Irregular Warfare Modeling/Data Validation Best Practices 11 th Annual MOVES Research Education Summit 12 July 2011.

Slides:



Advertisements
Similar presentations
Study Objectives and Questions for Observational Comparative Effectiveness Research Prepared for: Agency for Healthcare Research and Quality (AHRQ)
Advertisements

Evaluation for 1st Year Grantees Shelly Potts, Ph.D. Arizona State University
WMO Competency Standards: Development and Implementation Status
Software Quality Assurance Plan
TITLE OF PROJECT PROPOSAL NUMBER Principal Investigator PI’s Organization ESTCP Selection Meeting DATE.
Enhancing Data Quality of Distributive Trade Statistics Workshop for African countries on the Implementation of International Recommendations for Distributive.
Overview of Nursing Informatics
Job Analysis and Rewards
Creating Architectural Descriptions. Outline Standardizing architectural descriptions: The IEEE has published, “Recommended Practice for Architectural.
Quality evaluation and improvement for Internal Audit
Certified Business Process Professional (CBPP®)
Certified Business Process Professional (CBPP®) Exam Overview
Purpose of the Standards
Internal Auditing and Outsourcing
What is Business Analysis Planning & Monitoring?
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Essentials of Systems Analysis and Design Fourth Edition Joseph S. Valacich Joey F.
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall Essentials of Systems Analysis and Design Fourth Edition Joseph S. Valacich Joey F.
RUP Requirements RUP Artifacts and Deliverables
Overview of the Database Development Process
Reporting & Ethical Standards EPSY 5245 Michael C. Rodriguez.
1 Software Testing (Part-II) Lecture Software Testing Software Testing is the process of finding the bugs in a software. It helps in Verifying and.
Literature Review and Parts of Proposal
Northcentral University The Graduate School February 2014
Demystifying the Business Analysis Body of Knowledge Central Iowa IIBA Chapter December 7, 2005.
The Audit Process Tahera Chaudry March Clinical audit A quality improvement process that seeks to improve patient care and outcomes through systematic.
T. Dawson, TASC 9/11/13 Use of a Technical Reference in NASA IV&V.
An Online Knowledge Base for Sustainable Military Facilities & Infrastructure Dr. Annie R. Pearce, Branch Head Sustainable Facilities & Infrastructure.
How to Write a Critical Review of Research Articles
Writing research proposal/synopsis
NSAA Information Technology Conference Hartford, Connecticut September 24, 2015 Presented by: Mike Billo and Anne Skorija PA Department of the Auditor.
High Level Architecture Overview and Rules Thanks to: Dr. Judith Dahmann, and others from: Defense Modeling and Simulation Office phone: (703)
Software Testing Testing types Testing strategy Testing principles.
DGM07: Research Methodology SESSION 1 April 2, 2011 Dr. Naseem Abidi.
Evidence-Based Public Health Nancy Allee, MLS, MPH University of Michigan November 6, 2004.
What is a Business Analyst? A Business Analyst is someone who works as a liaison among stakeholders in order to elicit, analyze, communicate and validate.
Guiding Students through the Thesis/Dissertation Process Ralph C. Gomes, Professor Department of Sociology and Anthropology March 12, 2008.
PROF. DR. MOHD ADAM BAKAR HF :
P1516.4: VV&A Overlay to the FEDEP 20 September 2007 Briefing for the VV&A Summit Simone Youngblood Simone Youngblood M&S CO VV&A Proponency Leader
1 Chapter Nine Conducting the IT Audit Lecture Outline Audit Standards IT Audit Life Cycle Four Main Types of IT Audits Using COBIT to Perform an Audit.
1 Copyright © 2011 by Saunders, an imprint of Elsevier Inc. Chapter 8 Clarifying Quantitative Research Designs.
MODES-650 Advanced System Simulation Presented by Olgun Karademirci VERIFICATION AND VALIDATION OF SIMULATION MODELS.
Validation Methodology for Agent-Based Simulations Workshop Validation Theory Update Dr. Eric Weisel WernerAnderson, Inc. 8 July 2008.
The Conceptual Framework: What It Is and How It Works Linda Bradley, James Madison University Monica Minor, NCATE April 2008.
1.  Interpretation refers to the task of drawing inferences from the collected facts after an analytical and/or experimental study.  The task of interpretation.
Information System Project Management Lecture Five
Perspectives on the Analysis M&S Business Plan Dr. Tom Allen, IDA Mr. James Bexfield, PA&E, OSD Dr. Stuart Starr, IDA June 19, 2008.
Writing and presenting a dissertation proposal requires high self-discipline and commitment. Three essential pre-writing actions:  Complete preliminary.
 CMMI  REQUIREMENT DEVELOPMENT  SPECIFIC AND GENERIC GOALS  SG1: Develop CUSTOMER Requirement  SG2: Develop Product Requirement  SG3: Analyze.
ABS VV&A Framework Study Phase II Project Overview Lisa Jean Moya WernerAnderson, Inc. Phase II Workshop 3 8 July /8/2008.
1 DEMONSTRATION PROJECTS TO ENSURE STUDENTS WITH DISABILITIES RECEIVE A QUALITY HIGHER EDUCATION PROGRAM Performance Measurement, Program and Project Evaluation.
A Framework for Assessing Needs Across Multiple States, Stakeholders, and Topic Areas Stephanie Wilkerson & Mary Styers REL Appalachia American Evaluation.
ICAJ/PAB - Improving Compliance with International Standards on Auditing Planning an audit of financial statements 19 July 2014.
SEARCH STRATEGY by Dr. Ronald M. Henson Research Consultant.
Department of Computer Science Introduction to Information Security Chapter 8 ISO/IEC Semester 1.
Stages of Research and Development
Principal Investigator ESTCP Selection Meeting
Writing a sound proposal
International Strategic Management
Auditing Information Technology
Principal Investigator ESTCP Selection Meeting
Software Requirements
MaryCatherine Jones, MPH, Public Health Consultant, CVH Team
Measuring Data Quality and Compilation of Metadata
Verification and Validation Unit Testing
Program Planning and Evaluation Methods
Job Analysis CHAPTER FOUR Screen graphics created by:
Principal Investigator ESTCP Selection Meeting
An overview of Internal Controls Structure & Mechanism
Principal Investigator ESTCP Selection Meeting
Evidence-Based Public Health
Presentation transcript:

