364,051 research outputs found

    Detect the unexpected: a science for surveillance

    Get PDF
    Purpose – The purpose of this paper is to outline a strategy for research development focused on addressing the neglected role of visual perception in real life tasks such as policing surveillance and command and control settings. Approach – The scale of surveillance task in modern control room is expanding as technology increases input capacity at an accelerating rate. The authors review recent literature highlighting the difficulties that apply to modern surveillance and give examples of how poor detection of the unexpected can be, and how surprising this deficit can be. Perceptual phenomena such as change blindness are linked to the perceptual processes undertaken by law-enforcement personnel. Findings – A scientific programme is outlined for how detection deficits can best be addressed in the context of a multidisciplinary collaborative agenda between researchers and practitioners. The development of a cognitive research field specifically examining the occurrence of perceptual “failures” provides an opportunity for policing agencies to relate laboratory findings in psychology to their own fields of day-to-day enquiry. Originality/value – The paper shows, with examples, where interdisciplinary research may best be focussed on evaluating practical solutions and on generating useable guidelines on procedure and practice. It also argues that these processes should be investigated in real and simulated context-specific studies to confirm the validity of the findings in these new applied scenarios

    Taming Uncertainty in the Assurance Process of Self-Adaptive Systems: a Goal-Oriented Approach

    Full text link
    Goals are first-class entities in a self-adaptive system (SAS) as they guide the self-adaptation. A SAS often operates in dynamic and partially unknown environments, which cause uncertainty that the SAS has to address to achieve its goals. Moreover, besides the environment, other classes of uncertainty have been identified. However, these various classes and their sources are not systematically addressed by current approaches throughout the life cycle of the SAS. In general, uncertainty typically makes the assurance provision of SAS goals exclusively at design time not viable. This calls for an assurance process that spans the whole life cycle of the SAS. In this work, we propose a goal-oriented assurance process that supports taming different sources (within different classes) of uncertainty from defining the goals at design time to performing self-adaptation at runtime. Based on a goal model augmented with uncertainty annotations, we automatically generate parametric symbolic formulae with parameterized uncertainties at design time using symbolic model checking. These formulae and the goal model guide the synthesis of adaptation policies by engineers. At runtime, the generated formulae are evaluated to resolve the uncertainty and to steer the self-adaptation using the policies. In this paper, we focus on reliability and cost properties, for which we evaluate our approach on the Body Sensor Network (BSN) implemented in OpenDaVINCI. The results of the validation are promising and show that our approach is able to systematically tame multiple classes of uncertainty, and that it is effective and efficient in providing assurances for the goals of self-adaptive systems

    An instinct for detection: psychological perspectives on CCTV surveillance

    Get PDF
    The aim of this article is to inform and stimulate a proactive, multidisciplinary approach to research and development in surveillance-based detective work. In this article we review some of the key psychological issues and phenomena that practitioners should be aware of. We look at how human performance can be explained with reference to our biological and evolutionary legacy. We show how critical viewing conditions can be in determining whether observers detect or overlook criminal activity in video material. We examine situations where performance can be surprisingly poor, and cover situations where, even once confronted with evidence of these detection deficits, observers still underestimate their susceptibility to them. Finally we explain why the emergence of these relatively recent research themes presents an opportunity for police and law enforcement agencies to set a new, multidisciplinary research agenda focused on relevant and pressing issues of national and international importance

    Engaging the Digitally Engaged Student: Comparing Technology-Mediated Communication Use and Effects on Student Learning

    Get PDF
    The role of communication technologies in the learning process is both a dynamic and complex issue. Yet, we know surprisingly little about how the use of specific communication technologies may influence classroom performance, key learning outcomes, and other measures of course satisfaction. The research reported here attempts to add to our knowledge about the role of communication in the technology enhanced classroom (TEC) education and in technology-enhanced online (TEO) education through a direct comparison of two courses. Our findings indicate additional support for “The No Significant Difference Phenomenon.” Furthermore, we found that prior experiences lead students to gravitate towards their preferred learning environments, and that basic website elements are required in any learning environment to enhance student outcomes. Finally, we found that when used appropriately, the benefits of communication technology use in education outweigh many of the drawbacks

    Discovery-led refinement in e-discovery investigations: sensemaking, cognitive ergonomics and system design.

    Get PDF
    Given the very large numbers of documents involved in e-discovery investigations, lawyers face a considerable challenge of collaborative sensemaking. We report findings from three workplace studies which looked at different aspects of how this challenge was met. From a sociotechnical perspective, the studies aimed to understand how investigators collectively and individually worked with information to support sensemaking and decision making. Here, we focus on discovery-led refinement; specifically, how engaging with the materials of the investigations led to discoveries that supported refinement of the problems and new strategies for addressing them. These refinements were essential for tractability. We begin with observations which show how new lines of enquiry were recursively embedded. We then analyse the conceptual structure of a line of enquiry and consider how reflecting this in e-discovery support systems might support scalability and group collaboration. We then focus on the individual activity of manual document review where refinement corresponded with the inductive identification of classes of irrelevant and relevant documents within a collection. Our observations point to the effects of priming on dealing with these efficiently and to issues of cognitive ergonomics at the human–computer interface. We use these observations to introduce visualisations that might enable reviewers to deal with such refinements more efficiently

    Estimating Risk Preferences in the Field

    Get PDF
    We survey the literature on estimating risk preferences using field data. We concentrate our attention on studies in which risk preferences are the focal object and estimating their structure is the core enterprise. We review a number of models of risk preferences—including both expected utility (EU) theory and non-EU models—that have been estimated using field data, and we highlight issues related to identification and estimation of such models using field data. We then survey the literature, giving separate treatment to research that uses individual-level data (e.g., property insurance data) and research that uses aggregate data (e.g., betting market data). We conclude by discussing directions for future research

    SuperIdentity: fusion of identity across real and cyber domains

    No full text
    Under both benign and malign circumstances, people now manage a spectrum of identities across both real-world and cyber domains. Our belief, however, is that all these instances ultimately track back for an individual to reflect a single ‘SuperIdentity’. This paper outlines the assumptions underpinning the SuperIdentity Project, describing the innovative use of data fusion to incorporate novel real-world and cyber cues into a rich framework appropriate for modern identity. The proposed combinatorial model will support a robust identification or authentication decision, with confidence indexed both by the level of trust in data provenance, and the diagnosticity of the identity factors being used. Additionally, the exploration of correlations between factors may underpin the more intelligent use of identity information so that known information may be used to predict previously hidden information. With modern living supporting the ‘distribution of identity’ across real and cyber domains, and with criminal elements operating in increasingly sophisticated ways in the hinterland between the two, this approach is suggested as a way forwards, and is discussed in terms of its impact on privacy, security, and the detection of threa
    • 

    corecore