Toward Theoretical Techniques for Measuring the Use of Human Effort in Visual Analytic Systems

Visual analytic systems have long relied on user studies and standard datasets to demonstrate advances to the state of the art, as well as to illustrate the efficiency of solutions to domain-specific challenges. This approach has enabled some important comparisons between systems, but unfortunately the narrow scope required to facilitate these comparisons has prevented many of these lessons from being generalized to new areas. At the same time, advanced visual analytic systems have made increasing use of human-machine collaboration to solve problems not tractable by machine computation alone. To continue to make progress in modeling user tasks in these hybrid visual analytic systems, we must strive to gain insight into what makes certain tasks more complex than others. This will require the development of mechanisms for describing the balance to be struck between machine and human strengths with respect to analytical tasks and workload. In this paper, we argue for the necessity of theoretical tools for reasoning about such balance in visual analytic systems and demonstrate the utility of the Human Oracle Model for this purpose in the context of sensemaking in visual analytics. Additionally, we make use of the Human Oracle Model to guide the development of a new system through a case study in the domain of cybersecurity.

[1]  Georgios Theodoridis,et al.  BGPfuse: using visual feature fusion for the detection and attribution of BGP anomalies , 2013, VizSec '13.

[2]  Peng Dai,et al.  Execution control for crowdsourcing , 2011, UIST '11 Adjunct.

[3]  Jodi Heintz Obradovich Understanding Cognitive and Collaborative Work , 2011 .

[4]  Nenghai Yu,et al.  A comprehensive human computation framework: with application to image labeling , 2008, ACM Multimedia.

[5]  Joel S. Warm,et al.  Vigilance Requires Hard Mental Work and Is Stressful , 2008, Hum. Factors.

[6]  Pengyi Zhang Sensemaking: Conceptual Changes, Cognitive Mechanisms, and Structural Representations. a Qualitative User Study. , 2010 .

[7]  William Ribarsky,et al.  Scalable and Interactive Visual Analysis of Financial Wire Transactions for Fraud Detection , 2008, Inf. Vis..

[8]  Christopher G. Healey,et al.  Ensemble visualization for cyber situation awareness of network security data , 2015, 2015 IEEE Symposium on Visualization for Cyber Security (VizSec).

[9]  Brenda Dervin,et al.  Sense-making theory and practice: an overview of user interests in knowledge seeking and use , 1998, J. Knowl. Manag..

[10]  Jiajie Zhang,et al.  TURF: Toward a unified framework of EHR usability , 2011, J. Biomed. Informatics.

[11]  Dieter Fensel,et al.  It's a Streaming World! Reasoning upon Rapidly Changing Information , 2009, IEEE Intelligent Systems.

[12]  AbdulMalik S. Al-Salman,et al.  Visualizing PHPIDS log files for better understanding of web server attacks , 2013, VizSec '13.

[13]  Carla E. Brodley,et al.  Who Should Label What? Instance Allocation in Multiple Expert Active Learning , 2011, SDM.

[14]  Michael D. Buhrmester,et al.  Amazon's Mechanical Turk , 2011, Perspectives on psychological science : a journal of the Association for Psychological Science.

[15]  David E. Kieras,et al.  Task Analysis and the Design of Functionality , 2014, The Computer Science and Engineering Handbook.

[16]  Keith A. Butler,et al.  Using conceptual work products of health care to design health IT , 2016, J. Biomed. Informatics.

[17]  Eric Horvitz,et al.  Principles of mixed-initiative user interfaces , 1999, CHI '99.

[18]  Panagiotis G. Ipeirotis,et al.  Running Experiments on Amazon Mechanical Turk , 2010, Judgment and Decision Making.

[19]  Aniket Kittur,et al.  Crowdsourcing user studies with Mechanical Turk , 2008, CHI.

[20]  Benjamin B. Bederson,et al.  Human computation: a survey and taxonomy of a growing field , 2011, CHI.

[21]  Panagiotis G. Ipeirotis,et al.  Beat the Machine: Challenging Humans to Find a Predictive Model's “Unknown Unknowns” , 2015, JDIQ.

[22]  R. Jordan Crouser,et al.  Online Submission ID: 200 An Affordance-Based Framework for Human Computation and Human-Computer Collaboration , 2022 .

[23]  J. Swets Signal detection and recognition by human observers : contemporary readings , 1964 .

[24]  David E. Kieras,et al.  Visual Availability and Fixation Memory in Modeling Visual Search using the EPIC Architecture , 2006 .

[25]  Chris North,et al.  Observation-level interaction with statistical models for visual analytics , 2011, 2011 IEEE Conference on Visual Analytics Science and Technology (VAST).

