1,719 research outputs found
Recommended from our members
Distributed situation awareness: Advances in theory, measurement and application to team work
This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University.Situation Awareness (SA) is critical commodity for teams working in complex sociotechnical systems and is thus a fundamental consideration in collaborative system design and evaluation. Despite this, SA remains predominantly an individual construct, with the majority of models and measures focused on SA from an individual perspective. In comparison, team SA has received much less attention and this thesis argues that further work is required in the area both in relation to the development of theoretical perspectives and of valid measures, and to the development of guidelines for system, training and procedure design. This thesis advances team SA theory and measurement by further investigating a recently proposed model of SA in complex collaborative environments, the Distributed Situation Awareness (DSA) approach, and by testing a new methodology for representing and analysing DSA during real world collaborative activities. A review of SA theory and SA measurement approaches is presented. Following this, the DSA theory and propositional network assessment methodology are outlined and a series of case studies on DSA during real world collaborative activities in the military and civil domains are presented. The findings are subsequently used to explore the concept of DSA and the sub-concepts of compatible and transactive SA. In conclusion, a model of DSA in complex collaborative systems is presented, and a series of system design guidelines for supporting DSA are outlined
Port Community Learning Needs: Analysis and Design
The port industry is facing a dramatic wave of changes that have transformed the structure of theindustry. Modern seaports are increasingly shifting from a âhardware-basedâ approach towards âknowhow intensiveâ configuration. In this context knowledge resources, learning processes and training initiatives increasingly represent key elements to guarantee the quality of service supplied and hence the competitiveness of modern seaport communities. This paper describes the learning needs analysis conducted amongst key port community actors in three ports in the south east of Ireland during 2005 in the context of the I-Sea.Net project. It goes on to describe the learning requirements report and thetraining design carried out based on this analysis
Human factors consideration in the automation design of a safety-critical installation
M.Ing. (Engineering Management)Abstract: Human factors consideration should form an integral part of any systemâs design. The aim is to ensure the designed system is compatible with human skills and limitations. Benefits of this consideration include reduction in the required level of training once the system is deployed. Unfortunately, even though the requirement of humans in systems design is well known, systems are continuously designed with little or no input from the eventual operators. This study aims to investigate the human factors aspect in the automation design of a safety-critical installation. Automation in its noble form is intended to improve factors such as safety, efficiency, and costs. However, this is not always the case. Part of the problem is that human operators are not always adequately considered during the design. It is the aim of this study to elicit the important human factors that must be considered in the automation design. This is done using a case study method. The case study was undertaken at the major radioisotopes production institution in the Republic of South Africa. The use of this study method is adopted as it provides enough in-depth knowledge that can be used in other safety-critical facilities
Normaâs project - a research study into the sexual assault of older women in Australia
INTRODUCTION
Normaâs Project was conceived in response to the experience of Norma, the mother of one of the four researchers involved in the project. Norma was a confused and vulnerable 83 year old woman who was sexually assaulted by a male staff member during a respite stay in a residential aged care facility in 2011. Norma was able to tell her story coherently and consistently, and she was able to identify her attacker. She was fortunate that her daughter and others, including police and sexual assault workers, listened and believed her account, tried to bring the perpetrator to justice, and worked hard to make her feel safe again. Nonetheless, given the lack of forensic evidence, the case against the perpetrator was not strong enough for a successful court action to be prosecuted.
The idea of older women as victims of sexual assault is relatively recent and little understood. However, it is becoming increasingly evident that, despite the silence that surrounds the topic, such assaults occur in many settings and circumstances. The lack of community awareness can be partly attributed to commonly held assumptions that older women are asexual. How, then, can they be the target of sexual assault? What is unimaginable and unacceptable becomes unsayable or invisible.
