of SSC San Diego, provided essential insights, information, and advice in support of this project. Mr. Stephen Martin, also of SSC San Diego, provided particularly critical technology evaluation and system design advice. Their valuable contributions are gratefully acknowledged.
JA
EXECUTIVE SUMMARYThe Advanced Interface for Tactical Security (AITS) project was initiated to improve the task performance of security forces through technology and design improvements to information display systems. The project was implemented in three phases: (1) problem analysis and concept definition, (2) interface design and validation, and (3) communications tools development. This report contains the results of the first phase.Field observations and interviews were conducted with members of the U.S. Army and U.S. Marine Corps to identify information requirements for tactical security and related missions. Clusters of information needs that emerged from these efforts were then matched with human engineering principles of control and display design to generate a set of functional interface requirements, with an emphasis on performance commonality across tasks. Because military interviews highlighted the need for improved communications, this topic was added to the project as a distinct design focus. Finally, a review of advanced interface technologies was conducted to identify the engineering stateof-the-art, and results were used to select the hardware concepts for the baseline interface system.
METHOD
PURPOSEThe primary purpose of this development effort was to design and validate new interface concepts for use by tactical security personnel. A secondary purpose was to fit these results into a larger context of information and visualization support for people whose jobs require a high degree of mobility and equipment portability, and where the demand for information is infrequent.
PROCEDUREThe Advanced Interface for Tactical Security (AITS) project was conducted in three phases:1. Problem analysis and concept definition, which included a. A functional review of the job. This step involved field observations and interviews with prospective user communities (i.e., military units with a tactical security mission), with the objective of identifying tasks and procedures, support tools, and personnel factors required to perform the major classes of security jobs. b. Definition of user information requirements. After analyzing trends in the observation and interview data, we generated a prioritized list of information needs for tactical security tasks. These results were validated by checking them with additional people familiar with the security mission. c. Comparison of tactical security needs with those of other missions (e.g., military police, site security, surveillance and reconnaissance forces, etc.). This step involved an overview of related security jobs, especially those requiring mobile operators, and was done primarily for completeness. d. A survey of relevant interface design principles to guide selection of hardware comp...