[26]  Robert F. Erbacher Visualization design for immediate high-level situational assessment , 2012, VizSec '12.

[27]  Alex Endert,et al.  Semantic Interaction for Visual Analytics: Inferring Analytical Reasoning for Model Steering , 2016, Semantic Interaction for Visual Analytics.

[28]  Vito Latora,et al.  Modeling cascading failures in the North American power grid , 2005 .

[29]  F. J. Anscombe,et al.  Graphs in Statistical Analysis , 1973 .

[30]  Reinhard Pekrun,et al.  Boredom in achievement settings: Exploring control–value antecedents and performance outcomes of a neglected emotion. , 2010 .

[31]  Stuart K. Card,et al.  The cost structure of sensemaking , 1993, INTERCHI.

[32]  Jarke J. van Wijk,et al.  SNAPS: Semantic network traffic analysis through projection and selection , 2015, 2015 IEEE Symposium on Visualization for Cyber Security (VizSec).

[33]  Srikanth Kandula,et al.  NetClinic: Interactive visualization to enhance automated fault diagnosis in enterprise networks , 2010, 2010 IEEE Symposium on Visual Analytics Science and Technology.

[34]  Kate Ehrlich,et al.  Nimble cybersecurity incident management through visualization and defensible recommendations , 2010, VizSec '10.

[35]  Jiajie Zhang,et al.  Representations in Distributed Cognitive Tasks , 1994, Cogn. Sci..

[36]  Dagobert Soergel,et al.  Towards a comprehensive model of the cognitive process and mechanisms of individual sensemaking , 2014, J. Assoc. Inf. Sci. Technol..

[37]  Laura A. Dabbish,et al.  Labeling images with a computer game , 2004, AAAI Spring Symposium: Knowledge Collection from Volunteer Contributors.

[38]  William Ribarsky,et al.  Building and Applying a Human Cognition Model for Visual Analytics , 2009, Inf. Vis..

[39]  John T. Stasko,et al.  Characterizing the intelligence analysis process: Informing visual analytics design through a longitudinal field study , 2011, 2011 IEEE Conference on Visual Analytics Science and Technology (VAST).

[40]  Russ Burtner,et al.  Ocelot: user-centered design of a decision support visualization for network quarantine , 2015, 2015 IEEE Symposium on Visualization for Cyber Security (VizSec).

[41]  Udo Kruschwitz,et al.  A demonstration of human computation using the Phrase Detectives annotation game , 2009, HCOMP '09.

[42]  Jaime G. Carbonell,et al.  Proactive learning: cost-sensitive active learning with multiple imperfect oracles , 2008, CIKM '08.

[43]  Alex Endert,et al.  Semantic Interaction for Visual Analytics: Toward Coupling Cognition and Computation , 2014, IEEE Computer Graphics and Applications.

[44]  Irwin King,et al.  Mathematical Modeling of Social Games , 2009, 2009 International Conference on Computational Science and Engineering.

[45]  Jonathan C. Roberts,et al.  Contextual network navigation to provide situational awareness for network administrators , 2015, 2015 IEEE Symposium on Visualization for Cyber Security (VizSec).

[46]  William Ribarsky,et al.  WireVis: Visualization of Categorical, Time-Varying Data From Financial Transactions , 2007, 2007 IEEE Symposium on Visual Analytics Science and Technology.

[47]  Carla E. Brodley,et al.  Dis-function: Learning distance functions interactively , 2012, 2012 IEEE Conference on Visual Analytics Science and Technology (VAST).

[48]  Aidong Lu,et al.  Discovery of rating fraud with real-time streaming visual analytics , 2015, 2015 IEEE Symposium on Visualization for Cyber Security (VizSec).

[49]  Philip A. Legg,et al.  Visualizing the insider threat: challenges and tools for identifying malicious user activity , 2015, 2015 IEEE Symposium on Visualization for Cyber Security (VizSec).

[50]  Joshua Saxe,et al.  Visualization of shared system call sequence relationships in large malware corpora , 2012, VizSec '12.

[51]  Cui Tao,et al.  Model Checking for Verification of Interactive Health IT Systems , 2015, AMIA.

[52]  Alexander Pretschner,et al.  DAVAST: data-centric system level activity visualization , 2014, VizSec '14.

[53]  Jiajie Zhang,et al.  UFuRT: A Work ⴀ Centered Framework and Process for Design and Evaluation of Information Systems , 2007 .

[54]  Panagiotis G. Ipeirotis,et al.  Beat the Machine: Challenging Workers to Find the Unknown Unknowns , 2011, Human Computation.

[55]  Roger B. Dannenberg,et al.  TagATune: A Game for Music and Sound Annotation , 2007, ISMIR.

