Hilkka Grahn
YOU?
Author Swipe
View article: Cognitive Security: The study and practice of protecting the human mind and other Cognitive Assets from cognitive threats
Cognitive Security: The study and practice of protecting the human mind and other Cognitive Assets from cognitive threats Open
Technological and scientific advances in neuroscience, information technology, and artificial intelligence have expanded how human and machine cognition can be targeted, manipulated, and weaponized. These developments have heightened the n…
View article: Mapping research on disinformation and misinformation across the Nordic countries: An integrative review
Mapping research on disinformation and misinformation across the Nordic countries: An integrative review Open
Social media and artificial intelligence have made it easier than ever to create and widely spread manipulated content. Recent geopolitical and digital developments underscore the need for more research on the topic, even in the Nordic cou…
View article: Novice Perceptions on Effective Elements of PostgreSQL Error Messages
Novice Perceptions on Effective Elements of PostgreSQL Error Messages Open
SQL compiler error messages are the primary way users receive feedback when they encounter syntax errors or other issues in their SQL queries. Effective error messages can enhance the user experience by providing clear, informative, and ac…
View article: Investigating the situational dynamics of visual information sampling in lateral vehicle control – Subjective vs. objective estimates of spare visual capacity
Investigating the situational dynamics of visual information sampling in lateral vehicle control – Subjective vs. objective estimates of spare visual capacity Open
Drivers continually adapt their information sampling behavior to changing traffic conditions for safe driving. Scientists have studied this sampling behavior for decades; however, the literature on how drivers adapt their visual informatio…
View article: Building Blocks Towards More Effective SQL Error Messages
Building Blocks Towards More Effective SQL Error Messages Open
Reading and interpreting error messages are significant aspects of a software developer's work. Despite the importance and prevalence of error messages, especially for novices, SQL compiler error messages from various relational database m…
View article: Wargaming in Information Warfare Training: A Study of Finnish Officials
Wargaming in Information Warfare Training: A Study of Finnish Officials Open
In the digital age, information warfare has become a significant global concern, with malicious actors exploiting various media to manipulate public opinion, destabilising governments, and sowing discord. Automated and algorithmic tools ar…
View article: Placing Behavior in Context: Political Interpretations of Individual Behavior in Countering Information Warfare in Finland
Placing Behavior in Context: Political Interpretations of Individual Behavior in Countering Information Warfare in Finland Open
Malign information influence often targets large segments of the population, with the intent to manipulate individual behavior for the benefit of the actors disseminating this harmful information. However, in a liberal society like Finland…
View article: Utilizing Vector Database Management Systems in Cyber Security
Utilizing Vector Database Management Systems in Cyber Security Open
The rising popularity of phenomena such as ubiquitous computing and IoT poses increasingly high demands for data management, and it is not uncommon that database management systems (DBMS) must be capable of reading and writing hundreds of …
View article: Cognitive Security in a Changing World: Citizen Perceptions During Finland's NATO Joining Process
Cognitive Security in a Changing World: Citizen Perceptions During Finland's NATO Joining Process Open
Contemporary conflicts are multifaceted and no longer fit the traditional war-and-peace dichotomy due to digital dimensions and the role of the human mind. The concept of warfare has transformed significantly: it's no longer solely reliant…
View article: Effects of context-sensitive distraction warnings on drivers’ smartphone use and acceptance: A long-term naturalistic field study
Effects of context-sensitive distraction warnings on drivers’ smartphone use and acceptance: A long-term naturalistic field study Open
Driver distraction by smartphone use is a major contributor in traffic accidents. Context-sensitive driver (in)attention monitoring and warning systems might mitigate the associated risks. However, few naturalistic studies are yet availabl…
View article: Framework for SQL Error Message Design: A Data-Driven Approach
Framework for SQL Error Message Design: A Data-Driven Approach Open
Software developers use a significant amount of time reading and interpreting error messages. However, error messages have often been based on either anecdotal evidence or expert opinion, disregarding novices, who arguably are the ones who…
View article: NewSQL Database Management System Compiler Errors: Effectiveness and Usefulness
NewSQL Database Management System Compiler Errors: Effectiveness and Usefulness Open
Modern database management is often faced with a high number of concurrent end-users, and the need for database distribution to ensure fault tolerance and high throughput. To flexibly address these challenges, many modern database manageme…
View article: Error messages in relational database management systems: A comparison of effectiveness, usefulness, and user confidence
Error messages in relational database management systems: A comparison of effectiveness, usefulness, and user confidence Open
The database and the database management system (DBMS) are two of the main components of any information system. Structured Query Language (SQL) is the most popular query language for retrieving data from the database, as well as for many …
View article: Refining distraction potential testing guidelines by considering differences in glancing behavior
Refining distraction potential testing guidelines by considering differences in glancing behavior Open
Driver distraction is a recognized cause of traffic accidents. Although the well-known guidelines for measuring distraction of secondary in-car tasks were published by the United States National Highway Traffic Safety Administration (NHTSA…
View article: On the measurement of visual distraction potential of in-car activities
On the measurement of visual distraction potential of in-car activities Open
People use various applications from Instagram to Netflix while driving. Previous literature recognizes the harmful effects of conducting these secondary in-car tasks while driving. As a general discovery, studies indicate an association b…
View article: Visual Distraction Effects between In-Vehicle Tasks with a Smartphone and a Motorcycle Helmet-Mounted Head-Up Display
Visual Distraction Effects between In-Vehicle Tasks with a Smartphone and a Motorcycle Helmet-Mounted Head-Up Display Open
Besides motorists, also motorcyclists need safer user interfaces to interact with useful applications on the road. In this paper, distraction effects of in-vehicle tasks conducted with a head-up display (HUD) for motorcyclists were compare…
View article: Visual Distraction Effects of In-Car Text Entry Methods
Visual Distraction Effects of In-Car Text Entry Methods Open
Three text entry methods were compared in a driving simulator study with 17 participants. Ninety-seven drivers’ occlusion distance (OD) data mapped on the test routes was used as a baseline to evaluate the methods’ visual distraction poten…
View article: User Psychology Lab, University of Jyväskylä
User Psychology Lab, University of Jyväskylä Open
nonPeerReviewed
View article: On the Visual Distraction Effects of Audio-Visual Route Guidance
On the Visual Distraction Effects of Audio-Visual Route Guidance Open
This is the first controlled quantitative analysis on the visual distraction effects of audio-visual route guidance in simulated, but ecologically realistic driving scenarios with dynamic maneuvers and self-controlled speed (N = 24). The a…