Beyond Interaction Design: Beyond Human-Computer Interaction
Beyond Interaction Design: Beyond Human-Computer Interaction
Criticality of data quality as exemplified in two disasters
Information and Management
Sensitivity Analysis in Bayesian Networks
ECSQARU '95 Proceedings of the European Conference on Symbolic and Quantitative Approaches to Reasoning and Uncertainty
A review of explanation methods for Bayesian networks
The Knowledge Engineering Review
The effects of collaboration and system transparency on CIVE usage: an empirical study and model
Presence: Teleoperators and Virtual Environments - Special issue: Collaborative information visualization environments
The influence of agent reliability on trust in human-agent collaboration
ECCE '08 Proceedings of the 15th European conference on Cognitive ergonomics: the ergonomics of cool interaction
Revealing uncertainty for information visualization
Information Visualization
A model for types and levels of human interaction with automation
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Hi-index | 0.00 |
Threat evaluation (TE) is concerned with determining the intent, capability and opportunity of detected targets. To their aid, military operators use support systems that analyse incoming data and make inferences based on the active evaluation framework. Several interface and interaction guidelines have been proposed for the implementation of TE systems; however there is a lack of research regarding how to make these systems transparent to their operators. This paper presents the results from interviews conducted with TE operators focusing on the need for and possibilities of improving the transparency of TE systems through the visualization of uncertainty and the presentation of the system rationale.