HUMAN FACTOR Research Papers - Academia.edu (original) (raw)
Over the last years we observe how closely related the competence growth and the need to improve the quality of the tourist companies are. But the fact that the improving of the quality is not enough to face up to the effects that... more
Over the last years we observe how closely related the competence growth and the need to improve the quality of the tourist companies are. But the fact that the improving of the quality is not enough to face up to the effects that globalization has in this sector calls the attention. The repercussion of the human factor has been analyzed and investigated in the tourist sector, but it has been verified how later it does not join in the measure systems and quality service improvement. For this reason this investigation raises a review of the models of quality measurement of the service incorporating the employee as a key piece in the development of the services and in the loyalty and satisfaction of the customers. The secondary role that the employee has adopted opposite to the customer eliminates any significant function in terms of the quality management of the service. Therefore, it becomes necessary to create new models of quality management that integrate the employee and then th...
Objective: The authors evaluated the validity of trust in automation and information technology (IT) suspicion by examining their factor structure and relationship with decision confidence. Background: Research on trust has burgeoned, yet... more
Objective: The authors evaluated the validity of trust in automation and information technology (IT) suspicion by examining their factor structure and relationship with decision confidence. Background: Research on trust has burgeoned, yet the dimensionality of trust remains elusive. Researchers suggest that trust is a unidimensional construct, whereas others believe it is multidimensional. Additionally, novel constructs, such as IT suspicion, have yet to be distinguished from trust in automation. Research is needed to examine the overlap between these constructs and to determine the dimensionality of trust in automation. Method: Participants (N = 72) engaged in a computer-based convoy scenario involving an automated decision aid. The aid fused real-time sensor data and provided route recommendations to participants who selected a route based on (a) a map with historical enemy information, (b) sensor inputs, and (c) automation suggestions. Measures for trust in automation and IT susp...
Primarily on the basis of interviews, the treatment of gender is compared as a human factors consideration within military and civilian aviation. Defense and civilian cockpits have traditionally been built to specifications based on male... more
Primarily on the basis of interviews, the treatment of gender is compared as a human factors consideration within military and civilian aviation. Defense and civilian cockpits have traditionally been built to specifications based on male anthropometry and may embody a physical bias against women and smaller-statured men. Defense and commercial divisions of airframe manufacturers rely on similar computer modeling techniques and anthropometric data to accommodate a targeted population of pilots. However, the design of defense aircraft tends to be highly regulated, and more efforts have been taken to ensure that a larger pool of otherwise eligible pilots is accommodated by future systems, such as in the Joint Primary Aircraft Training System. Within very loose FAA guidelines, commercial manufacturers are responsive to their customer airlines, most of which are not concerned with accommodating women pilots unless they fear liability for employment discrimination. Commercial manufacturer...
The Human Factors Analysis and Classification System (HFACS) is a general human error framework originally developed and tested within the U.S. military as a tool for investigating and analyzing the human causes of aviation accidents.... more
The Human Factors Analysis and Classification System (HFACS) is a general human error framework originally developed and tested within the U.S. military as a tool for investigating and analyzing the human causes of aviation accidents. Based on Reason's (1990) model of latent and active failures, HFACS addresses human error at all levels of the system, including the condition of aircrew and organizational factors. The purpose of the present study was to assess the utility of the HFACS framework as an error analysis and classification tool outside the military. The HFACS framework was used to analyze human error data associated with aircrew-related commercial aviation accidents that occurred between January 1990 and December 1996 using database records maintained by the NTSB and the FAA. Investigators were able to reliably accommodate all the human causal factors associated with the commercial aviation accidents examined in this study using the HFACS system. In addition, the class...
- by Scott Shappell
- •
- Methodology, Causality, Safety, Analysis
- by Akash Bhoi
- •
- Ergonomics, CAD, Medical Human Factors, FMEA
- by Scott Shappell
- •
- Methodology, Causality, Safety, Analysis
Operating systems and programmes are more protected these days and attackers have shifted their attention to human elements to break into the organisation's information systems. As the number and frequency of cyber-attacks... more
Operating systems and programmes are more protected these days and attackers have shifted their attention to human elements to break into the organisation's information systems. As the number and frequency of cyber-attacks designed to take advantage of unsuspecting personnel are increasing, the significance of the human factor in information security management cannot be understated. In order to counter cyber-attacks designed
There are few studies of the human factors involved in the engagement of presence. The present study aims to investigate the influence of five user characteristics - test anxiety, spatial intelligence, verbal intelligence, personality and... more
There are few studies of the human factors involved in the engagement of presence. The present study aims to investigate the influence of five user characteristics - test anxiety, spatial intelligence, verbal intelligence, personality and computer experience - on the sense of presence in university students when exposed to virtual environments designed to assess their levels of test anxiety. This is the first study to investigate the influence of spatial intelligence on the sense of presence, and the first to use an immersive virtual reality system to investigate the relationship between users' personality characteristics and presence. The results show a greater sense of presence in test anxiety environments than in a neutral environment. Moreover, high test anxiety students feel more presence than their non-test anxiety counterparts, especially in test anxiety environments. Spatial intelligence and introversion also influence the sense of presence experienced by high test anxiety students exposed to emotional virtual environments. Interestingly, each of these user characteristics influences different dimensions of the sense of presence. These results may help to identify new groups of patients likely to benefit from virtual reality therapy.
تعامل انسان با برنامه هاي کاربردي ، شناخت انسان را از برنامه هاي کاربردي افزایش می دهد . عوامل انسانی فیلدي مطالعاتی علم درك مشخصات توانایی انسان براي طراحی ، توسعه و گسترش خدمات و سیستم ها ، می باشد. درساده ترین معنا ، فیلدي در مورد... more
تعامل انسان با برنامه هاي کاربردي ، شناخت انسان را از برنامه هاي کاربردي افزایش می دهد . عوامل انسانی فیلدي
مطالعاتی علم درك مشخصات توانایی انسان براي طراحی ، توسعه و گسترش خدمات و سیستم ها ، می باشد. درساده
ترین معنا ، فیلدي در مورد ویژگی ها و عواقب ناشی از تعامل بین انسان و ابزار است .
ازطریق درك قابلیتها ، محدودیت ها و ویژگی هاي دیگر از اینکه انسانها چگونه تفسیر و ارتباط برقرار می کنند با جهان
اطرافشان ، مهندسی عوامل انسانی تاثیرات طراحی و توسعه در تمام ابعاد از قراردادن دکمه ها در صفحه نمایش تا
سازماندهی ساخت و ساز از سیستم هاي نرم افزاري تولید شده و توزیع شده در سراسر جهان می باشد .
عامل هاي انسانی وقتی با مهندسی نرم افزار به کار برده می شود؛ تجربه کاربر ، طراحی رابط کاربري و حتی تجربه برنامه
نویسان از زبانهاي برنامه نویسی سطح بالا و .... نقش مهمی در تعامل ما با فناوري را بازي می کند. در این مقاله به بررسی
رابطه بین عوامل انسانی و دیگر جنبه هاي مهندسی نرم افزار از جمله توسعه سریع و کلاسیک مدل توسعه ، معماري
سرویس گرا و استخراج معنایی می پردازیم .
Official enquiries into large scale system failures may be used to interpret events according to the various types of human error which were committed. For example there are errors in operation of the system, in maintenance practices etc.... more
Official enquiries into large scale system failures may be used to interpret events according to the various types of human error which were committed. For example there are errors in operation of the system, in maintenance practices etc. Twelve well documented disasters are analysed and the conclusion emerges that operator error predominates. This fact is not suprising, reflecting as it does the short time span in which operators have to make decisions, compared to the other players such as designers, maintenance men etc.This conclusion has implications for the other human disciplines involved. For example designers should conceive systems which will be less prone to operator error, while management should support operators in whatever way possible to increase their effectiveness.
Les erreurs humaines sont étudiées dans le cadre théorique de la gestalt theory comparée aux théories de l'erreur cognitive. II est démontré que les processus ou actes de cognition erronée ne sont pas toujours les conséquences de la... more
Les erreurs humaines sont étudiées dans le cadre théorique de la gestalt theory comparée aux théories de l'erreur cognitive. II est démontré que les processus ou actes de cognition erronée ne sont pas toujours les conséquences de la routine, mais plutôt la suite naturelle d'une organisation de la forme, indépendante du fait qu'une certaine ligne d'action ait été apprise ou non. Des exemples issus des champs de la perception visuelle, de la pensée et de l'action dirigées vers un but sont présentés, dans lesquels le principes de la gestalt, finalité, bon déroulement et proximité conditionnent l'apparition d'échecs. Est aussi mis en discussion le fait que les erreurs pouvaient être ou pas considérées comme évaluation positive, comme elles pourraient être l'indication de la résolution d'un problème de production et dans certaines situations, fournir de l'information sur la manière la plus facile d'approcher un but.Human errors are discussed within the theoretical framework of gestalt theory as compared with cognitive error theories. It is argued that erroneous cognitive processes or actions are not always the consequence of routinisation, but instead are a natural consequence of gestalt organisation independent of whether or not a certain line of action has been learned. Examples from the fields of visual perception, thinking, and goal-directed action are presented, in which the gestalt principles of closure, good continuation, and proximity are conditions governing the emergence of failures. Also discussed is the issue of whether or not errors should be given positive evaluation, as they may be a cue for productive problem solving and may, in certain situations, provide information as to the smoothest path to approaching a goal.
Da millenni, l'attività di intelligence è una funzione primaria delle agenzie governative dei più importanti Paesi. Ciò comporta l'impiego di sistemi di crittografia per la protezione di dati riservati, da un lato, e di crittanalisi per... more
Da millenni, l'attività di intelligence è una funzione primaria delle agenzie governative dei più importanti Paesi. Ciò comporta l'impiego di sistemi di crittografia per la protezione di dati riservati, da un lato, e di crittanalisi per carpire tali informazioni, dall'altro. Più recentemente, la sicurezza informatica (cybersicurezza) è diventata un'esigenza di privati e di aziende, a cui si è opposto un incremento speculare dell'ingegno di malintenzionati nell'uso di tecniche crittografiche per fini disonesti, illeciti o illegali. L'articolo esplora alcuni aspetti del complesso problema privacy-sicurezza nel contesto del ruolo che la crittologia gioca in questi temi particolarmente caldi. Si introducono, in modo discorsivo e intuitivo, i principi di base dei sistemi a chiave pubblica, oltre a due recenti sviluppi in crittografia. Si accenna, infine, al cyber rischio dovuto al cosiddetto"fattore umano", se non adeguatamente governato.
From millennia, the issue of intelligence has been a major concern of government agencies in many countries. Therefore, cryptology techniques have been emerging in the dual role of cryptography to protect private information and cryptanalysis to get non-authorized access to the same information. In recent times, cybersecurity objectives, as extended to both personal and business sectors, witnessed a dramatic soaring of cybercrime activities, especially malware. The paper investigates a number of items in the intertwined relationship between privacy and security in the framework of the increasing role cryptology is expected to play in the future. The principles of public-key systems and other recent developments of cryptography are introduced in simple tutorial form. A final issue is how to contain the cyber risk stemming from "the human factor", when not properly controlled.
- by Esa Rantanen and +1
- •
- Information Systems, Technology, Human Factors, Taxonomy
The article is about AI research in the context of a complex artistic behavior: expressive music performance. A computer program is presented that learns to play piano with 'expression' and that even won an international computer... more
The article is about AI research in the context of a complex artistic behavior: expressive music performance. A computer program is presented that learns to play piano with 'expression' and that even won an international computer piano performance contest. A superficial analysis of an expressive performance generated by the system seems to suggest creative musical abilities. After a critical discussion of the processes underlying this behavior, we abandon the question of whether the system is really creative, and turn to the true motivation that drives this research: to use AI methods to investigate and better understand music performance as a human creative behavior. A number of recent and current results from our research are briefly presented that indicate that machines can give us interesting insights into such a complex creative behavior, even if they may not be creative themselves.
Data processing has significantly expanded virtual profession opportunities; regardless these subsidize have likewise assemble authentic insecurity pertaining to the data protection. Beforehand, issues of data protection were contemplated... more
Data processing has significantly expanded virtual profession opportunities; regardless these subsidize have likewise assemble authentic insecurity pertaining to the data protection. Beforehand, issues of data protection were contemplated in a technological framing, yet evolving protection indigence have expanded researchers regard to examine the administration occupation in the data protection administration. various investigations have inspected distinctive administration occupation and activities; however no one has given thorough picture of these occupation and implementation to supervise the data protection satisfactorily. Therefore, it is necessary to accumulate information regarding various governmental occupation and implementation from scribbling to endow administrators to acquire above mentioned for a progressively all-encompassing style to dispense with the data protection administration. By using a systematic scribbling review technique in this paper, it combined literature identified with the roles of administration in the data protection to investigate explicit administrative exercises to improve the data protection administration. It found that various exercises of administration, especially improvement and accomplishment of the data protection strategy, acquiescence practice, IT framework administration, IT and business arrangement, awareness, human resources administration and improvement of efficient business information architecture significantly affected the nature of information security management. In this manner, this examination makes a novel commitment by contending that an increasingly all-encompassing way to deal with the information security is required and it propose the manners by which administrators can assume a compelling job in the information security. This examination likewise opens up numerous new roads for additional examination around there.
Subject area – Production management and personnel management. Student level/applicability – Production management modules of undergraduate business and management courses. Case overview – The case describes the implementation of 5S... more
Subject area – Production management and personnel management.
Student level/applicability – Production management modules of undergraduate business and management courses.
Case overview – The case describes the implementation of 5S by a Polish production company, namely Bianor. It presents not only the literature base and benefits of 5S but, in particular, shows the specificity of the implementation process, taking into consideration attitudes of employees; moreover, the study devotes some attention to aspects of organizational culture.
Expected learning outcomes – The case shows how to implement the 5S method in a production company, and how effective communication of processes is essential to implementing business change.
Supplementary materials – Teaching note.
The IAEA International Standards for Tissue Banks published in 2003 were based on the Standards then currently in use in the USA and the European Union, among others, and reflect the best practices associated with the operation of a... more
The IAEA International Standards for Tissue Banks published in 2003 were based on the Standards then currently in use in the USA and the European Union, among others, and reflect the best practices associated with the operation of a tissue bank. They cover legal, ethical and regulatory controls as well as requirements and procedures from donor selection and tissue retrieval to processing and distribution of finished tissue for clinical use. The application of these standards allows tissue banks to operate with the current good tissue practice, thereby providing grafts of high quality that satisfy the national and international demand for safe and biologically useful grafts. The objective of this article is to review the IAEA Standards and recommend new topics that could improve the current version.