Abstract
The problem of automatically recognizing a user’s operational context, the implications of its shifting properties, and reacting in a dynamic manner are at the core of mission intelligence and decision making. Environments such as the OZONE Widget Framework (http://www.owfgoss.org) (OWF) provide the foundation for capturing the objectives, actions, and activities of both the mission analyst and the decision maker. By utilizing a “context container” that envelops an OZONE Application, we hypothesize that both user action and intent can be used to characterize user context with respect to operational modality (strategic, tactical, opportunistic, or random). As the analyst moves from one operational modality to another, we propose that information visualization techniques should adapt and present data and analysis pertinent to the new modality and to the trend of the shift. As a system captures the analyst’s actions and decisions in response to the new visualizations, the context container has the opportunity to assess the analyst’s perception of the information value, risk, uncertainty, prioritization, projection, and insight with respect to the current context stage. This paper will describe a conceptual architecture for an adaptive work environment for inferring user behavior and interaction within the OZONE framework, in order to provide the decision maker with context relevant information. We then bridge from our more conceptual OWF discussion to specific examples describing the role of context in decision making. Our first concrete example demonstrates how the Web analytics of a user’s browsing behavior can be used to authenticate users. The second example briefly examines the role of context in cyber security. Our third example illustrates how to capture the behavior of expert analysts in exploratory data analysis, which coupled with a recommender system, advises domain experts of “standard” analytical operations in order to suggest operations novel to the domain, but consistent with analytical goals. Finally, our fourth example discusses the role of context in a supervisory control problem when managing multiple autonomous systems.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
- 2.
- 3.
- 4.
- 5.
- 6.
- 7.
- 8.
- 9.
- 10.
References
F. Radlinski, M. Szummer, N. Craswell, Inferring query intent from reformulations and clicks, in Proceedings of the 19th International Conference on World Wide Web (ACM Press, 2010), pp. 1171–1172
P.H. Mohr, N. Ryan, J. Timmis, Capturing regular human activity through a learning context memory, in Proceedings of the 3rd International Workshop of Modelling and Retrieval of Context (MRC 2006) in Conjunction with AAAI-06 (2006), p. 6
P.H. Mohr, J. Timmis, N. Ryan, Immune inspired context memory, in Proceedings of the 1st International Workshop on Exploiting Context Histories in Smart Environments (2005), p. 4
M. Neal, Meta-stable memory in an artificial immune network, in Proceedings of the 2nd International e-Conference on Artificial Immune Systems (2003), pp. 229–241
V. Agrawal, G. Heredero, H. Penmetsa, A. Laha, L. Shastri, Activity context aware digital workspaces and consumer playspaces: manifesto and architecture, in AAAI Workshops (2013)
M. Banko, M.J. Cafarella, S. Soderland, M. Broadhead, O. Etzioni, Open information extraction from the web, in IJCAI (2007), pp. 2670–2676
R. Jain, EventWeb: developing a human-centered computing system. IEEE Comput. 41(2), 42–50 (2008)
J. Hendler, Web 3.0 emerging. IEEE Comput. 42(1), 111–113 (2009)
A. Fader, S. Soderland, O. Etzioni, Identifying relations for open information extraction. EMNLP 2011, 1535–1545 (2011)
U. Westermann, R. Jain, Toward a common event model for multimedia applications. IEEE Multimed. 14(1), 19–29 (2007)
