25
Technical Report 875 Identification of Command Post Lf Exercises (CPX) and Field Training c*1 Exercises (FTX) Messages CJ S. Delane Keene, Robert E. Solick, and James W. Lussier DTIC I U.S. Army Research Institute 0 EL E CTEf APRO0 41990 February 1990 D - United States Army Research Institute for the Behavioral and Social Sciences Approved for public release; distribution is unlimited. ()o

Identification of Command Post c*1 Exercises (FTX) …dtic.mil/dtic/tr/fulltext/u2/a220385.pdf · Technical Report 875 Identification of Command Post Lf Exercises (CPX) and Field

Embed Size (px)

Citation preview

Page 1: Identification of Command Post c*1 Exercises (FTX) …dtic.mil/dtic/tr/fulltext/u2/a220385.pdf · Technical Report 875 Identification of Command Post Lf Exercises (CPX) and Field

Technical Report 875

Identification of Command PostLf Exercises (CPX) and Field Trainingc*1 Exercises (FTX) Messages

CJ S. Delane Keene, Robert E. Solick,and James W. Lussier DTICI U.S. Army Research Institute 0 EL E CTEf

APRO0 41990February 1990 D -

United States Army Research Institutefor the Behavioral and Social Sciences

Approved for public release; distribution is unlimited.

()o

Page 2: Identification of Command Post c*1 Exercises (FTX) …dtic.mil/dtic/tr/fulltext/u2/a220385.pdf · Technical Report 875 Identification of Command Post Lf Exercises (CPX) and Field

U.S. ARMY RESEARCH INSTITUTE

FOR THE BEHAVIORAL AND SOCIAL SCIENCES

A Field Operating Agency Under the Jurisdiction

of the Deputy Chief of Staff for Personnel

EDGAR M. JOHNSON JON W. BLADESTechnical Director COL, IN

Commanding

Technical review by

Douglas K. Spiegel c o --Robert H. Sulzen , NTIS CRA&

DTIC TABUniannouinced "Justification

By

Distribution I

Availability. Codes

Avtil and/orDist Special

NOTICES

D TRIBUTION: Primary distribution o s report has been m I. Please addresscorre ndence concerning distributio f reports to: U.S. Army Research te for theBehavio ocial Sciences PERI-POX, 5001 Eisenhower Ave., Alex nia22333-5600.

FINAL DISPOSITION: This report may be destroyed when it is no longer needed. Please do notreturn it to the U.S. Army Research Institute for the Behavioral and Social Sciences.

NOTE: The findings in this report are not to be construed as an official Department of the Armyposition, unless so designated by other authorized documents.

Page 3: Identification of Command Post c*1 Exercises (FTX) …dtic.mil/dtic/tr/fulltext/u2/a220385.pdf · Technical Report 875 Identification of Command Post Lf Exercises (CPX) and Field

UNCLASSIFIEDSECURITY CLASSIFICATION OF THIS PAGE

Form ApprovedREPORT DOCUMENTATION PAGE OMB No. O704-188

la. REPORT SECURITY CLASSIFICATION lb. RESTRICTIVE MARKINGS

Unclassified2a. SECURITY CLASSIFICATION AUTHORITY 3. DISTRIBUTION/AVAILABILITY OF REPORT

Approved for public release;2b. DECLASSIFICATION / DOWNGRADING SCHEDULE distribution is unlimited.

4. PERFORMING ORGANIZATION REPORT NUMBER(S) 5. MONITORING ORGANIZATION REPORT NUMBER(S)

ARI Technical Report 875 --

6a. NAME OF PERFORMING ORGANIZATION 6b. OFFICE SYMBOL 7a. NAME OF MONITORING ORGANIZATIONU.S. Army Research Institute (if applicable)

Field Unit at Fort Leavenworth PERI-SL

6c. ADDRESS (City, State, and ZIP Code) 7b. ADDRESS (City, State, and ZIP Code)

P.O. Box 3407

Ft. Leavenworth, KS 66027-0347

8a. NAME OF FUNDING/ PONSORING 8b. OFFICE SYMBOL 9. PROCUREMENT INSTRUMENT IDENTIFICATION NUMBERORGANIZATIQN U.S. Army Researc (If applicable)

Institute tor the Behavioraland Social Sciences PERI-S --

rc. ADDRESS (City, State, and ZIP Code) 10. SOURCE OF FUNDING NUMBERSPROGRAM PROJECT TASK WORK UNIT

5001 Eisenhower Avenue ELEMENT NO. NO. NO. ACCESSION NO.Alexandria, VA 22333-5600 62785A 791 1301 H2

11. TITLE (Include Security Classification)

Identification of Command Post Exercises (CPX) and Field Training Exercises (FTX) Messages

12. PERSONAL AUTHOR(S)Keene, S. Delane; Solick, Robert E.; and Lussier, James W. (ARI)

13a. TYPE OF REPORT F73b. TIME COVERED 14. DATE OF REPORT (YearMonth, Day) 15. PAGE COUNTFinal FROM 88/05 TO 89/05 1990, February I

16. SUPPLEMENTARY NOTATIONAlso see companion report: Construction of Realistic Messages from Computer-Generated Alert

Messages by James W. Lussier, Robert E. Solick, S. Delane Keene, and J. M. Linville.

