Bin Mai’s research while affiliated with Texas A&M University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (10)


Dynamic Interactive Visualizations: Implications of Seeing, Doing, and Playing for Quantitative Analysis Pedagogy
  • Article

May 2019

·

52 Reads

·

2 Citations

INFORMS Transactions on Education

·

Bin Mai

·

S. Yasaman Amirkiaee

·

Teaching relatively complex quantitative topics in statistics, operations management, and management science to undergraduate as well as graduate students can pose numerous pedagogical challenges. However, several topics in these disciplines are amenable to exposition by means of dynamic interactive visualizations. We present a sample of such visualizations and discuss their implications for pedagogy. We also discuss how optimization modeling and a single data set can be leveraged to expose students to multiple variants of covering models and, more importantly, how visualizations can be used to quickly demonstrate the differences in these models. We present empirical evidence that by using dynamic interactive visualizations we are able to enhance the student learning experience.


Tracking and Comparing Eye Movements Patterns While Watching Interactive and Non-interactive Videos: NeuroIS Retreat 2018

January 2019

·

109 Reads

·

1 Citation

In this paper, we demonstrate how our eye moments differ when we are watching non-interactive videos (sports clips) versus interactive videos (video games clips). We obtained the eye tracking data from Collaborative Research in Computational Neuroscience’s (CRCNS) data sharing set; we analyzed the subsets of eye movement data which were tracked while the test subjects were watching sports clips (videos whose contents are non-interactive) and video game clips (videos whose contents are interactive). We then compare the variations of both x- and y-coordinate eye movements between watching real videos and watching animated videos to identify the difference in eye movement patterns between the cases. Moreover, we also conducted tests on to see if there exists any difference in the distribution of the eye status of fixation or saccade between the cases. Our results provide insights into the cognitive processes when people are watching videos. We also discuss the implications of our results to the various applications in IS field.


Using EEG Signal to Analyze IS Decision Making Cognitive Processes

November 2018

·

355 Reads

·

9 Citations

·

Bin Mai

·

·

[...]

·

In this paper, we demonstrate how electroencephalograph (EEG) signals can be used to analyze people’s mental states while engaging in cognitive processes during IS decision-making. We design an experiment in which participants are required to complete several cognitive tasks with various cognitive demands and under various stress levels. We collect their EEG signals as they perform the tasks and analyze those signals to infer their mental state (e.g., relaxation level and stress level) based on their EEG signal power.


When Hackers Err – The Impacts of False Positive on Information Security Games

June 2018

·

50 Reads

·

5 Citations

Decision Analysis

False positive rates and their impacts have been a focal point for information security research. However, most of this research investigates false positives exclusively from the system defender’s perspective, while in reality an attacker also faces the classification decision in identifying feasible targets and the consequences of false positive rates. In this paper, we present the first comprehensive analytical model that incorporates the false positives both from the perspective of the attacker as well as of the system defender. Our results show that such false positives from the attacker’s perspective have a significant impact on the attacker’s decision making for an attack, as well as the optimal protection strategy for the defender. Our results help to shed new light on a wide range of diverse information security phenomena such as spam emails, the Nigerian scams, and the design of Honeypot as a security mechanism. In addition, we show how an attacker’s mis-estimation of certain parameters would affect the defender’s strategy, and how the heterogeneity of the systems impacts the defender’s strategy to manipulate the attacker’s possible mis-estimation.


Figure 1. Concept linking diagram for the concept "Design and Action" Table 2. Some association rules for the concept "Design and Action" 
Table 1 . The 8 Clusters of NeuroIS Research 
Figure 2. Concept linking diagram for the concept "IS Strategy and Business Outcomes" 
The First 10 Years of NeuroIS: A Systematic Literature Review of NeuroIS Publications (2007 - 2017)
  • Conference Paper
  • Full-text available

January 2018

·

164 Reads

·

3 Citations

Download

Neuroscience Foundations for Human Decision Making in Information Security: A General Framework and Experiment Design

January 2017

·

20 Reads

·

6 Citations

In this paper, we propose a conceptual model for information security (InfoSec) decision making that is based on cognitive science and neuroscience, and present a comprehensive framework of InfoSec decision making process. In addition, we illustrate a specific experiment design that could be used to investigate how specific automatic affective processes would impact specific components of the InfoSec decision making process.


Bridging Aesthetics and Positivism in IS Visual Systems Design with Neuroscience: A Pluralistic Research Framework and Typology

January 2017

·

19 Reads

In this paper, we proposed a neuroscience-based general framework for IS visual systems design that uses neuroscience as the bridge that systematically integrates the principles of design aesthetics and principles of positivistic functionalities into a comprehensive model. Based on our general conceptual model, we also provide a detailed typological framework for the practical IS visual systems design.


Figure 1: Numerical Illustration of Proposition 1  
VULNERABILITY ENHANCEMENT VS. LOSS MITIGATION: OPTIMAL INFORMATION SECURITY INVESTMENT

June 2016

·

212 Reads

In this paper, we study information security investment for target asset protection. Most existing studies focus on the investment in information security that impacts the target asset's vulnerability while assuming that the loss resulting from a successful security breach is irrelevant to the security investment. We recognize the practice of information security investment in mitigating the resultant loss of security breaches and incorporate this important aspect of information security investment decision making in a mathematical modeling framework. We address the simultaneous impacts of security investment on not only the vulnerability of the target system, but also to the potential loss if the attack succeeds. Our results shed significant new light on optimal information security investment, including the conditions under which the information security investment should be focused more on vulnerability enhancement than loss mitigation, or vice versa; how the target asset's inherent vulnerability and potential loss after successful breach would impact the investment on either aspect, and how total a budget constraint would affect the optimal investment decision.