J. Hoxha, Cross-domain recommendations based on semantically-enhanced User Web Behavior. Ph.D. Dissertation, Karlsruher Institute (KIT), (2014)
H. Aarts, A. Dijksterhuis, Habits as knowledge structures: automaticity in goal-directed behavior. J. Pers. Soc. Psychol. 78(1), 53 (2000)
S.M. Bellovin, Security problems in the tcp/ip protocol suite. ACM SIGCOMM Comput. Commun. Rev. 19(2), 32–48 (1989)
W. Huba, B. Yuan, Y. Pan, S. Mishra, Towards a web tacking profiling algorithm, in Proceedings of IEEE International Conference on Technologies for Homeland Security (HST) (IEEE, 2013), pp. 12–17
J. Pang, B. Greenstein, R. Gummadi, S. Seshan, D. Wetherall, 802.11 user fingerprinting, in Proceedings of the 13th Annual ACM international Conference on Mobile Computing and Networking (ACM Press, 2007), pp. 99–110
E. Shi, Y. Niu, M. Jakobsson, R. Chow, Implicit authentication through learning user behavior. Inf. Secur. (Springer) 99–113 (2011)
P. Juola, M. Ryan, P. Brennan, J. Noecker Jr., A. Stolerman, R. Greenstadt, Keyboard behavior based authentication for security (IT Professional, 2013), p. 1
M. Abramson, D. Aha, What’s in a URL? Genre classification from URLs, in AAAI Workshop on Intelligent Techniques for Web Personalization and Recommendation (ITWP) (2013)
M. Abramson, D. Aha, User authentication from web browsing behavior. Florida Artif. Intell. Soc. (FLAIRS-26), 268–273 (2013)
L. Rabiner, A tutorial on hidden Markov models and selected applications in speech recognition, in Proceedings of the IEEE (1989), pp. 257–286
M. Abramson, Learning temporal user profiles of web browsing behavior, in 6th ASE International Conference on Social Computing (SocialCom ’14) (2014)
J.A.P. Lafferty, A. McCallum, F. Pereira, Conditional random fields: probabilistic models for segmenting and labeling sequence data, in International Conference on Machine Learning (ICML) (2001)
D. Bell, L. LaPadula, Secure Computer Systems: Mathematical Foundations (MITRE Corporation, 1973)
D. Bell, Looking back at the Bell-LaPadula model, in Proceedings of the 21st Annual Computer Security Applications Conference (1976), pp. 337–351
DoD Trusted Computer System Evaluation Critieria, 5200.28-STD (1983/1985)
C. Shannon, A mathematical theory of communication. Bell Syst. Tech. J. 27(3), 379–423 (1948)
I. Moskowitz, M. Kang, Covert channels here to stay?, in Proceedings of the Ninth Annual Conference on Computer Assurance, COMPASS’94 (1994), pp. 235–243
I. Moskowitz, G. Longdon, L. Chang, A new paradign hidden in steganography, in Proceedings of 2000 Workshop of New Security Paradigns (ACM Press, 2000), pp. 41–50
D. Kahneman, A. Tversky, On the psychology of prediction. Psychol. Rev. 80(4), 237–251 (1973)
T. Mahmood, F. Ricci, Improving recommender systems with adaptive conversational strategies, in Hypertext (ACM Press, 2000), pp. 73–82
M. Goebel, L. Gruenwald, A survey of data mining and knowledge discovery software tools. SIGKDD Explor. Newsl. 1(1), 20–33 (1999)
J.W. Tukey, Exploratory data analysis (Addison-Wesley, Boston, 1977)
J. Herlocker, J. Konstan, L. Terveen, J. Riedl, Evaluating collaborative filtering recommender systems. ACM Trans. Inf. Syst. 22(1), 5–53 (2004)
H. Simon, The new science of management decision (Prentice Hall PTR, 1977)
A. Endert, P. Fiaux, C. North, Semantic interaction for sensemaking: inferring analytical reasoning for model steering. IEEE Trans. Visual Comput. Graphics 18(12), 2879–2888 (2012)
G. Petasis, F. Vichot, F. Wolinski, G. Paliouras, V. Karkaletsis, C. Spyropoulos, Using machine learning to maintain rule-based named-entity recognition and classification systems, in 39th Conference of Association for Computational Linguistics, pp. 418–425
S. Chan, P. Treleaven, L. Capra, Continuous hyperparameter optimization for large-scale recommender systems, in IEEE International Conference on Big Data (2013), 350–358
J. Bergstra, Y. Bengio, Random search for hyperparameter optimization. J. Mach. Learn. Res. 13(1), 281–305 (2012)
G. Adomavicius, D. Jannach, Special issue on context-aware recommender systems. User Model User-Adap. Inter. 24(1–2), 1–5 (2014)
S.-M. Choi, S.-K. Ko, Y.-S. Han, A movie recommendation algorithm based on genre correlations. Expert Syst. Appl. 39(9), 8079–8085 (2012)
M. Livingston, J. Decker, Z. Ai, Evaluation of multivariate visualization on a multivariate task. IEEE Trans. Visual. Comput. Graph. 18(12) (2012, Dec)
R. Parasuraman, V. Riley, Humans and automation: use, misuse, disuse, abuse. Hum. Factors 39, 230–253 (1997). doi:10.1518/001872097778543886
J. Gertler, US unmanned aerial systems (Library Of Congress Washington DC Congressional Research Service, 2012)
K. Williams, A summary of unmanned aircraft accident/incident data: human factors implications (No. DOT/FAA/AM-04/24) (Federal Aviation Administration, Oklahoma City, OK, 2004)
Department of Defense, FY2009–2034 unmanned systems integrated roadmap (2009)
Office of Naval Research, Naval S&T strategic plan (Arlington, 2011)
J. Park, W. Jung, A study on the revision of the TACOM measure. IEEE Trans. Nucl. Sci. 54(6), 2666–2676 (2007)
J. Beatty, B. Lucero-Wagoner, The pupillary system, in Handbook of Psychophysiology, ed. by J.T. Cacioppo, L.G. Tassinary, G.G. Berntson. 2 ed. (Cambridge University Press, 2000), pp. 142–162
C. Sibley, J. Coyne, C. Baldwin, Pupil dilation as an index of learning, in Proceedings of the Human Factors and Ergonomics Society Annual Meeting (Human Factors and Ergonomics Society, Las Vegas, 2011), pp. 237–241
N. Hjortskov, D. Rissén, A. Blangsted, N. Fallentin, U. Lundberg, K. Søgaard, The effect of mental stress on heart rate variability and blood pressure during computer work. Eur. J. Appl. Physiol. 92, 84–89 (2004). doi:10.1007/s00421-004-1055-z
R. Ratwani, J. Mccurry, J. Trafton, Single operator, multiple robots: an eye movement based theoretic model of operator situation awareness, in Proceedings of the 5th ACM/IEEE International Conference on Human-Robot Interaction (IEEE, Osaka, Japan, 2010), pp. 235–242
R. Ratwani, J. McCurry, J. Trafton, Predicting postcompletion errors using eye movements, in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (ACM Press, 2008), pp. 539–542
M.L. Cummings, C.E. Nehme, Modeling the impact of workload in network centric supervisory control settings, in Neurocognitive and Physiological Factors During High-Tempo Operations (Ashgate Publishing Ltd, 2010), pp. 23–39
E. Blasch, S. Plano, Proactive decision fusion for site security, in International Conference on Information Fusion (2005)
http://www.dlib.org/dlib/september07/wolpers/09wolpers.html. Retrieved on 1 Nov 2013
A. Rath, D. Devaurs, S. Lindstaedt, UICO: an ontology-based user interaction context model for automatic task detection on the computer desktop, in CIAO ’09, Proceedings of the 1st Workshop on Context, Information and Ontologies (ACM Press, 2009), p. 10
Acknowledgment
We appreciate the efforts of Ms. Linda McGibbon in the preparation of this chapter. Her efforts are always beyond the call of duty.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland (outside the USA)
About this chapter
Cite this chapter
Newsom, B. et al. (2016). Modeling User Behaviors to Enable Context-Aware Proactive Decision Support. In: Snidaro, L., García, J., Llinas, J., Blasch, E. (eds) Context-Enhanced Information Fusion. Advances in Computer Vision and Pattern Recognition. Springer, Cham. https://doi.org/10.1007/978-3-319-28971-7_10
Download citation
DOI: https://doi.org/10.1007/978-3-319-28971-7_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-28969-4
Online ISBN: 978-3-319-28971-7
eBook Packages: Computer ScienceComputer Science (R0)