Simulating a vigilance task: Technology for homeland security research
نویسندگان
چکیده
Airport and border security personnel are working to improve security practices and preparedness to prevent acts of terrorism. While they must guard against false positives that result in needless delays for travelers, they must also balance those against the grave costs of missing a threat. In support of a study investigating individual differences in vigilance tasks, the authors have developed and pilot-tested a controllable simulated airport security screening environment. The simulation enables, in a more realistic setting than typically possible, research focused on understanding issues such as: Implications when task instructions differ in detail; Implications when task instructions require simultaneous search for multiple classes of objects, or when the classes have differing security implications; Implications of distraction (e.g., noise, activity, both expected and not) in the environment. These factors allow for an examination of distinct contributions to attentional processing, top-down executive control and bottom-up perceptual processing. Both processes need to be considered to adequately address perception of and attention to items in the environment. Ongoing basic studies are comparing use of the simulated environment against traditional techniques. Ongoing work with Government security personnel is directing the application to existing training needs to better determine how training can influence performance.
منابع مشابه
The Security of OpenBSD: Milk or Wine?
This work was produced under the auspices of the Institute for Information Infrastructure Protection (I3P) research program. The I3P is managed by Dartmouth College, and supported under Award number 2003-TK-TX-0003 from the U.S. Department of Homeland Security, Science and Technology Directorate. Points of view in this document are those of the authors and do not necessarily represent the offic...
متن کاملCyberinfrastructure for homeland security: Advances in information sharing, data mining, and collaboration systems
Most disaster scenarios faced by agencies entrustedwith homeland security require timely access to relevant information that can be sensed and acted upon. However, the required data and information often reside in silos that are isolated from each other due to jurisdictional boundaries or representational incompatibilities. Given the nature of the threat to homeland security, regional, cross-in...
متن کاملClosed-loop Attention Management: Using Augmented Cognition to Sustain Vigilance
Vigilance tasks, from driving to surveillance to security remain important and frequent tasks for the US Army. Yet the difficulty users have sustaining vigilance is well known. Augmented cognition offers new methods for supporting sustained vigilance via a closed-loop attention management system (CLAM). A CLAM system monitors operators’ psychophysiology for signs of inattention and then trigger...
متن کاملA Survey of Operations Research Models and Applications in Homeland Security
Operations research has had a long and distinguished history of work in emergency preparedness and response, airline security, transportation of hazardous materials, and threat and vulnerability analysis. Since the attacks of September 11, 2001 and the formation of the US Department of Homeland Security, these topics have been gathered under the broad umbrella of homeland security. In addition,...
متن کاملA value model for evaluating homeland security decisions.
One of the most challenging tasks of homeland security policymakers is to allocate their limited resources to reduce terrorism risks cost effectively. To accomplish this task, it is useful to develop a comprehensive set of homeland security objectives, metrics to measure each objective, a utility function, and value tradeoffs relevant for making homeland security investments. Together, these el...
متن کامل