+1 Recommend
1 collections
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Towards Design Recommendations for Training of Security Critical Agents in Mixed Reality Environments


      , ,

      Proceedings of the 32nd International BCS Human Computer Interaction Conference (HCI)

      Human Computer Interaction Conference

      4 - 6 July 2018

      Augmented Reality, User studies, Ethical issues



            This paper presents an overview of a requirements capture process and identified design challenges for a Mixed Reality (MR) platform which is designed to be used by security critical agents at operational command level. The platform aims to support a wide range of scenarios ranging from firearms training to chemical and nuclear incidents. The paper identifies a number of key design issues which are required to provide effective training across the range of scenarios discussed.


            Author and article information

            July 2018
            July 2018
            : 1-5

            L-4422 Belvaux – LU
            © Huynen et al. Published by BCS Learning and Development Ltd. Proceedings of British HCI 2018. Belfast, UK.

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            Proceedings of the 32nd International BCS Human Computer Interaction Conference
            Belfast, UK
            4 - 6 July 2018
            Electronic Workshops in Computing (eWiC)
            Human Computer Interaction Conference
            Product Information: 1477-9358BCS Learning & Development
            Self URI (journal page): https://ewic.bcs.org/
            Electronic Workshops in Computing


            1. 2012 Designing blended spaces Proceedings of the 26th Annual BCS Interaction Specialist Group Conference on People and Computers 398 403 Birmingham, United Kingdom British Computer Society

            2. 1998 Contextual design: Defining customer-centered systems Morgan Kaufmann Publishers

            3. Bureau of Counterterrorism. United States Department of State 2016 Country Reports on Terrorism 2016 United States Department of State Publication

            4. 2006 Learning for action: a short definitive account of soft systems methodology and its use, for practitioners, teachers and students John Wiley and Sons Ltd

            5. 1990 Flow: The psychology of optimal experience New York Harper and Row

            6. , ven 2009 Fidelity and validity of simulator training Theoretical Issues in Ergonomics Science, 10 4 305 314

            7. 2011 Gamification: Toward a definition In CHI 2011 gamification workshop proceedings (Vol. 12) , Canada

            8. Europol. (2016 Changes in modus operandi of Islamic State terrorist attacks The Hague: Europol Public Information

            9. 2003 Motivating, Influencing, and Persuading Users Motivating, Influencing, and Persuading Users 358 370 Hillsdale, NJ, USA: L. Erlbaum Associates Inc.

            10. 1999 Contextual design CHI ’99 extended abstracts on Human factors in computing systems Pittsburgh, Pennsylvania ACM

            11. 2003 Being There: Concepts, effects and measurement of user presence in synthetic environments Amsterdam Ios Press

            12. 2007 Immersive Simulation Training for the Dismounted Soldier Orlando, Florida, USA US Department of Defense

            13. 1997 At the Heart of It All: The Concept of Presence Journal of Computer-Mediated Communication 3 2

            14. 1998 Inattentional Blindness (Vol. 33) Cambridge: MA MIT press

            15. 1994 A taxonomy of mixed reality visual displays IEICE TRANSACTIONS on Information and Systems, 77 12 1321 1329

            16. 2018 Are you interested in how Augmented and Virtual Reality can be used to train Security Critical Agents? Retrieved from TARGET - Training Augmented Reality Generalised Environment Toolkit: http://www.target-h2020.eu

            17. 1973 Dilemmas in a general theory of planning Policy Sciences 4 155 169


            Comment on this article