Entity Workspace: An Evidence File That Aids Memory, Inference, and Reading
An intelligence analyst often needs to keep track of more facts than can be held in human memory. As a result, analysts use a notebook or evidence file to record facts learned so far. In practice, the evidence file is often an electronic document into which text snippets and hand-typed notes are placed. While this kind of evidence file is easy to read and edit, it provides little help for making sense of the captured information. We describe Entity Workspace, a tool designed to be used in place of a traditional evidence file. Entity Workspace combines user interface and entity extraction technologies to build up an explicit model of important entities (people, places, organizations, phone numbers, etc.) and their relationships. Using this model, it helps the analyst find and re-find facts rapidly, notice connections between entities, and identify good documents and entities to explore next.
Unable to display preview. Download preview PDF.
- 2.Bier, E., Good, L., Popat, K., Newberger, A.: A document corpus browser for in-depth reading. In: Proceedings of the Joint Conference on Digital Libraries (JCDL), pp. 87–96 (2004)Google Scholar
- 3.Bier, E.A., Ishak, E.W., Chi, E.: Entity quick click: rapid text copying based on automatic entity extraction. In: The Extended Abstracts of the Conference on Human Factors in Computing Systems, CHI 2006 (2006) (in press)Google Scholar
- 4.Chi, E.H., Hong, L., Gumbrecht, M., Card, S.K.: ScentHighlights: highlighting conceptually-related sentences during reading. In: Proceedings of the 10th International Conference on Intelligent User Interfaces, pp. 272–274 (2005)Google Scholar
- 6.Good, L.E.: Zoomable User Interfaces for the Authoring and Delivery of Slide Presentations. Ph.D. dissertation, Department of Computer Science, University of Maryland, October 27 (2003), http://hdl.handle.net/1903/262
- 7.Wright, W., Schroh, D., Proulx, P., Skaburskis, A., Cort, B.: Advances in nSpace – the sandbox for analysis. In: Poster at the 2005, International Conference on Intelligence Analysis (2005)Google Scholar