Matching Items (5)
Filtering by
- All Subjects: Computer Science
- All Subjects: Expertise
- Status: Published
Description
Improvised explosive devices (IEDs) have become a major threat to military personnel in recent years. In the United States Army, Mission Payload Operators (MPOs) operate cameras from unmanned aerial vehicles (UAVs) to detect the threat of IEDs using real-time images received. Previous researchers obtained the expert knowledge of twelve MPOs at Fort Huachuca and learned that they rely on "behavioral signatures," the behavioral and environmental cues associated with IED threat rather than the IED itself (Cooke, Hosch, Banas, Hunn, Staszewski & Fensterer, 2010). To the best of our knowledge, no formal MPO training exists and all training is acquired on-the-job. The end goal is to create training systems for future MPOs using cognitive engineering based on expert skill (CEBES) that focus on detection of behavioral cues associated with IED threats. The complexity and dynamicity of cues associated with IED emplacement is to be noted, as such cues are influenced by sociocultural knowledge and often develop over significant periods of time. A dynamic full motion video simulation environment has been created, and embedded with cues elicited from expert MPOs. A three-part simulation has been created. The next step is verifying critical cues MPOs identify and focus on using eye tracking equipment.
ContributorsKnobloch, Ashley Kay (Author) / Cooke, Nancy (Thesis director) / Branaghan, Russ (Committee member) / Barrett, The Honors College (Contributor) / School of Nutrition and Health Promotion (Contributor) / Human Systems Engineering (Contributor)
Created2014-12
Description
With the help of some Information Measurement Theory (IMT), Kashiwagi Solutions Model (KSM), and deductive logic background, supply chain managers can start utilizing a new way to effectively and efficiently negotiate contracts. Developed by Dr. Dean Kashiwagi, the Best Value Approach has been 98% successful with over 1,800 projects for the past 20 years. The process gives vendors/suppliers the power to use their expertise. In return for not having to follow the rules set by the client/buyer, the vendor must show documentation and plans of risk management, value added processes, and metrics.
ContributorsPhan, Alice (Co-author) / Holtzman, Krista (Co-author) / Kashiwagi, Dean (Thesis director) / Kashiwagi, Jacob (Committee member) / School of International Letters and Cultures (Contributor) / Department of Supply Chain Management (Contributor) / Barrett, The Honors College (Contributor)
Created2016-05
Description
Cyber operations are a complex sociotechnical system where humans and computers are operating in an environments in constant flux, as new technology and procedures are applied. Once inside the network, establishing a foothold, or beachhead, malicious actors can collect sensitive information, scan targets, and execute an attack.Increasing defensive capabilities through cyber deception shows great promise by providing an opportunity to delay and disrupt an attacker once network perimeter security has already been breached. Traditional Human Factors research and methods are designed to mitigate human limitations (e.g., mental, physical) to improve performance. These methods can also be used combatively to upend performance. Oppositional Human Factors (OHF), seek to strategically capitalize on cognitive limitations by eliciting decision-making errors and poor usability. Deceptive tactics to elicit decision-making biases might infiltrate attacker processes with uncertainty and make the overall attack economics unfavorable and cause an adversary to make mistakes and waste resources.
Two online experimental platforms were developed to test the Sunk Cost Fallacy in an interactive, gamified, and abstracted version of cyber attacker activities. This work presents the results of the Cypher platform. Offering a novel approach to understand decision-making and the Sunk Cost Fallacy influenced by factors of uncertainty, project completion and difficulty on progress decisions. Results demonstrate these methods are effective in delaying attacker forward progress, while further research is needed to fully understand the context in which decision-making limitations do and do not occur. The second platform, Attack Surface, is described. Limitations and lessons learned are presented for future work.
ContributorsJohnson, Chelsea Kae (Author) / Gutzwiller, Robert S (Thesis advisor) / Cooke, Nancy (Committee member) / Shade, Temmie (Committee member) / Ferguson-Walter, Kimberly (Committee member) / Roscoe, Rod (Committee member) / Gray, Rob (Committee member) / Arizona State University (Publisher)
Created2022
Description
As people begin to live longer and the population shifts to having more olderadults on Earth than young children, radical solutions will be needed to ease the
burden on society. It will be essential to develop technology that can age with the
individual. One solution is to keep older adults in their homes longer through smart
home and smart living technology, allowing them to age in place. People have many
choices when choosing where to age in place, including their own homes, assisted
living facilities, nursing homes, or family members. No matter where people choose to
age, they may face isolation and financial hardships. It is crucial to keep finances in
mind when developing Smart Home technology.
Smart home technologies seek to allow individuals to stay inside their homes for
as long as possible, yet little work looks at how we can use technology in different
life stages. Robots are poised to impact society and ease burns at home and in the
workforce. Special attention has been given to social robots to ease isolation. As
social robots become accepted into society, researchers need to understand how these
robots should mimic natural conversation. My work attempts to answer this question
within social robotics by investigating how to make conversational robots natural and
reciprocal.
I investigated this through a 2x2 Wizard of Oz between-subjects user study. The
study lasted four months, testing four different levels of interactivity with the robot.
None of the levels were significantly different from the others, an unexpected result. I
then investigated the robot’s personality, the participant’s trust, and the participant’s
acceptance of the robot and how that influenced the study.
ContributorsMiller, Jordan (Author) / McDaniel, Troy (Thesis advisor) / Michael, Katina (Committee member) / Cooke, Nancy (Committee member) / Bryan, Chris (Committee member) / Li, Baoxin (Committee member) / Arizona State University (Publisher)
Created2022
Description
The prevalence of autonomous technology is advancing at a rapid rate and is becoming more sophisticated. As this technology becomes more advanced, humans and autonomy may work together as teammates in various settings. A crucial component of teaming is trust, but to date, researchers are limited in assessing trust calibration dynamically in human-autonomy teams. Traditional methods of measuring trust (e.g., Likert scale questionnaires) capture trust after the fact or at a specific time. However, trust fluctuates, and determining what causes this might give machine designers insight into how machines can be improved upon so that operator’s trust towards the machines is more properly calibrated. This thesis aimed to assess the validity of an interaction-based metric of trust: anticipatory pushing of information. Anticipatory pushing of information refers to teammate A anticipating the needs of teammate B and pushing that information to teammate B. It was hypothesized there would be a positive relationship between the frequency of anticipatory pushing and self-reported trust scores. To test this hypothesis, text chat data and self-reported trust scores were analyzed in a previously conducted study in two different sessions (routine and degraded). Findings indicate that the anticipatory pushing of information and the self-reported trust scores between the human-human pairs in the degraded sessions were higher than the routine sessions. In degraded sessions, the anticipatory pushing of information between the human-human pairs was associated with human-human trust.
ContributorsBhatti, Shawaiz (Author) / Cooke, Nancy (Thesis advisor) / Chiou, Erin K (Committee member) / Gutzwiller, Robert (Committee member) / Arizona State University (Publisher)
Created2021