17. COSATI CODES 18. SUBJECT TERMS (Continue on reverse if necessary and identify by block number)FIELD GROUP SUB-GROUP Alert messages CPX training Battle simulation

Command group FTX training Controller,

training-, Computer simulation workload,

19.'ABSTRACT (Continue on reverse if necessary and identify by block number)Command groups are increasingly turning to computer-driven command post exercises

(CPX) as an economical and convenient means of training. The overall realism of this method

of training relies heavily on the capabilities of the control staff, who must act as keypersonnel in the units at echelons above, below, and adjacent to the training audience.

The controllers must generate a stream of realistic tactical messages, while attending to

a myriad of other duties that place demands on their time. Further, this task is not wellsupported by the current generation of battle simulations. Automating the production of

realistic messages is one solution to the problem. This report examines whether experi-

enced Army officers can distinguish between messages produced in a CPX and FIX environment

and investigates the characteristics of the messages that contribute to successful identi-

fication. The research will identify requirements for a system to automate the translation

of simulation output into realistic messages.

20. DISTRIBUTION /AVAILABILITY OF ABSTRACT 21. ABSTRACT SECURITY CLASSIFICATIONM UNCLASSIFIED/UNLIMITED [] SAME AS RPT. 0 DTIC USERS Unclassified

22a. NAME OF RESPONSIBLE INDIVIDUAL 221- TELEPHONE (Include Area Code) 22c. OFFICE SYMBOL

S. Delane Keenp (913) 684-4933 PERI-SL

DD Form 1473, JUN 86 Previous editions are obsolete. SECURITY CLASSIFICATION OF THIS PAGE

UNCLASSIFIEDi

Page 4: Identification of Command Post c*1 Exercises (FTX) …dtic.mil/dtic/tr/fulltext/u2/a220385.pdf · Technical Report 875 Identification of Command Post Lf Exercises (CPX) and Field

Technical Report 875

Identification of Command Post Exercises (CPX) andField Training Exercises (FTX) Messages

S. Delane Keene, Robert E. Solick,and James W. Lussier

U.S. Army Research Institute

Field Unit at Fort Leavenworth, KansasStanley M. Halpin, Chief

Systems Research LaboratoryRobin L. Keesee, Di r*,3r

U.S. Army Research Institute for the Behavioral dnd Social Sciences5001 Eisenhower Avenue, Alexandria, Virginia 22333-5600

Office, Deputy Chief of Staff for PersonnelDepartment of the Army

February 1990

Army Project Number Manpower, Personnel, and Training2Q162785A791

Approved lor public release; distribution is unlimited.

iii

Page 5: Identification of Command Post c*1 Exercises (FTX) …dtic.mil/dtic/tr/fulltext/u2/a220385.pdf · Technical Report 875 Identification of Command Post Lf Exercises (CPX) and Field

FOREWORD

The U.S. Army Research Institute, Fort Leavenworth Field Unit, conducts asystems and training research program that supports the Combined Arms Center(CAC).

For several years the Fort Leavenworth Field Unit has been involved inresearch to support the development and use of computer-driven battle simula-tions for training battalion through division command groups. A pressingproblem with the current generation of battle simulations is the burden placedon controllers, who must, in addition to many other duties, generate a streamof realistic tactical messages. This research will contribute to identifica-tion of requirements for an automated system to translate simulation outputinto more realistic messages, thereby improving training realism and reducingcontroller overload.

This research was an exploratory effort funded under Research Task 1301.It compares the ability of experienced officers to identify messages tran-scribed from command post exercises with their ability to identify similarmessages transcribed from field exercises. It also investigates which char-acteristics of messages are most salient in identification.

EDGAR M. JOHNSONTechnical Director

v

Page 6: Identification of Command Post c*1 Exercises (FTX) …dtic.mil/dtic/tr/fulltext/u2/a220385.pdf · Technical Report 875 Identification of Command Post Lf Exercises (CPX) and Field

IDENTIFICATION OF COMMAND POST EXERCISES (CPX) AND FIELD TRAINING EXERCISES

(FTX) MESSAGES

EXECUTIVE SUMMARY

Requirement:

Command groups are increasingly turning to computer-driven command postexercises (CPX) as an economical and convenient training mode. The overallrealism of this method of training relies heavily on the capabilities of thecontrol staff, who must play the roles of key personnel in the units at eche-lons above, below, and adjacent to the training audience. The controllersmust generate an information stream of realistic tactical messages whileattending to a myriad of other duties that place demands on their time. Fur-thermore, this task is not well supported by the current generation of battlesimulations. Automating the production of realistic messages is one solutionto this problem. This study was designed to provide information that wouldcontribute to identification of the requirements for a system to automate thetranslation of simulation output into realistic messages.

Procedure:

Thirty-one company grade combat arms officers participated in this study.Participants were presented with 48 stimulus messages in written text (24 CPXand 24 FTX) and asked to identify the training environment in which theyoriginated. Each message was further evaluated on four semantic differentialscales: vordy-succinct, vague-precise, vorthless-valuable, and excited-calm.The participants were also asked to respond to a questionnaire that assessedtheir beliefs concerning characteristics of CPX and FTX messages and thatobtained participant demographic information.

Findings:

The majority of the officers who participated in this study expressed thebelief that CPX and FTX messages could be distinguished based upon certaincharacteristics. However, their actual performance in classifying messageswas better than chance but less accurate than anticipated.

The participants were also questioned concerning FTX and CPX messagecharacteristics. The message characteristics believed to be most salient wereas follows: CPX messages are longer than FTX; also CPX messages are less emo-tional and contain more accurate information than FTX messages. On the seman-tic differential scales, participants rated CPX messages as more succinct,precise, and valuable than FTX messages. The major difference between the twodata sources was in message length. Participants expressed the belief thatCPX messages are longer than FTX messages but rated CPX messages as more suc-cinct on the semantic differential scale.

vii

Page 7: Identification of Command Post c*1 Exercises (FTX) …dtic.mil/dtic/tr/fulltext/u2/a220385.pdf · Technical Report 875 Identification of Command Post Lf Exercises (CPX) and Field

Utilization of Findings:

The information obtained in this study vill contribute to identificationof requirements for an automated system to translate simulation output intomore realistic messages.

The characteristics that appear to be salient in message identificationshould be used to translate CPX into FTX-like messages. These translatedmessages should then be tested to determine if experienced officers perceivethem as realistic FTX messages.

viii

Page 8: Identification of Command Post c*1 Exercises (FTX) …dtic.mil/dtic/tr/fulltext/u2/a220385.pdf · Technical Report 875 Identification of Command Post Lf Exercises (CPX) and Field

IDENTIFICATION OF COMMAND POST EXERCISES (CPX) AND FIELD TRAINING EXERCISES(FTX) MESSAGES

CONTENTS

Page

INTRODUCTION. .............. .................. 1

METHOD .. ............................. .... 2

Participants .. ............... .............. 2Data Collection Softvare and Procedures ... .............. 2

RESULTS. .. ............................ .... 3

Message Identification .. .. .. .. .. .. .. .. .. .. .. .... 3Semantic Differential Ratings. ................ ..... 3Demographic and Attitude Questions .. .. .. .. .. .. .. .. .... 4

DISCUSSION AND CONCLUSIONS. ............... ......... 7

REFERENCES .. ................................ 9

APPNIX A .. ................................ 10

LIST OF TABLES

Table 1. Message identification--number correct ... ........... 3

2. Semantic differential scales--mean ratings ... ......... 4

ix

Page 9: Identification of Command Post c*1 Exercises (FTX) …dtic.mil/dtic/tr/fulltext/u2/a220385.pdf · Technical Report 875 Identification of Command Post Lf Exercises (CPX) and Field

IDENTIFICATION OF COMMAND POST EXERCISES (CPX) AND FIELD TRAININGEXERCISES (FTX) MESSAGES

Introduction

AirLand Battle doctrine relies heavily on command and control (C2) Io ensurebattlefield success. Commanders and their staffs must perform their C func-tions in a synchronized, coordinated manner in a highly dynamic environment.Their successful battlefield performance depends upon how well they have beentrained; however, the opportunity for training is relatively infrequent.

Field exercises (FTXs) provide good "hands-on" training opportunities forcommand teams. However, training in this mode is very expensive. Furthermore,FTX training is extremely complicated to organize and execute, which furtherrestricts the frequency with which FTX training is conducted.

Command groups are increasingly turning to computer-driven command postexercises (CPXs) as an eIonomical and convenient training mode. These trainingsystems, such as ARTBASS , enable commanders and their staffs to practice theircommand and control functions under simulated battle conditions. However, theoverall effectiveness and realism of this method of training relies heavilyupon the capabilities of the control staff.

Controllers must play the roles of key personnel in the units at echelonsabove, below, and adjacent to the training audience. This role playing func-tion provides the training audience with insulation from the computer and alsoprovides them with communication training (Solick and Lussier, 1988).

Controllers must also, among other duties, generate an information stream ofrealistic tactical messages based on the simulation output. This task is notwell supported by the current generation of battle simulations. For instance,simulation output compromises message traffic realism by providing too much in-telligence information and too little detail. An illustrative example of thisis provided by Solick, et al (1988):

"For example, a sensor report might include a completeopposing force unit designation or an exact center-of-masslocation, whereas a realistic report might provide an estimateof the number of vehicles sighted, type of vehicles, approximatelocation and direction." (p. 24)

The translation of the computer output to tactical messages is performed bycontrollers in addition to the other numerous tasks which place demands upontheir time, such as directing simulated subordinates, keeping themselves ap-prised of the tactical situation, and coordinating with other control elements.Automating the production of realistic message traffic is one solution to thisproblem.

This report examines whether Army officers who have experienced both FTX andCPX training at the battalion level can distinguish which training environmentproduced a set of stimulus messages and investigates the characteristics of themessages that contribute to successful identification. This information willcontribute to the identification of requirements for an automated system totranslate computer output into realistic messages.

1ARTBASS - Army Training Battle Simulation System

m! ! !1

Page 10: Identification of Command Post c*1 Exercises (FTX) …dtic.mil/dtic/tr/fulltext/u2/a220385.pdf · Technical Report 875 Identification of Command Post Lf Exercises (CPX) and Field

Method

Participants: The participants in this study were 31 company grade combat armsofficers (6 2Lt.; 16 ILt.; 9 Cpt.) who volunteered their time during May, 1988.

Data Collection Software and Procedures: Data for this study were obtainedthrough the use of MSGJUDGE software developed by Vruels Research Corporationunder contract to the Army Research Institute (see Solick, Libehaber, Ober-mayer, Linville, and Obermayer, 1989). MSGJUDGE is a measurement instrumentfor the computer administration of a set of written messages from two or moredifferent environments to a panel of expert judges. Written messages were usedin this study rather than actual taped oral messages because of the difficultyin obtaining taped messages which were uniform in quality from both trainingenvironments. MSGJUDGE collects data in the form of responses to semanticscales, forced-choice questions, and a summary questionnaire. The software waspilot tested prior to use in this study. Information concerning the pilot datacollection is contained in Solick, et al, (1989).

In the present study, 48 messages were presented to each participant. Theoriginal pool of 292 messages was composed of 73 messages in each of the fourcategories (CPX enemy operations, CPX friendly operations, FTX enemy opera-tions, and FTX friendly operations). Twelve messages were randomly selectedfrom the 73 in each of these groups for presentation to subjects. A list ofthe 48 items which were administered, and the classification of each item, isattached as Appendix A.

For administration, a participant was presented with a stimulus messagewhich was displayed across the top of his computer screen; each of four bi-polar scales successively occupied the screen below. The four semantic scalesused for this study were: wordy-succinct, vague-precise, worthless-valuable,and excited-calm. Rating was on a 7 point scale ranging from -3 to +3. Forany given message, all of the semantic scales were administered one at a timeuntil all measurement was complete for that message. The following exampleshows the configuration of the screen for the semantic measurement.

Message: We have detected 2 BMP at 256 947.

-3 -2 -1 0 +1 +2 +3Wordy : : : : : Succinct

Pointer

The next screen showed the same message with another semantic scale, andthis was repeated until all four scales were administered. At that time, a newmessage was presented and the scales were repeated.

When all messages had been presented for semantic measurement, the samemessages were again presented in a forced-choice format (CPX or FTX). Thescreen configuration for this segment of the measurement is shown in the fol-lowing example:

2

Page 11: Identification of Command Post c*1 Exercises (FTX) …dtic.mil/dtic/tr/fulltext/u2/a220385.pdf · Technical Report 875 Identification of Command Post Lf Exercises (CPX) and Field

Message: We have detected 2 BMP at 256 947.

In this message from a CPX or FTX?Enter first letter from choice:

Finally, the participants were presented with questions which obtained demo-graphic information and assessed beliefs concerning various characteristics ofFTX and CPX messages.

Results

Message Identification:

Participants were asked to identify whether each of 48 messages originatedin an FTX or a CPX environment. The number of the messages identified cor-rectly (out of a total of 1488) for both categories and subcategories is pre-sented in Table 1.

Table 1

Message Identification - Number Correct

Enemy Friendly Total

FTX 235 254 489

CPX 165 210 375

Total 400 464 864

A two-way analysis of variance of the number of correct identifications

indicated that FTX messages were correctly identified significantly (p. <.01)more often than CPX messages, and messages with friendly operations contentwere correctly identified significantly (p. <.01) more often than messages withenemy information content, regardless of their FTX or UPX classification.

Semantic Differential Ratings:

Participants were asked to rate each message on four semantic differential

scales: wordy-succinct, vague-precise, worthless-valuable, and excited-calm.

