1 …, 2018 | 2 | 2018 |