his.sePublikationer
Ändra sökning
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
On visualizing threat evaluation configuration processes: A design proposal
Högskolan i Skövde, Institutionen för informationsteknologi. Högskolan i Skövde, Forskningscentrum för Informationsteknologi. (Skövde Artificial Intelligence Lab (SAIL))ORCID-id: 0000-0003-2900-9335
Högskolan i Skövde, Institutionen för informationsteknologi. Högskolan i Skövde, Forskningscentrum för Informationsteknologi. (Interaction Lab)ORCID-id: 0000-0001-6310-346X
Saab Electronic Defence Systems, Gothenburg, Sweden.
2014 (Engelska)Ingår i: 17th International Conference on Information Fusion (FUSION), 2014, IEEE conference proceedings, 2014, s. 1-8Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

Threat evaluation is concerned with estimating the intent, capability and opportunity of detected objects in relation to our own assets in an area of interest. To infer whether a target is threatening and to which degree is far from a trivial task. Expert operators have normally to their aid different support systems that analyze the incoming data and provide recommendations for actions. Since the ultimate responsibility lies in the operators, it is crucial that they trust and know how to configure and use these systems, as well as have a good understanding of their inner workings, strengths and limitations. To limit the negative effects of inadequate cooperation between the operators and their support systems, this paper presents a design proposal that aims at making the threat evaluationprocess more transparent. We focus on the initialization, configuration and preparation phases of thethreat evaluation process, supporting the user in the analysis of the behavior of the system considering the relevant parameters involved in the threat estimations. For doing so, we follow a known design process model and we implement our suggestions in a proof-of-concept prototype that we evaluate with military expert system designers.

Ort, förlag, år, upplaga, sidor
IEEE conference proceedings, 2014. s. 1-8
Nationell ämneskategori
Teknik och teknologier
Forskningsämne
Teknik; Skövde Artificial Intelligence Lab (SAIL); Interaction Lab (ILAB)
Identifikatorer
URN: urn:nbn:se:his:diva-10391ISI: 000363896100183Scopus ID: 2-s2.0-84910660640ISBN: 9788490123553 (tryckt)OAI: oai:DiVA.org:his-10391DiVA, id: diva2:771922
Konferens
17th International Conference on Information Fusion, FUSION 2014, Salamanca, Spain 7 July 2014 through 10 July 2014
Forskningsfinansiär
KK-stiftelsen
Anmärkning

Article number 6916152

Tillgänglig från: 2014-12-15 Skapad: 2014-12-15 Senast uppdaterad: 2018-04-27Bibliografiskt granskad

Open Access i DiVA

Fulltext saknas i DiVA

Scopus

Personposter BETA

Riveiro, MariaLebram, Mikael

Sök vidare i DiVA

Av författaren/redaktören
Riveiro, MariaLebram, Mikael
Av organisationen
Institutionen för informationsteknologiForskningscentrum för Informationsteknologi
Teknik och teknologier

Sök vidare utanför DiVA

GoogleGoogle Scholar

isbn
urn-nbn

Altmetricpoäng

isbn
urn-nbn
Totalt: 1060 träffar
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf