Skip to main content

Modeling User Behaviors to Enable Context-Aware Proactive Decision Support

  • Chapter
  • First Online:

Part of the book series: Advances in Computer Vision and Pattern Recognition ((ACVPR))

Abstract

The problem of automatically recognizing a user’s operational context, the implications of its shifting properties, and reacting in a dynamic manner are at the core of mission intelligence and decision making. Environments such as the OZONE Widget Framework (http://www.owfgoss.org) (OWF) provide the foundation for capturing the objectives, actions, and activities of both the mission analyst and the decision maker. By utilizing a “context container” that envelops an OZONE Application, we hypothesize that both user action and intent can be used to characterize user context with respect to operational modality (strategic, tactical, opportunistic, or random). As the analyst moves from one operational modality to another, we propose that information visualization techniques should adapt and present data and analysis pertinent to the new modality and to the trend of the shift. As a system captures the analyst’s actions and decisions in response to the new visualizations, the context container has the opportunity to assess the analyst’s perception of the information value, risk, uncertainty, prioritization, projection, and insight with respect to the current context stage. This paper will describe a conceptual architecture for an adaptive work environment for inferring user behavior and interaction within the OZONE framework, in order to provide the decision maker with context relevant information. We then bridge from our more conceptual OWF discussion to specific examples describing the role of context in decision making. Our first concrete example demonstrates how the Web analytics of a user’s browsing behavior can be used to authenticate users. The second example briefly examines the role of context in cyber security. Our third example illustrates how to capture the behavior of expert analysts in exploratory data analysis, which coupled with a recommender system, advises domain experts of “standard” analytical operations in order to suggest operations novel to the domain, but consistent with analytical goals. Finally, our fourth example discusses the role of context in a supervisory control problem when managing multiple autonomous systems.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    https://noscript.net/.

  2. 2.

    http://www.diffbot.com.

  3. 3.

    https://www.csie.ntu.edu.tw/~cjlin/libsvm/.

  4. 4.

    https://www.djangoprojct.com.

  5. 5.

    https://www.python.org.

  6. 6.

    http://www.mongodb.org.

  7. 7.

    http://www.r-project.org.

  8. 8.

    https://code.djangoproject.com/wiki/AJAX.

  9. 9.

    http://www.mozilla.org/en-US/firefox/.

  10. 10.

    https://developers.google.com/chart/.

References

  1. F. Radlinski, M. Szummer, N. Craswell, Inferring query intent from reformulations and clicks, in Proceedings of the 19th International Conference on World Wide Web (ACM Press, 2010), pp. 1171–1172

    Google Scholar 

  2. P.H. Mohr, N. Ryan, J. Timmis, Capturing regular human activity through a learning context memory, in Proceedings of the 3rd International Workshop of Modelling and Retrieval of Context (MRC 2006) in Conjunction with AAAI-06 (2006), p. 6

    Google Scholar 

  3. P.H. Mohr, J. Timmis, N. Ryan, Immune inspired context memory, in Proceedings of the 1st International Workshop on Exploiting Context Histories in Smart Environments (2005), p. 4

    Google Scholar 

  4. M. Neal, Meta-stable memory in an artificial immune network, in Proceedings of the 2nd International e-Conference on Artificial Immune Systems (2003), pp. 229–241

    Google Scholar 

  5. V. Agrawal, G. Heredero, H. Penmetsa, A. Laha, L. Shastri, Activity context aware digital workspaces and consumer playspaces: manifesto and architecture, in AAAI Workshops (2013)

    Google Scholar 

  6. M. Banko, M.J. Cafarella, S. Soderland, M. Broadhead, O. Etzioni, Open information extraction from the web, in IJCAI (2007), pp. 2670–2676

    Google Scholar 

  7. R. Jain, EventWeb: developing a human-centered computing system. IEEE Comput. 41(2), 42–50 (2008)

    Article  Google Scholar 

  8. J. Hendler, Web 3.0 emerging. IEEE Comput. 42(1), 111–113 (2009)

    Article  Google Scholar 

  9. A. Fader, S. Soderland, O. Etzioni, Identifying relations for open information extraction. EMNLP 2011, 1535–1545 (2011)

    Google Scholar 

  10. U. Westermann, R. Jain, Toward a common event model for multimedia applications. IEEE Multimed. 14(1), 19–29 (2007)

    Article  Google Scholar 

  11. J. Hoxha, Cross-domain recommendations based on semantically-enhanced User Web Behavior. Ph.D. Dissertation, Karlsruher Institute (KIT), (2014)

    Google Scholar 

  12. H. Aarts, A. Dijksterhuis, Habits as knowledge structures: automaticity in goal-directed behavior. J. Pers. Soc. Psychol. 78(1), 53 (2000)

