Advances in Human Factors in Cybersecurity: Proceedings of The AHFE 2019 International Conference On Human Factors in Cybersecurity, July 24-28, 2019, Washington D.C., USA Tareq Ahram Download PDF
Advances in Human Factors in Cybersecurity: Proceedings of The AHFE 2019 International Conference On Human Factors in Cybersecurity, July 24-28, 2019, Washington D.C., USA Tareq Ahram Download PDF
Advances in Human Factors in Cybersecurity: Proceedings of The AHFE 2019 International Conference On Human Factors in Cybersecurity, July 24-28, 2019, Washington D.C., USA Tareq Ahram Download PDF
OR CLICK LINK
https://textbookfull.com/product/advances-in-
human-factors-in-cybersecurity-proceedings-of-the-
ahfe-2019-international-conference-on-human-
factors-in-cybersecurity-
july-24-28-2019-washington-d-c-usa-tareq-ahram/
Read with Our Free App Audiobook Free Format PFD EBook, Ebooks dowload PDF
with Andible trial, Real book, online, KINDLE , Download[PDF] and Read and Read
Read book Format PDF Ebook, Dowload online, Read book Format PDF Ebook,
[PDF] and Real ONLINE Dowload [PDF] and Real ONLINE
More products digital (pdf, epub, mobi) instant
download maybe you interests ...
https://textbookfull.com/product/advances-in-human-factors-in-
cybersecurity-ahfe-2020-virtual-conference-on-human-factors-in-
cybersecurity-july-16-20-2020-usa-isabella-corradini/
Tareq Ahram
Waldemar Karwowski Editors
Advances in
Human Factors
in Cybersecurity
Proceedings of the AHFE 2019
International Conference on Human
Factors in Cybersecurity, July 24–28,
2019, Washington D.C., USA
Advances in Intelligent Systems and Computing
Volume 960
Series Editor
Janusz Kacprzyk, Systems Research Institute, Polish Academy of Sciences,
Warsaw, Poland
Advisory Editors
Nikhil R. Pal, Indian Statistical Institute, Kolkata, India
Rafael Bello Perez, Faculty of Mathematics, Physics and Computing,
Universidad Central de Las Villas, Santa Clara, Cuba
Emilio S. Corchado, University of Salamanca, Salamanca, Spain
Hani Hagras, School of Computer Science & Electronic Engineering,
University of Essex, Colchester, UK
László T. Kóczy, Department of Automation, Széchenyi István University,
Gyor, Hungary
Vladik Kreinovich, Department of Computer Science, University of Texas
at El Paso, El Paso, TX, USA
Chin-Teng Lin, Department of Electrical Engineering, National Chiao
Tung University, Hsinchu, Taiwan
Jie Lu, Faculty of Engineering and Information Technology,
University of Technology Sydney, Sydney, NSW, Australia
Patricia Melin, Graduate Program of Computer Science, Tijuana Institute
of Technology, Tijuana, Mexico
Nadia Nedjah, Department of Electronics Engineering, University of Rio de Janeiro,
Rio de Janeiro, Brazil
Ngoc Thanh Nguyen, Faculty of Computer Science and Management,
Wrocław University of Technology, Wrocław, Poland
Jun Wang, Department of Mechanical and Automation Engineering,
The Chinese University of Hong Kong, Shatin, Hong Kong
The series “Advances in Intelligent Systems and Computing” contains publications
on theory, applications, and design methods of Intelligent Systems and Intelligent
Computing. Virtually all disciplines such as engineering, natural sciences, computer
and information science, ICT, economics, business, e-commerce, environment,
healthcare, life science are covered. The list of topics spans all the areas of modern
intelligent systems and computing such as: computational intelligence, soft comput-
ing including neural networks, fuzzy systems, evolutionary computing and the fusion
of these paradigms, social intelligence, ambient intelligence, computational neuro-
science, artificial life, virtual worlds and society, cognitive science and systems,
Perception and Vision, DNA and immune based systems, self-organizing and
adaptive systems, e-Learning and teaching, human-centered and human-centric
computing, recommender systems, intelligent control, robotics and mechatronics
including human-machine teaming, knowledge-based paradigms, learning para-
digms, machine ethics, intelligent data analysis, knowledge management, intelligent
agents, intelligent decision making and support, intelligent network security, trust
management, interactive entertainment, Web intelligence and multimedia.
The publications within “Advances in Intelligent Systems and Computing” are
primarily proceedings of important conferences, symposia and congresses. They
cover significant recent developments in the field, both of a foundational and
applicable character. An important characteristic feature of the series is the short
publication time and world-wide distribution. This permits a rapid and broad
dissemination of research results.
Editors
123
Editors
Tareq Ahram Waldemar Karwowski
Institute for Advanced Systems Engineering University of Central Florida
University of Central Florida Orlando, FL, USA
Orlando, FL, USA
This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Advances in Human Factors
and Ergonomics 2019
10th International Conference on Applied Human Factors and Ergonomics and the
Affiliated Conferences
v
vi Advances in Human Factors and Ergonomics 2019
(continued)
Advances in Artificial Intelligence, Software Tareq Ahram
and Systems Engineering
Advances in Human Factors in Architecture, Jerzy Charytonowicz and Christianne
Sustainable Urban Planning and Infrastructure Falcão
Advances in Physical Ergonomics and Human Ravindra S. Goonetilleke and Waldemar
Factors Karwowski
Advances in Interdisciplinary Practice in Industrial Cliff Sungsoo Shin
Design
Advances in Safety Management and Human Pedro M. Arezes
Factors
Advances in Social and Occupational Ergonomics Richard H. M. Goossens and Atsuo
Murata
Advances in Manufacturing, Production Waldemar Karwowski, Stefan
Management and Process Control Trzcielinski and Beata Mrugalska
Advances in Usability and User Experience Tareq Ahram and Christianne Falcão
Advances in Human Factors in Wearable Tareq Ahram
Technologies and Game Design
Advances in Human Factors in Communication Amic G. Ho
of Design
Advances in Additive Manufacturing, Modeling Massimo Di Nicolantonio, Emilio Rossi
Systems and 3D Prototyping and Thomas Alexander
Preface
Our daily life, economic vitality, and national security depend on a stable, safe, and
resilient cyberspace. We rely on this vast array of networks to communicate and
travel, power our homes, run our economy, and provide government services. Yet,
cyber intrusions and attacks have increased dramatically over the last decade,
exposing sensitive personal and business information, disrupting critical operations,
and imposing high costs on the economy. The human factor at the core of
cybersecurity provides greater insight into this issue and highlights human error and
awareness as key factors, in addition to technical lapses, as the areas of greatest
concern. This book focuses on the social, economic, and behavioral aspects of
cyberspace, which are largely missing from the general discourse on cybersecurity.
The human element at the core of cybersecurity is what makes cyberspace the
complex, adaptive system that it is. An inclusive, multi-disciplinary, holistic
approach that combines the technical and behavioral element is needed to enhance
cybersecurity. Human factors also pervade the top cyber threats. Personnel
management and cyber awareness are essential for achieving holistic cybersecurity.
This book will be of special value to a large variety of professionals, researchers,
and students focusing on the human aspect of cyberspace, and for the effective
evaluation of security measures, interfaces, user-centered design, and design for
special populations, particularly the elderly. We hope this book is informative, but
even more than that it is thought-provoking. We hope it inspires, leading the reader
to contemplate other questions, applications, and potential solutions in creating safe
and secure designs for all.
This book includes two main sections:
Section 1 Cybersecurity Applications and Privacy Research
Section 2 Awareness and Cyber-Physical Security
vii
viii Preface
Each section contains research papers that have been reviewed by members
of the International Editorial Board. Our sincere thanks and appreciation to the
Board members as listed below:
Ritu Chadha, USA
Grit Denker, USA
Frank Greitzer, USA
Jim Jones, USA
Denise Nicholson, USA
Anne Tall, USA
Mike Ter Louw, USA
Elizabeth Whitaker, USA
ix
x Contents
1 Introduction
individual is, the more likely they are to process the content of pop-up messages using
automatic heuristic processing compared to someone who is more suspicious and less
trusting who will likely engage in more cognitively effortful and time-consuming
processing. Similarly, those who have a higher need for cognitive stimulation [19], will
be more susceptible to influence techniques used within pop-up messages such as
urgency, compliance with authority and avoidance of loss; at the expense of looking for
suspicious aspects, such as message authenticity cues (e.g., correct spelling and
grammar, company name). This leads to a prediction that an intervention training
protocol that increases suspicion and encourages more effortful processing of pop-up
message content should have carryover effects to a subsequent task performed with
malevolent pop-up interruptions.
To our knowledge, only two published studies have considered human suscepti-
bility to fraudulent pop-up interruptions occurring during a demanding memory-based
task. [2] developed a paradigm where young adult participants were interrupted by one
of three different types of pop-up message during a serial recall memory recall task.
One third of pop-ups were designed to look genuine (genuine condition) and high in
authority with no cues to potential malevolence. Another third (mimicked condition)
were also high in authority but contained cues to suggest malevolence. The other third
were also of a malevolent nature and low authority (i.e., contained no authority details
relating to the source of the pop-up such as company name, logo, or website link).
Participants had to decide whether to accept or decline pop-ups, at which point the
primary task would be reinstated at the point of interruption. Predictions informed by
parameters of SCAM [3] were supported, with an alarming 63% of mimicked pop-ups
accepted compared with 66% in the genuine condition. Even more worrying was that
56% of low authority pop-ups were accepted. Participants spent on average
only *5.5–6-s viewing pop-up message content before committing to a response.
When there were no time constraints to resume an interrupted task, participants
accepted a slightly higher percentage (72%) of genuine pop-ups and slightly fewer
(55%) mimicked pop-ups. This suggests that even without other cognitive and time
pressures, people are still not very good at detecting malevolent cues within mimicked
pop-up interruptions. [1] reported similar findings with older adults. Participants
demonstrated higher levels of susceptibility to malevolent pop-ups during an inter-
rupted memory recall phase, despite spending significant more time (*10.5–11-s)
viewing them than in [1]. Fitting with SCAM-based low suspicion and automaticity
predictions [3], both studies demonstrate very high levels of human susceptibility to
malevolent pop-up interruptions that occur during a demanding memory-based task.
However, concerns remain as neither study showed marked malevolent detection
improvements when time pressure was not a factor.
Given these results, it is important further develop and test interventions to reduce
susceptibility to computer-based communications such as malevolent pop-up messages.
Education-based training interventions are not always effective [20] with some finding
that people are more suspicious of scams that they are familiar with versus those that
are less familiar [21]. [22] tested the effectiveness of emails containing cues to
malevolence although found that not all people read and processed the content to a
deep enough level to identify them effectively. These findings fit SCAM parameters
regarding the use of automatic heuristic processing strategies, especially when
6 P. L. Morgan et al.
2 Method
2.1 Participants
Fifty Cardiff University Psychology undergraduate students (age: 19.32; SD 1.06) were
recruited, via opportunity sampling, in return for course credits with adequate a priori
power (.8 detect medium to large effect sizes (Cohen’s f .25 −.4). Participants were
first-language English or highly proficient in English as a second language and had
normal/correct vision. They were assigned to one of three cue identification training
groups. There were 16 in the Non-Malevolent Cue Identification (N-MCIT)/Control
group (M age: 19.63-years, four male), 17 in the Non-Incentivized Malevolent Cue
Identification (N-IMCIT) group (M age: 19.06-years, six male), and 17 in the Incen-
tivized Malevolent Cue Identification (IMCIT) group (M age: 19.29-years, two male).
2.2 Design
A mixed factorial design was employed. The between-participants’ independent vari-
able (IV) was CIT Group with three levels: Control, N-IMCIT, and IMCIT. There were
three repeated measures IVs. One was serial recall phase with two levels: Phase 1/Pre-
Intervention 1, and, Phase 3/Post-Intervention. Another was the malevolency (Message
Attempting to Reduce Susceptibility to Fraudulent Computer Pop-Ups 7
2.3 Materials
Prior to the start of Phase 1 and 3 trials, the following message was displayed in the
middle of the computer screen for 15-s:
‘This system is protected by virus protection software and pop-ups are installed on a regular
basis. However, please be vigilant about the security of this system by ensuring that any
attempts by applications to access system information of data are legitimate.’
2.4 Procedure
Before providing consent, participants read through an information sheet and experi-
mental instructions (which were also verbally read by the experimenter) before com-
pleting two practice trials: one with a non-interrupted serial recall task, and another
with a serial recall task interrupted by a non-malevolent pop-up. They were not
informed about the cyber security element of the experiment during this process. At the
beginning of Phase 1, participants were presented with the computer security message
(see Materials). After this disappeared, they were able to press the spacebar to start trial
one of 18, with 12 of the trials interrupted (see Materials). Phase 2 was the intervention
phase. Participants read an instruction sheet appropriate for their group. All were
instructed they had 5-min to read 5-passages (one-at-a-time) and complete the cue
Attempting to Reduce Susceptibility to Fraudulent Computer Pop-Ups 9
identification task relevant to their group. The Control group had to indicate (Yes or
No) whether the passage of text contained at least one cue relating to its category
description (e.g., color: look for color words). If answering yes, they then had to
indicate how many category words they could identify within the passage (i.e., 1–3). N-
IMCIT and IMCIT groups were first given written information pertaining to the
malevolency cues contained within pop-ups experienced in Phase 1. These were
explained verbally by the experimenter who checked participants’ understanding. As
with the Control group, participants in the MCIT groups were then presented with 5-
passages of text, one-at-a-time, and had to indicate (Yes or No) whether the passage it
contained at least one trained cue indicating potential malevolence. Participants were
also provided with a small whiteboard and marker to make notes, if desired. Phase 3
(post-intervention) involved 30 serial recall trials with 24 interrupted. After Phase 3,
participants completed demographics and pop-up awareness questionnaires. Partici-
pants were debriefed, with information about cyber-security and awareness aims.
All analyses are two-tailed with a = .05. One dataset was excluded, as it was found to
be a statistical outlier (z-scores > 3.29, ps < .001) on more than one measure.
Percentage of Pop-Up Messages Accepted/Declined
First, we consider mean percentages of ‘malevolent’ pop-ups accepted across Phases 1
(pre-intervention) and 3 (post-intervention), collapsing across New and Old cue
malevolent pop-ups in Phase 3 (Table 1). The percentage of malevolent pop-ups
accepted looks to have decreased in Phase 3 for both MCIT groups, although increased
for the Control group. Somewhat surprisingly, the mean percentage is markedly lower
in the Control versus the N-IMCIT and IMCIT groups.
Table 1. Percentage of Malevolent and Genuine pop-ups accepted during Phases 1 and 2 and
across each Training Group. Note. SD = Standard Deviation.
Malevolent Pop-Ups Genuine Pop-Ups
Phase Condition Mean SD Mean SD
1 Control 56.30 .34 63.54 .39
N-IMCIT 73.41 .31 84.31 .30
IMCIT 81.29 .29 87.25 .29
3 Control 67.69 .33 70.83 .35
N-IMCIT 60.35 .31 85.29 .24
IMCIT 70.12 .31 92.65 .11
however a significant interaction, F(2, 47) = 3.44, MSE = .04, p = .04. Bonferroni pot-
hoc tests revealed a non-significant (although trend) reduction in the percentage of
malevolent pop-ups accepted in Phase 3 compared with Phase 1 for the IMCIT group
(p = .07). However, the significant interaction might be better explained by the per-
centage of malevolent pop-ups accepted by the Control group in Phase 1 being sig-
nificantly lower than in the N-IMCIT and IMCIT groups within Phase 1 (ps < .025).
Given this unexpected difference (discussed later), another mixed ANOVA, this time 2
(Training Group: MCIT, IMCIT) 2 (Phase: 1, 3), was conducted. This revealed a
significant main effect of Phase, F(1, 32) = 5.63, MSE = .04, p = .02 with a lower
percentage of malevolent pop-ups accepted in Phase 3 than in Phase 1. There was a non-
significant main effect of Training Group, F(1, 32) = .96, MSE = .08, p = .33, and a
non-significant interaction, F(1, 32) = .03, MSE = .04, p = .86.
Taken together, these findings suggest that: (1) MCIT worked in terms of reducing
the percentage of malevolent pop-up messages accepted post-intervention, (2) IMCIT
did not lead to better performance than N-IMCIT, and, (3) participants in the Control
group, in Phase 1 at least, performed differently (i.e., chose to accept far less malev-
olent pop-ups) to those in MCIT conditions. In relation to (1), findings are in line with
SCAM predictions that heightening suspicion will lead to increased cognitive and less
automatic processing of stimuli [3], thus improving the likelihood of identifying
malevolence cues. However, the percentage of malevolent pop-ups accepted was still
very high, even after the intervention. In relation to (2), incentivized MCIT through
social comparison (using an onscreen leaderboard technique), was not effective enough
to cause even more suspicion and increased cognitive processing of potential cues to
suggest malevolence within pop-up messages compared to non-incentivized MCIT.