3

Page 12: Identification of Command Post c*1 Exercises (FTX) …dtic.mil/dtic/tr/fulltext/u2/a220385.pdf · Technical Report 875 Identification of Command Post Lf Exercises (CPX) and Field

These ratings were obtained in order to ascertain if these semantic character-istics were useful in identifying their FTX or CPX origin and could be used todevelop rules for making CPX messages more like FTX messages. The participantsclassified CPX messages as more succinct, precise, valuable and excited thanFTX messages. The mean rating for each scale is presented in Table 2. The 48messages with their mean rating on each semantic differential scale are pre-sented in Appendix A.

A discriminant analysis of the semantic differential ratings indicated thalthree of the scales were useful in predicting classificaticn. These scales, inorder of importance of their contribution, are: vague-precise, wordy-succinct,and worthless-valuable. The excited-calm scale addei no independently usefulinformation to the equation.

Table 2

Semantic Differential Scales-Mean Ratings

Scale FTX CPX

Wordy - Succinct .45 1.58Vague - Prerise -.33 1.00Worthless - Valuable .60 1.60Excited - Calm -.02 .24

Demographic and Attitude Questions: Participants were asked to respond to 24questions concerning their experience with FTX and CPX training environmentsand concerning their attitudes and beliefs pertaining to messages obtained inthe two environments. These questions, together with responses, are presentedbelow.

I. Have you ever participated in a Command Post Exercise (CPX)?

Response: Yes - 90.3%No - 9.7%

2. Have you ever participated i.. a Field Training Exercise (FTX)?

Response: Yes - 100.00%

3. DD you think it is possible, in general, to tell CPX messages from FTXmessages?

Response: Yes - 61.3%No - 38.7%

4

Page 13: Identification of Command Post c*1 Exercises (FTX) …dtic.mil/dtic/tr/fulltext/u2/a220385.pdf · Technical Report 875 Identification of Command Post Lf Exercises (CPX) and Field

Do you consider the following to be recognizable differences between CPX

and FTX messages?

4. Length of Transmission:

Response: Yes - 71.0%No - 29.0%

5. Vocabulary:

Response: Yes - 83.9%No - 16.1%

6. Emotion of the Speaker:

Response: Yes - 80.6%No - 19.4%

7. Speaker, i.e. First Person Voice or Third Person:

Response: Yes - 64.5%No - 35.5%

8. Completeness of Sentences:

Response: Yes - 74.2%No - 25.8%

9. Accuracy of Descriptions:

Response: Yes - 90.3%No - 9.7%

10. Passive Voice vs Active Voice:

Response: Yes - 77.4%No - 22.6%

11. Present Tense Speaker vs Past Tense Speaker:

Response: Yes - 48.4%No - 51.6%

12. Use of key "tip-off" words:

Response: Yes - 80.6%No - 19.4%

13. Do you think the transmissions will be longer in an FTX or CPX?

Response: FTX - 35.5%CPX - 64.5%

5

Page 14: Identification of Command Post c*1 Exercises (FTX) …dtic.mil/dtic/tr/fulltext/u2/a220385.pdf · Technical Report 875 Identification of Command Post Lf Exercises (CPX) and Field

14. Will the speaker be more emotional in a CPX or FTX?

Response: FTX = 93.5%CPX - 6.5%

15. Will the speakers have a more varied vocabulary in an FTX or in a CPX?

Response: FTX - 51.6%CPX - 48.4%

16. Will the transmission contain more accurate information if from a CPX orfrom a FTX?

Response: FTX - 9.7%CPX - 90.3%

17. Do you feel that the quality of training can be affected based on the

realism of radio transmissions that describe the battlefield to the Commanderand staff?

Response: Yes - 93.5%No - 6.5%

18. Have you ever participated at an opposing force exercise at the NationalTraining Center?

Response: Yes - 80.6%

No - 19.4%

19. Have you ever participated in a CPX using ARTBASS?

Response: Yes - 64.5%No - 35.5%

20. Which environment, CPX or FTX, provides the best training for yourself?

Response: FTX - 93.5%CPX - 6.5%

21. Which environment, FTX or CPX, provides the best training for the battal-

ion staff?

Response: FIX - 58.1%CPX - 41.9%

6

Page 15: Identification of Command Post c*1 Exercises (FTX) …dtic.mil/dtic/tr/fulltext/u2/a220385.pdf · Technical Report 875 Identification of Command Post Lf Exercises (CPX) and Field

22. The self-administered program you just completed is the initial phase of aproject to describe differences in communications between CPX and FTX. Thegoal of the project is to provide more realistic training environments. Do youthink this self-administered message judgment program will show those differ-ences?

