Cognition, Technology & Work

, Volume 14, Issue 2, pp 157–168 | Cite as

Analysis tools in the study of distributed decision-making: a meta-study of command and control research

Original Article

Abstract

Our understanding of distributed decision making in professional teams and their performance comes in part from studies in which researchers gather and process information about the communications and actions of teams. In many cases, the data sets available for analysis are large, unwieldy and require methods for exploratory and dynamic management of data. In this paper, we report the results of interviewing eight researchers on their work process when conducting such analyses and their use of support tools in this process. Our aim with the study was to gain an understanding of their workflow when studying distributed decision making in teams, and specifically how automated pattern extraction tools could be of use in their work. Based on an analysis of the interviews, we elicited three issues of concern related to the use of support tools in analysis: focusing on a subset of data to study, drawing conclusions from data and understanding tool limitations. Together, these three issues point to two observations regarding tool use that are of specific relevance to the design of intelligent support tools based on pattern extraction: open-endedness and transparency.

Keywords

Command and control Text analysis Interview study Exploratory sequential data analysis 

Notes

Acknowledgments

This work was supported by the Swedish National Defense College. We would like to thank the participants at the Swedish Defense Research Agency and VSL Systems AB for participating in this study.

References

  1. Alberts DS, Gartska JJ, Stein FP (2000) Network centric warefare: developing and leveraging information superiority. National Defense University Press, WashingtonGoogle Scholar
  2. Albinsson P-A, Morin M (2002) Visual exploration of communication in command and control. In: Proceedings of the sixth international conference on information visualisation, London, UKGoogle Scholar
  3. Albinsson P-A, Morin M, Thorstensson M (2004) Managing metadata in collaborative command and control analysis. In: Proceedings of the 48th annual meeting of the human factors and ergonomics societyGoogle Scholar
  4. Andriole SJ (1989) Handbook of decision support systems. TAB Books Inc, Blue Ridge SummitGoogle Scholar
  5. Brehmer B (2005) The dynamic OODA loop: amalgamating Boyd’s OODA loop and the cybernetic approach to command and control. In: Proceedings of the 2005 command and control research and technology symposiumGoogle Scholar
  6. Cutting DR, Karger DR, Pedersen JO, Tukey JW (1992) Scatter/gather: a cluster-based approach to browsing large document collections. In: Proceedings of the 15th annual international ACM SIGIR conference on research and development in information retrievalGoogle Scholar
  7. Flanagan JC (1954) The critical incident technique. Psychol Bull 51(4)Google Scholar
  8. Fornell C, Bookstein FL (1982) Two structural equation models: LISREL and PLS applied to consumer exit-voice theory. J Market Res 19(4):440–452CrossRefGoogle Scholar
  9. Gorman JC, Foltz PW, Kiekel PA, Martin MJ (2003) Evaluation of latent semantic analysis-based measures of team communication content. In: Proceedings of the human factors and ergonomics society 47th annual meetingGoogle Scholar
  10. Jensen E (2009) Sensemaking in military planning: a methodological study of command teams. Cogn Technol Work 11:103–118CrossRefGoogle Scholar
  11. Jenvald J, Eriksson M (2009) Structured reflective observation in continuing training. In: Proceedings of the 8th WANO human performance meetingGoogle Scholar
  12. Johansson B, Persson M, Granlund R, Mattsson P (2003) C3fire in command and control research. Cogn Technol Work 5(3):191–196CrossRefGoogle Scholar
  13. Jöreskog KG (1973) A general method for estimating linear structural equation systems. In: Goldberger AS, Duncan OD (eds) Structural equation models in the social sciences. Seminar Press, USAGoogle Scholar
  14. Klein G (1998) Sources of power. How people make decisions. MIT Press, CambridgeGoogle Scholar
  15. Klein, GA, Orasanu, J, Calderwood, R, Zsambok, CE (eds) (1993) Decision making in action: models and methods. Ablex Publishing corporation, NYGoogle Scholar
  16. Kruskal JB (1964) Multidimensional scaling by optimizing goodness of fit to a nonmetric hypothesis. Psychometrika 29(1)Google Scholar
  17. Kylesten B, Nählinder S (2010) The effect of decision-making training: results from a command-and-control training facility. Cogn Technol Work 1–9. doi:10.1007/s10111-010-0157-0
  18. Lazar J, Feng JH, Hochheiser H (2010) Research methods in human-computer interaction. Wiley, NYGoogle Scholar
  19. Leifler O (2008) Combining technical and human-centered strategies for decision support in command and control—the ComPlan approach. In: Proceedings of the 5th international conference on information systems for crisis response and managementGoogle Scholar
  20. Leifler O, Eriksson H (2010) Message classification as a basis for studying command and control communications-an evaluation of machine learning approaches (Submitted for publication)Google Scholar
  21. Miles MB, Huberman AM (1994) Qualitative data analysis: an expanded sourcebook. SAGE, CAGoogle Scholar
  22. Morin M (2002) Multimedia representations of distributed tactical operations. PhD thesis, Institute of Technology, Linköpings universitetGoogle Scholar
  23. Morin M, Albinsson P-A (2005) Creating high-tech teams: practical guidance on work performance and technology. Chapter exploration and context in communication analysis. APA Press, Washington, pp 89–112Google Scholar
  24. Rosell M, Velupillai S (2008) Revealing relations between open and closed answers in questionnaires through text clustering evaluation. In: Proceedings of LREC 2008, Marrakesh, MoroccoGoogle Scholar
  25. Rubel RC (2001) War-gaming network-centric warfare. Naval War Col Rev 54(2):61–74Google Scholar
  26. Sanderson P, Fisher C (1994) Exploratory sequential data analysis: foundations. Human Comp Interact 9:251–317CrossRefGoogle Scholar
  27. Sanderson P, Scott J, Johnston T, Mainzer J, Watanabe L, James J (1994) MacSHAPA and the enterprise of exploratory sequential data analysis (ESDA). Int J Human Comp Stud 41(5):633–681CrossRefGoogle Scholar
  28. Shattuck LG, Woods DD (2000) Communication of intent in military command and control systems. In: McCann C, Pigeau R (eds) The human in command: exploring the modern military experience. Kluwer Academic/Plenum Publishers, London, pp 279–292Google Scholar
  29. Stanton N, Baber C, Walker G, Houghton R, McMaster R, Stewart R, Harris D, Jenkins D, Young M, Salmon P (2008) Development of a generic activities model of command and control. Cogn Technol Work 10:209–220. doi:10.1007/s10111-007-0097-5 CrossRefGoogle Scholar
  30. Steiger JH, Schönemann PH (1978) Theory construction and data analysis in the behavioral sciences, chapter a history of factor indeterminacy. Jossey-Bass Inc, San FranciscoGoogle Scholar
  31. Thorstensson M, Axelsson M, Morin M, Jenvald J (2001) Monitoring and analysis of command post communication in rescue operations. Saf Sci 39:51–60CrossRefGoogle Scholar
  32. Wærn Y, Cañas JJ (2003) Microworld task environments for conducting research on command and control. Cogn Technol Work 5(3):181–182. doi:10.1007/s10111-003-0126-y CrossRefGoogle Scholar

Copyright information

© Springer-Verlag London Limited 2011

Authors and Affiliations

  1. 1.Department of Computer and Information ScienceLinköping UniversityLinköpingSweden

Personalised recommendations