This finding (despite there being a trend) is not in line with [22] and possible reasons
are considered in the Limitations section. Considering (3), the only difference was
when the groups were tested: The Control group were tested after the MCIT groups.
Next, we consider mean percentages of ‘genuine’ pop-ups accepted in Phases 1 and
3, noting again that both New and Old cue malevolent pop-up data are collapsed across
(Table 1). The percentage of genuine pop-ups accepted increased marginally in Phase 3
across all groups. However, and as with malevolent pop-ups, the mean percentage of
genuine pop-ups accepted in Phase 1 was markedly lower in the Control versus MCIT
groups. A mixed 3 2 analysis of variance (ANOVA) with Training Group as the
between-subjects variable and Phase revealed a marginally non-significant main effect
of Training Group, F(2, 47) = 3.12, MSE = .07, p = .054, and a non-significant main
effect of Phase, F(1, 47) = 2.57, MSE = .02, p = .12. There was a non-significant
interaction. However, these findings might again be affected by the unusual pattern of
data in the Control condition during Phase 1 compared to the MCIT condition.
Therefore, a 2 (Training Group: MCIT, IMCIT) 2 (Phase: 1, 3) mixed ANOVA was
conducted. There were non-significant main effects of Training Group, F(1, 32) < 1,
p = .50, and Phase, F(1, 32) < 1, p = .39, and a non-significant interaction, F(1,
32) < 1, p = .55.
Taken together, these findings suggest that (1) the ability to identify genuine pop-
up messages was high, (2) MCIT did not have any effect on this, and (3) participants in
the Control group, in Phase 1 at least, performed quite differently (i.e., accepted fewer
Attempting to Reduce Susceptibility to Fraudulent Computer Pop-Ups 11
Table 2. Percentage of Old and New pop-ups accepted during Phase 3 across each Training
Group. Note. SD = Standard Deviation.
Malevolent
Pop-Ups
Phase Condition Mean SD
Old Control 67.75% .34
N-IMCIT 58.82% .35
IMCIT 66.65% .34
New Control 67.75% .36
N-IMCIT 61.79% .31
IMCIT 73.35% .30
We anticipated that participants in both MCIT groups, and in particular the I-MCIT
group would be less likely to spot new cues. However, there is no statistical evidence to
suggest that any form of MCIT led to participants accepting more New messages,
despite an *11.5% higher acceptance of these in the IMCIT versus the N-IMCIT
condition in Phase 3. Of course, this could be a power issue, and future studies should
12 P. L. Morgan et al.
consider this before ruling out the possibility that MCIT will not put people at a dis-
advantage in terms of spotting malevolent cues that they have not be trained to identify,
Time to Accept/Decline Pop-Up Messages
Next, we consider the time taken at make an accept/decline response. Noting that the
time to accept/decline malevolent pop-ups was 5.37-s for younger adults in the [2]
study, and 10-92-s for older adults in the [1] study. In the same studies, the times to
accept genuine pop-ups were 5.47-s and 10.45-s respectively. Mean pop-up
accept/decline times for the current study are displayed in Table 3 (with one outlier
removed: z-scores > 3.29, p < .001). Malevolent and genuine pop-ups, accept/decline
times are noticeably lower (*1–2-s) than in e.g., [2]. Also, response times appear to
reduce for each Group in Phase 3 versus Phase 1. The third, and somewhat counter-
intuitive observation, is that response times are noticeably lowest (and very short) for
the Control Group (M 3.39 Phase 1, M 2.97 Phase 3).
Table 3. Time (seconds) before making an accept/decline response to Malevolent and Genuine
pop-ups during Phases 1 and 2 and across each Training Group. Note. SD = Standard Deviation.
Malevolent Genuine
Pop-Ups Pop-Ups
Phase Condition Mean SD Mean SD
1 Control 3.45 2.65 3.33 2.23
N-IMCIT 4.41 2.49 4.26 2.15
IMCIT 4.77 2.99 4.57 3.05
3 Control 3.08 1.82 2.85 1.87
N-IMCIT 3.66 1.57 3.51 1.55
IMCIT 4.54 3.07 4.05 2.31
and identify cues than in the MCIT groups. This was not the case. Also, their accep-
tance rate for malevolent pop-ups in Phase 3 increased by over 10% and the time taken
to accept/decline messages reduced by almost half a second. Upon closer inspection of
the data, three Control group participants almost always declined malevolent messages
compared with the others whose performance was largely in line with those in the
MCIT groups. However, they were not statistical outliers the p < .001 (z-
scores > 3.29) level.
4 Limitations
There are limitations. First, there was no statistical evidence to suggest that those in the
IMCIT group were better at identifying malevolent pop-ups than those in the N-IMCIT
group, despite a trend. Perhaps using a leaderboard with individual position increasing
after each task (e.g., 19th/20 after the first task, 1st after the last task) was not effective
enough. This may be influenced by some participants potentially being aware that they
were performing optimally and met with incongruent feedback to suggest otherwise.
Competing with other people in situ may have promoted stronger social comparison
and led to more intense cognitive processing strategies [3]. Second, within both MCIT
conditions, participants had to identify whether they detected malevolent cues and then
type a number corresponding to how many. This method meant that accuracy of
malevolent cue identical could not be measured. Third, participants had one-minute per
training task, only five tasks to complete, with each passage containing only three
malevolent cues. They were also aware that there would be a maximum of three
malevolent cues. This may not have been cognitively engaging enough. Finally,
Control group participants were treating pop-ups with higher levels of suspicion in
Phase 1. Ideally, this condition would be re-run to check for a possibly anomalous
effect.
