his.sePublikasjoner
Endre søk
RefereraExporteraLink to record
Permanent link

Direct link
Referera
Referensformat
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
On visualizing threat evaluation configuration processes: A design proposal
Högskolan i Skövde, Institutionen för informationsteknologi. Högskolan i Skövde, Forskningscentrum för Informationsteknologi. (Skövde Artificial Intelligence Lab (SAIL))ORCID-id: 0000-0003-2900-9335
Högskolan i Skövde, Institutionen för informationsteknologi. Högskolan i Skövde, Forskningscentrum för Informationsteknologi. (Interaction Lab)ORCID-id: 0000-0001-6310-346X
Saab Electronic Defence Systems, Gothenburg, Sweden.
2014 (engelsk)Inngår i: 17th International Conference on Information Fusion (FUSION), 2014, IEEE conference proceedings, 2014, s. 1-8Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

Threat evaluation is concerned with estimating the intent, capability and opportunity of detected objects in relation to our own assets in an area of interest. To infer whether a target is threatening and to which degree is far from a trivial task. Expert operators have normally to their aid different support systems that analyze the incoming data and provide recommendations for actions. Since the ultimate responsibility lies in the operators, it is crucial that they trust and know how to configure and use these systems, as well as have a good understanding of their inner workings, strengths and limitations. To limit the negative effects of inadequate cooperation between the operators and their support systems, this paper presents a design proposal that aims at making the threat evaluationprocess more transparent. We focus on the initialization, configuration and preparation phases of thethreat evaluation process, supporting the user in the analysis of the behavior of the system considering the relevant parameters involved in the threat estimations. For doing so, we follow a known design process model and we implement our suggestions in a proof-of-concept prototype that we evaluate with military expert system designers.

sted, utgiver, år, opplag, sider
IEEE conference proceedings, 2014. s. 1-8
HSV kategori
Forskningsprogram
Teknik; Skövde Artificial Intelligence Lab (SAIL); Interaction Lab (ILAB)
Identifikatorer
URN: urn:nbn:se:his:diva-10391ISI: 000363896100183Scopus ID: 2-s2.0-84910660640ISBN: 9788490123553 (tryckt)OAI: oai:DiVA.org:his-10391DiVA, id: diva2:771922
Konferanse
17th International Conference on Information Fusion, FUSION 2014, Salamanca, Spain 7 July 2014 through 10 July 2014
Forskningsfinansiär
Knowledge Foundation
Merknad

Article number 6916152

Tilgjengelig fra: 2014-12-15 Laget: 2014-12-15 Sist oppdatert: 2018-04-27bibliografisk kontrollert

Open Access i DiVA

Fulltekst mangler i DiVA

Scopus

Personposter BETA

Riveiro, MariaLebram, Mikael

Søk i DiVA

Av forfatter/redaktør
Riveiro, MariaLebram, Mikael
Av organisasjonen

Søk utenfor DiVA

GoogleGoogle Scholar

isbn
urn-nbn

Altmetric

isbn
urn-nbn
Totalt: 1060 treff
RefereraExporteraLink to record
Permanent link

Direct link
Referera
Referensformat
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf