Show simple item record

dc.contributor.authorHodgetts, Helen M.
dc.contributor.authorVachon, François
dc.contributor.authorChamberland, C.
dc.contributor.authorTremblay, Sébastian
dc.date.accessioned2017-05-09T12:06:32Z
dc.date.available2017-05-09T12:06:32Z
dc.date.issued2017-05-30
dc.identifier.citationHodgetts, H.M., Vachon, F., Chamberland, C., & Tremblay, S., (2017). See no Evil: Challenges of security surveillance and monitoring. Journal of Applied Research in Memory and Cognition.en_US
dc.identifier.issn2211-3681
dc.identifier.issn2211-369X (ESSN)
dc.identifier.urihttp://hdl.handle.net/10369/8447
dc.descriptionThis article was published in Journal of Applied Research in Memory and Cognition on 30 May 2017 available at https://doi.org/10.1016/j.jarmac.2017.05.001en_US
dc.description.abstractWhile the development of intelligent technologies in security surveillance can augment human capabilities, they do not replace the role of the operator entirely; as such, when developing surveillance support it is critical that limitations to the cognitive system are taken into account. The current article reviews the cognitive challenges associated with the task of a CCTV operator: visual search and cognitive/perceptual overload, attentional failures, vulnerability to distraction, and decision-making in a dynamically evolving environment. While not directly applied to surveillance issues, we suggest that the NSEEV (noticing – salience, effort, expectancy, value) model of attention could provide a useful theoretical basis for understanding the challenges faced in detection and monitoring tasks. Having identified cognitive limitations of the human operator, this review sets out a research agenda for further understanding the cognitive functioning related to surveillance, and highlights the need to consider the human element at the design stage when developing technological solutions to security surveillance.en_US
dc.language.isoenen_US
dc.publisherElsevieren_US
dc.relation.ispartofseriesJournal of Applied Research in Memory and Cognition;
dc.rights.urihttps://creativecommons.org/licenses/by-nc-nd/3.0/
dc.subjectvisual searchen_US
dc.subjectdynamic decision-makingen_US
dc.subjectinformation overloaden_US
dc.subjectattentional failuresen_US
dc.subjectdistractionen_US
dc.titleSee no Evil: Challenges of security surveillance and monitoringen_US
dc.typeArticleen_US
dc.identifier.doihttps://doi.org/10.1016/j.jarmac.2017.05.001
dcterms.dateAccepted2017-05-01
rioxxterms.funderCardiff Metropolitan Universityen_US
rioxxterms.identifier.projectCardiff Metropolian (Internal)en_US
rioxxterms.versionAMen_US
rioxxterms.licenseref.urihttp://www.rioxx.net/licenses/under-embargo-all-rights-reserveden_US
rioxxterms.licenseref.startdate2017-05-09
rioxxterms.freetoread.startdate2018-05-30
rioxxterms.funder.project37baf166-7129-4cd4-b6a1-507454d1372een_US


Files in this item

Thumbnail

This item appears in the following collection(s)

Show simple item record

https://creativecommons.org/licenses/by-nc-nd/3.0/
Except where otherwise noted, this item's license is described as https://creativecommons.org/licenses/by-nc-nd/3.0/