5 Implications
References
1. Morgan, P.L., Williams, E.J., Zook, N.A., Christopher, G.: Exploring older adult
susceptibility to fraudulent computer pop-up interruptions. In: International Conference on
Applied Human Factors and Ergonomics, pp. 56–68. Springer, Cham (2018)
2. Williams, E.J., Morgan, P.L., Joinson, A.N.: Press accept to update now: individual
differences in susceptibility to malevolent interruptions. Decis. Support Syst. 96, 119–129
(2017)
3. Vishwanath, A., Harrison, B., Ng, Y.J.: Suspicion, cognition, and automaticity model of
phishing susceptibility. Commun. Res. 45(8), 1–21 (2016)
4. Anti-Phishing Working Group (APWG). https://www.antiphishing.org/resources/apwg-
reports/
5. Department for Culture, Media & Sport.: Cyber security breaches survey 2017. https://www.
gov.uk/government/uploads/system/uploads/attachment_data/file/609186/Cyber_Security_
Breaches_Survey_2017_main_report_PUBLIC.pdf
6. National Cyber Security Centre.: Weekly threat report, 30 June 2017. https://www.ncsc.gov.
uk/report/weekly-threat-report-30th-june2017
7. Perera, D.: Researcher: Sony hackers used fake emails, Politico. https://www.politico.com/
story/2015/04/sony-hackers-fake-emails-117200
8. Forbes Cyber Security report. https://www.forbes.com/sites/ellistalton/2018/04/23/the-u-s-
governments-lack-of-cybersecurity-expertise-threatens-our-infrastructure/#20d248be49e0
9. HM Government. National cyber security strategy 2016–2021. https://www.gov.uk/
government/uploads/system/uploads/attachment_data/file/567242/national_cyber_security_
strategy_2016.pdf
10. Conteh, N.Y., Schmick, P.J.: Cybersecurity: risks, vulnerabilities and countermeasures to
prevent social engineering attacks. Int. J. Adv. Comput. Res. 6(23), 31 (2016)
11. Downing, D., Covington, M., Covington, M., Barrett, C.A., Covington, S.: Dictionary of
Computer and Internet Terms. Barron’s Educational Series, New York (2000)
12. Daintith, J., Wright, E.: A Dictionary of Computing. Oxford University Press, Oxford (2008)
13. Norton How To 2018. https://us.norton.com/internetsecurity-how-to-the-importance-of-
general-software-updates-and-patches.html
14. Altmann, E.M., Trafton, J.G., Hambrick, D.Z.: Momentary interruptions can derail the train
of thought. J. Exp. Psychol. Gen. 143(1), 215–226 (2014)
15. Hodgetts, H.M., Jones, D.M.: Interruption of the Tower of London task: support for a goal-
activation approach. J. Exp. Psychol. Gen. 135(1), 103–115 (2006)
16. Monk, C.A., Trafton, J.G., Boehm-Davis, D.A.: The effect of interruption duration and
demand on resuming suspended goals. J. Exp. Psychol. Appl. 14(4), 299–313 (2008)
17. Altmann, E.M., Trafton, J.G.: Memory for goals: an activation-based model. Cogn. Sci. 26,
39–83 (2002)
18. Altmann, E.M., Trafton, J.G.: Timecourse of recovery from task interruption: data and a
model. Psychon. Bull. Rev. 14(6), 1079–1084 (2017)
19. Cacioppo, J.T., Petty, R.E., Feng Kao, C.: The efficient assessment of need for cognition.
J. Pers. Assess. 48(3), 306–307 (1984)
20. Anandpara, V., Dingman, A., Jakobsson, M., Liu, D., Roinestad, H.: Phishing IQ tests
measure fear, not ability. In: International Conference on Financial Cryptography and Data
Security, pp. 362–366. Springer, Berlin (2007)
21. Downs, J.S., Holbrook, M.B., Cranor, L.F.: Decision strategies and susceptibility to
phishing. In: Proceedings of the Second Symposium on Usable Privacy and Security,
pp. 79–90. ACM (2006)
Attempting to Reduce Susceptibility to Fraudulent Computer Pop-Ups 15
22. Kumaraguru, P., Sheng, S., Acquisti, A., Cranor, L.F., Hong, J.: Teaching Johnny not to fall
for phish. ACM Trans. Internet Technol. (TOIT). 10(2), 1–30 (2010)
23. Clifford, M.M.: Effects of competition as a motivational technique in the classroom. Am.
Educ. Res. J. 9(1), 123–137 (1972)
24. Aleman, J.L.F., de Gea, J.M.C., Mondéjar, J.J.R.: Effects of competitive computer-assisted
learning versus conventional teaching methods on the acquisition and retention of
knowledge in medical surgical nursing students. Nurse Educ. Today 31(8), 866–871 (2011)
25. Festinger, L.: A theory of social comparison processes. Hum. Relat. 7(2), 117–140 (1954)
26. Peirce, J.W.: PsychoPy—psychophysics software in Python. J. Neurosci. Methods 162(2),
8–13 (2007)
Another random document with
no related content on Scribd:
not so clean-looking as Playmate Place. Lamoir lived in the garden and the
park. I met Hugh and Lamoir in the last years of their life together, and
whenever I went to stay at Langton Weaver I would find Lamoir in the
park. She would generally be standing just off a path, quite still, wearing
gardening-gloves, and looking thoughtfully down at the flowers. Then she
would touch one here and there. She was gardening.
So, Hugh said, ten years passed; and he, when he thought of it at all,
would think theirs a happy enough marriage, as marriages go. Reality, after
all, couldn’t be so good as dreams, ever. That is what he thought. And he
loved Lamoir. He was a collector of fine things, and so it was bred in his
bone to love Lamoir. She loved him, too. Sometimes in quite a strange
abandoned way, for a woman who had been married so long. In quite an un-
English way, when you came to think of it—although it can’t be in the least
“un-English” to be passionate, but one gets into the habit of saying the
idiotic things that English novelists say. Lamoir would say things
unmentionable and beautiful, in the rare moments. But, somehow, those
rarest moments would never be of Hugh’s contriving, not after the first year
or so. They would come suddenly, out of the night of ordinary marriage,
they would come like angels with silent wings. And Lamoir would be the
voice of the angel with silent wings, and Lamoir in those rarest moments
would be the very body and soul of love. But Hugh couldn’t woo those
moments. Perhaps no man ever can. It may be, Hugh said, that there’s a
frontier to any woman’s love for any man, and beyond that frontier is the
unknowable darkness and unknowable light, and from that secret place can
leap a passion that no man in the world is worthy to woo. It just comes or it
doesn’t come.
