Assessing Performance of Awacs Command and Control Teams

Author(s):  
Linda R. Elliott ◽  
Mathieu A. Dalrymple ◽  
Kelly Neville

Performance constructs are discussed within the context of complex and dynamic command and control (C2) team performance. Airborne Warning and Control System (AWACS) team members function in an information-rich environment, exchanging updates through an array of visual displays and communication channels. In combat, they face challenges of limited resources, ambiguous information, time pressure, and enemy interference. Subsequently, accurate assessment of communication, coordination, and decision making in AWACS teams can be difficult and time-consuming. Theoretical predictions arising from laboratory tasks must ultimately face the test of external validity using criterion measures of performance. This paper describes some of the challenges in developing criterion measures of performance and situation assessment within a dynamic and complex task requiring high expertise and teamwork. Results from two studies are briefly described.

Author(s):  
Alma Schaafstal ◽  
Raegan M. Hoeft ◽  
Martin van Schaik

The process of training teams increasingly occurs in synthetic environments. However, it is often still modeled after live team training, including the disadvantages of live training, for example, the fact that all teammates must be available. This paper explores overcoming the disadvantages of human teammates in training teams in synthetic environments, while keeping the advantages of learning in a collaborative and cooperative fashion. Simulated teammates are a promising alternative because they are always available, may be modeled after experienced training personnel, and may be more cost effective in the long run. This paper details a research approach towards the definition of requirements for simulated teammates. In our approach, we carry out a set of experiments using confederates as simulated teammates, in a well-controlled simulation of a military command-and-control task The results of a first experiment show slightly better teamwork skills for those teams trained with simulated teammates.


1981 ◽  
Vol 25 (1) ◽  
pp. 546-550 ◽  
Author(s):  
John Hallam ◽  
Robert B Stammers

In the multiman-machine system, the organisation of the team appears to depend to a great extent on the characteristics of the tasks to be performed. After a discussion of the factors contributing to team performance, and the demands imposed by tasks, the results of a series of experiments are described in which certain task characteristics (complexity and organisation) of simulated command-and-control tasks are varied to investigate the performance of two-man teams working in either a vertical (serial) or a horizontal (parallel) team organisation. Evidence from this experimental work suggests that both types of team organisation may have their advantages and disadvantages in relation to different task characteristics.


Author(s):  
Richard P. McGlynn ◽  
Janet L. Sutton ◽  
Vicki L. Sprague ◽  
Robert M. Demski ◽  
Linda G. Pierce

Author(s):  
Kavisankar Leelasankar ◽  
Chellappan C. ◽  
Sivasankar P.

The success of computer forensics lies in the complete analysis of the evidence that is available. This is done by not only analyzing the evidence which is available but also searching for new concrete evidence. The evidence is obtained through the logs of the data during the cyberattack. When performing analysis of the cyberattack especially the botnet attacks, there are many challenges. First and the foremost is that it hides the identity of the mastermind, the botmaster. It issues the command to be executed using its subordinate, the command and control (C&C). The traceback of C&C itself is a complex task. Secondly, it victimizes the innocent compromised device zombies. This chapter discusses the analysis done in both proactive and reactive ways to resolve these challenges. The chapter ends by discussing the analysis to find the real mastermind to protect the innocent compromised system and to protect the victim system/organization affected by the botnet cyberattack.


Author(s):  
Kavisankar Leelasankar ◽  
Chellappan C. ◽  
Sivasankar P.

The success of computer forensics lies in the complete analysis of the evidence that is available. This is done by not only analyzing the evidence which is available but also searching for new concrete evidence. The evidence is obtained through the logs of the data during the cyberattack. When performing analysis of the cyberattack especially the botnet attacks, there are many challenges. First and the foremost is that it hides the identity of the mastermind, the botmaster. It issues the command to be executed using its subordinate, the command and control (C&C). The traceback of C&C itself is a complex task. Secondly, it victimizes the innocent compromised device zombies. This chapter discusses the analysis done in both proactive and reactive ways to resolve these challenges. The chapter ends by discussing the analysis to find the real mastermind to protect the innocent compromised system and to protect the victim system/organization affected by the botnet cyberattack.


Author(s):  
Steph Michailovs ◽  
Stephen Pond ◽  
Megan Schmitt ◽  
Jessica Irons ◽  
Matthew Stoker ◽  
...  

Objective Examine the extent to which increasing information integration across displays in a simulated submarine command and control room can reduce operator workload, improve operator situation awareness, and improve team performance. Background In control rooms, the volume and number of sources of information are increasing, with the potential to overwhelm operator cognitive capacity. It is proposed that by distributing information to maximize relevance to each operator role (increasing information integration), it is possible to not only reduce operator workload but also improve situation awareness and team performance. Method Sixteen teams of six novice participants were trained to work together to combine data from multiple sensor displays to build a tactical picture of surrounding contacts at sea. The extent that data from one display were available to operators at other displays was manipulated (information integration) between teams. Team performance was assessed as the accuracy of the generated tactical picture. Results Teams built a more accurate tactical picture, and individual team members had better situation awareness and lower workload, when provided with high compared with low information integration. Conclusion A human-centered design approach to integrating information in command and control settings can result in lower workload, and enhanced situation awareness and team performance. Application The design of modern command and control rooms, in which operators must fuse increasing volumes of complex data from displays, may benefit from higher information integration based on a human-centered design philosophy, and a fundamental understanding of the cognitive work that is carried out by operators.


2000 ◽  
Author(s):  
Samuel G. Schiflett ◽  
Linda R. Elliott ◽  
Mathieu Dalrymple ◽  
Philip A. Tessier ◽  
Rebecca Cardenas

2016 ◽  
Vol 22 (1) ◽  
pp. 115-118
Author(s):  
Zbigniew Redziak

Abstract This article presents selected aspects of internal restrictions relating to officers’ making decisions at tactical level in the Land Forces of the Polish Armed Forces. It is dedicated to military practitioners and theoreticians who deal with command and control. The article includes the following kinds of decision-making restrictions: pressure from superiors, capital restrictions, time pressure, structural limitations and cultural restrictions.


1984 ◽  
Author(s):  
Merri-Ann Cooper ◽  
Samuel Shiflett ◽  
Arthur L. Korotkin ◽  
Edwin A. Fleishman

Sign in / Sign up

Export Citation Format

Share Document