Human Trust in Networks. Dr. Liz Bowman ARL SLAD 14 th ICCRTS June 2009

Similar documents
Data Fusion Models in WSNs: Comparison and Analysis

Visual CP Representation of Knowledge

Commanding Officer Decision Superiority: The Role of Technology and the Decision Maker

Australian Journal of Basic and Applied Sciences

VIEW: An Assessment of Problem Solving Style

On the Combined Behavior of Autonomous Resource Management Agents

Alpha provides an overall measure of the internal reliability of the test. The Coefficient Alphas for the STEP are:

15 th ICCRTS THE EVOLUTION OF C2. Suggested Topics: Experimentation and Analysis; Modeling and Simulation; C2 Architectures and Technologies

Intelligent Agent Technology in Command and Control Environment

Circuit Simulators: A Revolutionary E-Learning Platform

A Note on Structuring Employability Skills for Accounting Students

The open source development model has unique characteristics that make it in some

ACBSP Related Standards: #3 Student and Stakeholder Focus #4 Measurement and Analysis of Student Learning and Performance

EECS 571 PRINCIPLES OF REAL-TIME COMPUTING Fall 10. Instructor: Kang G. Shin, 4605 CSE, ;

SYSTEM ENTITY STRUCTUURE ONTOLOGICAL DATA FUSION PROCESS INTEGRAGTED WITH C2 SYSTEMS

19 th ICCRTS. Modelling of Command and Control Agility

On Human Computer Interaction, HCI. Dr. Saif al Zahir Electrical and Computer Engineering Department UBC

GROUP COMPOSITION IN THE NAVIGATION SIMULATOR A PILOT STUDY Magnus Boström (Kalmar Maritime Academy, Sweden)

A GENERIC SPLIT PROCESS MODEL FOR ASSET MANAGEMENT DECISION-MAKING

Towards a Collaboration Framework for Selection of ICT Tools

5.7 Course Descriptions

Coordination Challenges in Global Software Development

Ericsson Wallet Platform (EWP) 3.0 Training Programs. Catalog of Course Descriptions

ENEE 302h: Digital Electronics, Fall 2005 Prof. Bruce Jacob

On the Design of Group Decision Processes for Electronic Meeting Rooms

Scenario Design for Training Systems in Crisis Management: Training Resilience Capabilities

The Enterprise Knowledge Portal: The Concept

The Dynamics of Social Learning in Distance Education

CNS 18 21th Communications and Networking Simulation Symposium

Use and Adaptation of Open Source Software for Capacity Building to Strengthen Health Research in Low- and Middle-Income Countries

Application of Virtual Instruments (VIs) for an enhanced learning environment

STUDENT SATISFACTION IN PROFESSIONAL EDUCATION IN GWALIOR

Observing Teachers: The Mathematics Pedagogy of Quebec Francophone and Anglophone Teachers

Greek Teachers Attitudes toward the Inclusion of Students with Special Educational Needs

VOL. 3, NO. 5, May 2012 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved.

CHAPTER V: CONCLUSIONS, CONTRIBUTIONS, AND FUTURE RESEARCH

Oklahoma State University Policy and Procedures

LEADERSHIP AND COMMUNICATION SKILLS

THEORY OF PLANNED BEHAVIOR MODEL IN ELECTRONIC LEARNING: A PILOT STUDY

Focus on. Learning THE ACCREDITATION MANUAL 2013 WASC EDITION

VOL VISION 2020 STRATEGIC PLAN IMPLEMENTATION

The Art of War for Software Project Management

Module 12. Machine Learning. Version 2 CSE IIT, Kharagpur

Requirements-Gathering Collaborative Networks in Distributed Software Projects

A Model to Detect Problems on Scrum-based Software Development Projects

Reduce the Failure Rate of the Screwing Process with Six Sigma Approach

On-Line Data Analytics

Learning Objectives by Course Matrix Objectives Course # Course Name Psyc Know ledge

LEGO MINDSTORMS Education EV3 Coding Activities

Overcoming the Tyranny of Distance in 21 st Century Research AARNet/Pacific Wave. Overcoming the Tyranny of Distance in 21 st Century Research

Instructor: Mario D. Garrett, Ph.D. Phone: Office: Hepner Hall (HH) 100

Fragment Analysis and Test Case Generation using F- Measure for Adaptive Random Testing and Partitioned Block based Adaptive Random Testing

InTraServ. Dissemination Plan INFORMATION SOCIETY TECHNOLOGIES (IST) PROGRAMME. Intelligent Training Service for Management Training in SMEs

Learning in the digital age

Seminar - Organic Computing

Using Safety Culture to Drive Habitual Excellence. Objectives

Human Factors Engineering Design and Evaluation Checklist

LABORATORY : A PROJECT-BASED LEARNING EXAMPLE ON POWER ELECTRONICS

The effects of a scientifically-based team resource management intervention for fire service teams

Test Effort Estimation Using Neural Network

Knowledge Synthesis and Integration: Changing Models, Changing Practices

Deploying Agile Practices in Organizations: A Case Study

OCR for Arabic using SIFT Descriptors With Online Failure Prediction

Social Media Journalism J336F Unique Spring 2016

A Reinforcement Learning Variant for Control Scheduling

Strategic Goals, Objectives, Strategies and Measures

A Coding System for Dynamic Topic Analysis: A Computer-Mediated Discourse Analysis Technique

Essentials of Ability Testing. Joni Lakin Assistant Professor Educational Foundations, Leadership, and Technology

UNDERSTANDING DECISION-MAKING IN RUGBY By. Dave Hadfield Sport Psychologist & Coaching Consultant Wellington and Hurricanes Rugby.

Software Security: Integrating Secure Software Engineering in Graduate Computer Science Curriculum

Size Matters: How Big Should a Military Design Team Be?

Motivation to e-learn within organizational settings: What is it and how could it be measured?

Malicious User Suppression for Cooperative Spectrum Sensing in Cognitive Radio Networks using Dixon s Outlier Detection Method

A BOOK IN A SLIDESHOW. The Dragonfly Effect JENNIFER AAKER & ANDY SMITH

teacher, peer, or school) on each page, and a package of stickers on which

On-the-Fly Customization of Automated Essay Scoring

Iep Data Collection Templates

VIA ACTION. A Primer for I/O Psychologists. Robert B. Kaiser

AFRL-HE-AZ-TR Acquisition and Retention of Team Coordination in Command and-control

MSE 5301, Interagency Disaster Management Course Syllabus. Course Description. Prerequisites. Course Textbook. Course Learning Objectives

Operational Knowledge Management: a way to manage competence

ASSESSMENT OF STUDENT LEARNING OUTCOMES WITHIN ACADEMIC PROGRAMS AT WEST CHESTER UNIVERSITY

Reducing Features to Improve Bug Prediction

Experiments with SMS Translation and Stochastic Gradient Descent in Spanish Text Author Profiling

Institutionen för datavetenskap. Hardware test equipment utilization measurement

Empirical Software Evolvability Code Smells and Human Evaluations

Telekooperation Seminar

COMMUNITY ENGAGEMENT

SYLLABUS Rochester Institute of Technology College of Liberal Arts, Department of Psychology Fall Quarter, 2007

AC : DESIGNING AN UNDERGRADUATE ROBOTICS ENGINEERING CURRICULUM: UNIFIED ROBOTICS I AND II

A Game-based Assessment of Children s Choices to Seek Feedback and to Revise

Causal Relationships between Perceived Enjoyment and Perceived Ease of Use: An Alternative Approach 1

FUZZY EXPERT. Dr. Kasim M. Al-Aubidy. Philadelphia University. Computer Eng. Dept February 2002 University of Damascus-Syria

Empowering Students Learning Achievement Through Project-Based Learning As Perceived By Electrical Instructors And Students

San José State University Department of Marketing and Decision Sciences BUS 90-06/ Business Statistics Spring 2017 January 26 to May 16, 2017

Emergency Management Games and Test Case Utility:

An Automated Data Fusion Process for an Air Defense Scenario

PRODUCT COMPLEXITY: A NEW MODELLING COURSE IN THE INDUSTRIAL DESIGN PROGRAM AT THE UNIVERSITY OF TWENTE

Applying Fuzzy Rule-Based System on FMEA to Assess the Risks on Project-Based Software Engineering Education

Universidad EAFIT- Todos los derechos reservados

Transcription:

Human Trust in Networks Dr. Liz Bowman ARL SLAD 14 th ICCRTS June 2009

Trust and Tactical Networks The devolution of the network to the tactical echelon makes the implementation of mobile networking problematic (Taylor, 2005). Conner (2005) notes presence of a digital divide between operational and tactical commands, a result of great distances and the vast amount of data attempting to be shared. Trust: Facilitates cooperative team behavior, exchange of resources and serves to reduce uncertainty (Lee & See, 2004). Predictor of system use, appropriate reliance on automation, and strategies for system use (Atoyan, Duquet & Robert, 2006; Jian, Bisantz & Drury, 2000; Corritore, Kracher & Wiedenbeck, 2003; Parasuraman, Sheridan & Wickens, 2000). Is not a stable attribute but is determined by the situation in which the trust actor and the object of trust exist (Corritore et al. (2003). The introduction of new technologies leads to novel forms of interactions between users and technologies that require trust (Riegelsberger et al. (2005).

How do users conceptualize the Network? Quality of information transfer in the network is a function of actors, channels, context, and information (Desouza, Roy, and Lin, 2008). Social domain: role and relationship ; Cognitive domain: belief and goal ; Information domain: operational nodes, data, and links ; Physical domain: objects and energy (Uruguay et al.,2008).

How is trust impacted at the tactical level by collaboration? Feedback loops with reciprocal resource commitments seem to provide greater trust and commitment in crisis response teams (Hudgens & Bordetsky,2008). Collaborative tools that can synthesize the efforts of a large group can increase trust in the divergence, convergence and evaluation stages of teamwork (Kruse, Helquist & Adkins, 2008). Personal face to face relationships are the foundation for trustful collaboration that cannot be reproduced by technological interconnections (Warne, 2008). Collaboration must account for the disadvantaged users who have limited bandwidth or intermittent connectivity; collaboration tools will need to take into account these networked nodes (Salamacha and Teates,2008)

How does human trust in networks develop? Operational trust (Blatt, 2004): the level of trust required by team members in order to accomplish a task Ad hoc groups build interpersonal trust through transfer; transfer relates to perception of organizational legitimacy, this provides starting capital of trust, but this trust is fragile if members have different perspectives (Ekman and Uhr, 2008)

Exploratory Study Goals Obtain an empirical and analytical understanding of human trust in a tactical network How do humans perceive the network? What are the network performance characteristics that are most relevant to human performance Explore how MANET performance impacts tactical decision making Information flow? Situational Awareness? Investigate the human impact on network performance Friendly: over/under use of applications? Overloading? Enemy: Denial/Delay of service, insertion of false information Long term goal: Correlate physical network metrics to human performance metrics such as trust, situational awareness, etc.

Examples of Network Metrics Variables Traffic Profiles Parametric loading Primary Metrics Connectivity Offered Load (measured) QoS prioritization with background traffic Mobility Packet Completion Rate Packet Latency Packet Jitter Offered Load Point to Point & Multi Node Static simple LOS & heavy foliation Mobile racetrack through open & foliated Vehicular + Dismount (3+5 node network) Packet Size Window Size Data Dissemination Multicast Group Config BFT Staleness Unicast Full Recon Platoon (4+15 node network) Completion Rate Recon Platoon Ground Truth Picture SRW-F1 100% UAV down for refueling UAV on station 90% 80% UAV back on station SUGV UAV-C1 UGS 70% 60% All Sensors 50% Dismount Only UAV Only UAV-C1 40% 30% SUGV 20% 10% 20:20 20:10 20:00 19:50 19:40 19:30 19:20 19:10 19:00 18:50 18:40 18:30 18:20 18:10 18:00 17:50 17:40 17:30 17:20 17:10 0% 17:00 Traffic Composition SUGV ARV-RSTA

Impact of Network Performance on Humans Delays / dropped messages: fail to alert Soldiers to enemy detections by sensors Node drop off: loss of comms, low SA Low bandwidth: images of enemy detections are delayed/lost Latency: blue position reports don t show the current force locations Loss of network connections: isolates dismounted and vehicle based Soldiers from comms

Procedures 15 q. Trust in Network Survey administered daily at end of mission Principal Components Analysis used to determine factor structure of survey Repeated Measures Analysis of Variance conducted to examine differences between two platoons

Principal Components Analysis Results Variance Explained: Depend: 39.6% Reliable: 18.05% Comms: 10.95% Access: 8.51% Total: 77.12% Rotated Component Matrix(a) Component Depend Reliable Comms Access Access.085.312.089.786 Received.074.240.844.004 Send.012.571.643.036 Comms.320.184.587.210 Open.107.005.045.857 Resend.151.604.561.138 Support.124.865.250.074 Reliable.253.837.172.161 Services.237.843.223.186 Secure.910.055.076.170 Integrity.889.014.018.146 Depend.877.107.254.105 Reliable.790.284.318.268 Trust.765.397.141.069 Familiar.585.245.151.468 Extraction Method: Principal Component Analysis. Rotation Method: Varimax with Kaiser Normalization. a Rotation converged in 6 iterations.

Repeated Measures Analysis of Variance Limitations Unexpected technology performance between platoons Information Warfare attacks on one platoon Significant difference between first/last day Wilk s λ F (4,16) = 4.98, p =.008 Platoons differed on factor of dependability, Wilk s λ F (1,19) = 7.58, p =.013 Ratings declined for both platoons during the experiment SO platoon the mean score declined from 4.20 to 3.56 FCS platoon mean score declined from 2.76 to 2.21

Conclusions Valuable first step in documenting human trust in networks Need to improve survey tool for parsimony and explanation of variance Consider survey administration; shorter tool at more frequent intervals is recommended to capture network fluctuations

Backup Slides

References Atoyan, H., Duquet, J R., & Robert, J M. (2006). Trust in new decision aid systems. In Jean Marc Robert and Bertrand David (Eds.): Proceedings of the 18th International Conference of the Association Francophone d'interaction Homme Machine, Montreal, Quebec, Canada, 18 21 April 2006. ACM International Conference Proceeding Series 133 ACM 2006, ISBN 1 59593 350 6, [On line] Available: http://www.informatik.uni trier.de/~ley/db/conf/ihm/ihm2006.html#atoyandr06 p. 115 122. Blatt, N. (2004). Operational Trust: A new look at the Human Requirement in Network Centric Warfare. Proceedings of the 9th International Command and Control Research and Technology Symposium, San Diego, 15 17 June, 2004 Conner, W. D. (2005). Understanding First in the Contemporary Operational Environment. Ft. Leavenworth, KS: School of Advanced Military Studies, US Army Command and General Staff College. Corritore, C. L., Kracher, B. & Wiedenbeck, S. (2003). On line trust: Concepts, eveolving themes, a model. International Journal of Human Computer Studies, 58, 737 758. Desouza, K. C., Roy, S. & Lin, Y. (2008). Performance Measures for Edge Organizations: A Preliminary Report. Proceedings of the 13th International Command and Control Research Technology Symposium, Seattle, Washington, June 17 19 2008, Washington, D.C: CCRP. Ekman, O. & Uhr, C. (2008). Crisis specific social networks: The interplay between organizational legitimacy and personal trust. Proceedings of the 13th International Command and Control Research Technology Symposium, Seattle, Washington, June 17 19 2008, Washington, D.C: CCRP. Hudgens, B. J. & Bordetsky, A. (2008). Feedback Models for Collaboration and Trust in Crisis Response Networks. Proceedings of the 13th International Command and Control Research Technology Symposium, Seattle, Washington, June 17 19 2008, Washington, D.C: CCRP. Jian, J. Y., Bisantz, A. M., and Drury, C. G., 2000, Foundations for an empirically determined scale of trust in automated systems, International Journal of Cognitive Ergonomics, 1(4), 53 71. Kruse, J., Helquist, J. & Adkins, M. (2008). Large Scale Collaboration for Ill Structured Problems. Proceedings of the 13th International Command and Control Research Technology Symposium, Seattle, Washington, June 17 19 2008, Washington, D.C: CCRP. Lee, J. D. & See, K. A. (2004). Trust in automation: designing for appropriate reliance. Human Factors, vol. 46, pp 50 80. Parasuraman, R., Sheridan, T. B., & Wickens, C. D. (2000). A model for types and levels of human interaction with automation. IEEE Tran. Syst. Man. Cybern. A. Syst. Hum., vol 30, pp 286 297. Riegelsberger, J., Sasse, M. A. & McCarthy, J. D. (2005). The mechanics of trust: A framework for research and design. International Journal of Human Computer Studies, vol 62 pp 381 422. Salamacha, C. O. & Teates, H. B. (2008). A Framework for Effective, Interoperable Collaboration. Proceedings of the 13th International Command and Control Research Technology Symposium, Seattle, Washington, June 17 19 2008, Washington, D.C: CCRP. Taylor, C. D. (2005). The transformation of reconnaissance: Who will fight for information on the future battlefield? Fort Leavenworth, KS: School of Advanced Military Studies, U.S. Army Command and General Staff College.

Trust in Network Survey 1. I was able to access services on my display 2. I am confident that I received all the communications meant for me. 3. I was able to send communications. 4. I could communicate with others in my platoon. 5. I was able to open sensor images on my display with no delays. 6. People asked me to resend images or messages. 7. The network s services supported the mission. 8. The network services were reliable. 9. I am confident in the services provided by the network. 10. The network is secure. 11. The network had integrity. 12. The network is dependable. 13. The network is reliable. 14. I can trust the network. 15. I am familiar with the network. adapted from Jian, J. Y., Bisantz, A. M., and Drury, C. G., 2000, Foundations for an empirically determined scale of trust in automated systems, International Journal of Cognitive Ergonomics, 1(4), 53 71.