Novel Developments in Formal Methods for Human Factors Engineering

Author(s):  
Matthew L. Bolton

Formal methods are robust tools and techniques for modeling, specifying, and mathematically proving properties about (verifying) systems. They are particularly good at both finding unexpected problems that arise from complex system interactions and proving that specific types of problems will never manifest. Formal methods have predominantly been used in the analysis and design of computer hardware and software systems. However, a growing research area within the human factors engineering community has been examining how formal methods can be used to prove whether problems exist in systems that rely on human-automation and human-human interaction for their safe operation. This symposium contains four papers by researchers who have been pushing the boundaries of where and how formal methods can be used in human factors engineering.

2017 ◽  
Vol 8 (2) ◽  
pp. 1-25
Author(s):  
Christos Kalloniatis ◽  
Argyri Pattakou ◽  
Evangelia Kavakli ◽  
Stefanos Gritzalis

Pervasiveness of information systems is well underway, redefining our social and economic relationships. This technological revolution has generated enormous capabilities, but also enabled the creation of new vulnerabilities and threats. A major challenge in the field of information systems is therefore, to ensure the trustworthiness of the underlying technologies that make possible the generation, collection, storage, processing and transmission of user data at rates more intensive than ever before. Trust in information systems depends on different aspects, one of which is the security of user's data. Data security is referred as the protection of user's data from corruption and unauthorized access. Another important aspect of trust is the protection of user's privacy. Protecting privacy is about complying with user's desires when it comes to handling personal information. Without security to guarantee data protection, appropriate uses of that data cannot be realized. This implies that security and privacy issues are inherently intertwined and should be viewed synergistically. The aim of this paper is to elevate modern practices for ensuring security and privacy during software systems analysis and design. To this end, the basic security and privacy requirements that should be considered are introduced. Additionally, a number of well known methods in the research area of requirements engineering which focus on eliciting and modeling security and privacy requirements are described. Finally, a comparative analysis between these methods is presented.


1982 ◽  
Vol 26 (1) ◽  
pp. 30-34
Author(s):  
S. Keith Adams

Most literature on the application of human factors engineering in industry has described problems from the viewpoint of the seller of human factors technology, that is, the human factors engineer. It is also important that the seller learn to identify human factors problems as perceived by the buyers, that is, those who design and operate production hardware and software systems. This paper describes the author's experience in teaching a graduate level course in human factors engineering to a group of 30 manufacturing engineers and soliciting their perceptions of human factors problems in manufacturing operations in the form of team reports. The results indicate a sample of the depth and scope of human factors problems in modern manufacturing. They also indicate directions and trends in the vast area of industrial application as related to heavy manufacturing.


Author(s):  
Christos Kalloniatis ◽  
Argyri Pattakou ◽  
Evangelia Kavakli ◽  
Stefanos Gritzalis

Pervasiveness of information systems is well underway, redefining our social and economic relationships. This technological revolution has generated enormous capabilities, but also enabled the creation of new vulnerabilities and threats. A major challenge in the field of information systems is therefore, to ensure the trustworthiness of the underlying technologies that make possible the generation, collection, storage, processing and transmission of user data at rates more intensive than ever before. Trust in information systems depends on different aspects, one of which is the security of user's data. Data security is referred as the protection of user's data from corruption and unauthorized access. Another important aspect of trust is the protection of user's privacy. Protecting privacy is about complying with user's desires when it comes to handling personal information. Without security to guarantee data protection, appropriate uses of that data cannot be realized. This implies that security and privacy issues are inherently intertwined and should be viewed synergistically. The aim of this paper is to elevate modern practices for ensuring security and privacy during software systems analysis and design. To this end, the basic security and privacy requirements that should be considered are introduced. Additionally, a number of well known methods in the research area of requirements engineering which focus on eliciting and modeling security and privacy requirements are described. Finally, a comparative analysis between these methods is presented.


2020 ◽  
Vol 1 (1) ◽  
Author(s):  
Mary Claire Claire Mancl

Maintaining crew health throughout long duration deep space missions presents significant new design challenges. Since communication with Earth will be limited and it is not possible to return in the event of a medical emergency it is critical that medical care on a deep space mission be as autonomous as possible. The goal of this project was to design and assess a medical system concept for the Deep Space Habitat Concept Demonstrator derived from the core stage of the Space Launch System. The Medical Bay was designed as a primary location to support the medical care of 4 crew members on a 1000 day mission. It includes workspace, stowage, and direct access to all necessary medical equipment and supplies. A Human Factors Engineering (HFE) Analysis was conducted to test ergonomic effectiveness and system requirement compliance. This initial design will continue to be used by the HFE Team and the Advanced Concepts Office (ACO) at NASA’s Marshall Spaceflight Center (MSFC) for further demonstration, analysis, and design conception for deep space travel.


1983 ◽  
Author(s):  
S. L. Ehrenreich ◽  
M. J. Cosky

2004 ◽  
Author(s):  
Brian Peacock ◽  
Jeffrey McCandless ◽  
Sudhakar Rajulu ◽  
Frances Mount ◽  
Melissa Mallis ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document