[56]  Fabrizio Sebastiani,et al.  Machine learning in automated text categorization , 2001, CSUR.

[57]  David E. Kieras,et al.  Predictive engineering models based on the EPIC architecture for a multimodal high-performance human-computer interaction task , 1997, TCHI.

[58]  Heikki Topi,et al.  Computing Handbook, Third Edition: Information Systems and Information Technology , 2014, Computing Handbook, 3rd ed..

[59]  Raheem A. Beyah,et al.  NAVSEC: a recommender system for 3D network security visualizations , 2013, VizSec '13.

[60]  Yacin Nadji,et al.  MalwareVis: entity-based visualization of malware network traces , 2012, VizSec '12.

[61]  Cordelia Schmid,et al.  Learning realistic human actions from movies , 2008, 2008 IEEE Conference on Computer Vision and Pattern Recognition.

[62]  F. L. Greitzer,et al.  A multi-layer, data-driven advanced reasoning tool for intelligent data mining and analysis for smart grids , 2012, 2012 IEEE Power and Energy Society General Meeting.

[63]  Dafna Shahaf,et al.  Towards a Theory of AI Completeness , 2007, AAAI Spring Symposium: Logical Formalizations of Commonsense Reasoning.

[64]  Peng Dai,et al.  Human Intelligence Needs Artificial Intelligence , 2011, Human Computation.

[65]  P. Pirolli,et al.  The Sensemaking Process and Leverage Points for Analyst Technology as Identified Through Cognitive Task Analysis , 2007 .

[66]  David E. Kieras,et al.  An Overview of the EPIC Architecture for Cognition and Performance With Application to Human-Computer Interaction , 1997, Hum. Comput. Interact..

[67]  Alvitta Ottley,et al.  Manipulating and controlling for personality effects on visualization tasks , 2015, Inf. Vis..

[68]  Yan Lindsay Sun,et al.  CyberSAVe: situational awareness visualization for cyber security of smart grid systems , 2013, VizSec '13.

[69]  Giuseppe Santucci,et al.  PERCIVAL: proactive and reactive attack and response assessment for cyber incidents using visual analytics , 2015, 2015 IEEE Symposium on Visualization for Cyber Security (VizSec).

[70]  Gregory D. Abowd,et al.  Developing Scripts to Teach Social Skills: Can the Crowd Assist the Author? , 2011, Human Computation.

[71]  Shantanu H. Joshi,et al.  Query-based coordinated multiple views with Feature Similarity Space for visual analysis of MRI repositories , 2011, 2011 IEEE Conference on Visual Analytics Science and Technology (VAST).

[72]  Manuel Blum,et al.  reCAPTCHA: Human-Based Character Recognition via Web Security Measures , 2008, Science.

[73]  Neville A. Stanton,et al.  Book preview , 2003, INTR.

[74]  Russ Burtner,et al.  Mixed-initiative visual analytics using task-driven recommendations , 2015, 2015 IEEE Conference on Visual Analytics Science and Technology (VAST).

[75]  Victoria L. Lemieux,et al.  The Application of Visual Analytics to Financial Stability Monitoring , 2015 .

[76]  Xiaojin Zhu,et al.  --1 CONTENTS , 2006 .

[77]  Chris North,et al.  Semantic interaction for visual text analytics , 2012, CHI.

[78]  Daniel A. Keim,et al.  Finding anomalies in time-series using visual correlation for interactive root cause analysis , 2013, VizSec '13.

[79]  Adam Krzyżak,et al.  Methods of combining multiple classifiers and their applications to handwriting recognition , 1992, IEEE Trans. Syst. Man Cybern..

[80]  Alex Endert,et al.  7 key challenges for visualization in cyber network defense , 2014, VizSEC.

[81]  P. Fitts The information capacity of the human motor system in controlling the amplitude of movement. , 1954, Journal of experimental psychology.

[82]  George W. Furnas,et al.  Model-driven formative evaluation of exploratory search: A study under a sensemaking framework , 2008, Inf. Process. Manag..

[83]  Allen Newell,et al.  The psychology of human-computer interaction , 1983 .

[84]  Loukas Lazos,et al.  IMap: visualizing network activity over internet maps , 2014, VizSec '14.

[85]  Anthony J. Hornof,et al.  GLEAN: a computer-based tool for rapid GOMS model usability evaluation of user interface designs , 1995, UIST '95.

[86]  Jane Yung-jen Hsu,et al.  MuSweeper: An Extensive Game for Collecting Mutual Exclusions , 2011, Human Computation.

[87]  Remco Chang,et al.  Toward Complexity Measures for Systems Involving Human Computation , 2014 .