Skip to main content

Proposing the Underlying Causes That Lead to the Trainee’s Erroneous Actions to the Trainer

  • Conference paper
Creating New Learning Experiences on a Global Scale (EC-TEL 2007)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 4753))

Included in the following conference series:

Abstract

When a trainer aims to provide trainees with appropriate help and assistance, she/he needs to know what errors the trainee is making and furthermore what causes lead to these errors. In this paper, we propose a mechanism which infers the underlying causes that lead to the production of the trainee’s erroneous action in order to support the trainer in her/his monitoring activity. This mechanism is based on and uses CREAM, a second-generation method of Human Reliability Analysis (HRA). We implement this mechanism by using Dempster-Shafer’s theory.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Schank, R.C., Berman, T.R., Macperson, K.A.: Learning by doing, in Instructional-Design Theories and Models. In: Reigeluth, C.M. (ed.) A New Paradigm of Instructional Theory, pp. 161–181. Lawrence Erlbaum Associates, Mahwah, NJ (1999)

    Google Scholar 

  2. El-Kechaï, N., Després., C.: A Plan Recognition Process, Based on a Task Model, for Detecting Learner’s Erroneous Actions. In: Ikeda, M., Ashley, K.D., Chan, T.-W. (eds.) ITS 2006. LNCS, vol. 4053, pp. 329–338. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  3. Hollnagel, E.: The phenotype of erroneous actions. International Journal of Man-Machine Studies 39, 1–32 (1993)

    Article  Google Scholar 

  4. Hollnagel, E.: Cognitive Reliability and Error Analysis Method. Elsevier Science, Oxford (1998)

    Google Scholar 

  5. Hollnagel, E.: Looking for errors of omission and commission or the hunting of the Snark revisited. Reliability Engineering and Systems Safety 68, 135–145 (2000)

    Article  Google Scholar 

  6. Shafer, G.: A Mathematical Theory of Evidence. Princeton University Press, Princeton (1976)

    MATH  Google Scholar 

  7. Dempster, A.P.: Upper and lower probabilities induced by a multivalued mapping. Annals of Mathematical Statistics, 325–339 (1967)

    Google Scholar 

  8. Charniak, E., Goldman, R.P.: A Bayesian model of plan recognition. Artificial Intelligence 64, 53–79 (1992)

    Article  Google Scholar 

  9. Bauer, M.: A Dempster-Shafer approach to modeling agents preferences in plan recognition. User Modeling and User-Adapted Interaction 5(3-4), 317–348 (1995)

    Article  Google Scholar 

  10. Greer, J., Koehn, G.M.: The Peculiarities of Plan Recognition for Intelligent Tutoring Systems. In: IJCAI Workshop on the Next Generation of Plan Recognition Systems, pp. 54–59 (1995)

    Google Scholar 

  11. Carberry, S.: Techniques for Plan Recognition. User Modeling and User-Adapted Interaction 11(1-2), 31–48 (2001)

    Article  MATH  Google Scholar 

  12. Shute, V.J., Psotka, J.: Intelligent Tutoring Systems: Past, Present and Future. In: Jonassen, D. (ed.) Handbook of Research on Educational Communications and Technology, Scholastic Publications (1996)

    Google Scholar 

  13. Conati, C., VanLehn, K.: Probabilistic plan recognition for cognitive apprenticeship. In: 18th Annual Meeting of the Cognitive Science Society, San Diego, CA. USA, pp. 403–408 (1996)

    Google Scholar 

  14. Conati, C., Gertner, A., Vanlehn, K.: Using bayesian networks to manage uncertainty in student modeling. User Modeling and User-Adapted Interaction 12(4), 371–417 (2002)

    Article  MATH  Google Scholar 

  15. Tchétagni, J.M.P., Nkambou, R.: Hierarchical Representation and Evaluation of the Student in an Intelligent Tutoring System. In: Cerri, S.A., Gouardéres, G., Paraguaçu, F. (eds.) ITS 2002. LNCS, vol. 2363, pp. 708–717. Springer, Heidelberg (2002)

    Google Scholar 

  16. Scapin, D., Bastien, J.M.C.: Analyse des tâches et aide ergonomique à la conception: l’approche MAD*. In: de l’IHM, K. (ed.) Analyse et conception, France, pp. 85–116 (2001)

    Google Scholar 

  17. Trichet, F., Tchounikine, P.: DSTM: a Framework to Operationalize and Refine a Problem-Solving Method modeled in terms of Tasks and Methods. Expert Systems With Applications (ESWA) 16, 105–120 (1999)

    Article  Google Scholar 

  18. Choquet, C., et al.: Modeling the Knowledge-Based Components of a Learning Environment within the Task/Method Paradigm. In: Goettl, B.P., Halff, H.M., Redfield, C.L., Shute, V.J. (eds.) ITS 1998. LNCS, vol. 1452, pp. 56–65. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Erik Duval Ralf Klamma Martin Wolpers

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

El-Kechaï, N., Després, C. (2007). Proposing the Underlying Causes That Lead to the Trainee’s Erroneous Actions to the Trainer. In: Duval, E., Klamma, R., Wolpers, M. (eds) Creating New Learning Experiences on a Global Scale. EC-TEL 2007. Lecture Notes in Computer Science, vol 4753. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-75195-3_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-75195-3_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-75194-6

  • Online ISBN: 978-3-540-75195-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics