Table 1 - uploaded by Mica R. Endsley
Content may be subject to copyright.
SS-SAI total items per construct with example

SS-SAI total items per construct with example

Source publication
Article
Full-text available
This paper presents the development of a subjective shared situation awareness (SA) inventory for distributed teams. Items populating the inventory were developed to incorporate participants' perceptions on key elements of SA, including the sufficiency of shared SA requirements, mechanisms, processes and devices. This inventory was administered dur...

Context in source publication

Context 1
... final iteration of the SS- SAI has a total of 53 items. Table 1 describes the final number of items retained for each construct of interest. ...

Citations

... Following both training scenarios, the participants were given a quick debrief about the scenario and the proper response. Next, the first performance scenario was started and once complete was followed by the same individual SA measures but with the added Shared SA Inventory (SSAI) [SST09]. Subsequently, participants were asked to complete the second performance scenario and the same individual SA and SSAI surveys. ...
Chapter
Full-text available
In this chapter, we provide an overview of Cyber Situational Awareness, an emerging research area in the broad field of cyber security, and discuss, at least at a high level, how to gain Cyber Situation Awareness. Our discussion focuses on answering the following questions: What is Cyber Situation Awareness? Why is research needed? What are the current research objectives and inspiring scientific principles? Why should one take a multidisciplinary approach? How could one take an end-to-end holistic approach? What are the future research directions?
... Based on these models, detailed procedures for objectively measuring individual and shared SA in teams have been developed. In addition, others have provided extensive research designed to measure individual and team SA processes (Bolstad et al., 2007;Cannon-Bowers et al., 1993;Chute & Wiener, 1996;Cooke et al., 2003;Cuevas, Jones, & Mossey, 2011;Gorman et al., 2005;Mosier & Chidester, 1991;Orasanu, 1990;Salas et al., 1995;Scielzo, Strater, Tinsley, Ungvarsky, & Endsley, 2009). This literature base provides a detailed and useful understanding of team SA and how to support it. ...
Article
Situation awareness (SA) has become a widely used construct within the human factors community, the focus of considerable research over the past 25 years. This research has been used to drive the development of advanced information displays, the design of automated systems, information fusion algorithms, and new training approaches for improving SA in individuals and teams. In recent years, a number of papers criticized the Endsley model of SA on various grounds. I review those criticisms here and show them to be based on misunderstandings of the model. I also review several new models of SA, including situated SA, distributed SA, and sensemaking, in light of this discussion and show how they compare to existing models of SA in individuals and teams.
Chapter
Traditionally, cyber security has been positioned and developed primarily from a computational-technology perspective. Unfortunately, this has been rather short-sighted as it provided solutions that fail to consider many human-related, cognitive, and social factors that underlie solutions of significance. While there have been substantial contributions from technology development that help the overall problem, a more comprehensive and effective approach is now needed that: (a) explores cognitive sciences and collaborative systems as a substantial basis to reify discovery and prediction, (b) produces incisive research results that inform the design of cyber tools and interfaces for active use, and (c) establishes new understanding of cyber situation awareness wherein the distributed cognitive activities of users, dynamic and changing roles of the threat and the environment, collaborative teamwork, and the promise of innovative cognitive technologies are intertwined and realized. This chapter outlines the perspective of social-cyber systems, a transdisciplinary approach designed to enhance information protection, reduce errors and uncertainty, take advantage of teamwork, and facilitate insightful understanding of what awareness and collective induction means for cyber defense and security. The Living Laboratory Framework is used to describe our approach and to implement specific aspects of social-cyber system research that inform dimensions of awareness and induction. Cognitive explorations underlying cyber situation awareness are presented that involve entwining theoretical foundations, models and simulation, and problem formulation - with - ethnographies of practice, knowledge elicitation, design storyboarding and technology prototyping. Integration of these important elements provides the basis of expanding individual cognitive processing into collaborative teamwork and collective induction that afford the goals of obtaining readiness and resilience in social-cyber systems. Finally, the chapter looks towards what future requirements will be necessary to sustain efficacy in protecting valuable resources and services.