+44 (0)1509 263171
Please use this identifier to cite or link to this item:
|Title: ||Detection of terrorist threats in air passenger luggage: expertise development|
|Authors: ||Liu, Xi|
Gale, Alastair G.
|Issue Date: ||2007|
|Publisher: ||© IEEE|
|Citation: ||LIU, X., GALE, A.G. and SONG, T., 2007. Detection of terrorist threats in air passenger luggage: expertise development. IN: 41st Annual IEEE International Carnahan Conference on Security Technology, Ottawa, Ontario, 8-11 October, pp. 301-306|
|Abstract: ||Currently, detecting potential threats in air passenger baggage heavily depends on the human examination of X-ray images of individual luggage items. In order to improve the performance of airport security personnel in searching images of air passenger luggage it is important first to understand fully the requirements of the demanding task. Here, an experiment is reported where eye movements of naive observers and screeners were recorded when they searched 30 X-ray images of air passenger luggage for potential terrorist threat items such as guns, knives and improvised explosive devices. Compared with novices, the advantages of the screeners were speed and accuracy in detecting threats. Eye position data revealed that screeners were faster to fixate on target areas and once they fixated on targets their hit rate was significantly higher. Most of the lEDs were missed by both naive observers and screeners due to interpretation errors which indicated the importance of training. Stimulus salience at the first fixation locations of naive observers and screeners was compared to investigate expertise development. It was found that experience did not change attention preference on stimuli properties at the beginning of the observers visual search. The implications and further studies are discussed.|
|Description: ||This is a conference paper [©2007 IEEE]. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. This paper is also available from: http://ieeexplore.ieee.org/Xplore/dynhome.jsp|
|Appears in Collections:||Conference Papers and Presentations (Computer Science)|
Files associated with this item:
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.