    Article  Google Scholar 

  13. S.M. Bellovin, Security problems in the tcp/ip protocol suite. ACM SIGCOMM Comput. Commun. Rev. 19(2), 32–48 (1989)

    Article  Google Scholar 

  14. W. Huba, B. Yuan, Y. Pan, S. Mishra, Towards a web tacking profiling algorithm, in Proceedings of IEEE International Conference on Technologies for Homeland Security (HST) (IEEE, 2013), pp. 12–17

    Google Scholar 

  15. J. Pang, B. Greenstein, R. Gummadi, S. Seshan, D. Wetherall, 802.11 user fingerprinting, in Proceedings of the 13th Annual ACM international Conference on Mobile Computing and Networking (ACM Press, 2007), pp. 99–110

    Google Scholar 

  16. E. Shi, Y. Niu, M. Jakobsson, R. Chow, Implicit authentication through learning user behavior. Inf. Secur. (Springer) 99–113 (2011)

    Google Scholar 

  17. P. Juola, M. Ryan, P. Brennan, J. Noecker Jr., A. Stolerman, R. Greenstadt, Keyboard behavior based authentication for security (IT Professional, 2013), p. 1

    Google Scholar 

  18. M. Abramson, D. Aha, What’s in a URL? Genre classification from URLs, in AAAI Workshop on Intelligent Techniques for Web Personalization and Recommendation (ITWP) (2013)

    Google Scholar 

  19. M. Abramson, D. Aha, User authentication from web browsing behavior. Florida Artif. Intell. Soc. (FLAIRS-26), 268–273 (2013)

    Google Scholar 

  20. L. Rabiner, A tutorial on hidden Markov models and selected applications in speech recognition, in Proceedings of the IEEE (1989), pp. 257–286

    Google Scholar 

  21. M. Abramson, Learning temporal user profiles of web browsing behavior, in 6th ASE International Conference on Social Computing (SocialCom ’14) (2014)

    Google Scholar 

  22. J.A.P. Lafferty, A. McCallum, F. Pereira, Conditional random fields: probabilistic models for segmenting and labeling sequence data, in International Conference on Machine Learning (ICML) (2001)

    Google Scholar 

  23. D. Bell, L. LaPadula, Secure Computer Systems: Mathematical Foundations (MITRE Corporation, 1973)

    Google Scholar 

  24. D. Bell, Looking back at the Bell-LaPadula model, in Proceedings of the 21st Annual Computer Security Applications Conference (1976), pp. 337–351

    Google Scholar 

  25. DoD Trusted Computer System Evaluation Critieria, 5200.28-STD (1983/1985)

    Google Scholar 

  26. C. Shannon, A mathematical theory of communication. Bell Syst. Tech. J. 27(3), 379–423 (1948)

    Article  MathSciNet  MATH  Google Scholar 

  27. I. Moskowitz, M. Kang, Covert channels here to stay?, in Proceedings of the Ninth Annual Conference on Computer Assurance, COMPASS’94 (1994), pp. 235–243

    Google Scholar 

  28. I. Moskowitz, G. Longdon, L. Chang, A new paradign hidden in steganography, in Proceedings of 2000 Workshop of New Security Paradigns (ACM Press, 2000), pp. 41–50

    Google Scholar 

  29. D. Kahneman, A. Tversky, On the psychology of prediction. Psychol. Rev. 80(4), 237–251 (1973)

    Article  Google Scholar 

  30. T. Mahmood, F. Ricci, Improving recommender systems with adaptive conversational strategies, in Hypertext (ACM Press, 2000), pp. 73–82

    Google Scholar 

  31. M. Goebel, L. Gruenwald, A survey of data mining and knowledge discovery software tools. SIGKDD Explor. Newsl. 1(1), 20–33 (1999)

    Article  Google Scholar 

  32. J.W. Tukey, Exploratory data analysis (Addison-Wesley, Boston, 1977)

    Google Scholar 

  33. J. Herlocker, J. Konstan, L. Terveen, J. Riedl, Evaluating collaborative filtering recommender systems. ACM Trans. Inf. Syst. 22(1), 5–53 (2004)

    Article  Google Scholar 

  34. H. Simon, The new science of management decision (Prentice Hall PTR, 1977)

    Google Scholar 

  35. A. Endert, P. Fiaux, C. North, Semantic interaction for sensemaking: inferring analytical reasoning for model steering. IEEE Trans. Visual Comput. Graphics 18(12), 2879–2888 (2012)

    Article  Google Scholar 

  36. G. Petasis, F. Vichot, F. Wolinski, G. Paliouras, V. Karkaletsis, C. Spyropoulos, Using machine learning to maintain rule-based named-entity recognition and classification systems, in 39th Conference of Association for Computational Linguistics, pp. 418–425

    Google Scholar 

  37. S. Chan, P. Treleaven, L. Capra, Continuous hyperparameter optimization for large-scale recommender systems, in IEEE International Conference on Big Data (2013), 350–358

