Modeling User Behaviors to Enable Context-Aware Proactive Decision Support

The problem of automatically recognizing a user’s operational context, the implications of its shifting properties, and reacting in a dynamic manner are at the core of mission intelligence and decision making. Environments such as the OZONE Widget Framework (http://www.owfgoss.org) (OWF) provide the foundation for capturing the objectives, actions, and activities of both the mission analyst and the decision maker. By utilizing a “context container” that envelops an OZONE Application, we hypothesize that both user action and intent can be used to characterize user context with respect to operational modality (strategic, tactical, opportunistic, or random). As the analyst moves from one operational modality to another, we propose that information visualization techniques should adapt and present data and analysis pertinent to the new modality and to the trend of the shift. As a system captures the analyst’s actions and decisions in response to the new visualizations, the context container has the opportunity to assess the analyst’s perception of the information value, risk, uncertainty, prioritization, projection, and insight with respect to the current context stage. This paper will describe a conceptual architecture for an adaptive work environment for inferring user behavior and interaction within the OZONE framework, in order to provide the decision maker with context relevant information. We then bridge from our more conceptual OWF discussion to specific examples describing the role of context in decision making. Our first concrete example demonstrates how the Web analytics of a user’s browsing behavior can be used to authenticate users. The second example briefly examines the role of context in cyber security. Our third example illustrates how to capture the behavior of expert analysts in exploratory data analysis, which coupled with a recommender system, advises domain experts of “standard” analytical operations in order to suggest operations novel to the domain, but consistent with analytical goals. Finally, our fourth example discusses the role of context in a supervisory control problem when managing multiple autonomous systems.

[1]  Mark James Neal,et al.  Meta-stable Memory in an Artificial Immune Network , 2003, ICARIS.

[2]  Kevin W Williams,et al.  A Summary of Unmanned Aircraft Accident/Incident Data: Human Factors Implications , 2004 .

[3]  H. Aarts,et al.  Habits as knowledge structures: Automaticity in goal-directed behavior , 2000 .

[4]  Yoshua Bengio,et al.  Random Search for Hyper-Parameter Optimization , 2012, J. Mach. Learn. Res..

[5]  Le Gruenwald,et al.  A survey of data mining and knowledge discovery software tools , 1999, SKDD.

[6]  C. E. SHANNON,et al.  A mathematical theory of communication , 1948, MOCO.

[7]  S. M. Bellovin,et al.  Security problems in the TCP/IP protocol suite , 1989, CCRV.

[8]  Srinivasan Seshan,et al.  802.11 user fingerprinting , 2007, MobiCom '07.

[9]  Raja Parasuraman,et al.  Humans and Automation: Use, Misuse, Disuse, Abuse , 1997, Hum. Factors.

[10]  Andreas S. Rath,et al.  UICO: an ontology-based user interaction context model for automatic task detection on the computer desktop , 2009, CIAO '09.

[11]  Ramesh Jain,et al.  Toward a Common Event Model for Multimedia Applications , 2007, IEEE MultiMedia.

[12]  Ariel Stolerman,et al.  Keyboard-Behavior-Based Authentication , 2013, IT Professional.

[13]  Chris North,et al.  Semantic Interaction for Sensemaking: Inferring Analytical Reasoning for Model Steering , 2012, IEEE Transactions on Visualization and Computer Graphics.

[14]  Yin Pan,et al.  Towards a web tracking profiling algorithm , 2013, 2013 IEEE International Conference on Technologies for Homeland Security (HST).

[15]  Yo-Sub Han,et al.  A movie recommendation algorithm based on genre correlations , 2012, Expert Syst. Appl..

[16]  Licia Capra,et al.  Continuous hyperparameter optimization for large-scale recommender systems , 2013, 2013 IEEE International Conference on Big Data.

[17]  Nick S. Ryan,et al.  Immune Inspired Context Memory , 2005 .

[18]  Filip Radlinski,et al.  Inferring query intent from reformulations and clicks , 2010, WWW '10.

[19]  Oren Etzioni,et al.  Open Information Extraction from the Web , 2007, CACM.

[20]  Francesco Ricci,et al.  Improving recommender systems with adaptive conversational strategies , 2009, HT '09.

[21]  Jonathan L. Herlocker,et al.  Evaluating collaborative filtering recommender systems , 2004, TOIS.

[22]  Herbert A. Simon,et al.  The new science of management decision , 1960 .

[23]  A. K. Blangsted,et al.  The effect of mental stress on heart rate variability and blood pressure during computer work , 2004, European Journal of Applied Physiology.

[24]  Ramesh C. Jain,et al.  EventWeb: Developing a Human-Centered Computing System , 2008, Computer.

[25]  D. E. Bell,et al.  Secure Computer Systems : Mathematical Foundations , 2022 .

[26]  Nick S. Ryan,et al.  Capturing Regular Human Activity through a Learning Context Memory , 2006 .

[27]  A. Tversky,et al.  On the psychology of prediction , 1973 .

[28]  James A. Hendler,et al.  Web 3.0 Emerging , 2009, Computer.

[29]  Joseph T. Coyne,et al.  Pupil Dilation as an Index of Learning , 2011 .

[30]  Mark A. Livingston,et al.  Evaluation of Multivariate Visualization on a Multivariate Task , 2012, IEEE Transactions on Visualization and Computer Graphics.

[31]  Lawrence R. Rabiner,et al.  A tutorial on hidden Markov models and selected applications in speech recognition , 1989, Proc. IEEE.

[32]  Georgios Paliouras,et al.  Using Machine Learning to Maintain Rule-based Named-Entity Recognition and Classification Systems , 2001, ACL.

[33]  I. S. Moskowitz,et al.  Covert channels-here to stay? , 1994, Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance.

[34]  Raj M. Ratwani,et al.  Single operator, multiple robots: an eye movement based theoretic model of operator situation awareness , 2010, HRI 2010.

[35]  Oren Etzioni,et al.  Identifying Relations for Open Information Extraction , 2011, EMNLP.

[36]  Park Jinkyun,et al.  A Study on the Revision of the TACOM Measure , 2007, IEEE Transactions on Nuclear Science.

[37]  Markus Jakobsson,et al.  Implicit Authentication through Learning User Behavior , 2010, ISC.

[38]  S. Plano,et al.  Proactive decision fusion for site security , 2005, 2005 7th International Conference on Information Fusion.

[39]  David W. Aha,et al.  User Authentication from Web Browsing Behavior , 2013, FLAIRS.

[40]  Andrew McCallum,et al.  Conditional Random Fields: Probabilistic Models for Segmenting and Labeling Sequence Data , 2001, ICML.

[41]  Myriam Abramson Learning Temporal User Profiles of Web Browsing Behavior , 2014 .

[42]  Dietmar Jannach,et al.  Preface to the special issue on context-aware recommender systems , 2013, User Modeling and User-Adapted Interaction.

[43]  Raj M. Ratwani,et al.  Predicting postcompletion errors using eye movements , 2008, CHI.

[44]  Ira S. Moskowitz,et al.  A new paradigm hidden in steganography , 2001, NSPW '00.

[45]  Lokendra Shastri,et al.  Activity Context Aware Digital Workspaces and Consumer Playspaces: Manifesto and Architecture , 2012, AAAI 2012.