Automated identification of insight seeking behaviours, strategies and rules: a preliminary study

Journal article


Hepenstal, S., Zhang, L. and Wong, BL William 2021. Automated identification of insight seeking behaviours, strategies and rules: a preliminary study. Sage Journals: Proceedings of the Human Factors and Ergonomics Society Annual Meeting . (65), pp. 1269-1273. https://doi.org/https://doi.org/10.1177/1071181321651348
AuthorsHepenstal, S., Zhang, L. and Wong, BL William
Abstract

In this paper, we demonstrate how insight seeking strategies and rules can be captured from analyst interactions with a question-answer system, as they perform an investigation. We present our analysis of an interactive investigation exercise undertaken by 14 experienced intelligence analysts. We propose that our approach to model the abstract higher order cognition involved in insight seeking provides a means to design intelligent systems that can reward and optimise potential lines of inquiry, ultimately creating the environment from which insights can be derived.

KeywordsIntelligent agents; Naturalistic decision making
Year2021
JournalSage Journals: Proceedings of the Human Factors and Ergonomics Society Annual Meeting
Journal citation(65), pp. 1269-1273
PublisherSAGE Publications
ISSN1541-9312
Digital Object Identifier (DOI)https://doi.org/https://doi.org/10.1177/1071181321651348
Official URLhttps://journals.sagepub.com/doi/abs/10.1177/1071181321651348
Publication dates
Online12 Nov 2021
Publication process dates
Deposited10 Feb 2022
Accepted author manuscript
License
File Access Level
Open
Output statusPublished
Permalink -

https://repository.canterbury.ac.uk/item/905q9/automated-identification-of-insight-seeking-behaviours-strategies-and-rules-a-preliminary-study

Download files


Accepted author manuscript
HFES 2021 - InsightSeekingBehaviours-REDRAFT v4.pdf
License: CC BY-NC-ND
File access level: Open

  • 66
    total views
  • 30
    total downloads
  • 2
    views this month
  • 1
    downloads this month

Export as

Related outputs

Investigating security issues (multilayer attacks) on IoT devices using machine learning
Al Sukhni, B., Manna, S., Dave, J. and Zhang, L. 2024. Investigating security issues (multilayer attacks) on IoT devices using machine learning.
Safeguarding IoMT: Semi-automated Intrusion Detection System (SAIDS) for detecting multilayer attacks
Al Sukhni, B., Manna, S., Dave, J. and Zhang, L. 2024. Safeguarding IoMT: Semi-automated Intrusion Detection System (SAIDS) for detecting multilayer attacks.
Exploring optimal set of features in machine learning for improving IoT multilayer security
Al Sukhni, B., Manna, S., Dave, J. and Zhang, Leishi 2023. Exploring optimal set of features in machine learning for improving IoT multilayer security. 2023 IEEE 9th World Forum on Internet of Things (WF-IoT). https://doi.org/10.1109/wf-iot58464.2023.10539376
A review of privacy-preserving federated learning, deep learning, and machine learning IIoT and IoTs solutions
Obarafor, Victor, Qi, Man and Zhang, L. 2023. A review of privacy-preserving federated learning, deep learning, and machine learning IIoT and IoTs solutions. in: 2023 8th IEEE International Conference on Signal and Image Processing (ICSIP) Wuxi, China IEEE. pp. 1074-1078
The impact of system transparency on analytical reasoning
Hepenstal, S., Zhang, L. and Wong, B. 2023. The impact of system transparency on analytical reasoning. in: CHI '23: CHI Conference on Human Factors in Computing Systems, Hamburg Germany, April 23 - 28, 2023 New York ACM.
The impact of system transparency on analytical reasoning
Hepenstal, S., Zhang, L. and Wong, B.L.W. 2023. The impact of system transparency on analytical reasoning.
Machine learning-based solutions for securing IoT systems against multilayer attacks
Al Sukhni, B., Manna, S., Dave, J. and Zhang, L. 2022. Machine learning-based solutions for securing IoT systems against multilayer attacks. in: Singh Tomar, R., Verma, S., Kumar Chaurasia, B., Singh, V., Abawajy, J. H., Akashe, S., Hsiung, Pao-Ann and Prasad, R. (ed.) Communication, Networks and Computing Third International Conference, CNC 2022, Gwalior, India, December 8–10, 2022, Proceedings, Part I Cham Springer. pp. 140-153
Investigating the security issues of multi-layer IoMT attacks using machine learning techniques
Al Sukhni, B., Manna, S., Dave, J. and Zhang, L. 2022. Investigating the security issues of multi-layer IoMT attacks using machine learning techniques.
Designing a system to mimic expert cognition: An initial prototype
Hepenstal, Sam, Zhang, Leishi and William Wong, B. L. 2022. Designing a system to mimic expert cognition: An initial prototype. Proceedings of the Human Factors and Ergonomics Society Annual Meeting. 66 (1), pp. 2057-2061. https://doi.org/10.1177/1071181322661092
An analysis of expertise in intelligence analysis to support the design of human-centered artificial intelligence
Hepenstal, S., Zhang, L. and Wong, BL William 2021. An analysis of expertise in intelligence analysis to support the design of human-centered artificial intelligence. https://doi.org/10.1109/SMC52423.2021.9659095
A granular computing approach to provide transparency of intelligent systems for criminal investigations
Zhang, L. 2021. A granular computing approach to provide transparency of intelligent systems for criminal investigations. in: Pedrycz, W. and Chen, S.-M. (ed.) Interpretable Artificial Intelligence: A Perspective of Granular Computing Cham Springer.
Developing conversational agents for use in criminal investigations
Hepenstal, S., Zhang, L., Kodagoda N. and Wong B.L.W 2021. Developing conversational agents for use in criminal investigations. ACM Transactions on Interactive Intelligent Systems. 11 (3-4), pp. 1-35. https://doi.org/10.1145/3444369