Effects of Perceptual Augmentation of Visual Displays: Dissociation of Performance and Situational Awareness

Author(s):  
R. Jay Shively ◽  
Allen D. Goodman

It is intuitive that good performance is associated with, if not caused by, good situational awareness. There are, however, some situations in which these two concepts diverge. Some examples of this dissociation, such as auto-pilots, have been identified. However, it is also possible that these concepts diverge in a much more subtle manner. This research is focused on investigating those more subtle situations. Specifically, this research addresses the effects of perceptual display enhancement based upon Ecological Task Analysis (ETA) on performance and situational awareness. A perceptually augmented display was designed based upon ETA. Globally, performance advantages were found for the group with the enhanced display. Further, the findings demonstrated a dissociation of subtask performance and operator's knowledge of the system subtask. The mechanisms involved in this dissociation are related to the characteristics of the display augmentation that led to the increased performance. The level of processing, and the presence of feedback seem to play an important mediating role. These findings have important implications for both designers and researchers.

Author(s):  
Samuel Mahoney ◽  
Emilie Roth ◽  
Kristin Steinke ◽  
Jonathan Pfautz ◽  
Curt Wu ◽  
...  

Author(s):  
Cyril Onwubiko

This chapter describes work on modelling situational awareness information and system requirements for the mission. Developing this model based on Goal-Oriented Task Analysis representation of the mission using an Agent Oriented Software Engineering methodology advances current information requirement models because it provides valuable insight on how to effectively achieve the mission’s requirements (information, systems, networks, and IT infrastructure), and offers enhanced situational awareness within the Computer Network Defence environment. Further, the modelling approach using Secure Tropos is described, and model validation using a security test scenario is discussed.


2010 ◽  
Author(s):  
Robert F. Erbacher ◽  
Deborah A. Frincke ◽  
Pak Chung Wong ◽  
Sarah Moody ◽  
Glenn Fink

Author(s):  
S. Camille Peres ◽  
Daniel Verona

This paper presents a brief description of surface electromyography (sEMG), what it can be used for, as well as some of the problems associated with visual displays of sEMG data. Sonifications of sEMG data have shown potential for certain applications in data monitoring and movement training, however there are still challenges related to the design of these sonifications that need to be addressed. Our previous research has shown that different sonification designs resulted in better listener performance for different sEMG evaluation tasks (e.g. identifying muscle activation time vs. muscle exertion level). Based on this finding, we speculated that sonifications may benefit from being designed to be task-specific, and that integrating a task analysis into the sonification design process may help sonification designers identify intuitive and meaningful sonification designs. This paper presents a brief introduction to what a task analysis is, provides an example of how a task analysis can be used to inform sonification design, and outlines future research into a task-analysis-based approach to sonification design.


Author(s):  
Samuel Mahoney ◽  
Emilie Roth ◽  
Kristin Steinke ◽  
Jonathan Pfautz ◽  
Curt Wu ◽  
...  

Author(s):  
David Peebles ◽  
Peter C.-H. Cheng

We report an investigation into the processes involved in a common graph-reading task using two types of Cartesian graph. We describe an experiment and eye movement study, the results of which show that optimal scan paths assumed in the task analysis approximate the detailed sequences of saccades made by individuals. The research demonstrates the computational inequivalence of two sets of informationally equivalent graphs and illustrates how the computational advantages of a representation outweigh factors such as user unfamiliarity. We describe two models, using the ACT rational perceptual motor (ACT-R/PM) cognitive architecture, that replicate the pattern of observed response latencies and the complex scan paths revealed by the eye movement study. Finally, we outline three guidelines for designers of visual displays: Designers should (a) consider how different quantities are encoded within any chosen representational format, (b) consider the full range of alternative varieties of a given task, and (c) balance the cost of familiarization with the computational advantages of less familiar representations. Actual or potential applications of this research include informing the design and selection of appropriate visual displays and illustrating the practice and utility of task analysis, eye tracking, and cognitive modeling for understanding interactive tasks with external representations.


Author(s):  
R. Jay Shively

Emergency dispatchers must make complex life or death decisions under extreme time pressure. Using Ecological Task Analysis (ETA), a technique normally applied to aerospace human factors problems, a new display was designed that would better assist their decision making task. The major design constraints were identified to be the beat number and priority of incidents, available units, and the spatial relationship of the those units to the incident. Using these and other less formal factors, a GUI interface was designed and an evaluation was conducted at the Richmond, CA police dispatch center. The results suggest that the GUI display may reduce training times and increase situational awareness.


Author(s):  
Cyril Onwubiko

This chapter describes work on modelling situational awareness information and system requirements for the mission. Developing this model based on Goal-Oriented Task Analysis representation of the mission using an Agent Oriented Software Engineering methodology advances current information requirement models because it provides valuable insight on how to effectively achieve the mission’s requirements (information, systems, networks, and IT infrastructure), and offers enhanced situational awareness within the Computer Network Defence environment. Further, the modelling approach using Secure Tropos is described, and model validation using a security test scenario is discussed.


2021 ◽  
Vol 50 (1) ◽  
pp. 648-648
Author(s):  
Charles Spear ◽  
Allison Parsons ◽  
Naveen Muthu ◽  
Heather Wolfe ◽  
Robert Sutton ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document