Knowledge Elicitation Tool Classification. Janet E. Burge. Artificial Intelligence Research Group. Worcester Polytechnic Institute

Similar documents
Maximizing Learning Through Course Alignment and Experience with Different Types of Knowledge

Agent-Based Software Engineering

Module 12. Machine Learning. Version 2 CSE IIT, Kharagpur

Probabilistic Latent Semantic Analysis

Unit 7 Data analysis and design

Introduction to Modeling and Simulation. Conceptual Modeling. OSMAN BALCI Professor

Pragmatic Use Case Writing

PROCESS USE CASES: USE CASES IDENTIFICATION

AQUA: An Ontology-Driven Question Answering System

Learning Methods for Fuzzy Systems

Different Requirements Gathering Techniques and Issues. Javaria Mushtaq

Developing a Language for Assessing Creativity: a taxonomy to support student learning and assessment

The Enterprise Knowledge Portal: The Concept

Notes on The Sciences of the Artificial Adapted from a shorter document written for course (Deciding What to Design) 1

Knowledge-Based - Systems

WHY SOLVE PROBLEMS? INTERVIEWING COLLEGE FACULTY ABOUT THE LEARNING AND TEACHING OF PROBLEM SOLVING

OCR LEVEL 3 CAMBRIDGE TECHNICAL

Activities, Exercises, Assignments Copyright 2009 Cem Kaner 1

Laporan Penelitian Unggulan Prodi

Automating the E-learning Personalization

10.2. Behavior models

Multimedia Courseware of Road Safety Education for Secondary School Students

The 9 th International Scientific Conference elearning and software for Education Bucharest, April 25-26, / X

CREATING SHARABLE LEARNING OBJECTS FROM EXISTING DIGITAL COURSE CONTENT

Knowledge based expert systems D H A N A N J A Y K A L B A N D E

Abstractions and the Brain

Second Language Acquisition in Adults: From Research to Practice

Word Segmentation of Off-line Handwritten Documents

A GENERIC SPLIT PROCESS MODEL FOR ASSET MANAGEMENT DECISION-MAKING

Deploying Agile Practices in Organizations: A Case Study

LEt s GO! Workshop Creativity with Mockups of Locations

USING LEARNING THEORY IN A HYPERMEDIA-BASED PETRI NET MODELING TUTORIAL

Evolution of Symbolisation in Chimpanzees and Neural Nets

DIGITAL GAMING & INTERACTIVE MEDIA BACHELOR S DEGREE. Junior Year. Summer (Bridge Quarter) Fall Winter Spring GAME Credits.

Designing a Rubric to Assess the Modelling Phase of Student Design Projects in Upper Year Engineering Courses

Objectives. Chapter 2: The Representation of Knowledge. Expert Systems: Principles and Programming, Fourth Edition

Rule Learning With Negation: Issues Regarding Effectiveness

Beyond the Blend: Optimizing the Use of your Learning Technologies. Bryan Chapman, Chapman Alliance

Designing a Computer to Play Nim: A Mini-Capstone Project in Digital Design I

IBM Software Group. Mastering Requirements Management with Use Cases Module 6: Define the System

Implementing a tool to Support KAOS-Beta Process Model Using EPF

A Context-Driven Use Case Creation Process for Specifying Automotive Driver Assistance Systems

Computerized Adaptive Psychological Testing A Personalisation Perspective

University of Groningen. Systemen, planning, netwerken Bosman, Aart

Software Maintenance

An Industrial Technologist s Core Knowledge: Web-based Strategy for Defining Our Discipline

PAST EXPERIENCE AS COORDINATION ENABLER IN EXTREME ENVIRONMENT: THE CASE OF THE FRENCH AIR FORCE AEROBATIC TEAM

Towards a Collaboration Framework for Selection of ICT Tools

ReinForest: Multi-Domain Dialogue Management Using Hierarchical Policies and Knowledge Ontology

Australian Journal of Basic and Applied Sciences

Laboratorio di Intelligenza Artificiale e Robotica

ECE-492 SENIOR ADVANCED DESIGN PROJECT

How People Learn Physics

Introduction to CRC Cards

CONCEPT MAPS AS A DEVICE FOR LEARNING DATABASE CONCEPTS

Classroom Connections Examining the Intersection of the Standards for Mathematical Content and the Standards for Mathematical Practice

Modeling user preferences and norms in context-aware systems

DSTO WTOIBUT10N STATEMENT A

(Sub)Gradient Descent

Using Virtual Manipulatives to Support Teaching and Learning Mathematics

Developing True/False Test Sheet Generating System with Diagnosing Basic Cognitive Ability

