Zobrazeno 1 - 10
of 55
pro vyhledávání: '"Sarah A. Jessup"'
Autor:
Gene M. Alarcon, Tyler J. Ryan, August Capiola, Sarah A. Jessup, David W. Wood, Tamera R. Schneider
Publikováno v:
Cogent Psychology, Vol 6, Iss 1 (2019)
We investigated the relationship between perceptions of trustworthiness and state suspicion over time. A total of 195 participants composing 39 teams completed an interdependent computer-mediated team task. Assessments of trustworthiness and state su
Externí odkaz:
https://doaj.org/article/ec0b3c14da824dd3a473582ee104d0c4
Autor:
Gene M. Alarcon, Anthony M. Gibson, Charles Walter, Rose F. Gamble, Tyler J. Ryan, Sarah A. Jessup, Brian E. Boyd, August Capiola
Publikováno v:
Systems, Vol 8, Iss 3, p 28 (2020)
Open-source software (OSS) is a key aspect of software creation. However, little is known about programmers’ decisions to trust software from OSS websites. The current study emulated OSS websites and manipulated reputation and performance factors i
Externí odkaz:
https://doaj.org/article/4fe0df8459664caeba4c60f041a22cb4
Autor:
Gene M. Alarcon, Charles Walter, Anthony M. Gibson, Rose F. Gamble, August Capiola, Sarah A. Jessup, Tyler J. Ryan
Publikováno v:
Systems, Vol 8, Iss 1, p 8 (2020)
Automation and autonomous systems are quickly becoming a more engrained aspect of modern society. The need for effective, secure computer code in a timely manner has led to the creation of automated code repair techniques to resolve issues quickly. H
Externí odkaz:
https://doaj.org/article/6ff2b135ab3a4ba2b32d61a713de41cf
Autor:
Gene M. Alarcon, Rose Gamble, Sarah A. Jessup, Charles Walter, Tyler J. Ryan, David W. Wood, Chris S. Calhoun
Publikováno v:
Cogent Psychology, Vol 4, Iss 1 (2017)
Computer programs (code) are integral to the functions of current society. Yet, little is known about why programmers trust code they did not create. The current paper applied the heuristic-systematic model (HSM) of information processing to percepti
Externí odkaz:
https://doaj.org/article/c5681992ad0344f4897a39bc1700a2dd
Publikováno v:
Journal of obsessive-compulsive and related disorders. 36
Consistent with the inhibitory retrieval approach, one proposed modification to improve the effectiveness of exposure-based interventions is to maximize variability by not proceeding linearly up an exposure hierarchy. Accordingly, the present study c
Publikováno v:
Psychological Trauma: Theory, Research, Practice, and Policy. 15:567-575
Publikováno v:
International Journal of Cognitive Therapy. 15:479-491
Research has shown threat overestimation is significantly associated with intolerance of uncertainty (IU), and both processes predict higher anxiety and safety behavior usage. However, the extent to which threat overestimation predicts subsequent COV
Publikováno v:
Decision. 9:388-406
Autor:
Anthony M. Gibson, August Capiola, Gene M. Alarcon, Michael A. Lee, Sarah A. Jessup, Izz aldin Hamdan
Publikováno v:
Theoretical Issues in Ergonomics Science. 24:241-266
The perfect automation schema is described as a representation people hold regarding the performance of automated systems, comprising initial high expectations for automated systems’ performance and low forgiveness after automated systems fail. Mer
Autor:
Rebecca C. Cox, Alexa N. Garcia, Sarah C. Jessup, Sarah E. Woronko, Catherine E. Rast, Bunmi O. Olatunji
Publikováno v:
Behavior Therapy.