These moments did not come when he thought they would, when he
expected them. She would somehow be passive then, somehow there yet
not there. Then suddenly, when he had got used to the hurt of her
“coldness,” out of the night of ordinary marriage would sweep the angel
with the silent wings in the body and the voice of Lamoir. Hugh said that
sometimes the song of the sirens was in Lamoir’s voice, but if Hugh was
right about that Ulysses must have been just a silly old man and the sirens
darlings.
IV
For Hugh, his pleasure in travelling was given an exquisite point by
returning to Lamoir. That was when he seemed to love her most, as he
returned to her. One gets out of the habit of being desirous if one stays in
the home all the time. And Lamoir would be waiting for him, sweet and
still. He thought of her all the time, as he returned towards her.
Once, nine years ago, he returned to her by night. He had been away
from England for four or five months, and, arriving that evening in London,
he had dined quickly and taken the first train down to Langton Weaver. It
was a cool July night, loaded with stars. He had walked the two miles from
the railway station.
Hugh was happy as he walked. He was conscious of his happiness, of his
health, of his strength. Hugh was forty then, a dry, taut forty. And the idea
of Lamoir, white and supple, was like a temptation that exalted and
ennobled. The sky was almost Italian, Hugh said, the stars were so
unusually clear and bright. He walked, not up the drive towards the door,
but across the lawn towards the three French windows of the drawing-room.
They showed a faint bronze light. Lamoir was there. She was sitting in a
Dorothy chair of old blue velvet, reading. A lamp in a bowl of yellow
amber lit the book, but her face was only a frail whiteness, and her hair was
as though veiled. He pushed open a window which was unlatched. He
called: “Lamoir!”
She made that gesture he knew so well, loved so well. Lamoir would not
be Lamoir without that gesture. Always, at first sight of him returning to
her, she would make that gesture. It was delicious with a lure which he
never could explain. It was as though she was afraid of her love for him.
Towards her heart, the gesture was: but faint, not definite: a hand like a
white bird, fluttering, fluttering vainly, fluttering out of stillness, fluttering
back into stillness—all in a second. Lamoir, you see, had a weak heart, and
that was why, maybe, she was born so still, to balance the weakness of her
heart.
And it was always the same with him when he saw her after an absence.
The world stood still, no living thing moved but Lamoir’s hand and his
infinite desire. The pleasure of seeing her was exquisite, like a pain. In all
his life Hugh had known no woman but Lamoir. Seeing her now, the earth
and sky held only himself and her and the thing that was between them.
That vivid thing with eyes of fire which can be beautiful or beastly. She
troubled him and exalted him, and somehow his love for her would be
stabbed by a queer sense of terror, which he never could explain. And she
was so still, so passive, unknowable. But her eyes, as he made to touch her,
adored him.
She lay beside him a long time in the delicious silence of love before she
spoke and said: “Good-bye, Hugh.”
He thought she must have gone mad. He stared at her, through the
darkness. “Good-bye?” he echoed.
“Yes,” she said, and that was all she said.
He had put out the light in the bowl of yellow amber. He lay in the
darkness, understanding nothing. Then his mind grew darker than the room,
and he just managed to say:
“But, Lamoir, are you mad? Good-bye! What do you mean?”
She did not answer for what seemed a long time. She was a soft darkness
in the dark room, beside him. The night was a blue curtain over the
windows, hung with stars like toys. He touched her, as though to prove to
himself that he was not dreaming. He must be dreaming. But she was there,
beside him, soft, warm: Lamoir, his wife. And the stars on the windows
were as though at his finger-tips, but Lamoir was untouchable. She was
untouchable, suddenly. She was most untouchable when he touched her. It
seemed wrong to touch her. That made him angry. He laughed.
“I’m damned,” he said, “if I understand what all this is about! I come
home after months away, and you say good-bye!”
“I don’t think,” she said, “that I can explain. Not now....”
He laughed. She was going away, and she didn’t trouble to explain why!
He wanted her to say: “Don’t be bitter, please!” But she was silent. She
was beside him, yet her breath came from across the universe. And what on
earth was it all about?
“But do you mean you want to leave me?” he asked, astounded, angry.
She said: “Yes.”
“Lamoir!”
She said: “I can’t bear it any longer, Hugh. I love you too much.”
He repeated idiotically: “You love me too much?”
Now she was standing, a shadow in the darkness, away from him, a
million miles away from him. He was silent. All the inside of him went
silent. Suddenly there were no words, no need for words, no Lamoir, no
Hugh, nothing but the primal nothingness before Adam. He would not hold
her for a moment if she wished to leave him.
“You will understand,” she said. “You see, I want to be free to love you,
and you won’t let me. You will understand that, too. God has given me no
children, Hugh. He has given me only my love for you. That is all I have,
and I have been sacrificing it to you for ten years; but now I am growing
afraid for it, it’s become such a poor, beaten, wretched bit of a thing, and so
I must leave you. I owe that to myself, dear—and to the you inside you.”
And he said, despite himself, that he loved her. What was so strange was
that, suddenly, he had ceased to feel like her husband, suddenly it seemed to
him inconceivable that he had possessed her countless times. Inconceivable
that he and she had been one, when now they were so apart! It had seemed
so easy then to touch her—now, not a lifetime would surmount the barriers
she had raised between them. He suddenly thought: “Good Lord, how lucky
I’ve been in the past—and I never knew it!”
