65,441 research outputs found

    Investigating people: a qualitative analysis of the search behaviours of open-source intelligence analysts

    Get PDF
    The Internet and the World Wide Web have become integral parts of the lives of many modern individuals, enabling almost instantaneous communication, sharing and broadcasting of thoughts, feelings and opinions. Much of this information is publicly facing, and as such, it can be utilised in a multitude of online investigations, ranging from employee vetting and credit checking to counter-terrorism and fraud prevention/detection. However, the search needs and behaviours of these investigators are not well documented in the literature. In order to address this gap, an in-depth qualitative study was carried out in cooperation with a leading investigation company. The research contribution is an initial identification of Open-Source Intelligence investigator search behaviours, the procedures and practices that they undertake, along with an overview of the difficulties and challenges that they encounter as part of their domain. This lays the foundation for future research in to the varied domain of Open-Source Intelligence gathering

    Integrative Use of Information Extraction, Semantic Matchmaking and Adaptive Coupling Techniques in Support of Distributed Information Processing and Decision-Making

    No full text
    In order to press maximal cognitive benefit from their social, technological and informational environments, military coalitions need to understand how best to exploit available information assets as well as how best to organize their socially-distributed information processing activities. The International Technology Alliance (ITA) program is beginning to address the challenges associated with enhanced cognition in military coalition environments by integrating a variety of research and development efforts. In particular, research in one component of the ITA ('Project 4: Shared Understanding and Information Exploitation') is seeking to develop capabilities that enable military coalitions to better exploit and distribute networked information assets in the service of collective cognitive outcomes (e.g. improved decision-making). In this paper, we provide an overview of the various research activities in Project 4. We also show how these research activities complement one another in terms of supporting coalition-based collective cognition

    On the discovery of social roles in large scale social systems

    Get PDF
    The social role of a participant in a social system is a label conceptualizing the circumstances under which she interacts within it. They may be used as a theoretical tool that explains why and how users participate in an online social system. Social role analysis also serves practical purposes, such as reducing the structure of complex systems to rela- tionships among roles rather than alters, and enabling a comparison of social systems that emerge in similar contexts. This article presents a data-driven approach for the discovery of social roles in large scale social systems. Motivated by an analysis of the present art, the method discovers roles by the conditional triad censuses of user ego-networks, which is a promising tool because they capture the degree to which basic social forces push upon a user to interact with others. Clusters of censuses, inferred from samples of large scale network carefully chosen to preserve local structural prop- erties, define the social roles. The promise of the method is demonstrated by discussing and discovering the roles that emerge in both Facebook and Wikipedia. The article con- cludes with a discussion of the challenges and future opportunities in the discovery of social roles in large social systems

    Practical Strategies for Integrating a Conversation Analyst in an Iterative Design Process

    Full text link
    We present a case study of an iterative design process that includes a conversation analyst. We discuss potential benefits of conversation analysis for design, and we describe our strategies for integrating the conversation analyst in the design process. Since the analyst on our team had no previous exposure to design or engineering, and none of the other members of our team had any experience with conversation analysis, we needed to build a foundation for our interaction. One of our key strategies was to pair the conversation analyst with a designer in a highly interactive collaboration. Our tactics have been effective on our project, leading to valuable results that we believe we could not have obtained using another method. We hope that this paper can serve as a practical guide to those interested in establishing a productive and efficient working relationship between a conversation analyst and the other members of a design team.Comment: 11 page

    GIS and urban design

    Get PDF
    Although urban planning has used computer models and information systems sincethe 1950s and architectural practice has recently restructured to the use of computeraideddesign (CAD) and computer drafting software, urban design has hardly beentouched by the digital world. This is about to change as very fine scale spatial datarelevant to such design becomes routinely available, as 2dimensional GIS(geographic information systems) become linked to 3dimensional CAD packages,and as other kinds of photorealistic media are increasingly being fused with thesesoftware. In this chapter, we present the role of GIS in urban design, outlining whatcurrent desktop software is capable of and showing how various new techniques canbe developed which make such software highly suitable as basis for urban design.We first outline the nature of urban design and then present ideas about how varioussoftware might form a tool kit to aid its process. We then look in turn at: utilisingstandard mapping capabilities within GIS relevant to urban design; buildingfunctional extensions to GIS which measure local scale accessibility; providingsketch planning capability in GIS and linking 2-d to 3-d visualisations using low costnet-enabled CAD browsers. We finally conclude with some speculations on thefuture of GIS for urban design across networks whereby a wide range of participantsmight engage in the design process digitally but remotely

    Concept-based Analysis of Surface and Structural Misfits (CASSM) Tutorial notes

    Get PDF
    Concept-based Analysis of Surface and Structural Misfits (CASSM) in a novel approach to usability analysis that focuses attention on misfits between user and system concepts. We believe that as an approach it has several desirable qualities: o It focuses on concepts rather than tasks or procedures. Consequently, it complements the majority of existing approaches to usability evaluation. In particular, it analyses conceptual misfits between user and system. o By intentionally supporting ‘sketchy’ analysis, CASSM avoids the ‘death by detail’ that plagues many evaluation techniques. CASSM analyses do not have to be complete or consistent to be useful – though of course a thorough analysis is likely to have these properties. Also, CASSM analyses are often quite succinct, compared to (for example) a Cognitive Walkthrough (Wharton et al, 1994), Heuristic Evaluation (Nielsen, 1994) or GOMS analysis (John & Kieras, 1996). o As a notation, it provides a ‘bridge’ between the core ideas underpinning work on mental models and design issues, and may thus make prior work on mental models more readily accessible to design practice. [This should be regarded as a hypothesis that has not yet been tested.] o The CASSM notation provides a relatively formal definition of many of Green’s Cognitive Dimensions (see, for example, Green, 1989; Green & Petre, 1996; Blackwell & Green 2003). In this way, it further supports assessment of a system in terms of CDs. This is discussed in detail towards the end of this document. Although the name (CASSM: Concept-based Analysis of Surface and Structural Misfits) emphasises the importance of misfits, you should be aware that there are other kinds of user–system misfits that are outside the scope of CASSM; for example, inconsistencies in procedures for similar tasks would be picked up by other techniques but are not directly addressed within CASSM. CASSM focuses on conceptual structures
    corecore