{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T10:39:57Z","timestamp":1775126397093,"version":"3.50.1"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2007,8,22]],"date-time":"2007-08-22T00:00:00Z","timestamp":1187740800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cogn Tech Work"],"published-print":{"date-parts":[[2008,7]]},"DOI":"10.1007\/s10111-007-0098-4","type":"journal-article","created":{"date-parts":[[2007,8,21]],"date-time":"2007-08-21T06:40:40Z","timestamp":1187678440000},"page":"199-207","source":"Crossref","is-referenced-by-count":19,"title":["WESTT (workload, error, situational awareness, time and teamwork): an analytical prototyping system for command and control"],"prefix":"10.1007","volume":"10","author":[{"given":"Robert J.","family":"Houghton","sequence":"first","affiliation":[]},{"given":"Chris","family":"Baber","sequence":"additional","affiliation":[]},{"given":"Malcolm","family":"Cowton","sequence":"additional","affiliation":[]},{"given":"Guy H.","family":"Walker","sequence":"additional","affiliation":[]},{"given":"Neville A.","family":"Stanton","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2007,8,22]]},"reference":[{"key":"98_CR1","volume-title":"The architecture of cognition","author":"J Anderson","year":"1983","unstructured":"Anderson J (1983) The architecture of cognition. Harvard University Press, Cambridge"},{"key":"98_CR23","volume-title":"Cognitive psychology and its implications","author":"JR Anderson","year":"1990","unstructured":"Anderson JR (1990) Cognitive psychology and its implications, 3rd edn. W.H. Freeman, New York","edition":"3"},{"key":"98_CR2","doi-asserted-by":"crossref","unstructured":"Adamic LA, Buyukkoten O, Adar E (2003) A social network caught in the web. Internal report, HP and Google Labs","DOI":"10.5210\/fm.v8i6.1057"},{"key":"98_CR3","volume-title":"The agile organization: From informal networks to complex effects and agility","author":"SR Atkinson","year":"2005","unstructured":"Atkinson SR, Moffat J (2005) The agile organization: from informal networks to complex effects and agility. DODCCRP Publications, Washington"},{"key":"98_CR4","doi-asserted-by":"crossref","first-page":"613","DOI":"10.1006\/ijhc.2000.0452","volume":"54","author":"C Baber","year":"2001","unstructured":"Baber C, Mellor BA (2001) Modelling multimodal human-computer interaction using critical path analysis. Inter J Hum\u2013Comput Stud 54:613\u2013636","journal-title":"Inter J Hum\u2013Comput Stud"},{"key":"98_CR5","first-page":"585","volume-title":"Interact\u201901","author":"C Baber","year":"2001","unstructured":"Baber C, Stanton NA (2001) Analytical prototyping of personal technologies: using predictions of time and error to evaluate user interfaces. In: Hirsoe M (ed) Interact\u201901. IOS Press, Amsterdam, pp 585\u2013592"},{"key":"98_CR6","first-page":"175","volume-title":"Interface technology","author":"C Baber","year":"1999","unstructured":"Baber C, Stanton NA (1999) Analytical prototyping. In: Noyes JM, Cook M (eds) Interface technology. Research Studies Press, Baldock, pp 175\u2013194"},{"key":"98_CR7","volume-title":"The psychology of human\u2013computer interaction","author":"SK Card","year":"1983","unstructured":"Card SK, Moran TP, Newell A (1983) The psychology of human\u2013computer interaction. LEA, Hillsdale"},{"key":"98_CR8","unstructured":"Dekker AH (2002) C4ISR architectures, social network analysis and the FINC methodology: an experiment in military organisational structure. DSTO report DSTO-GD\u20130313"},{"key":"98_CR9","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1207\/s15327051hci0803_3","volume":"8","author":"WD Gray","year":"1993","unstructured":"Gray WD, John BE, Atwood ME (1993) Project ERNESTINE: validating a GOMS analysis for predicting and explaining real-world performance. Hum\u2013Comput Interact 8:237\u2013309","journal-title":"Hum\u2013Comput Interact"},{"key":"98_CR10","unstructured":"Houghton RJ, Baber C (2005) Social aspects of network enabled capability: information sharing and decision-making. IEE people and systems conference: who are we designing for? London, November 2005"},{"key":"98_CR11","volume-title":"A guide to practical human reliability assessment","author":"B Kirwan","year":"1994","unstructured":"Kirwan B (1994) A guide to practical human reliability assessment. Taylor & Francis, London"},{"key":"98_CR12","unstructured":"Klein GA (1989) Recognition-primed decisions. In: Rouse WB (ed) Advances in man\u2013machine systems research, vol 5. JAI, Greenwich, pp 47\u201392"},{"key":"98_CR13","first-page":"16","volume":"8","author":"M Lloyd","year":"2004","unstructured":"Lloyd M (2004) The NEC use-case methodology. Distillation 8:16\u201323","journal-title":"Distillation"},{"key":"98_CR14","doi-asserted-by":"crossref","first-page":"607","DOI":"10.1177\/001872089103300602","volume":"33","author":"N Moray","year":"1991","unstructured":"Moray N, Dessousky MI, Kijowski BA, Adapathya R (1991) Strategic behaviour, workload and performance in task scheduling. Hum Factors 33:607\u2013629","journal-title":"Hum Factors"},{"key":"98_CR15","volume-title":"Behavioral analysis and measurement methods","author":"D Meister","year":"1985","unstructured":"Meister D (1985) Behavioral analysis and measurement methods. Wiley, New York"},{"key":"98_CR16","volume-title":"Network enabled capability, an introduction","author":"Ministry of Defence","year":"2004","unstructured":"Ministry of Defence (2004) Network enabled capability, an introduction. Ministry of Defence, UK"},{"key":"98_CR17","volume-title":"Network enabled capability","author":"Ministry of Defence","year":"2005","unstructured":"Ministry of Defence (2005) Network enabled capability. Joint Services Publication 777, London"},{"key":"98_CR18","unstructured":"NATO (2002) Code of best practice for C2 assessment (Decision maker\u2019s guide)"},{"key":"98_CR19","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1007\/978-1-4757-9244-7_6","volume-title":"Applications of human performance models to system design","author":"RA North","year":"1989","unstructured":"North RA, Riley VA (1989) A predictive model of operator workload. In: MacMillan GR et al. (eds) Applications of human performance models to system design. Plenum, New York, pp 81\u201390"},{"key":"98_CR20","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/978-1-4757-9244-7_4","volume-title":"Applications of human performance models to system design","author":"DL Parks","year":"1989","unstructured":"Parks DL, Boucek GP (1989) Workload prediction, diagnosis and continuing challenges. In: MacMillan GR et al. (eds) Applications of human performance models to system design. Plenum, New York, pp 47\u201364"},{"key":"98_CR21","doi-asserted-by":"crossref","unstructured":"Stanton NA, Stewart RJ, Baber C, Harris D, Houghton RJ, McMaster R, Salmon P, Hoyle G, Walker G, Young MS, Linsell M, Dymott R (2007) Distributed situational awareness in dynamic systems: theoretical development and application of an ergonomics methodology. Ergonomics (in press)","DOI":"10.1080\/00140130600612762"},{"key":"98_CR22","volume-title":"Social network analysis: methods and applications","author":"S Wasserman","year":"1992","unstructured":"Wasserman S, Faust K (1992) Social network analysis: methods and applications. Cambridge University Press, Cambridge"}],"container-title":["Cognition, Technology &amp; Work"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10111-007-0098-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10111-007-0098-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10111-007-0098-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T20:25:59Z","timestamp":1559161559000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10111-007-0098-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,8,22]]},"references-count":23,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2008,7]]}},"alternative-id":["98"],"URL":"https:\/\/doi.org\/10.1007\/s10111-007-0098-4","relation":{},"ISSN":["1435-5558","1435-5566"],"issn-type":[{"value":"1435-5558","type":"print"},{"value":"1435-5566","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,8,22]]}}}