He was going to touch her, when like a blow on the face he realised that
to touch her would be indecent. She was not his wife. Suddenly, absurdly,
he thought of Soames Forsyte, of John Galsworthy. Hugh had always
disliked Galsworthy for his creation of Forsyte, a man who could rape his
wife.
Lamoir said suddenly: “There will be another chance later on....”
He leapt at that. “Later on? Lamoir, you mean you will come back?”
“No,” she said. “I didn’t mean that. I shall never come back.”
“You will,” he said between his teeth, and with a great effort of will he
took her in his arms.
But afterwards she went away, and she never came back.
We were silent for a long time after Hugh had spoken of the way Lamoir
had left him. And then he said: “Of course she was right. I did understand,
later on. That is why I have made no attempt to see her these last nine years.
Love, you see, has many masks. We slip on one or other of them, and we
say, ‘This is love,’ but really it’s only a fraction of love. And a fraction of
love can be the negation of love. Love is enormous and difficult. We must
learn how to love, as we must learn how to play music. I did not know how.
But I shall see Lamoir soon. I am going to Algeria next week. I have been
wanting to go for a long time, but I must just wait another few days....”
“But, Hugh, why do you wait even one day?” I protested. “Lamoir is
longing to see you, I know she is.”
“Yes. But I must wait four or five days or so. For a sort of anniversary.
My idea, if you won’t laugh at me too much, is to see Playmate Place again,
and then that will give me a clue as to how to deal with Lamoir when I see
her in the flesh. I’m sure it will give me a clue. And I’m sure I shall see it
again, in three or four days from to-day. I’d like to, immensely. Of course it
won’t have changed one bit, but I wonder if Lamoir and I will have grown
up. If we have, it will be rather a feat to climb that tree, won’t it? Or maybe
the tree will have grown too, though it seemed huge enough at the time.
You see, the thing seems to go in cycles of twenty years, more or less. I saw
the garden for the first time on a June day in my ninth year. I met Lamoir
for the first time on a June day, perhaps the same one, in my twenty-ninth
year. And now I’m forty-nine, and the day falls in three or four or five days’
time. Either, I’m quite sure, I see that garden again on that day, or I see
Lamoir herself, or....”
“Or?” I said. “Or what?”
“Well, God knows!” Hugh smiled, pulling at that stiff grey thing on his
upper lip, and on the dawn of the fourth day from that night Hugh was
found by one of the keepers of Hyde Park lying at the foot of a great tree
near the Albert Gate, dead of a broken neck. At the inquest there was read
out a letter from his wife’s lawyers, which had been delivered at Hugh’s
house on the morning of his death and which he couldn’t, therefore, have
read, saying that they had heard by wire from Algeria that his wife had died
of heart-failure the day before.
X: THE GHOUL OF GOLDERS GREEN
“Big!” said Mr. Trevor. “Big? Let me tell you, constable, that the last
time Mr. Maturin hit Jack Dempsey, Dempsey bounced back from the floor
so quick that he knocked Mr. Maturin out on the rebound.”
Mr. Trevor says that Beau Maturin came on through the night like an
avenger through a wilderness, so little did he reck of cruel moons and rude
policemen. Said he: “Good evening, Ralph. Good evening, constable. Lo, I
am in wine!”
“You’ve said it,” said the policeman.
“Gently, my dear! Or,” said Mr. Maturin cordially, “I will dot you one,
and look at it which way you like it is a far, far better thing to be in wine
than in a hospital. Now, are there any good murders going to-night?”
“Going?” said the constable. “I’m ’ere to see there ain’t any coming. But
I’ve just been telling this gent about some recent crises. Corpses slit to
ribbons just as you or me might slit up a vealanam——”
“Don’t say that again!” snapped Mr. Trevor.
“By Heaven, what’s that?” sighed Mr. Maturin; and, following his intent
eyes, they saw, a yard or so behind them on the pavement, a something that
glittered in the moonlight. Mr. Trevor says that, without a thought for his
own safety, he instantly took a step towards the thing, but that the
policeman restrained him. It was Mr. Maturin who picked the thing up. The
policeman whistled thoughtfully.
“A razor, let’s face it!” whispered Beau Maturin.
“And sharp!” said the policeman, thoughtfully testing the glittering blade
with the ball of his thumb.
Mr. Trevor says that he was never in his life less conscious of any
feeling of excitement. He merely pointed out that he could swear there had
been no razor there when he had come round the corner, and that, while he
had stood there, no one had passed behind him.
“The chap that owns this razor,” said the policeman, emphasising each
word with a gesture of the blade, “must ’ave slunk behind you and me as
we stood ’ere talking and dropped it, maybe not finding it sharp enough for
’is purpose. What do you think, Mr. Maturin?”
But Mr. Maturin begged to be excused from thinking, protesting that
men are in the hands of God and God is in the hands of women, so what the
devil is there to think about?
Mr. Trevor says that the motive behind his remark at that moment, which
was to the effect that he simply must have a drink, was merely that he was
thirsty. A clock struck two.
“After hours,” said the policeman; and he seemed, Mr. Trevor thought,
to grin evilly.
“What do they know of hours,” sighed Mr. Maturin, “who only Ciro’s
know? Come, Ralph. My love, she jilted me but the other night. Therefore I
will swim in wine, and thrice will I call upon her name when I am
drowning. Constable, good-night to you.”
“Now I’ve warned you!” the policeman called after them. “Don’t go into
any alleys or passages like Lansdowne Passage else you’ll be finding
yourselves slit up like vealanam-pies.”
Maybe it was only the treacherous light of the moon, but Mr. Trevor
fancied as he looked back that the policeman, where he stood thoughtfully
fingering the shining blade, seemed to be grinning evilly at them.
