Matching Items (5)
Filtering by

Clear all filters

136670-Thumbnail Image.png
Description
Improvised explosive devices (IEDs) have become a major threat to military personnel in recent years. In the United States Army, Mission Payload Operators (MPOs) operate cameras from unmanned aerial vehicles (UAVs) to detect the threat of IEDs using real-time images received. Previous researchers obtained the expert knowledge of twelve MPOs

Improvised explosive devices (IEDs) have become a major threat to military personnel in recent years. In the United States Army, Mission Payload Operators (MPOs) operate cameras from unmanned aerial vehicles (UAVs) to detect the threat of IEDs using real-time images received. Previous researchers obtained the expert knowledge of twelve MPOs at Fort Huachuca and learned that they rely on "behavioral signatures," the behavioral and environmental cues associated with IED threat rather than the IED itself (Cooke, Hosch, Banas, Hunn, Staszewski & Fensterer, 2010). To the best of our knowledge, no formal MPO training exists and all training is acquired on-the-job. The end goal is to create training systems for future MPOs using cognitive engineering based on expert skill (CEBES) that focus on detection of behavioral cues associated with IED threats. The complexity and dynamicity of cues associated with IED emplacement is to be noted, as such cues are influenced by sociocultural knowledge and often develop over significant periods of time. A dynamic full motion video simulation environment has been created, and embedded with cues elicited from expert MPOs. A three-part simulation has been created. The next step is verifying critical cues MPOs identify and focus on using eye tracking equipment.
ContributorsKnobloch, Ashley Kay (Author) / Cooke, Nancy (Thesis director) / Branaghan, Russ (Committee member) / Barrett, The Honors College (Contributor) / School of Nutrition and Health Promotion (Contributor) / Human Systems Engineering (Contributor)
Created2014-12
135520-Thumbnail Image.png
Description
With the help of some Information Measurement Theory (IMT), Kashiwagi Solutions Model (KSM), and deductive logic background, supply chain managers can start utilizing a new way to effectively and efficiently negotiate contracts. Developed by Dr. Dean Kashiwagi, the Best Value Approach has been 98% successful with over 1,800 projects for

With the help of some Information Measurement Theory (IMT), Kashiwagi Solutions Model (KSM), and deductive logic background, supply chain managers can start utilizing a new way to effectively and efficiently negotiate contracts. Developed by Dr. Dean Kashiwagi, the Best Value Approach has been 98% successful with over 1,800 projects for the past 20 years. The process gives vendors/suppliers the power to use their expertise. In return for not having to follow the rules set by the client/buyer, the vendor must show documentation and plans of risk management, value added processes, and metrics.
ContributorsPhan, Alice (Co-author) / Holtzman, Krista (Co-author) / Kashiwagi, Dean (Thesis director) / Kashiwagi, Jacob (Committee member) / School of International Letters and Cultures (Contributor) / Department of Supply Chain Management (Contributor) / Barrett, The Honors College (Contributor)
Created2016-05
172009-Thumbnail Image.png
Description
Cyber operations are a complex sociotechnical system where humans and computers are operating in an environments in constant flux, as new technology and procedures are applied. Once inside the network, establishing a foothold, or beachhead, malicious actors can collect sensitive information, scan targets, and execute an attack.Increasing defensive capabilities through

Cyber operations are a complex sociotechnical system where humans and computers are operating in an environments in constant flux, as new technology and procedures are applied. Once inside the network, establishing a foothold, or beachhead, malicious actors can collect sensitive information, scan targets, and execute an attack.Increasing defensive capabilities through cyber deception shows great promise by providing an opportunity to delay and disrupt an attacker once network perimeter security has already been breached. Traditional Human Factors research and methods are designed to mitigate human limitations (e.g., mental, physical) to improve performance. These methods can also be used combatively to upend performance. Oppositional Human Factors (OHF), seek to strategically capitalize on cognitive limitations by eliciting decision-making errors and poor usability. Deceptive tactics to elicit decision-making biases might infiltrate attacker processes with uncertainty and make the overall attack economics unfavorable and cause an adversary to make mistakes and waste resources. Two online experimental platforms were developed to test the Sunk Cost Fallacy in an interactive, gamified, and abstracted version of cyber attacker activities. This work presents the results of the Cypher platform. Offering a novel approach to understand decision-making and the Sunk Cost Fallacy influenced by factors of uncertainty, project completion and difficulty on progress decisions. Results demonstrate these methods are effective in delaying attacker forward progress, while further research is needed to fully understand the context in which decision-making limitations do and do not occur. The second platform, Attack Surface, is described. Limitations and lessons learned are presented for future work.
ContributorsJohnson, Chelsea Kae (Author) / Gutzwiller, Robert S (Thesis advisor) / Cooke, Nancy (Committee member) / Shade, Temmie (Committee member) / Ferguson-Walter, Kimberly (Committee member) / Roscoe, Rod (Committee member) / Gray, Rob (Committee member) / Arizona State University (Publisher)
Created2022
171933-Thumbnail Image.png
Description
As people begin to live longer and the population shifts to having more olderadults on Earth than young children, radical solutions will be needed to ease the burden on society. It will be essential to develop technology that can age with the individual. One solution is to keep older adults in their

As people begin to live longer and the population shifts to having more olderadults on Earth than young children, radical solutions will be needed to ease the burden on society. It will be essential to develop technology that can age with the individual. One solution is to keep older adults in their homes longer through smart home and smart living technology, allowing them to age in place. People have many choices when choosing where to age in place, including their own homes, assisted living facilities, nursing homes, or family members. No matter where people choose to age, they may face isolation and financial hardships. It is crucial to keep finances in mind when developing Smart Home technology. Smart home technologies seek to allow individuals to stay inside their homes for as long as possible, yet little work looks at how we can use technology in different life stages. Robots are poised to impact society and ease burns at home and in the workforce. Special attention has been given to social robots to ease isolation. As social robots become accepted into society, researchers need to understand how these robots should mimic natural conversation. My work attempts to answer this question within social robotics by investigating how to make conversational robots natural and reciprocal. I investigated this through a 2x2 Wizard of Oz between-subjects user study. The study lasted four months, testing four different levels of interactivity with the robot. None of the levels were significantly different from the others, an unexpected result. I then investigated the robot’s personality, the participant’s trust, and the participant’s acceptance of the robot and how that influenced the study.
ContributorsMiller, Jordan (Author) / McDaniel, Troy (Thesis advisor) / Michael, Katina (Committee member) / Cooke, Nancy (Committee member) / Bryan, Chris (Committee member) / Li, Baoxin (Committee member) / Arizona State University (Publisher)
Created2022
161959-Thumbnail Image.png
Description
The prevalence of autonomous technology is advancing at a rapid rate and is becoming more sophisticated. As this technology becomes more advanced, humans and autonomy may work together as teammates in various settings. A crucial component of teaming is trust, but to date, researchers are limited in assessing trust calibration

The prevalence of autonomous technology is advancing at a rapid rate and is becoming more sophisticated. As this technology becomes more advanced, humans and autonomy may work together as teammates in various settings. A crucial component of teaming is trust, but to date, researchers are limited in assessing trust calibration dynamically in human-autonomy teams. Traditional methods of measuring trust (e.g., Likert scale questionnaires) capture trust after the fact or at a specific time. However, trust fluctuates, and determining what causes this might give machine designers insight into how machines can be improved upon so that operator’s trust towards the machines is more properly calibrated. This thesis aimed to assess the validity of an interaction-based metric of trust: anticipatory pushing of information. Anticipatory pushing of information refers to teammate A anticipating the needs of teammate B and pushing that information to teammate B. It was hypothesized there would be a positive relationship between the frequency of anticipatory pushing and self-reported trust scores. To test this hypothesis, text chat data and self-reported trust scores were analyzed in a previously conducted study in two different sessions (routine and degraded). Findings indicate that the anticipatory pushing of information and the self-reported trust scores between the human-human pairs in the degraded sessions were higher than the routine sessions. In degraded sessions, the anticipatory pushing of information between the human-human pairs was associated with human-human trust.
ContributorsBhatti, Shawaiz (Author) / Cooke, Nancy (Thesis advisor) / Chiou, Erin K (Committee member) / Gutzwiller, Robert (Committee member) / Arizona State University (Publisher)
Created2021