Response: Yes - 48.4%No - 51.6%

23. I also wish to determine if there is a training difference between CPX andFTX. I am going to use the differences in message traffic to describe thatdifference. Do you think this program will help to identify the training dif-ferences?

Response: Yes - 58.1%No - 41.9%

24. Is this type of research, determining differences between CPX and FTXmessages to improve training, beneficial to the Army?

Response: Yes - 71.0%No - 29.0%

Discussion and Conclusions

As currently practiced, CPX training does not provide realistic tacticalmessages for the training audience. This is primarily because the controllers,who are responsible for message generation have too little time and too great aworkload to adequately produce realistic messages. There is a widely holdview, supported by the majority of the Army officers who participated in thisstudy, that the quality of training can be affected by the realism of messagesthat describe the battlefield to the Commander and staff. These participantsalso indicated that they believe that they can distinguish messages generatedin a CPX environment from messages generated in an FTX environment. The pur-pose of this study was to determine if CPX and FTX messages could, in fact, bedistinguished, and to ascertain which characteristics of the messages were mostsalient in this identification. Ultimately, this information could be used toeither automate the message generation process or provide guidelines for con-trollers which would contribute to the production of more realistic messages aswell as reduce controller workload.

The results of this study indicate that the participants could distinguishCPX from FTX messages, but their accuracy was somewhat less than anticipated.Although classification accuracy was significantly better for FTX messages thanfor CPX messages, this could have been the result of a general FTX responsebias when in doubt about a message's true classification.

Nevertheless, the participants expressed strong beliefs concerning the sali-ent characteristics which distinguish CPX messages from FTX messages. Partici-pants expressed the belief that CPX messages are longer, less emotional and

7

Page 16: Identification of Command Post c*1 Exercises (FTX) …dtic.mil/dtic/tr/fulltext/u2/a220385.pdf · Technical Report 875 Identification of Command Post Lf Exercises (CPX) and Field

contain more accurate information than FTX messages. Additionally, they be-lieve that CPX and FTX messages can be distinguished on the basis of vocabularyand "tip-off" words.

The analysis of the semantic differential ratings yielded similar results.Participants rated CPX messages as more succinct, precise and valuable than FTXmessages. There was a discrepancy here in that CPX messages were rated as moresuccinct, but participants expressed the belief that they are longer than FTXmessages. The fact that the calm-excited scale failed to provide any addi-tional information could be explained by the fact that the stimulus messageswere presented in the form of written text rather than spoken form, which wouldprovide more opportunity for projection of emotion.

Although further research may be needed to resolve the discrepancy in theresults concerning the saliency of message length in message classification,the information obtained in this study has been formulated into rules for gen-erating more realistic CPX messages. These rule-generated messages were testedto determine if participants would perceive them as FTX messages. The resultsof this study are presented in Lussier, Solick, Keene and Linville (1989). Thefollowing example demonstrates how this transformation process may work.

Original Alert Message: HA/B/3-41 visually detected at NK 320 321 1 T64.

Transformation Message: I've got a lone T-64 off to the North of myposition. Looks like it may be disabled, but can'ttell for sure.

In this example, the CPX simulation alert message was made more realistic byadding uncertainty and vagueness. When the transformed version of this messagewas presented to participants, 87% perceived it as a FTX message (Lussier, etal 1989).

Page 17: Identification of Command Post c*1 Exercises (FTX) …dtic.mil/dtic/tr/fulltext/u2/a220385.pdf · Technical Report 875 Identification of Command Post Lf Exercises (CPX) and Field

References

Lussier, J. V. Solick, R. E., Keene, S. D., and Linville, J. M. (In prepa-ration, 1990). Construction of Realistic Messages from Computer Gen-erated Alert Messages (ARI Technical Report 871). Alexandria, VA: U.S.Army Research Institute for the Behavioral and Social Sciences.

Solick, R. E., Liebhaber, M. J., Obermayer, R. V., Linville, J. M., and Ober-mayer, A. H. (In preparation, 1989). Judging Samples of Command Post andField Training Exercise Messages (ARI Research Note 89-32). Alexandria,VA: U.S. Army Research Institute for the Behavioral and Social Sciences.

Solick, R. E., and Lussier, J. V. (1988). Design of Battle Simulation forCommand and Staff Training (ARI Technical Report 788). Alexandria, VA:U.S. Army Research Institute for the Behavioral and Social Sciences.(AD A196 655)

9

Page 18: Identification of Command Post c*1 Exercises (FTX) …dtic.mil/dtic/tr/fulltext/u2/a220385.pdf · Technical Report 875 Identification of Command Post Lf Exercises (CPX) and Field

Appendix A

L 0 C14 C4 m0 0 -qu

co en -.

It 9% r.0 0 4 1

C'4~~~ M0~ 0 01 0

&4

-14 Ln Ln en co 0

en 10c

e%4 '4 14 -4 0 0

W c

w0 0

U3 w 03w14 en~

W U3

0

-O W

V 14w

0A 0

cc I w o -o 0 0~ 0 l4

0) W~ -J00 10

0. 00 Q)c

1w ~ ~~~~ ad -4 .&

w~~~~- 0 ) o0 w

0 j =0 3t0

P0 . )A or "-44 U- r. 0 0

&J) M4 0 a- 0 r. .jm

000 CL W Lj 0- 4. M 0 W .04j MO4 .0 14U 6) 0

0 0 ~0 ~*A. 0-ab 9 &A 000 0H -4 W.0Hu

CL 0 C' 0 -W w- wo a0 0 I- >. 0. 93 w- 4)

.c0 b0 *1~ 0 0 r-L

0.0 v b w (0OCl 1c 0- -W . r. 0 04. 44 0I. a o 0 c , 0 - 4.) 4I

CZ 0 j 4 j 0 0 00 0 &jo~ 00 I 0 d 6

0 ~.0 0 0 4.' 100%. .4U 0

Page 19: Identification of Command Post c*1 Exercises (FTX) …dtic.mil/dtic/tr/fulltext/u2/a220385.pdf · Technical Report 875 Identification of Command Post Lf Exercises (CPX) and Field

Appendix A

'00

0!0

cc 0~ uoC

01

M gal - c-io 0

is 4J w a

4) oU

w o0 t

-434 0

* * 0

0 4J4 U

m00 ~C cW -.

cc V

01)

0 0 L

0 ) In L4AicJ0 %D 0U3 .0 0

co4 C 0

bo s 4T 0 'w

00t4 0 a -404

be ~~~ V- 4

cc c: 0000 0% 0 1L A

0 '4-' to 44 1.-J ca V nX4~ " 0 U0 .Co&f 14 ..- Cc0bo0. -r - U >.0 a- ~ -~.-4 Li z &

to :1 4) > 4 0 00v0j.b0 4 0 W b .. 1sO0W I " bo "0.0

J- go W 4. 4 '. 4 AJJ LM 0.Z C

0 X 4 r E0'.' 0 ..Q.-( -)410. Q#o a Lm o to~ " X

04 m~ 4.)0~iJ~ 0 CorJcc 0oO .04 =O' "~. Li

0 LA ~ 4-1~

w0 o 0o -"' 0 o4 M 0 0 .- ( 9 ) * C0

Page 20: Identification of Command Post c*1 Exercises (FTX) …dtic.mil/dtic/tr/fulltext/u2/a220385.pdf · Technical Report 875 Identification of Command Post Lf Exercises (CPX) and Field

Appendix A

I 0 IA 040% ~0' A

NY* 0 A -00

li 0

v4 C4 IA00 -tq

00

U~~~> '7a.C,

p.. -T CIA. Go. IAO.4

o1 4) -4% 0 0D4) 7 - N 4 V z

44 r. U, u0b

£12 0i m

o 0 % . C oI

N u C:<u

A1 Nr C;cot

0 0 0 00

-4 cc04 Ln0 0 b 00 a

0 ) 6- 0

0r I aJ

0 0. 0 4W0wr.v -4

Izi ;0% C). rL. Vi bC0 Xa 0-H- to* -

h W

ap0 jj=4 o0 0~ -J

0 j 41

1 = 0 ,, 4r Ar0 . Hww I; V- O 0t o Hb

lo A -40 W "a .63 bO bov - 0 U

w1 V.4 0 bo 0 Ajt . .0a ,I'- ". -j X C . O -

0 = I w 0A *P ; 0 w oU0 0~.~ u 0A 41 4O r- $: 0z

.* 0 ;N 4). .v..U 41 V- 4G),wa 3L 0)

00 Q.001.4J 4.4 Z1 r4. wto b 410 w0

AU%4 ~0 A.) 4tl W 0 aO Li -0 =0 . r v Uw A4

(A 41 GO >, -H ' 00 1 ag 0 0 ZD-

0 bi~~~ ~ 1 .-- 4i -0 112

Page 21: Identification of Command Post c*1 Exercises (FTX) …dtic.mil/dtic/tr/fulltext/u2/a220385.pdf · Technical Report 875 Identification of Command Post Lf Exercises (CPX) and Field

Ap~pendix A

0 '

C4 0 co

00- -4

0 ci

-4-

0 Go w

0i~ .10 "

0 In 0

0_

U 0

00 0~

0 bO 0

w* w

0 ~0 m 04

0 I0

00n

1. 0 . L

V4 "I4 b4 A 0 ' i v .9 0 0 r40 L

04 aa. w C.)

4w r4 %

0 to .0c

A4 c:V-

0~~~ as . C0

A- A* v) " - 0 ) -a 4o

4,' ", 00 b W W P- 6j .ti 1-4005st9- 4) ;0% .~ U

(a 04 P% 54 0 CD*o. "0A 3 w 0b 0r 4,..4

a W 4) 4) 0. bo 0 to

44,~ 0 0 10q w.L:0"4' U 4 a

w 00 0 4C-4I

-1 &A 0b4 w0 4 04. - (v o

M,,0 0

c U 04

0 X: bd0- 00 0.0 -C -

13 '

Page 22: Identification of Command Post c*1 Exercises (FTX) …dtic.mil/dtic/tr/fulltext/u2/a220385.pdf · Technical Report 875 Identification of Command Post Lf Exercises (CPX) and Field

Appendix A

Cn r4 0 0%

m 0~ 0 .- 4 cu Vcc

0%~C 0 -. '4 C4J

So t-.C'4 C4

000 ox0 n

CA 0!

-t~( -4- IV0 I 4 d U

CA 02. 00iJO '~, w

0 S" 0 ' .c' ' 04 J

w 3. 00)

0 4 . 4 .10 0 0 LM O

P. V.-4W-,

0 b 0

-4 n

a 00 a 0o0g

V4. U w U I cc 1 wr 0C~~~~~ .. 0P2 4 N

-W W 4j A C

Uj 00.. & ) 2e

LA W0 PO0

W f Cf ='6 o 0 0 -'w.4- 4)0 W 2 8 W 0 N 8

w o o0 %d 0. 44" (2 -W0 lN

w " 0 0 0 (D w 4 0. 0 4W- o 0%0w u MU0

W2 CJ Wl 0% * 0 en0(% 8

~-4. ~.0 * -4 0 1 14. 0

Page 23: Identification of Command Post c*1 Exercises (FTX) …dtic.mil/dtic/tr/fulltext/u2/a220385.pdf · Technical Report 875 Identification of Command Post Lf Exercises (CPX) and Field

Appendix A

*n C4 C

C4 C14m LM 0

.0 0% 00 as %

in .4 r4 eq 4r w ~

ccJ m

w1 LfA 0-

0 4

C4 V

U37 w 00C4 N C.)a 4

41 000.c 04

0 . 0'N . - 0'-0-o

a 0X

v 0~

V 0

0C 0o41

0 Ij C.

.4 (U cc %4t0o .0 0 0

C) > -v A 0 0

w 0 q X u W0

H Aj 'm 0 bD

a Hz )w0 0 co "a C

0 6 Ol% C V1 414 z4 900 NI C4 b1- - 4 L

- =(. 0 c- w 01r_

X .~ ~ La * j~ >

r.N S Cl.~' * 4J 0 >J0 S10 a0 Ll. H 0

0 Ubzo c4 r- .~0 01 0 4j Li be 41.0 0 H 0u

0 .~4 '.i'. -,-4 M '00 r-4 m

0 4)a0o9w : 0 Z u 41 A 0 0

0) 0 T 0.4 ~ C. 0cc 0 m -f0 X co 0 m 4 w.4 0

0eQ0 t .)0 * '0- go0 -41J 4. 4 ad go

15 b~

Page 24: Identification of Command Post c*1 Exercises (FTX) …dtic.mil/dtic/tr/fulltext/u2/a220385.pdf · Technical Report 875 Identification of Command Post Lf Exercises (CPX) and Field

Appendix A

o -- 0% 7

0 Q

0 t 0

CIA C14 -4 - q ~

W 0 m,

-4~~~~ Lr 7I % -

-C- C)I - 4 A~

00. ~0

4) mU

916, U3.J

o &4 C0 CJ 0o '4 0 > -7i 0 CO

-- 047 -7vs~i1- 4

0 w 74

wc - co D t -H r '4 -H4:X4,- 00 :.0 -

W) 4.) 4 i.. Wo 0 0 0 0 0

-4 L-A 00b

0j "o0w-r

VI :3 W 4 c wb-.

Ujj

P4 LA V .W DboX >

0 W4o41,o>, l

0~~~~- CO Ad >>v U

C cw0 0 w0 04 X -) n% 0

0 a 4. fA4 .

160%,

Page 25: Identification of Command Post c*1 Exercises (FTX) …dtic.mil/dtic/tr/fulltext/u2/a220385.pdf · Technical Report 875 Identification of Command Post Lf Exercises (CPX) and Field

Appendix A

M% C14--f r! co

0 0

0%0

0I

0 cc

in 0C0

co r-10,70

CU 0 cc

0% 00 0 ~cO

00"1d. 0 0

I Io(UI

CO4to 91 J -

0 0to.0 )

> 0 (u

U C,4

A4 0 co 0 00cc4 z' .coc

0 to

00

m~. ou U).6 4) CL1-

c C 0 &J0

'0 . . 0) .,- 0

.00 V) 0bo >a~ '4 wt%*