Specification and Evaluation of Machine Translation Toy Systems - Criteria for laboratory assignments

ISFA2008U_120 A SCHEDULING REINFORCEMENT LEARNING ALGORITHM

Dublin City Schools Mathematics Graded Course of Study GRADE 4

Author: Justyna Kowalczys Stowarzyszenie Angielski w Medycynie (PL) Feb 2015

SINGLE DOCUMENT AUTOMATIC TEXT SUMMARIZATION USING TERM FREQUENCY-INVERSE DOCUMENT FREQUENCY (TF-IDF)

Concept mapping instrumental support for problem solving

Problem and Design Spaces during Object-Oriented Design: An Exploratory Study

Guide to Teaching Computer Science

CHAPTER 4: REIMBURSEMENT STRATEGIES 24

Applying Fuzzy Rule-Based System on FMEA to Assess the Risks on Project-Based Software Engineering Education

Utilizing Soft System Methodology to Increase Productivity of Shell Fabrication Sushant Sudheer Takekar 1 Dr. D.N. Raut 2

CWIS 23,3. Nikolaos Avouris Human Computer Interaction Group, University of Patras, Patras, Greece

The CTQ Flowdown as a Conceptual Model of Project Objectives

Python Machine Learning

Lecture 1: Basic Concepts of Machine Learning

Running head: LISTENING COMPREHENSION OF UNIVERSITY REGISTERS 1

Improved Effects of Word-Retrieval Treatments Subsequent to Addition of the Orthographic Form

LEXICAL COHESION ANALYSIS OF THE ARTICLE WHAT IS A GOOD RESEARCH PROJECT? BY BRIAN PALTRIDGE A JOURNAL ARTICLE

Using the Attribute Hierarchy Method to Make Diagnostic Inferences about Examinees Cognitive Skills in Algebra on the SAT

Procedia - Social and Behavioral Sciences 93 ( 2013 ) rd World Conference on Learning, Teaching and Educational Leadership WCLTA 2012

EDUC-E328 Science in the Elementary Schools

Chapter 10 APPLYING TOPIC MODELING TO FORENSIC DATA. 1. Introduction. Alta de Waal, Jacobus Venter and Etienne Barnard

Thinking and re-thinking verbal protocol analysis in design research

Matching Similarity for Keyword-Based Clustering

A cognitive perspective on pair programming

QuickStroke: An Incremental On-line Chinese Handwriting Recognition System

Cooking Matters at the Store Evaluation: Executive Summary

Aligning learning, teaching and assessment using the web: an evaluation of pedagogic approaches

INNOWIZ: A GUIDING FRAMEWORK FOR PROJECTS IN INDUSTRIAL DESIGN EDUCATION

INSTRUCTIONAL FOCUS DOCUMENT Grade 5/Science

CHAPTER V: CONCLUSIONS, CONTRIBUTIONS, AND FUTURE RESEARCH

Creating Meaningful Assessments for Professional Development Education in Software Architecture

DOES RETELLING TECHNIQUE IMPROVE SPEAKING FLUENCY?

GACE Computer Science Assessment Test at a Glance

Extending Place Value with Whole Numbers to 1,000,000

Visual CP Representation of Knowledge

ZACHARY J. OSTER CURRICULUM VITAE

A Coding System for Dynamic Topic Analysis: A Computer-Mediated Discourse Analysis Technique

Why PPP won t (and shouldn t) go away

Transcription:

Page 1 of 28 Knowledge Elicitation Tool Classification Janet E. Burge Artificial Intelligence Research Group Worcester Polytechnic Institute Knowledge Elicitation Methods * KE Methods by Interaction Type * Interviewing * Case Study * Protocols * Critiquing * Role Playing * Simulation * Prototyping * Teachback * Observation * Goal Related * List Related * Construct Elicitation * Sorting * Laddering * 20 Questions * Document Analysis *

Page 2 of 28 KE Methods by Knowledge Type Obtained * Procedures * Problem Solving Strategy * Goals/Subgoals * Classification * Dependencies/Relationships * Evaluation * References * Table 1. KE Techniques Grouped by Interaction Type * Table 2. Interview Methods * Table 3. Case Study Methods * Table 4. Protocol Methods * Table 5. Critiquing Methods * Table 6. Role Playing Methods * Table 7. Simulation Methods * Table 8. Prototyping Methods * Table 9. Teachback Methods * Table 10. Observation Methods * Table 11. Goal Related Methods * Table 12. List Related Methods * Table 13. Construct Elicitation Methods * Table 14. Sorting Methods * Table 15. Laddering Methods * Table 16. 20 Questions Method *

Page 3 of 28 Table 17. Document Analysis Methods * Table 18. Methods that Elicit Procedures * Table 19. Methods that Elicit Problem Solving Strategy * Table 20. Methods that Elicit Goals/Subgoals * Table 21. Methods that Elicit Classification of Domain Entities * Table 22. Methods that Elicit Relationships * Table 23. Methods that Elicit Evaluations * Knowledge Elicitation Methods Many Knowledge Elicitation (KE) methods have been used to obtain the information required to solve problems. These methods can be classified in many ways. One common way is by how directly they obtain information from the domain expert. methods involve directly questioning a domain expert on how they do their job. In order for these methods to be successful, the domain expert has to be reasonably articulate and willing to share information. The information has to be easily expressed by the expert, which is often difficult when tasks frequently performed often become 'automatic.' methods are used in order to obtain information that can not be easily expressed directly. Two other ways of classifying methods are discussed in this document. One classifies the methods by how they interact with the domain expert. Another classifies them by what type of information is obtained. Other factors that influence the choice of KE method are the amount of domain knowledge required by the knowledge engineer and the effort required to analyze the data. KE Methods by Interaction Type There are many ways of grouping KE methods. One is to group them by the type of interaction with the domain expert. Table 1 shows the categories and the type of information produced. Table 1. KE Techniques Grouped by Interaction Type Category Examples Type Results Interview Structured Varies depending on

Page 4 of 28 Unstructured questions asked Semi-Structured Case Study Critical Incident Method Forward Scenario Simulation Procedures followed, rationale Critical Decision Method Protocols Protocol Analysis Procedures followed, rationale Critiquing Critiquing Evaluation of problem solving strategy compared to alternatives Role Playing Role Playing Procedures, difficulties encountered due to role Simulation Simulation Wizard of Oz Procedures followed Prototyping Rapid Prototyping Storyboarding Evaluation of proposed approach Teachback Teachback Correction of Misconceptions Observation Observation Procedure followed Goal Related Goal Decomposition Dividing the Domain Goals and subgoals, groupings of goals List Related Decision Analysis Estimate of

Page 5 of 28 worth of all decisions for a task Construct Elicitation Repertory Grid Multi-dimensional Scaling Entities, attributes, sometimes relationships Sorting Card Sorting Classification of entities (dimension chosen by subject) Laddering Laddered Grid Hierarchical map of the task domain 20 Questions 20 Questions Information used to solve problems, organization of problem space Document Analysis Document Analysis (usually) Varies depending on available documents, interaction with experts Interviewing Interviewing consists of asking the domain expert questions about the domain of interest and how they perform their tasks. Interviews can be unstructured, semi-structured, or structured. The success of an interview session is dependent on the questions asked (it is difficult to know which questions should be asked, particularly if the interviewer is not familiar with the domain) and the ability of the expert to articulate their knowledge. The expert may not remember exactly how they perform a task, especially if it is one that they perform automatically". Some interview methods are used to build a particular type of model of the task. The model is built by the knowledge engineer based on information obtained during the interview and then reviewed with the domain expert. In some cases, the models can be built interactively with the expert, especially if there are software tools available for model creation. Table 2 shows a list of interview methods. Table 2. Interview Methods

Page 6 of 28 Interviewing (structured, unstructured, semistructured) Procedures followed, knowledge used (easily verbalized knowledge) [Hudlicka, 1997], Concept Mapping Procedures followed [Hudlicka, 1997], [Thordsen, 1991], [Gowin & Novak, 1984] Interruption Analysis Procedures, problemsolving strategy, rationale [Hudlicka, 1997] ARK (ACT-based representation of knowledge) (combination of methods) Goal-subgoal network Includes production rules describing goal/subgoal relationship Cognitive Structure Analysis (CSA) Representational format of experts knowledge; content of the knowledge structure Problem discussion Solution strategies Tutorial interview Whatever expert teaches! Uncertain information elicitation Uncertainty about problems Data flow modeling Data flow diagram (data items and data flow between them no sequence information) [OTT, 1998], [Gane & Sarson, 1977] Entity-relationship modeling Entity relationship diagram (entities, attributes, and relationships) [OTT, 1998], [Swaffield & Knight, 1990] Entity life modeling Entity life cycle diagram (entities and state changes) [OTT, 1998], [Swaffield & Knight, 1990]

Page 7 of 28 Object oriented modeling Network of objects (types, attributes, relations) Semantic nets Semantic Net (inc. relationships between objects) IDEF modeling IDEF Model (functional decomposition) [OTT, 1998], [Riekert, 1991] [OTT, 1998], [Atkinson, 1990] [OTT, 1998], [McNeese & Zaff, 1991] Petri nets Functional task net [OTT, 1998], [Coovert et al., 1990], [Hura, 1987], [Weingaertner & Lewis, 1988] Questionnaire Sequence of task actions, cause and effect relationships Task action mapping Decision flow diagram (goals, subgoals, actions) [OTT, 1998], [Bainbridge, 1979] [OTT, 1998], [Coury et al., 1991] User Needs Analysis (decision process diagrams) Decision process diagrams [OTT, 1998], [Coury et al., 1991] Case Study In Case Study methods different examples of problems/tasks within a domain are discussed. The problems consist of specific cases that can be typical, difficult, or memorable. These cases are used as a context within which directed questions are asked. Table 3 shows a list of methods that use cases to obtain information. Table 3. Case Study Methods Retrospective case description Procedures followed al., 1990],

Page 8 of 28 Critical incident strategy Complete plan, plus factors that influenced the plan. al., 1990], Forward scenario simulation Procedures followed, reasons behind them al., 1990], Critical Decision Method Goals considered, options generated, situation assessment [Hudlicka, 1997], [Thordsen, 1991], [Klein et al., 1986] Retrospective case description Procedures used to solve past problems al., 1990], Interesting cases Procedures used to solve unusual problems al., 1990], Protocols Protocol analysis [Ericsson and Simon, 1984] involves asking the expert to perform a task while "thinking aloud." The intent is to capture both the actions performed and the mental process used to determine these actions. As with all the direct methods, the success of the protocol analysis depends on the ability of the expert to describe why they are making their decision. In some cases, the expert may not remember why they do things a certain way. In many cases, the verbalized thoughts will only be a subset of the actual knowledge used to perform the task. One method used to augment this information is Interruption analysis. For this method, the knowledge engineer interrupts the expert at critical points in the task to ask questions about why they performed a particular action. For design, protocol analysis would involve asking the expert to perform the design task. This may or not be possible depending on what is being designed or the length of time normally required to perform a design task. Interruption analysis would be useful in determining why subtasks are performed in a particular order. One disadvantage, however, is that the questions could distract the expert enough that they may make mistakes or start "second guessing" their own decisions. If time and resources were available, it would be interesting to perform protocol analysis of the same task using multiple experts noting any differences in ordering. This could obtain both alternative orderings and, after questioning the expert, the rationale for their decisions. Table 4 lists protocol analysis. Table 4. Protocol Methods

Page 9 of 28 protocol analysis (think aloud, talk aloud, eidetic reduction, retrospective reporting, behavioral descriptions, playback) Procedures, problemsolving strategy [Hudlicka, 1997], [Ericsson & Simon, 1984], Critiquing In Critiquing, an approach to the problem/task is evaluated by the expert. This is used to determine the validity of results of previous KE sessions. Table 5 lists critiquing methods. Table 5. Critiquing Methods Critiquing Evaluation of a problem solving strategy compared to alternatives al., 1990], Role Playing In Role Playing, the expert adapts a role and acts out a scenario where their knowledge is used. The intent is that by viewing a situation from a different perspective, information will be revealed that was not discussed when the expert was asked directly. Table 6 shows role playing. Table 6. Role Playing Methods role playing Procedures, difficulties encountered due to role al., 1990],

Page 10 of 28 Simulation In Simulation methods, the task is simulated using a computer system or other means. This is used when it is not possible to actually perform the task. Table 7 shows simulation methods. Table 7. Simulation Methods wizard of oz Procedures followed al., 1990], Simulations Problem solving strategies, procedures Problem analysis Procedures, rationale (like simulated interruption analysis) al., 1990], Prototyping In Prototyping, the expert is asked to evaluate a prototype of the proposed system being developed. This is usually done iteratively as the system is refined. Table 8 shows prototyping methods. Table 8. Prototyping Methods System refinement New test cases for a prototype system System examination Experts opinion on prototype s rules and control structures System validation Outside experts evaluation of cases

Page 11 of 28 solved by expert and protocol system Rapid prototyping Evaluation of system/procedure al., 1990], [Diaper, Storyboarding Prototype display design [OTT, 1998], [McNeese & Zaff, 1991] Teachback In Teachback, the knowledge engineer attempts to teach the information back to the expert, who then provides corrections and fills in gaps. Table 9 shows teachback methods. Table 9. Teachback Methods teachback Correction of misconceptions al., 1990], Observation In Observation methods, the knowledge engineer observes the expert performing a task. This prevents the knowledge engineer from inadvertently interfering in the process, but does not provide any insight into why decisions are made. Table 10 shows observation methods. Table 10. Observation Methods Discourse analysis (observation) Taxonomy of tasks/subtasks or functions [OTT, 1998], [Belkin & Brooks, 1988] On-site observation Procedure, problem al.,

Page 12 of 28 solving strategies Active participation Knowledge and skills needed for task 1990], al., 1990], Goal Related In Goal Related methods, focused discussion techniques are used to elicit information about goals and subgoals. Table 11 shows goal related methods. Table 11. Goal Related Methods Goal Decomposition Goals and subgoals Dividing the domain How data is grouped to reach a goal Reclassification Evidence needed to prove that a decision was correct Distinguishing goals Minimal sets of discriminating features al., 1990], al., 1990], al., 1990], Goal ed Analysis (goal-means network) Goal-means network [OTT, 1998], [Woods & Hollnagel, 1987] List Related In List Related methods, the expert is asked to provide lists of information, usually decisions. Table 12 shows list related methods. Table 12. List Related Methods

Page 13 of 28 Decision analysis Estimate of worth for all possible decisions for a task al., 1990], Construct Elicitation Construct Elicitation methods are used to obtain information about how the expert discriminates between entities in the problem domain. The most commonly used construct elimination method is Repertory Grid Analysis [Kelly, 1955]. For this method, the domain expert is presented with a list of entities and is asked to describe the similarities and differences between them. These similarities and differences are used to determine the important attributes of the entities. After completing the initial list of attributes, the knowledge engineer works with the domain expert to assign ratings to each entity/attribute pair. Table 13 shows construct elicitation methods. Table 13. Construct Elicitation Methods repertory grid Attributes (and entities if provided by subject) [Hudlicka, 1997], [Kelly, 1955] multi-dimensional scaling Attributes and relationships proximity scaling Attributes and relationships [Hudlicka, 1997] Sorting In sorting methods, domain entities are sorted to determine how the expert classifies their knowledge. Table 14 shows sorting methods. Table 14. Sorting Methods

Page 14 of 28 card sorting Hierarchical cluster diagram (classification) [1], al., 1990], Laddering In Laddering, a hierarchical structure of the domain is formed by asking questions designed to move up, down, and across the hierarchy. Table 15 shows laddering methods. Table 15. Laddering Methods Laddered grid A hierarchical map of the task domain al., 1990], 20 Questions This is a method used to determine how the expert gathers information by having the expert as the knowledge engineer questions. Table 16 shows the 20 questions method. Table 16. 20 Questions Method 20 questions Amount and type of information used to solve problems; how problem space is organized, or how expert has represented, Task-relevant knowledge.

Page 15 of 28 Document Analysis Document analysis involves gathering information from existing documentation. May or may not involve interaction with a human expert to confirm or add to this information. Table 17 shows documentation analysis methods. Table 17. Document Analysis Methods Collect artifacts of task performance How expert organizes or processes task information, how it is compiled to present to others al., 1990], Document analysis (Usually) Conceptual graph [OTT, 1998], [Gordon et al., 1993] Goal ed Analysis (goal-means network) Goal-means network [OTT, 1998], [Woods & Hollnagel, 1987] KE Methods by Knowledge Type Obtained Besides being grouped into direct and indirect categories, KE methods can also be grouped (to some extent) by the type of knowledge obtained. For example, many of the indirect KE methods are best at obtaining classification knowledge while direct methods are more suited for obtaining procedural knowledge. This does not, however, mean that the techniques can not be used for other knowledge types. Since some designers may not be able to directly express how they perform a design task, it might be useful to use an indirect method in conjunction with a direct method to obtain this information. Information types used here are: Procedures Problem solving strategy/rationale Goals, sub-goals Classification Relationships Evaluation Many methods fit into more than one category and are listed more than once. Also, this

Page 16 of 28 classification shows the information most commonly extracted using a method and does not imply that only that type of information can be elicited. Procedures These are methods that can be used to determine the steps followed to complete a task. Table 18 lists methods used to elicit procedures. Table 18. Methods that Elicit Procedures Method Category Output Type Reference Interviewing (structured, unstructured, semistructured) Interviewing Procedures followed, knowledge used [Hudlicka, 1997], Concept Mapping Interview Procedures followed [Hudlicka, 1997], [Thordsen, 1991], [Gowin & Novak, 1984] Interruption Analysis Interviewing Procedures, problem-solving strategy, rationale [Hudlicka, 1997] Problem discussion Interview Solution strategies Tutorial interview Interview Whatever expert teaches! Entity life modeling Interview Entity life cycle diagram (entities and state changes) [OTT, 1998], [Swaffield & Knight, 1990] IDEF modeling Interview IDEF Model (functional decomposition) [OTT, 1998], [McNeese & Zaff, 1991] Petri nets Interview Functional task net [OTT, 1998], [Coovert et al., 1990], [Hura, 1987], [Weingaertner & Lewis, 1988]

Page 17 of 28 Questionnaire Interview Sequence of task actions, cause and effect relationships [OTT, 1998], [Bainbridge, 1979] Task action mapping Interview Decision flow diagram (goals, subgoals, actions) [OTT, 1998], [Coury et al., 1991] Retrospective case description Case Study Procedures followed Critical incident strategy Case Study Complete plan, plus factors that influenced the plan. Forward scenario simulation Case Study Procedures followed, reasons behind them Retrospective case description Case Study Procedures used to solve past problems Interesting cases Case Study Procedures used to solve unusual problems protocol analysis (think aloud, talk aloud, eidetic reduction, retrospective reporting, behavioral descriptions, playback) Protocols Procedures, problem-solving strategy [Hudlicka, 1997], [Ericsson & Simon, 1984], Teachback Teachback Correction of misconceptions Critiquing Critiquing Evaluation of a

Page 18 of 28 problem solving strategy compared to alternatives role playing Role Playing Procedures, difficulties encountered due to role wizard of oz Simulation Procedures followed Simulations Simulation Problem solving strategies, procedures Problem analysis Simulation Procedures, rationale (like simulated interruption analysis) On-site observation Observation Procedure, problem solving strategies Problem Solving Strategy These methods attempt to determine how the expert makes their decisions. Table 19 lists methods that elicit a problem solving strategy. Table 19. Methods that Elicit Problem Solving Strategy Method Category Output Type Reference Interviewing (structured, unstructured, Interviewing Procedures followed, knowledge used [Hudlicka, 1997],

Page 19 of 28 semi-structured) Interruption Analysis Interviewing Procedures, problem-solving strategy, rationale [Hudlicka, 1997] Problem discussion Interview Solution strategies Tutorial interview Interview Whatever expert teaches! Uncertain information elicitation Interview Uncertainty about problems Critical incident strategy Case Study Complete plan, plus factors that influenced the plan. Forward scenario simulation Case Study Procedures followed, reasons behind them protocol analysis (think aloud, talk aloud, eidetic reduction, retrospective reporting, behavioral descriptions, playback) Protocols Procedures, problem-solving strategy [Hudlicka, 1997], [Ericsson & Simon, 1984], critiquing Critiquing Evaluation of a problem solving strategy compared to alternatives wizard of oz Simulation Procedures followed Simulations Simulation Problem solving strategies,

Page 20 of 28 procedures Problem analysis Simulation Procedures, rationale (like simulated interruption analysis) Reclassification Goal Related Evidence needed to prove that a decision was correct On-site observation Observation Procedure, problem solving strategies Goal ed Analysis (goalmeans network) Interview/Document Analysis Goal-means network [OTT, 1998], [Woods & Hollnagel, 1987] 20 questions 20 Questions Amount and type of information used to solve problems; how problem space is organized, or how expert has represented Task-relevant knowledge., Cloze experiments Model of decision-making rules and structures Goals/Subgoals These are methods that are concerned with extracting the goals and subgoals for performing the task. These methods are listed separately from procedures since ordering is not necessarily provided. Table 20 lists methods that elicit this information.

Page 21 of 28 Table 20. Methods that Elicit Goals/Subgoals Method Category Output Type Reference ARK (ACT-based representation of knowledge) (combination of methods) Interview Goal-subgoal network Includes production rules describing goal/subgoal relationship Task action mapping Interview Decision flow diagram (goals, subgoals, actions) [OTT, 1998], [Coury et al., 1991] Critical Decision Method Case Study Goals considered, options generated, situation assessment [Hudlicka, 1997], [Thordsen, 1991], [Klein et al., 1986] goal decomposition Goal Related Goals and subgoals Dividing the domain Goal Related How data is grouped to reach a goal Reclassification Goal Related Evidence needed to prove that a decision was correct Distinguishing goals Goal Related Minimal sets of discriminating features Goal ed Analysis (goalmeans network) Interview/Document Analysis Goal-means network [OTT, 1998], [Woods & Hollnagel, 1987]

Page 22 of 28 Classification These methods are used to classify entities within a domain. Figure 21 lists methods concerned with classification. Table 21. Methods that Elicit Classification of Domain Entities Method Category Output Type Reference Cognitive Structure Analysis (CSA) Interview Representational format of experts knowledge; content of the knowledge structure Data flow modeling Interview Data flow diagram (data items and data flow between them no sequence information) [OTT, 1998], [Gane & Sarson, 1977] Entity-relationship modeling Interview Entity relationship diagram (entities, attributes, and relationships) [OTT, 1998], [Swaffield & Knight, 1990] Entity life modeling Interview Entity life cycle diagram (entities and state changes) [OTT, 1998], [Swaffield & Knight, 1990] Object oriented modeling Interview Network of objects (types, attributes, relations) [OTT, 1998], [Riekert, 1991] Semantic nets Interview Semantic Net (inc. relationships between objects) [OTT, 1998], [Atkinson, 1990] Distinguishing goals Goal Related Minimal sets of discriminating features Decision analysis List Related Estimate of worth

Page 23 of 28 for all possible decisions for a task Discourse analysis (observation) Observation Taxonomy of tasks/subtasks or functions [OTT, 1998], [Belkin & Brooks, 1988] Collect artifacts of task performance Document Analysis How expert organizes or processes task information, how it is compiled to present to others Document analysis Document Analysis Conceptual graph [OTT, 1998], [Gordon et al., 1993] repertory grid Construct Elicitation Attributes (and entities if provided by subject) [Hudlicka, 1997], [Kelly, 1955] multi-dimensional scaling Construct Elicitation Attributes and relationships proximity scaling Construct Elicitation Attributes and relationships [Hudlicka, 1997] card sorting Sorting Hierarchical cluster diagram (classification) laddered grid Laddering A hierarchical map of the task domain [1], [Geiwitz, et Ranking augmented conceptual ranking Other Conceptual Ranking (ordering by value) [OTT, 1998], [Chignell & Peterson, 1988], [Kagel, 1986], [Whaley, 1979]

Page 24 of 28 Dependencies/Relationships Table 22 lists methods that obtain relationships between domain entities. Table 22. Methods that Elicit Relationships Method Category Output Type Reference Data flow modeling Interview Data flow diagram (data items and data flow between them no sequence information) [OTT, 1998], [Gane & Sarson, 1977] Entity-relationship modeling Interview Entity relationship diagram (entities, attributes, and relationships) [OTT, 1998], [Swaffield & Knight, 1990] Object oriented modeling Interview Network of objects (types, attributes, relations) [OTT, 1998], [Riekert, 1991] Semantic nets Interview Semantic Net (inc. relationships between objects) Questionnaire Interview Sequence of task actions, cause and effect relationships [OTT, 1998], [Atkinson, 1990] [OTT, 1998], [Bainbridge, 1979] Discourse analysis (observation) Observation Taxonomy of tasks/subtasks or functions [OTT, 1998], [Belkin & Brooks, 1988] multi-dimensional scaling Construct Elicitation Attributes and relationships Proximity scaling Construct Elicitation Attributes and relationships [Hudlicka, 1997] card sorting Sorting Hierarchical cluster diagram (classification) [1], [Geiwitz, et

Page 25 of 28 Laddered grid Laddering A hierarchical map of the task domain Evaluation Table 23 lists methods that are used for evaluation of prototypes or other types of KE session results. Table 23. Methods that Elicit Evaluations Method Category Output Type Reference teachback Teachback Correction of misconceptions critiquing Critiquing Evaluation of a problem solving strategy compared to alternatives System refinement Prototyping New test cases for a prototype system System examination Prototyping Experts opinion on prototype s rules and control structures System validation Prototyping Outside experts evaluation of cases solved by expert and protocol system Rapid prototyping Prototyping Evaluation of system/procedure [Diaper,

Page 26 of 28 Storyboarding Prototyping Prototype display design [OTT, 1998], [McNeese & Zaff, 1991] Decision analysis List Related Estimate of worth for all possible decisions for a task Ranking augmented conceptual ranking Other Conceptual Ranking (ordering by value) [OTT, 1998], [Chignell & Peterson, 1988], [Kagel, 1986], [Whaley, 1979] References Atkinson, G. (1990). Practical experience using an automated knowledge acquisition tool. Proceedings of the Second Annual Conference of the International Association of Knowledge Engineers, 87-97. Bainbridge, L. (1979). Verbal reports as evidence of the process operator's knowledge. International Journal of-man-machine Studies, 11, 411-436. Belkin, N. J., Brooks, H. M. (1988). Knowledge elicitation using discourse analysis. In B. Gaines and J. Boose (Eds.) Knowledge based systems, Vol. 1, pp 107-124. Academic Press Limited. Chignell, M. H., Peterson, J. G. (1988). Strategic issues in knowledge engineering. Human Factors, 30(4), 381-394. Coovert, M. D., Cannon-Bowers, J. A., & Salas, E. (1990). Applying mathematical modeling technology to the study of team training and performance. Paper presented at the 12th Annual Interservice/Industry Training Systems Conference, Orlando, FL, November. Cordingley, E. S. (1989). Knowledge elicitation techniques for knowledge-based systems. In D. Diaper (Ed.), Knowledge elicitation: Principles, techniques and applications. Chichester, England: Ellis Horwood Ltd. Coury, B. G., Motte, S., & Seiford, L. M. (1991). Capturing and representing decision processes in the design of an information system. Proceedings of the Human Factors Society 35th Annual Meeting, 1223-1227. Santa Monica, CA: Human Factors Society. Diaper, D. (Ed.). (1989). Knowledge elicitation: Principles, techniques and applications.

Page 27 of 28 Chicester, England: Ellis Horwood Ltd. Ericsson, K.A., Simon, H.A. (1984). Protocol Analysis: Verbal Reports as Data. Cambridge, MA: The MIT Press. Gane, C., Sarson, T. (1977). Structured Systems Analysis:--Tools and Techniques. Unpublished document! McDonnell Douglas Corporation. Geiwitz, J., Kornell, J., McCloskey, B. (1990). An Expert System for the Selection of Knowledge Acquisition Techniques. Technical Report 785-2, Contract No. DAAB07-89-C- A044. California, Anacapa Sciences. Gordon, S. E., Schmierer, K. A., & Gill, R. T. (1993). Conceptual graph analysis: Knowledge acquisition for instructional system design. Human Factors, 35, p. 459-481. Gowin, R., Novak, J.D. (1984). Learning how to learn. NY: Cambridge University Press. Hudlicka, E. (1997). Summary of Knowledge Elicitation Techniques for Requirements Analysis, Course Material for Human Computer Interaction, Worcester Polytechnic Institute. Hura, G. S. (1987). Petri net applications. IEEE Potentials, October, 25-28. Kagel, A. S. (1986). The unshuffle algorithm. Computer Language, 1(11), 61-66. Kelly, G. (1955). The Psychology of Personal Constructs. New York: Norton. Klein, G. A., Calderwood, R., Clinton-Cirocco, A. (1986). Rapid decision making on the fireground, Proceedings o fthe 30 th Annual Human Factors Society, 1, 576-580. Dayton, OH: Human Factors Society. McNeese, M. D., Zaff, B. S. (1991). Knowledge as design: A methodology for overcoming knowledge acquisition bottlenecks in intelligent interface design. Proceedings of the Human Factors Society 35th Annual Meeting, 1181-1185. Santa Monica, CA: Human Factors Society. OTT (1998), http://www.ott.navy.mil/2_2/2_2_6/, Task Analysis, Chief of Naval Operations' Office of Training Technology. Riekert, W. (1991). Knowledge acquisition as an object-oriented modeling process. In M. J. Tauber and D. Ackermann (Eds.) Mental models and human computer interactions, 373-381. Amsterdam: Elsevier Sciences Publishers B. V. Swaffield, G., Knight, B. (1990). Applying system analysis techniques to knowledge engineering. Expert Systems, 1, 82-93. Thordsen, M. (1991). A Comparison of Two Tools for Cognitive Task Analysis: Concept Mapping and the Critical Decision Method. Proceedings of the Human Factors Society 35 th Annual Meeting.

Page 28 of 28 Weingaertner, S. T., Lewis, A. H. (1988). Evaluation of decision aiding in submarine emergency decision making. In J. Ranta (Ed.) Analysis, Design, and Evaluation of Man- Machine Systems: Selected Papers from the 3rd IFAC/IEA/IFORS Conference, 1 95-201. Oxford, UK: Pergamon. Whaley, C. P. (1979). Collecting paired-comparison data with a sorting algorithm. Behavior Research Methods and Instrumentation, 11, 147-150. Woods, D. D., Hollnagel, E. (1987). Mapping cognitive demands in complex problemsolving worlds. International Journal of Man-Machine Studies, 26, 257-275.