Designing a system to mimic expert cognition: An initial prototype

Journal article


Hepenstal, Sam, Zhang, Leishi and William Wong, B. L. 2022. Designing a system to mimic expert cognition: An initial prototype. Proceedings of the Human Factors and Ergonomics Society Annual Meeting. 66 (1), pp. 2057-2061. https://doi.org/10.1177/1071181322661092
AuthorsHepenstal, Sam, Zhang, Leishi and William Wong, B. L.
AbstractIn this paper, we present a proof-of-concept system to highlight the potential benefits of mimicking higher-order cognitive processes involved in ‘insight seeking’ to create the necessary context for expert sensemaking. We draw upon data from a realistic investigation exercise undertaken by 14 experienced intelligence analysts and use this to develop our prototype to mimic behaviours demonstrated by expert analysts. Our prototype system evaluates different strategies and provides recommendations for an analyst to explore, through a prototype user interface. The recommended strategies, and associated information retrieved, aligns with the actual investigations. We propose that our system presents a novel and promising approach to design AI support systems for tasks that typically require human expert cognitive processes.
KeywordsAI; Artificial intelligence ; Expert cognition
Year2022
JournalProceedings of the Human Factors and Ergonomics Society Annual Meeting
Journal citation66 (1), pp. 2057-2061
PublisherSAGE
ISSN2169-5067
1071-1813
Digital Object Identifier (DOI)https://doi.org/10.1177/1071181322661092
Official URLhttps://doi.org/10.1177/1071181322661092
Publication dates
Print27 Nov 2022
Online27 Oct 2022
Publication process dates
Deposited02 Nov 2022
Accepted23 May 2022
Accepted author manuscript
License
Output statusPublished
Permalink -

https://repository.canterbury.ac.uk/item/92zqw/designing-a-system-to-mimic-expert-cognition-an-initial-prototype

Download files


Accepted author manuscript
  • 64
    total views
  • 29
    total downloads
  • 0
    views this month
  • 0
    downloads this month

Export as

Related outputs

Investigating security issues (multilayer attacks) on IoT devices using machine learning
Al Sukhni, B., Manna, S., Dave, J. and Zhang, L. 2024. Investigating security issues (multilayer attacks) on IoT devices using machine learning.
Safeguarding IoMT: Semi-automated Intrusion Detection System (SAIDS) for detecting multilayer attacks
Al Sukhni, B., Manna, S., Dave, J. and Zhang, L. 2024. Safeguarding IoMT: Semi-automated Intrusion Detection System (SAIDS) for detecting multilayer attacks.
Exploring optimal set of features in machine learning for improving IoT multilayer security
Al Sukhni, B., Manna, S., Dave, J. and Zhang, Leishi 2023. Exploring optimal set of features in machine learning for improving IoT multilayer security. 2023 IEEE 9th World Forum on Internet of Things (WF-IoT). https://doi.org/10.1109/wf-iot58464.2023.10539376
A review of privacy-preserving federated learning, deep learning, and machine learning IIoT and IoTs solutions
Obarafor, Victor, Qi, Man and Zhang, L. 2023. A review of privacy-preserving federated learning, deep learning, and machine learning IIoT and IoTs solutions. in: 2023 8th IEEE International Conference on Signal and Image Processing (ICSIP) Wuxi, China IEEE. pp. 1074-1078
The impact of system transparency on analytical reasoning
Hepenstal, S., Zhang, L. and Wong, B. 2023. The impact of system transparency on analytical reasoning. in: CHI '23: CHI Conference on Human Factors in Computing Systems, Hamburg Germany, April 23 - 28, 2023 New York ACM.
The impact of system transparency on analytical reasoning
Hepenstal, S., Zhang, L. and Wong, B.L.W. 2023. The impact of system transparency on analytical reasoning.
Machine learning-based solutions for securing IoT systems against multilayer attacks
Al Sukhni, B., Manna, S., Dave, J. and Zhang, L. 2022. Machine learning-based solutions for securing IoT systems against multilayer attacks. in: Singh Tomar, R., Verma, S., Kumar Chaurasia, B., Singh, V., Abawajy, J. H., Akashe, S., Hsiung, Pao-Ann and Prasad, R. (ed.) Communication, Networks and Computing Third International Conference, CNC 2022, Gwalior, India, December 8–10, 2022, Proceedings, Part I Cham Springer. pp. 140-153
Investigating the security issues of multi-layer IoMT attacks using machine learning techniques
Al Sukhni, B., Manna, S., Dave, J. and Zhang, L. 2022. Investigating the security issues of multi-layer IoMT attacks using machine learning techniques.
An analysis of expertise in intelligence analysis to support the design of human-centered artificial intelligence
Hepenstal, S., Zhang, L. and Wong, BL William 2021. An analysis of expertise in intelligence analysis to support the design of human-centered artificial intelligence. https://doi.org/10.1109/SMC52423.2021.9659095
Automated identification of insight seeking behaviours, strategies and rules: a preliminary study
Hepenstal, S., Zhang, L. and Wong, BL William 2021. Automated identification of insight seeking behaviours, strategies and rules: a preliminary study. Sage Journals: Proceedings of the Human Factors and Ergonomics Society Annual Meeting . (65), pp. 1269-1273. https://doi.org/https://doi.org/10.1177/1071181321651348
A granular computing approach to provide transparency of intelligent systems for criminal investigations
Zhang, L. 2021. A granular computing approach to provide transparency of intelligent systems for criminal investigations. in: Pedrycz, W. and Chen, S.-M. (ed.) Interpretable Artificial Intelligence: A Perspective of Granular Computing Cham Springer.
Developing conversational agents for use in criminal investigations
Hepenstal, S., Zhang, L., Kodagoda N. and Wong B.L.W 2021. Developing conversational agents for use in criminal investigations. ACM Transactions on Interactive Intelligent Systems. 11 (3-4), pp. 1-35. https://doi.org/10.1145/3444369