11 Matching Results

Search Results

Advanced search parameters have been applied.

Overview Report: Normal and Emergency Operation Visualization

Description: This is an overview report to document and illustrate methods used in a project entitled “Normal and Emergency Operations Visualization” for a utility company, conducted in 2009-2010 timeframe with funding from the utility company and the U.S. Department of Energy. The original final report (about 180 pages) for the project is not available for distribution because it alludes to findings that assessed the design of an operational system that contained proprietary information; this abridged version contains descriptions of methods and some findings to illustrate the approach used, while avoiding discussion of sensitive or proprietary information. The client has approved this abridged version of the report for unlimited distribution to give researchers and collaborators the benefit of reviewing the research concepts and methods that were applied in this study.
Date: May 1, 2011
Creator: Greitzer, Frank L.
Partner: UNT Libraries Government Documents Department

Situated Usability Testing for Security Systems

Description: While usability testing is well established, assessing the usability of security software, tools, or methods deserves more careful consideration. It has been argued that dealing with security has become too difficult for individuals or organizations to manage effectively or to use conveniently. As difficult as it is for system administrators and developers to deal with, security is even more challenging for casual users. Indeed, it is much too easy for casual/home users to configure the security of their systems in non-optimal ways that leave their systems inadvertently insecure. This is exacerbated by the fact that casual users are focused on matters other than security, and likely would prefer not even to think about security. This brief report argues that when security and/or privacy are part of the equation, traditional methods for usability testing should be re-considered. The purpose of this brief report is to argue for and outline a method associated with a new approach to usability testing for examining usable security issues.
Date: March 2, 2011
Creator: Greitzer, Frank L.
Partner: UNT Libraries Government Documents Department

Human Factors for Situation Assessment in Grid Operations

Description: Executive Summary Despite advances in technology, power system operators must assimilate overwhelming amounts of data to keep the grid operating. Analyses of recent blackouts have clearly demonstrated the need to enhance the operator’s situation awareness (SA). The long-term objective of this research is to integrate valuable technologies into the grid operator environment that support decision making under normal and abnormal operating conditions and remove non-technical barriers to enable the optimum use of these technologies by individuals working alone and as a team. More specifically, the research aims to identify methods and principles to increase SA of grid operators in the context of system conditions that are representative or common across many operating entities and develop operationally relevant experimental methods for studying technologies and operational practices which contribute to SA. With increasing complexity and interconnectivity of the grid, the scope and complexity of situation awareness have grown. New paradigms are needed to guide research and tool development aimed to enhance and improve operations. In reviewing related research, operating practices, systems, and tools, the present study established a taxonomy that provides a perspective on research and development surrounding power grid situation awareness and clarifies the field of human factors/SA for grid operations. Information sources that we used to identify critical factors underlying SA included interviews with experienced operational personnel, available historical summaries and transcripts of abnormal conditions and outages (e.g., the August 14, 2003 blackout), scientific literature, and operational policies/procedures and other documentation. Our analysis of August 2003 blackout transcripts and interviews adopted a different perspective than previous analyses of this material, and we complemented this analysis with additional interviews. Based on our analysis and a broad literature review, we advocate a new perspective on SA in terms of sensemaking, also called situated or ecological decision making, where the focus of the ...
Date: August 8, 2007
Creator: Guttromson, Ross T.; Schur, Anne; Greitzer, Frank L. & Paget, Mia L.
Partner: UNT Libraries Government Documents Department

Identifying at-risk employees: A behavioral model for predicting potential insider threats

Description: A psychosocial model was developed to assess an employee’s behavior associated with an increased risk of insider abuse. The model is based on case studies and research literature on factors/correlates associated with precursor behavioral manifestations of individuals committing insider crimes. In many of these crimes, managers and other coworkers observed that the offenders had exhibited signs of stress, disgruntlement, or other issues, but no alarms were raised. Barriers to using such psychosocial indicators include the inability to recognize the signs and the failure to record the behaviors so that they could be assessed by a person experienced in psychosocial evaluations. We have developed a model using a Bayesian belief network with the help of human resources staff, experienced in evaluating behaviors in staff. We conducted an experiment to assess its agreement with human resources and management professionals, with positive results. If implemented in an operational setting, the model would be part of a set of management tools for employee assessment that can raise an alarm about employees who pose higher insider threat risks. In separate work, we combine this psychosocial model’s assessment with computer workstation behavior to raise the efficacy of recognizing an insider crime in the making.
Date: September 1, 2010
Creator: Greitzer, Frank L.; Kangas, Lars J.; Noonan, Christine F. & Dalton, Angela C.
Partner: UNT Libraries Government Documents Department

Cognitive Foundations for Visual Analytics

Description: In this report, we provide an overview of scientific/technical literature on information visualization and VA. Topics discussed include an update and overview of the extensive literature search conducted for this study, the nature and purpose of the field, major research thrusts, and scientific foundations. We review methodologies for evaluating and measuring the impact of VA technologies as well as taxonomies that have been proposed for various purposes to support the VA community. A cognitive science perspective underlies each of these discussions.
Date: February 25, 2011
Creator: Greitzer, Frank L.; Noonan, Christine F. & Franklin, Lyndsey
Partner: UNT Libraries Government Documents Department

Tradeoff Analysis for Combat Service Support Wireless Communications Alternatives

Description: As the Army moves toward more mobile and agile forces and continued sustainment of numerous high-cost legacy logistics management systems, the requirement for wireless connectivity and a wireless network to supporting organizations has become ever more critical. There are currently several Army communications initiatives underway to resolve this wireless connectivity issue. However, to fully appreciate and understand the value of these initiatives, a Tradeoff Analysis is needed. The present study seeks to identify and assess solutions. The analysis identified issues that impede Interim Brigade Combat Team (IBCT) communication system integration and outlined core requirements for sharing of logistics data between the field and Army battle command systems. Then, the analysis examined wireless communication alternatives as possible solutions for IBCT logistics communications problems. The current baseline system was compared with possible alternatives involving tactical radio systems, wireless/near term digital radio, cellular satellite, and third-generation (3G) wireless technologies. Cellular satellite and 3G wireless technologies offer clear advantages and should be considered for later IBCTs.
Date: February 28, 2002
Creator: Burnette, John R.; Thibodeau, Christopher C. & Greitzer, Frank L.
Partner: UNT Libraries Government Documents Department

Cyber Friendly Fire

Description: Cyber friendly fire (FF) is a new concept that has been brought to the attention of Department of Defense (DoD) stakeholders through two workshops that were planned and conducted by the Air Force Research Laboratory (AFRL) and research conducted for AFRL by the Pacific Northwest National Laboratory. With this previous work in mind, we offer a definition of cyber FF as intentional offensive or defensive cyber/electronic actions intended to protect cyber systems against enemy forces or to attack enemy cyber systems, which unintentionally harms the mission effectiveness of friendly or neutral forces. Just as with combat friendly fire, a fundamental need in avoiding cyber FF is to maintain situation awareness (SA). We suggest that cyber SA concerns knowledge of a system's topology (connectedness and relationships of the nodes in a system), and critical knowledge elements such as the characteristics and vulnerabilities of the components that comprise the system (and that populate the nodes), the nature of the activities or work performed, and the available defensive (and offensive) countermeasures that may be applied to thwart network attacks. A training implication is to raise awareness and understanding of these critical knowledge units; an approach to decision aids and/or visualizations is to focus on supporting these critical knowledge units. To study cyber FF, we developed an unclassified security test range comprising a combination of virtual and physical devices that present a closed network for testing, simulation, and evaluation. This network offers services found on a production network without the associated costs of a real production network. Containing enough detail to appear realistic, this virtual and physical environment can be customized to represent different configurations. For our purposes, the test range was configured to appear as an Internet-connected Managed Service Provider (MSP) offering specialized web applications to the general public. The network is essentially ...
Date: September 1, 2011
Creator: Greitzer, Frank L.; Carroll, Thomas E. & Roberts, Adam D.
Partner: UNT Libraries Government Documents Department

Human Factors Evaluation of Advanced Electric Power Grid Visualization Tools

Description: This report describes initial human factors evaluation of four visualization tools (Graphical Contingency Analysis, Force Directed Graphs, Phasor State Estimator and Mode Meter/ Mode Shapes) developed by PNNL, and proposed test plans that may be implemented to evaluate their utility in scenario-based experiments.
Date: April 1, 2009
Creator: Greitzer, Frank L.; Dauenhauer, Peter M.; Wierks, Tamara G. & Podmore, Robin
Partner: UNT Libraries Government Documents Department

Towards a Research Agenda for Cyber Friendly Fire

Description: Historical assessments of combat fratricide reveal principal contributing factors in the effects of stress, degradation of skills due to continuous operations or sleep deprivation, poor situation awareness, and lack of training and discipline in offensive/defense response selection. While these problems are typically addressed in R&D focusing on traditional ground-based combat, there is also an emerging need for improving situation awareness and decision making on defensive/offensive response options in the cyber defense arena, where a mistaken response to an actual or perceived cyber attack could lead to destruction or compromise of friendly cyber assets. The purpose of this report is to examine cognitive factors that may affect cyber situation awareness and describe possible research needs to reduce the likelihood and effects of "friendly cyber fire" on cyber defenses, information infrastructures, and data. The approach is to examine concepts and methods that have been described in research applied to the more traditional problem of mitigating the occurrence of combat identification and fratricide. Application domains of interest include cyber security defense against external or internal (insider) threats.
Date: November 18, 2009
Creator: Greitzer, Frank L.; Clements, Samuel L.; Carroll, Thomas E. & Fluckiger, Jerry D.
Partner: UNT Libraries Government Documents Department

Experimental Evaluation of Electric Power Grid Visualization Tools in the EIOC

Description: The present study follows an initial human factors evaluation of four electric power grid visualization tools and reports on an empirical evaluation of two of the four tools: Graphical Contingency Analysis, and Phasor State Estimator. The evaluation was conducted within specific experimental studies designed to measure the impact on decision making performance.
Date: December 1, 2009
Creator: Greitzer, Frank L.; Dauenhauer, Peter M.; Wierks, Tamara G.; Podmore, Robin & Dalton, Angela C.
Partner: UNT Libraries Government Documents Department

Cognitive tasks in information analysis: Use of event dwell time to characterize component activities

Description: Technology-based enhancement of information analysis requires a detailed understanding of the cognitive tasks involved in the process. The information search and report production tasks of the information analysis process were investigated through evaluation of time-stamped workstation data gathered with custom software. Model tasks simulated the search and production activities, and a sample of actual analyst data were also evaluated. Task event durations were calculated on the basis of millisecond-level time stamps, and distributions were plotted for analysis. The data indicate that task event time shows a cyclic pattern of variation, with shorter event durations (< 2 sec) reflecting information search and filtering, and longer event durations (> 10 sec) reflecting information evaluation. Application of cognitive principles to the interpretation of task event time data provides a basis for developing “cognitive signatures” of complex activities, and can facilitate the development of technology aids for information intensive tasks.
Date: September 28, 2004
Creator: Sanquist, Thomas F.; Greitzer, Frank L.; Slavich, Antoinette L.; Littlefield, Rik J.; Littlefield, Janis S. & Cowley, Paula J.
Partner: UNT Libraries Government Documents Department