Ann Speed
YOU?
Author Swipe
View article: BeyondFingerprinting: AI-guided discovery of robust materials & processes
BeyondFingerprinting: AI-guided discovery of robust materials & processes Open
BeyondFingerprinting was a 2021-2024 Sandia Grand Challenge LDRD exploring the potential to develop new resilient materials and manufacturing processes by taking an artificial-intelligence (AI)-guided approach that integrates human-subject…
View article: Assessing the nature of large language models: A caution against anthropocentrism.
Assessing the nature of large language models: A caution against anthropocentrism. Open
Generative AI models garnered a large amount of public attention and speculation with the release of OpenAI’s chatbot, ChatGPT in November of 2022. At least two opinion camps exist – one that is excited about the possibilities these models…
View article: Assessing the nature of large language models: A caution against anthropocentrism
Assessing the nature of large language models: A caution against anthropocentrism Open
Generative AI models garnered a large amount of public attention and speculation with the release of OpenAIs chatbot, ChatGPT. At least two opinion camps exist: one excited about possibilities these models offer for fundamental changes to …
View article: Assessing the nature of large language models: A caution against anthropocentrism
Assessing the nature of large language models: A caution against anthropocentrism Open
Generative AI models garnered a large amount of public attention and speculation with the release of OpenAI’s chatbot, ChatGPT in November of 2022. At least two opinion camps exist – one that is excited about the possibilities these models…
View article: Central alarm station interface for situation awareness
Central alarm station interface for situation awareness Open
A method for analyzing security alarms is provided. The method comprising receiving alarm data from a number of security sensors generating alarms, wherein the alarm data includes spatio-temporal data regarding where and when an alarm is t…
View article: Characterizing Human Performance: Detecting Targets at High False Alarm Rates [Slides]
Characterizing Human Performance: Detecting Targets at High False Alarm Rates [Slides] Open
Analysts develop a “no threat” bias with high false alarms. If only shown alarms for actual attacks, may never actually see an alarm. We see this in the laboratory, but not often studied in applied environments. (TSA is an exception.) In t…
View article: The Impact of Individual Traits on Domain Task Performance: Exploring the Dunning-Kruger Effect
The Impact of Individual Traits on Domain Task Performance: Exploring the Dunning-Kruger Effect Open
Research shows that individuals often overestimate their knowledge and performance without realizing they have done so, which can lead to faulty technical outcomes. This phenomenon is known as the Dunning-Kruger effect (Kruger & Dunning, 1…
View article: Research Needs for Trusted Analytics in National Security Settings
Research Needs for Trusted Analytics in National Security Settings Open
As artificial intelligence, machine learning, and statistical modeling methods become commonplace in national security applications, the drive to create trusted analytics becomes increasingly important. The goal of this report is to identi…
View article: Trait Vs. Skill: Individual Differences -- Survey Questions
Trait Vs. Skill: Individual Differences -- Survey Questions Open
This document is UUR survey questions for use in an exploratory express LDRD experiment. The purpose of the study is to understand if people overestimate their performance only in some situations or some people are more prone to it do to a…
View article: Intrusion Detection System Alarm Station Operator Interface Improvements
Intrusion Detection System Alarm Station Operator Interface Improvements Open
To address Alarm Station operator performance, Portable Intrusion Detection System team gathered information concerning AS operator data needs when assessing alarms. The purpose was to improve the Portable Intrusion Detection System operat…
View article: Human Factors in Security
Human Factors in Security Open
Physical security systems (PSS) and humans are inescapably tied in the current physical security paradigm. Yet, physical security system evaluations often end at the console that displays information to the human. That is, these evaluation…
View article: Sandia National Laboratories’ Cyber Tracer Program
Sandia National Laboratories’ Cyber Tracer Program Open
The Cyber Tracer Program at Sandia National Laboratories develops methods to prevent, counter and minimize cyber-attacks and protect valuable digital assets in the interest of national security.
View article: Method for Determining the Sensitivity of a Physical Security System.
Method for Determining the Sensitivity of a Physical Security System. Open
Modern systems, such as physical security systems, are often designed to involve complex interactions of technological and human elements. Evaluation of the performance of these systems often overlooks the human element. A method is propos…
View article: Applying Image Clutter Metrics to Domain-Specific Expert Visual Search
Applying Image Clutter Metrics to Domain-Specific Expert Visual Search Open
Visual clutter metrics play an important role in both the design of information visualizations and in the continued theoretical development of visual search models. In visualization design, clutter metrics provide a mathematical prediction…
View article: The Role of Visual Inspection in the 21<sup>st</sup> Century
The Role of Visual Inspection in the 21<sup>st</sup> Century Open
Visual inspection research has a long history spanning the 20 th century and continuing to the present day. Current efforts in multiple venues demonstrate that visual inspection continues to have a vital role for many different types of ta…
View article: Modeling human-technology interaction as a sociotechnical system of systems
Modeling human-technology interaction as a sociotechnical system of systems Open
As system of systems (SoS) models become increasingly complex and interconnected a new approach is needed to capture the effects of humans within the SoS. Many real-life events have shown the detrimental outcomes of failing to account for …