• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • No language data
  • Tagged with
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

PREDICTING RESPONSE TO DARK PATTERNS BASED ON INDIVIDUAL DIFFERENCES

Sneha Lekha Uppala (11979974) 06 June 2023
<p>With the advent of the Internet, the digital market saw growth in online businesses, and now, it is impossible to imagine a world without the Internet. The prevalence of online services increased the internet user base, and employing different UX designs attracted more customers. With increased competition, profits, and growth in mind, businesses started using various dark design pattern strategies to seek data, profits, and attention. Dark patterns are user interface design techniques that manipulate user behavior in deceptive ways, often leading to unintended outcomes. As the use of these patterns continues to grow, it is crucial to understand how users respond to them based on their Individual differences. Earlier research revealed how effective these dark pattern strategies are, how prevalent they are, and how users perceive and feel about them. However, there needs to be more research on how users respond to these dark pattern strategies based on individual differences. The research aims to understand what individual differences predict their responses to different types of dark patterns. </p> <p>The study recruited participants through Amazon Mechanical Turk (MTurk), a widely used online marketplace for paid tasks. The survey consisted of several questionnaires, including demographic information, individual differences (such as the Big Five personality traits, impulsivity, and internet addiction), and vignettes containing dark patterns. </p> <p>Data was collected from 259 participants and imported into SPSS for analysis. The correlational analysis identified statistically significant variables related to dark pattern strategies. The results indicated that extroversion and agreeableness were significant predictors of dark pattern compliance. Specifically, individuals who scored higher in extroversion and lower in agreeableness were more likely to comply with the dark patterns presented in the vignettes. These findings have important implications for designers, policymakers, and consumers. Designers should consider individual differences when designing user interfaces to avoid using manipulative techniques that could lead to unintended outcomes. Policymakers should consider regulating the use of dark patterns to protect consumers from potentially harmful practices. Consumers should be aware of the dark patterns and how they may affect their behavior, making informed decisions when interacting with online platforms. </p> <p>The results of this study also contribute to the growing body of literature on individual differences and their relationship to user behavior. Previous studies revealed that personality traits, cognitive styles, and other individual differences can influence how users interact with technology. This study expands on this research by explicitly investigating the role of Big Five personality traits, impulsivity, and internet addiction in predicting user responses to dark patterns. In conclusion, this research paper contributes to understanding how individual differences can predict user responses to dark patterns. The study highlights the importance of considering individual differences when designing user interfaces to avoid using manipulative techniques. </p>
2

THE DOUBLE BIND OF REPRODUCTIVE EXPECTATIONS: EXPLORING THE MECHANISMS THROUGH WHICH VOLUNTARILY CHILDFREE WOMEN AND MOTHERS ARE PENALIZED IN PROMOTION DECISIONS

Heather Arispa Weigold (12456504) 12 July 2022 (has links)
<p>  </p> <p>An increasing number of working age adults are choosing to delay or forego parenthood entirely, but little research has explored how voluntarily childfree adults are perceived and treated in the workplace. While a large body of research has examined the impacts of motherhood on working women, little work has been done to understand the experiences of voluntarily childfree women. This study explored perceptions of working women based on their reproductive choices and whether these perceptions relate to differences in promotion decisions. Based on social backlash theory, I hypothesized that voluntarily childfree (VCF) women would be penalized in promotion decisions, and that perceptions of agentic-dominance and communality would explain this relationship. Using a sample of 220 participants recruited through Amazon Mechanical Turk, I tested my proposed mediation model and found no support for my hypotheses. Counter to expectations, no evidence of the motherhood penalty emerged either. Despite the lack of significant findings in this study, future work should consider assessing the relationships proposed with different experimental design.</p>
3

Personality Traits and Resistance to Online Trust Exploitation

Vaishnavi Mahindra (16642734) 07 August 2023 (has links)
<p>Social engineering attacks, especially trust exploitation, have become a focus of attention</p> <p>for cybercriminals attempting to manipulate or deceive users to take actions that further</p> <p>expose their vulnerabilities. This has also become a budding field for researchers as these</p> <p>interactions are based on complex social equations that are constantly taken advantage of.</p> <p>Identifying the "weakest link" is a popular method of identifying how these exploits take</p> <p>place, generally by observing when individuals fall for a social engineering attack. However,</p> <p>valuable insights may be used to harden security by observing patterns in users resistant</p> <p>or vigilant to these attacks. Primarily, this trend may be discovered in resistant users’</p> <p>personality traits. This has been found to be a more accurate indicator of behavior than</p> <p>self-reported intentions. Survey responses (n=120) indicate correlations between high test</p> <p>scores in trust exploitation exercises and Conscientiousness in the Big 5 Personality Model</p> <p>(p<0.001). No significant correlation was seen between self-reported cybersecurity habits</p> <p>and actual security behavior.</p>

Page generated in 0.5449 seconds