The significant gaps in knowledge about the sexual assault of older women present a major obstacle to the development of frameworks and strategies for prevention and intervention. Consequently the Normaâs Project research team sought funding from the Australian Department of Social Services to address the gaps and increase our understandings of the settings, social contexts and vulnerabilities associated with the sexual assault of older women. The project aims to increase awareness of this important issue both within the community and amongst service providers, and to strengthen the communityâs ability to prevent, respond to and speak out about the sexual assault of older women
Establishing cyber situational awareness in industrial control systems
The cyber threat to industrial control systems is an acknowledged security issue, but a
qualified dataset to quantify the risk remains largely unavailable. Senior executives of
facilities that operate these systems face competing requirements for investment budgets,
but without an understanding of the nature of the threat cyber security may not
be a high priority. Operational managers and cyber incident responders at these facilities
face a similarly complex situation. They must plan for the defence of critical
systems, often unfamiliar to IT security professionals, from potentially capable, adaptable
and covert antagonists who will actively attempt to evade detection. The scope
of the challenge requires a coherent, enterprise-level awareness of the threat, such that
organisations can assess their operational priorities, plan their defensive posture, and
rehearse their responses prior to such an attack.
This thesis proposes a novel combination of concepts found in risk assessment,
intrusion detection, education, exercising, safety and process models, fused with experiential
learning through serious games. It progressively builds a common set of shared
mental models across an ICS operation to frame the nature of the adversary and establish
enterprise situational awareness that permeates through all levels of teams involved
in addressing the threat. This is underpinned by a set of coping strategies that identifies
probable targets for advanced threat actors, proactively determining antagonistic
courses of actions to derive an appropriate response strategy
Competition and Regulation Policy in Antipodean Government-Funded UltraFast Fibre Broadband Markets
Both the Australian and New Zealand governments have committed to spend substantial sums in order to bring forward the nationwide deployment of ultra-fast fibre-to-the-home (FTTH) broadband networks. With deployment proceeding apace, two significant questions have arisen regarding the economic, commercial and political rationale for the Australian and New Zealand governmentsâ decisions. The first is why the respective governments are assuming a central role in the design, financing, deployment and (in Australiaâs case) operation of a nationwide network of a specific technology type, given that such intervention is at significant variance with both recent international industry policy and practice advocated by international agencies such as the OECD and the ITU, and the recent policy and regulatory history in both countries. The second is how these new Government-funded networks will affect the nature of competitive interaction in the telecommunications (broadband) industry in their respective countries.
This paper addresses these questions. First it traces the development of the Australian and New Zealand fibre investment policies in the context of international competition policy orthodoxy. It then examines the competition and regulation policies that will govern the insertion of the respective government-funded fibre networks into environments where both legacy policies and technological developments have shaped, and will continue to shape, the evolution of the respective telecommunications sectors. The analysis finds that political, rather than economic imperatives have dominated the government investment decision in both countries. The Australian investment has been accompanied by a comprehensive set of competition and regulation policies aligned with maximising the likelihood of fibre uptake, but both the up-front costs and political risks are high. The New Zealand initiative is lower-cost initially, but lacks clear over-arching competition and regulation policy objectives to guide sector development. The result is a fragmented regulatory regime and a range of contradictory and confusing incentives for all sector participants that will inevitably increase the economic costs of the project and lead to delays in fibre network uptake.
Consequently, the Antipodean âexperimentsâ in government funding of fibre networks are unlikely to offer good models of either policy or process for other jurisdictions
'Yeah, this one will be a good one', or tacit knowledge, prophylaxis, and the border: exploring everyday health security decisionmaking
Approaching health security from a practice-theoretical perspective, this article advances our understanding of the everyday and locality in health security decisionmaking, and is guided by the following two questions: How is it determined when a health security threat is likely to be present at a point of entry? What knowledge informs everyday health security decisions at borders? Markedly little is known about health security decisionmaking, though conventional wisdom tells us that health security decisions are based on stringent processes and â importantly â anchored in epidemiological knowledge. The assumed primacy of epidemiological knowledge in health security decisionmaking is well illustrated by the SARS-CoV-2 pandemic: evidence-based responses emerged globally following sophisticated epidemiologic investigation. Are health security decisions always rooted in epidemiology? A 12-month period of non-participant observation of Port Health Officers â who, under the auspices of the 2005 International Health Regulations, are responsible for numerous prophylactic measures at the UK border â gives a unique, privileged entry point for understanding the health security decisionmaking process and tells a story that both questions the centrality of epidemiology and foregrounds the role of tacit knowledge and intuition in health security decisionmaking. This article, which draws on insights from the science and technology studies literature on tacit knowledge, shows how observed health risk taxonomies and corollary decisions in prophylactic border security are predicated almost exclusively on hunches and âjust knowingâ that something âdoesnât feel rightâ
- âŠ