Bridging Aesthetics and Positivism in IS Visual Systems Design with Neuroscience: A Pluralistic Research Framework and Typology

January 2016

·

155 Reads

·

1 Citation

In this paper, we proposed a neuroscience-based general framework for IS visual systems design that uses neuroscience as the bridge that systematically integrates the principles of design aesthetics and principles of positivistic functionalities into a comprehensive model. Based on our general conceptual model, we also provide a detailed typological framework for the practical IS visual systems design.


Fig. 2. A general framework for neuro-scientific InfoSec decision making  
Neuroscience Foundations for Human Decision Making in Information Security: A General Framework and Experiment Design

January 2016

·

1,365 Reads

·

8 Citations

In this paper, we propose a conceptual model for information security (InfoSec) decision making that is based on cognitive science and neuroscience, and present a comprehensive framework of InfoSec decision making process. In addition, we illustrate a specific experiment design that could be used to investigate how specific automatic affective processes would impact specific components of the InfoSec decision making process.

Citations (8)


... Data has become an indispensable thing in people's lives. In order to more clearly and effectively convey and communicate the data in tourism education, colleges and universities have begun to study how to improve the interactivity of teaching with the help of visualization [13][14][15][16]. ...

Reference:

A study of methods to improve pedagogical interactivity using data visualization in tourism education
Dynamic Interactive Visualizations: Implications of Seeing, Doing, and Playing for Quantitative Analysis Pedagogy
  • Citing Article
  • May 2019

INFORMS Transactions on Education

... The transition from text-oriented, non-interactive materials using static images to video and animated materials, where the learner will be more motivated and learn, explains this transformation. When the reflections of current technologies on distance learning activities are examined, both animated (Azizah & Widiartin, 2019;Handayani et al., 2020;Shiu et al., 2019;Zheng et al., 2020) and interactive materials (Daita et al., 2019;Iasha et al., 2019;Richtberg & Girwidz, 2019;Teese et al., 2020) are often used in distance-learning activities. ...

Tracking and Comparing Eye Movements Patterns While Watching Interactive and Non-interactive Videos: NeuroIS Retreat 2018
  • Citing Chapter
  • January 2019

... The relatability of neuroscience to IS research can also be seen in the emerging research field of NeuroIS (Mamun et al., 2018;Riedl et al., 2017). To give an example of such interdisciplinary research, Dimoka et al. (2011) investigated a brain area known as the dorsolateral prefrontal cortex (DLPFC) and its association with the perceived ease of use of an online shopping website in a functional magnetitic resonance imaging (fMRI) experiment. ...

The First 10 Years of NeuroIS: A Systematic Literature Review of NeuroIS Publications (2007 - 2017)

... However, workload indicators show that this also increases drivers' visual and psychological burden, possibly due to the additional attention demands and driving tasks elicited by the markings. During the decision-making process, as the grade of distraction difficulty increases, drivers become more engaged in cognitive processes and are less likely to relax, leading to a gradual decrease in α/β values [52]. ...

Using EEG Signal to Analyze IS Decision Making Cognitive Processes
  • Citing Chapter
  • November 2018

... Over the last two years, applications papers in Decision Analysis have focused overwhelmingly on topics related to security and emergency management (Bagchi and Bandyopadhyay 2018, Dillon et al. 2018, Goethals and Scala 2018, Guan et al. 2018, Mai and Kulkarni 2018 However, this trend was driven by the nature of the submissions received and should not be taken as a limitation on the types of papers that can succeed in Decision Analysis. Examples of other applied topics of interest to the journal include entrepreneurship (Bodily 2016), insurance (Meeker et al. 2015, Bodily andFurman 2016), and medical decision making (Alagoz et al. 2013, Nohdurft et al. 2017. ...

When Hackers Err – The Impacts of False Positive on Information Security Games
  • Citing Article
  • June 2018

Decision Analysis

... Bondi 2014), and the use of sophisticated imaging techniques, such as fMRI (e.g. Mai et al. 2017). Furthermore, we contend that mixed-methods research approaches (Dalal et al. 2022), such as sequential explanatory design (i.e., collecting quantitative data that informs a subsequent qualitative study) and concurrent data collection designs (e.g., triangulation), could be beneficial in helping marketing scientists unravel the inherent complexity in how individual differences interact with PS situations in predicting outcomes. ...

Neuroscience Foundations for Human Decision Making in Information Security: A General Framework and Experiment Design
  • Citing Chapter
  • January 2017

... Therefore, unlocking a different area in human-computer interaction that incorporates multidisciplinary approaches such as psychology, digital humanities and also product design. In recent research, Peak, Prybutok, Mai, and Parsons (2017) claims that two aspects should be considered when visually designing an information system; cognitive or behavioural aspect that relates to usability and functionality and secondly the pleasure (hedonism) aspect that relates to user's experience associated to aesthetics (visceral) and emotions. This concept does not vary much from Norman's theory of emotional design that reflects upon three levels of user interaction; visceral, behavioural and reflective and concurrently cognitive (behavioural) and affective (visceral) aspects of interaction. ...

Bridging Aesthetics and Positivism in IS Visual Systems Design with Neuroscience: A Pluralistic Research Framework and Typology
  • Citing Article
  • January 2016

... Bondi 2014), and the use of sophisticated imaging techniques, such as fMRI (e.g. Mai et al. 2017). Furthermore, we contend that mixed-methods research approaches (Dalal et al. 2022), such as sequential explanatory design (i.e., collecting quantitative data that informs a subsequent qualitative study) and concurrent data collection designs (e.g., triangulation), could be beneficial in helping marketing scientists unravel the inherent complexity in how individual differences interact with PS situations in predicting outcomes. ...

Neuroscience Foundations for Human Decision Making in Information Security: A General Framework and Experiment Design