Prashanth Rajivan
YOU?
Author Swipe
View article: Improving Situational Awareness During Interfacility Transport Using a Transport Monitoring and Communication Application: A Simulation-Based Pilot Study
Improving Situational Awareness During Interfacility Transport Using a Transport Monitoring and Communication Application: A Simulation-Based Pilot Study Open
Objectives: To evaluate the impact of using a simulated teletransport application compared with ad hoc phone calls between medical control physicians (MCP) and transport teams on situational awareness and communication during neonatal inte…
View article: A simulation-based approach to analysing delays in the transport of critically ill neonates
A simulation-based approach to analysing delays in the transport of critically ill neonates Open
Neonatal interfacility transport ensures that critically ill neonatal patients can receive higher levels of care when needed. Delays in the transport process impact the quality of care and increase the risk of medical complications. The ob…
View article: Beliefs Trump Facts: Effect of Frequent Corrections on Misinformation Beliefs during Extended Extreme Events
Beliefs Trump Facts: Effect of Frequent Corrections on Misinformation Beliefs during Extended Extreme Events Open
Providing corrections to people who have engaged with false claims in Online Social Networks (OSN) is a form of cognitive intervention employed to address the spread of misinformation. Although there is a large body of work that has studie…
View article: Improving Privacy and Security of Telehealth
Improving Privacy and Security of Telehealth Open
Dek : Multidisciplinary experts’ perspectives on how to strengthen protection of patients’ health information in telehealth designs and workflows.
View article: Analyzing Instance Representation in Cognitive Models of Phishing Decision Making
Analyzing Instance Representation in Cognitive Models of Phishing Decision Making Open
Phishing attacks remain a significant security threat. One approach to addressing this challenge is through personalized and adaptive anti-phishing training solutions capable of tailoring learning experiences to individual needs and contex…
View article: “We Have No Security Concerns”: Understanding the Privacy-Security Nexus in Telehealth for Audiologists and Speech-Language Pathologists
“We Have No Security Concerns”: Understanding the Privacy-Security Nexus in Telehealth for Audiologists and Speech-Language Pathologists Open
The advent of telehealth revolutionizes healthcare by enabling remote consultations, yet poses complex security and privacy challenges. These are often acutely felt by lower-resourced, allied-healthcare practices. To address this, our stud…
View article: Privacy Concerns of Student Data Shared with Instructors in an Online Learning Management System
Privacy Concerns of Student Data Shared with Instructors in an Online Learning Management System Open
Learning management systems are used for facilitating communication between instructors and students, dissemination of lecture materials, and grading of assignments. They collect large amounts of student data, necessary or otherwise, with …
View article: SoK: Analyzing Privacy and Security of Healthcare Data from the User Perspective
SoK: Analyzing Privacy and Security of Healthcare Data from the User Perspective Open
Interactions in healthcare, by necessity, involve sharing sensitive information to achieve high-quality patient outcomes. Therefore, sensitive data must be carefully protected. This article explores existing privacy and security research c…
View article: Privacy, Security, and Usability Tradeoffs of Telehealth from Practitioners' Perspectives
Privacy, Security, and Usability Tradeoffs of Telehealth from Practitioners' Perspectives Open
The COVID-19 pandemic has significantly transformed the healthcare sector, with telehealth services being among the most prominent changes. The adoption of telehealth services, however, has raised new challenges, particularly in the areas …
View article: SoK: Analysis of User-Centered Studies Focusing on Healthcare Privacy & Security
SoK: Analysis of User-Centered Studies Focusing on Healthcare Privacy & Security Open
Sensitive information is intrinsically tied to interactions in healthcare, and its protection is of paramount importance for achieving high-quality patient outcomes. Research in healthcare privacy and security is predominantly focused on u…
View article: Frequent Truth: Impact of Frequency of Misinformation Correction in Extended Extreme Events
Frequent Truth: Impact of Frequency of Misinformation Correction in Extended Extreme Events Open
Misinformation management is a growing area of concern in Online Social Network (OSN) organizations. There are several behavioral interventions employed to address misinformation in OSN's. One example is offering users correction when they…
View article: Modeling Phishing Decision using Instance Based Learning and Natural Language Processing
Modeling Phishing Decision using Instance Based Learning and Natural Language Processing Open
Phishing is the practice of deceiving humans into disclosing sensitive information or inappropriately granting access to a secure system. Unfortunately, there is a severe lack of theoretical models to adequately explain and predict the cog…
View article: <i>SpearSim</i>: Design and Evaluation of Synthetic Task Environment for Studies on Spear Phishing Attacks
<i>SpearSim</i>: Design and Evaluation of Synthetic Task Environment for Studies on Spear Phishing Attacks Open
Despite significant advancements in security technologies, phishing attacks continue to be rampant and successful because distinguishing phishing emails from real messages remains difficult to most end-users, mainly the targeted kind known…
View article: Influence of Cumulative Risk Priming on Security Update Decision Making
Influence of Cumulative Risk Priming on Security Update Decision Making Open
Installing security updates is one of the important security actions individuals can take to prevent potential cybersecurity threats. The cumulative risk of delaying the installation of security updates over an extended period can be subst…
View article: Panel: Humans and Technology for Inclusive Privacy and Security
Panel: Humans and Technology for Inclusive Privacy and Security Open
Computer security and user privacy are critical issues and concerns in the digital era due to both increasing users and threats to their data. Separate issues arise between generic cybersecurity guidance (i.e., protect all user data from m…
View article: Update now or later? Effects of experience, cost, and risk preference on update decisions
Update now or later? Effects of experience, cost, and risk preference on update decisions Open
Installing software updates is one of the most important security actions that people can take to protect their computer systems. However, people often delay installing updates. Why would people delay installation of security updates, know…
View article: Cyber Teaming and Role Specialization in a Cyber Security Defense Competition
Cyber Teaming and Role Specialization in a Cyber Security Defense Competition Open
A critical requirement for developing a cyber capable workforce is to understand how to challenge, assess, and rapidly develop human cyber skill-sets in realistic cyber operational environments. Fortunately, cyber team competitions make us…
View article: Creative Persuasion: A Study on Adversarial Behaviors and Strategies in Phishing Attacks
Creative Persuasion: A Study on Adversarial Behaviors and Strategies in Phishing Attacks Open
Success of phishing attacks depend on effective exploitation of human weaknesses. This research explores a largely ignored, but crucial aspect of phishing: the adversarial behavior. We aim at understanding human behaviors and strategies th…