Abstract : Correctly identifying a weapon system as "friend" or "foe" is vital to the success of the Army mission. Incorrect identification can leave the enemy to fight another day or cause a fratricide event. A current threat identification training method is to use Army Field Manual (FM) 1-402, which has not been updated since 1984, and is difficult to tailor towards specific and evolving threat training and mission requirements. This thesis, therefore, has two main purposes: development of a modifiable computer-based program that individual units can easily tailor to meet their current threat training requirements, and a statistical analysis to deteriine if Computer-Based Training (CET) is suitable for individual soldier threat identification training. The CBT application developed for this thesis is dynamically linked to image and text files maintained by the unit-training officer, thus allowing for modification and updates as required. Experimental results indicate that using this CBT application can be a suitable, and in some aspects better, training tool than FM 1A02. After a 20-minute study period, experiment participants using the CBT had an average nomenclature final test score increase of 38.4 percent over a similarly experienced control-group.
[1]
William Horton,et al.
Designing and writing online documentation
,
1990
.
[2]
Patty Curthoys,et al.
Developing user interfaces: Ensuring usability through product and process
,
1997
.
[3]
Michael J. Zyda,et al.
Modeling and Simulation: Linking Entertainment & Defense
,
1997
.
[4]
David H. Jonassen,et al.
Acquiring Structural Knowledge from Semantically Structured Hypertext.
,
1992
.
[5]
Thomas C. Reeves,et al.
Pseudoscience in Computer-Based Instruction: The Case of Learner Control Research.
,
1993
.
[6]
Robert J. Seidel,et al.
Computer-based instruction in military environments
,
1987
.
[7]
Dennis James,et al.
Computer Based Training
,
1987
.
[8]
David Wallace,et al.
A Comparative Evaluation of World Wide Web-Based and Classroom Teaching
,
1997
.