    Google Scholar 

  38. J. Bergstra, Y. Bengio, Random search for hyperparameter optimization. J. Mach. Learn. Res. 13(1), 281–305 (2012)

    MathSciNet  MATH  Google Scholar 

  39. G. Adomavicius, D. Jannach, Special issue on context-aware recommender systems. User Model User-Adap. Inter. 24(1–2), 1–5 (2014)

    Google Scholar 

  40. S.-M. Choi, S.-K. Ko, Y.-S. Han, A movie recommendation algorithm based on genre correlations. Expert Syst. Appl. 39(9), 8079–8085 (2012)

    Article  Google Scholar 

  41. M. Livingston, J. Decker, Z. Ai, Evaluation of multivariate visualization on a multivariate task. IEEE Trans. Visual. Comput. Graph. 18(12) (2012, Dec)

    Google Scholar 

  42. R. Parasuraman, V. Riley, Humans and automation: use, misuse, disuse, abuse. Hum. Factors 39, 230–253 (1997). doi:10.1518/001872097778543886

    Google Scholar 

  43. J. Gertler, US unmanned aerial systems (Library Of Congress Washington DC Congressional Research Service, 2012)

    Google Scholar 

  44. K. Williams, A summary of unmanned aircraft accident/incident data: human factors implications (No. DOT/FAA/AM-04/24) (Federal Aviation Administration, Oklahoma City, OK, 2004)

    Google Scholar 

  45. Department of Defense, FY2009–2034 unmanned systems integrated roadmap (2009)

    Google Scholar 

  46. Office of Naval Research, Naval S&T strategic plan (Arlington, 2011)

    Google Scholar 

  47. J. Park, W. Jung, A study on the revision of the TACOM measure. IEEE Trans. Nucl. Sci. 54(6), 2666–2676 (2007)

    Article  Google Scholar 

  48. J. Beatty, B. Lucero-Wagoner, The pupillary system, in Handbook of Psychophysiology, ed. by J.T. Cacioppo, L.G. Tassinary, G.G. Berntson. 2 ed. (Cambridge University Press, 2000), pp. 142–162

    Google Scholar 

  49. C. Sibley, J. Coyne, C. Baldwin, Pupil dilation as an index of learning, in Proceedings of the Human Factors and Ergonomics Society Annual Meeting (Human Factors and Ergonomics Society, Las Vegas, 2011), pp. 237–241

    Google Scholar 

  50. N. Hjortskov, D. Rissén, A. Blangsted, N. Fallentin, U. Lundberg, K. Søgaard, The effect of mental stress on heart rate variability and blood pressure during computer work. Eur. J. Appl. Physiol. 92, 84–89 (2004). doi:10.1007/s00421-004-1055-z

  51. R. Ratwani, J. Mccurry, J. Trafton, Single operator, multiple robots: an eye movement based theoretic model of operator situation awareness, in Proceedings of the 5th ACM/IEEE International Conference on Human-Robot Interaction (IEEE, Osaka, Japan, 2010), pp. 235–242

    Google Scholar 

  52. R. Ratwani, J. McCurry, J. Trafton, Predicting postcompletion errors using eye movements, in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (ACM Press, 2008), pp. 539–542

    Google Scholar 

  53. M.L. Cummings, C.E. Nehme, Modeling the impact of workload in network centric supervisory control settings, in Neurocognitive and Physiological Factors During High-Tempo Operations (Ashgate Publishing Ltd, 2010), pp. 23–39

    Google Scholar 

  54. E. Blasch, S. Plano, Proactive decision fusion for site security, in International Conference on Information Fusion (2005)

    Google Scholar 

  55. http://www.dlib.org/dlib/september07/wolpers/09wolpers.html. Retrieved on 1 Nov 2013

  56. A. Rath, D. Devaurs, S. Lindstaedt, UICO: an ontology-based user interaction context model for automatic task detection on the computer desktop, in CIAO ’09, Proceedings of the 1st Workshop on Context, Information and Ontologies (ACM Press, 2009), p. 10

    Google Scholar 

Download references

Acknowledgment

We appreciate the efforts of Ms. Linda McGibbon in the preparation of this chapter. Her efforts are always beyond the call of duty.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Benjamin Newsom .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland (outside the USA)

About this chapter

Cite this chapter

Newsom, B. et al. (2016). Modeling User Behaviors to Enable Context-Aware Proactive Decision Support. In: Snidaro, L., García, J., Llinas, J., Blasch, E. (eds) Context-Enhanced Information Fusion. Advances in Computer Vision and Pattern Recognition. Springer, Cham. https://doi.org/10.1007/978-3-319-28971-7_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-28971-7_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-28969-4

  • Online ISBN: 978-3-319-28971-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics