Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kuo-Chuan Yeh is active.

Publication


Featured researches published by Kuo-Chuan Yeh.


annual computer security applications conference | 2014

It's the psychology stupid: how heuristics explain software vulnerabilities and how priming can illuminate developer's blind spots

Daniela A. S. de Oliveira; Marissa Rosenthal; Nicole Morin; Kuo-Chuan Yeh; Justin Cappos; Yanyan Zhuang

Despite the security communitys emphasis on the importance of building secure software, the number of new vulnerabilities found in our systems is increasing. In addition, vulnerabilities that have been studied for years are still commonly reported in vulnerability databases. This paper investigates a new hypothesis that software vulnerabilities are blind spots in developers heuristic-based decision-making processes. Heuristics are simple computational models to solve problems without considering all the information available. They are an adaptive response to our short working memory because they require less cognitive effort. Our hypothesis is that as software vulnerabilities represent corner cases that exercise unusual information flows, they tend to be left out from the repertoire of heuristics used by developers during their programming tasks. To validate this hypothesis we conducted a study with 47 developers using psychological manipulation. In this study each developer worked for approximately one hour on six vulnerable programming scenarios. The sessions progressed from providing no information about the possibility of vulnerabilities, to priming developers about unexpected results, and explicitly mentioning the existence of vulnerabilities in the code. The results show that (i) security is not a priority in software development environments, (ii) security is not part of developers mindset while coding, (iii) developers assume common cases for their code, (iv) security thinking requires cognitive effort, (v) security education helps, but developers can have difficulties correlating a particular learned vulnerability or security information with their current working task, and (vi) priming or explicitly cueing about vulnerabilities on-the-spot is a powerful mechanism to make developers aware about potential vulnerabilities.


Ergonomics in Design | 2010

One Laptop per Child: POLISHING UP THE XO LAPTOP USER EXPERIENCE

Kuo-Chuan Yeh; Jonah P. Gregory; Frank E. Ritter

FEATURE AT A GLANCE: We examine the user experience of the XO laptop (the “


frontiers in education conference | 2011

Teaching computational thinking to non-computing majors using spreadsheet functions

Kuo-Chuan Yeh; Ying Xie; Fengfeng Ke

100 laptop”). The XO laptop combines many technology innovations and is used in the United States and abroad. We asked users to perform a range of simple tasks to demonstrate that several aspects of the XO laptop and similar devices can be improved, including hardware and software. Our recommendations are not difficult modifications. What we found suggests that usability problems may pose a greater risk to the success of this device than perhaps was imagined by its designers. We hope to see the XO laptops usability become more polished and that usability, in general, will be considered appropriately as a potential risk for similar products.


Society for Information Technology & Teacher Education International Conference | 2009

Using an Educational Computer Game as a Motivational Tool for Supplemental Instruction Delivery for Novice Programmers in Learning Computer Programming

Kuo-Chuan Yeh


new security paradigms workshop | 2014

Vulnerabilities as Blind Spots in Developer's Heuristic-Based Decision-Making Processes

Justin Cappos; Yanyan Zhuang; Daniela A. S. de Oliveira; Marissa Rosenthal; Kuo-Chuan Yeh


Educational Technology archive | 2013

Digital disturbances, disorders, and pathologies: A discussion of some unintended consequences of technology in higher education

Noela Haughton; Kuo-Chuan Yeh; John Nworie; Liz Romero


Archive | 2012

An Initial Evaluation of the D2P/MTT, a Computer-Based, Declarative to Procedural (D2P) Theory Driven Moving Target Tutor

Kuo-Chuan Yeh; Frank E. Ritter


frontiers in education conference | 2011

Work in progress — Using a computer gaming strategy to facilitate undergraduates' learning in a computer programming course: An experimental study

Kuo-Chuan Yeh; Wei-Fan Chen


international conference on foundations of augmented cognition | 2011

Modeling pharmacokinetics and pharmacodynamics on a mobile device to help caffeine users

Frank E. Ritter; Kuo-Chuan Yeh


Archive | 2013

Technical Review of the Declarative to Procedural Tutor for Moving Target Tutor (Review of D2P/MTT 11/27/2012)

Kuo-Chuan Yeh; Frank E. Ritter; Kevin Voller

Collaboration


Dive into the Kuo-Chuan Yeh's collaboration.

Top Co-Authors

Avatar

Frank E. Ritter

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Wei-Fan Chen

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Fengfeng Ke

Florida State University

View shared research outputs
Top Co-Authors

Avatar

Liz Romero

Nova Southeastern University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge