RESUMEN
Declines in the capacity to sustain attention to repetitive, monotonous tasks is a phenomenon known as vigilance decrement (Endsley M, Kiris E. The out-of-the-loop performance problem and level of control in automation. 1995. Hum Factors. 37:32-64). This review compares cognitive theories with psycho-physiological models of vigilance decrement, and a gap is identified in mapping between the 2. That is, theories of vigilance decrement refer to "cognitive" resources; by contrast, psychophysiological models of the cerebral systems associated with attention explain performance functions according to neurochemical resources. A map does not currently exist in the literature that bridges the gap between cognitive theories of vigilance decrement and psychophysiological models of the human attention system. The link between "cognitive resource" theories of vigilance decrement and the psychophysiological models of attention performance is a gap in the literature that this review fills. This comprehensive review provides an expanded psychophysiological understanding of vigilance decrement that could help inform the management of declines in sustained attention capacity in operational settings. In addition, elucidating the link between cognitive theories of vigilance decrement and psychophysiological models of the human attention system might be used to treat and better understand pathologies such as attention-deficit hyperactivity disorder.
Asunto(s)
Psicofisiología , Vigilia , Humanos , Tiempo de Reacción/fisiologíaRESUMEN
Vigilance decrement refers to a psychophysiological decline in the capacity to sustain attention to monotonous tasks after prolonged periods. A plethora of experimental tasks exist for researchers to study vigilance decrement in classic domains such as driving and air traffic control and baggage security; however, the only cyber vigilance tasks reported in the research literature exist in the possession of the United States Air Force (USAF). Moreover, existent cyber vigilance tasks have not kept up with advances in real-world cyber security and consequently no longer accurately reflect the cognitive load associated with modern network defense. The Western Australian Cyber Defense Task (WACDT) was designed, engineered, and validated. Elements of network defense command-and-control consoles that influence the trajectory of vigilance can be adjusted within the WACDT. These elements included cognitive load, event rate, signal salience and workload transitions. Two forms of the WACDT were tested. In static trials, each element was adjusted to its maximum level of processing difficulty. In dynamic trials, these elements were set to increase from their minimum to their maximum values. Vigilance performance in static trials was shown to improve over time. In contrast, dynamic WACDT trials were characterized by vigilance performance declines. The WACDT provides the civilian human factors research community with an up-to-date and validated vigilance task for network defense accessible to civilian researchers.
RESUMEN
The capacity to sustain attention to virtual threat landscapes has led cyber security to emerge as a new and novel domain for vigilance research. However, unlike classic domains, such as driving and air traffic control and baggage security, very few vigilance tasks exist for the cyber security domain. Four essential challenges that must be overcome in the development of a modern, validated cyber vigilance task are extracted from this review of existent platforms that can be found in the literature. Firstly, it can be difficult for researchers to access confidential cyber security systems and personnel. Secondly, network defense is vastly more complex and difficult to emulate than classic vigilance domains such as driving. Thirdly, there exists no single, common software console in cyber security that a cyber vigilance task could be based on. Finally, the rapid pace of technological evolution in network defense correspondingly means that cyber vigilance tasks can become obsolete just as quickly. Understanding these challenges is imperative in advancing human factors research in cyber security. CCS categories: Human-centered computing~Human computer interaction (HCI)~HCI design and evaluation methods.