II
They walked in silence, their steps ringing sharp on the bitter-chill air.
The night in the sky was pale at the white disdain of the moon. It was Mr.
Maturin who spoke at last, saying: “There’s too much talk of murder to-
night. A man cannot go to bed on such crude talk. You know me, kid. Shall
we go to The Garden of My Grandmother?”
At that moment a taxicab crawled across the moonlight; and the driver, a
man in a Homburg hat of green plush, did not attempt to hide his pleasure at
being able to satisfy the gentlemen’s request to take them to The Garden of
My Grandmother.
Mr. Trevor says that he has rarely chanced upon a more unsatisfactory
taxicab than that driven by the man in the Homburg hat of green plush. By
closing one’s eyes one might perhaps have created an illusion of movement
by reason of certain internal shrieks and commotions, but when one saw the
slow procession of shops by the windows and the lamp-posts loitering by
the curb, one was, as Beau Maturin pointed out, justified in believing that
the hackney-cab in question was not going fast enough to outstrip a retired
Czecho-Slovakian admiral in an egg-and-spoon race. Nor were they
altogether surprised when the taxicab died on them in Conduit Street. The
man in the Homburg hat of green plush jumped out and tried to restart the
engine. He failed. The gentlemen within awaited the issue in silence. The
silence, says Mr. Trevor, grew terrible. But the taxicab moved not, and the
man in the Homburg hat of green plush began, in his agitation, thumping
the carburetor with his clenched fist.
“No petrol,” he pleaded. “No petrol.”
Said Mr. Trevor to Mr. Maturin: “Let us go. Let us leave this man.”
“ ’Ere, my fare!” said the fellow.
“Your fare?” said Mr. Maturin with contracted brows. “What do you
mean, ‘your fare’?”
“Bob on the meter,” said the wretch.
“My friend will pay,” said Mr. Maturin, and stalked away. Mr. Trevor
says that, while retaining throughout the course of that miserable night his
undoubted flair for generosity, he could not but hold Beau Maturin’s high-
handed disavowal of his responsibilities against him; and he was hurrying
after him up Conduit Street, turning over such phrases as might best point
the occasion and make Mr. Maturin ashamed of himself, when that pretty
gentleman swung round sharply and said: “Ssh!”
But Mr. Trevor was disinclined to Ssh, maintaining that Mr. Maturin
owed him ninepence.
“Ssh, you fool!” snapped Mr. Maturin; and Mr. Trevor had not obliged
him for long before he discerned in the quietness of Conduit Street a small
discordant noise, or rather, says Mr. Trevor, a series of small discordant
noises.
“She’s crying, let’s face it,” whispered Mr. Maturin.
“She! Who?”
“Ssh!” snapped Mr. Maturin.
They were at that point in Conduit Street where a turn to the right will
bring one into a fat little street which looks blind but isn’t, insomuch as
close by the entrance to the Alpine Club Galleries there is a narrow passage
or alley leading into Savile Row. Mr. Trevor says that the repugnance with
which he at that moment looked towards the darkness of that passage or
alley had less than nothing to do with the blood-thirsty policeman’s last
words but was due merely to an antipathy he had entertained towards all
passages or alleys ever since George Tarlyon had seen a ghost in one. Mr.
Maturin and he stood for some minutes in the full light of the moon while,
as though from the very heart of the opposite darkness, the lacerating
tremors of weeping echoed about their ears.
“I can’t bear it!” said Beau Maturin. “Come along.” And he advanced
towards the darkness, but Mr. Trevor said he would not, pleading foot
trouble.
“Come,” said Beau Maturin, but Mr. Trevor said: “To-morrow, yes. But
not to-night.”
Then did Beau Maturin advance alone into the darkness towards the
passage or alley, and with one pounce the darkness stole his top-hat from
the moon. Beau Maturin was invisible. The noise of weeping abated.
“Oi!” called Mr. Trevor. “Come back, you fool!”
“Ssh!” whispered the voice of Mr. Maturin.
Mr. Trevor said bitterly: “You’re swanking, that’s all!”
“It’s a girl!” whispered the voice of Mr. Maturin, whereupon Mr. Trevor,
who yielded to no man in the chivalry of his address towards women, at
once advanced, caught up Mr. Maturin and, without a thought for his own
safety, was about to pass ahead of him when Beau Maturin had the bad taste
to whisper “ ’Ware razors!” and thus again held the lead.
She who wept, now almost inaudibly, was a dark shape just within the
passage. Her face, says Mr. Trevor, was not visible, yet her shadow had not
those rather surprising contours which one generally associates with women
who weep in the night.
“Madam,” began Mr. Maturin.
“Oh!” sobbed the gentle voice. “He is insulting me!”
Mr. Trevor lays some emphasis on the fact that throughout the course of
that miserable night his manners were a pattern of courtliness. Thinking,
however, that a young lady in a situation so lachrymose would react more
favourably to a fatherly tone, he said:
“My child, we hope——”
“Ah!” sobbed the gentle voice. “Please go away, please! I am not that
sort!”
“Come, come!” said Mr. Maturin. “It is us whom you insult with a
suspicion so disagreeable. My friend and I are not of the sort to commit
ourselves to so low a process as that which is called, I believe, ‘picking
up.’ ”
“We have, as a matter of fact, friends of our own,” said Mr. Trevor
haughtily.
“Speaking generally,” said Mr. Maturin, “women like us. Time over
again I have had to sacrifice my friendship with a man in order to retain his
wife’s respect.”
“Ah, you are a man of honour!” sobbed the young lady.
“We are two men of honour,” said Mr. Trevor.
“And far,” said Mr. Maturin warmly, “from intending you any mischief,
we merely thought, on hearing you weeping——”
“You heard me, sir!”
“From Conduit Street,” said Mr. Trevor severely, whereupon Mr.
Maturin lifted up his voice and sang: