Rudolph Louis Mappus IV

Learn More
This paper reports on methods and results of an applied research project by a team consisting of SAIC and four universities to develop, integrate, and evaluate new approaches to detect the weak signals characteristic of insider threats on organizations' information systems. Our system combines structural and semantic information from a real corporate(More)
A long term goal of assistive technology research is to build creative expression applications where subjects can extemporaneously express themselves. Sketch drawing is one form of creative expression. In this work, we demonstrate the usability of a brain-machine interface (BMI) for expression using a letter drawing task. We describe empirical results that(More)
The increasing proliferation of social media results in users that are forced to ascertain the truthfulness of information that they encounter from unknown sources using a variety of indicators (e.g. explicit ratings, profile information, etc.). Through human-subject experimentation with an online social network-style platform, our study focuses on the(More)
This paper describes an architecture for dynamically handling spatial relations in an incremental, nonmonotonic diagrammatic reasoning system. The architecture represents jointly exhaustive and pairwise disjoint (JEPD) spatial relation sets as nodes in a dependency network. These spatial relation sets include interval relations, relative orientation(More)
A fundamental problem in detecting threats to security by monitoring computer usage is the high number of false positives that are created when analyzing a large data set for anomalous behavior. We address the problem by modeling user behavior at multiple scales so as to allow for the identification potential insider threats from users' logged activity by(More)
We present work that uses agent-based modeling to represent both intra-and inter-personal interactions to evaluate strategies for message targeting aimed at optimizing technology adoption within a social network. Our work demonstrates the advantage afforded by considering both network (structural) and agent (cognitive) properties of participants in the(More)