College of Wilmington Techniques for Modeling Human Factors Paper

User Generated

Fbha

Computer Science

College of Wilmington

Description

Choose any two models from below and write 350 words on each model with model name, description, models developer or creator, and framework.

  • Behaviorist model
  • Cognitive science model
  • Useful heuristics model

Use can use graphics in this assignment.

Note: Must use research scholarly articles and other reputable sources as references, paper must pass SafeAssign with a score of less than 20%.

**APA format references and paper

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running Head: TECHNIQUES FOR MODELING HUMAN FACTORS

Techniques for Modeling Human Factors
Students Name
Institutional affiliation

1

TECHNIQUES FOR MODELING HUMAN FACTORS

2

Techniques for Modeling Human Factors
In the security industry, researchers have ignored human factors when designing models
these assumptions significantly affect the usability of the system. Most security breaches in the
past years can be attributed to human errors, which can quickly be addressed if the social factors
were put into consideration when designing security protocol. For instance, when addressing
cyber-attacks, computers should be designed for untrained users. Therefore, understanding their
behavior will help them create security protocols that are in line for such individuals.
According to George Edward, all models are wrong however, some are usable. This
theory is applicable when determining human performance modeling (Fischer, 2001). There are
three techniques for behavior modeling, which are cognitive science model, useful heuristic
model and behaviorist model.
Behaviorist model
Behaviorist model is centered on the idea that all...


Anonymous
Excellent resource! Really helped me get the gist of things.

Studypool
4.7
Indeed
4.5
Sitejabber
4.4

Related Tags