Irregular Warfare Modeling/Data Validation Best Practices 11 th Annual MOVES Research Education Summit 12 July 2011

Purpose and Agenda 2 Purpose: To discuss the framework developed at TRAC-MTRY/NPS toward conducting validation of Methods, Models, and Tools (MMT) that inform analysis of Irregular Warfare (IW) and to overview ongoing development of a similar data validation framework. 12 July th MOVES Research and Education Summit Overview and Objectives. Validation Project Teams. Project Descriptions and Results. −IW Model Validation Best Practices. −IW Data Validation Best Practices. Summary and Way Ahead. Questions.

Overview and Objectives 12 July th MOVES Research and Education Summit TRAC-MTRY and Naval Postgraduate School. –IW Modeling Validation Best Practices Guide, FY09-FY10. -Identify and develop a best practices for verifying and validating social science theory and modeling required for tactical level IW MMT. –Validating Data that Supports IW Models, FY10-FY11. -Assess, at a minimum, the validation of IW data, to include an examination of data requirements, data sources, and data availability as well as derivation of data. Objective: To develop methodologies/best practices toward validating methods, models and tools (MMT) and associated data that support IW analysis, using the CG model for implementation of these practices.

Validation Project Teams 12 July th MOVES Research and Education Summit FY09/FY10 TRAC-MTRY/NPS. –CPT Richard F. Brown, Project Lead. –Dr. Jeffrey Appleget, Professor, OR Department. –Dr. Deborah Duong, Senior Analyst, Augustine Consulting, Inc. –Mr. Curtis Blais, Professor, MOVES Institute. –Mr. Timothy K. Perkins, ERDC. –Ms. Meredith Thompson, SEED Center. FY10/FY11 TRAC-MTRY/NPS. –MAJ Joe Vargas, Project Lead. –CPT Richard F. Brown, Project Support. –Dr. Jeffrey Appleget, Professor, OR Department. –Mr. Curtis Blais, Professor, MOVES Institute. –Dr. Michael Jaye, Professor, Defense Analysis Department. –Dr. Eric Weisel, CEO, WernerAnderson, Inc. –COL Robert Burks, Senior Military Advisor, OR Department. Each team represents efforts that focus on developing frameworks and methodologies toward validating models, validating data, and making assessments of and building documentation toward validation of CG.

Best Practices Guide Approach and Requirements Requirement 1. Provide a report that identifies validation best practices for IW MMT tactical-level representation. Requirement 2. Apply the BPG developed in Requirement 1 to both relevant MMT in order to demonstrate usability of the BPG framework. Best Practice Guide Approach. –Conducted an extensive literature review of prevalent validation literature, to include the DOD Recommended Best Practices, MIL-STD-3022, SISO General Methodology for VV&A, and others (Chapter 2). –Synthesized literature and described the challenges of modeling the IW environment and validating the models that represent the IW environment (Chapter 3). –Constructed a validation framework toward model validation. The framework includes detailed descriptions of the principal areas of the framework that must be identified to conduct proper validation (Chapter 4). –Apply the BPG, as appropriate, to relevant MMT; in particular, the CG model. 12 July th MOVES Research and Education Summit

Validation Framework Concept Map “The Golden Triangle” This effort resulted in the construction of the following model validation and development framework. The components of the “Golden Triangle” make up the crux of model validation and establish the critical basis of comparison to the real world. Validation Framework Concept Map. User Needs –The developer needs to obtain a succinct and clear statement of the problem the M&S is expected to address. Requirements –Develop specific functional or quality statements that can be directly and explicitly assessed to determine requirement. Acceptability Criteria –Develop a requirements traceability matrix relating each specified requirement with acceptability criteria applicable to the intended use. Results –The acceptability criteria identify what the model needs to do to satisfy or meet the set of respective requirements pertinent to the intended use. Data –The greater the specificity in the data requirements for a model, the greater the ability to collect the data needed to populate the model. Intended Use. –Obtain a clear, succinct statement of intended use from the user representatives. Simuland. –The simuland is the real- world system of interest, including the objects, processes, or phenomena to be simulated. Referent. –Identify the social science theory (or theories, if multiple competing theories will be represented in the model for comparison) that explains that phenomena. Conceptual Model. –Develop the conceptual model using tools and techniques that create machine-readable specifications of the data and logic of the model. Executable Model. –Design the model implementation to be as transparent as possible to permit analysis of execution paths and computed outcomes 12 July th MOVES Research and Education Summit

IW Data Validation Best Practices 12 July th MOVES Research and Education Summit WORKING OUTLINE Introduction. Literature Review. –Review validation standard and practices from DOD and related sources that add value to DoD MMT. Data Supporting Irregular Warfare Modeling. –Describe IW-type data and highlight the challenges in validating this data. IW Data Sources. –Characterize sources for IW data. Best Practices for Validating IW Data. –Explain the IW data validation framework, to include a description of methods toward validating IW data, what metadata must be included with data sets, and other significant insights. Summary and Recommendations. Appendix. –Develop IW data validation framework use-case using relevant MMT, in particular, the CG Model. Requirement: Provide a report that assesses, at a minimum, the validation of IW data, to include an examination of data requirements, data sources, and data availability as well as the derivation of data.

Summary and Way Ahead 12 July th MOVES Research and Education Summit Summary. –Multi-disciplinary team developed a BPG that provides a useful framework that a validation agent could use for validating a IW model, or that a developer could use to properly develop an IW model. –Model validation best practices incorporate concepts that developers are aware of, yet many of the concepts must be enumerated explicitly to ensure validation is possible. –“Validation” may not be a proper term with respect to data. A paradigm shift may be in order. –Any type of validation, whether model or data, must be related to a specified and/or intended use. Way Ahead. –TRADOC Analysis Center (TRAC) Irregular Warfare Modeling and Simulation Summit provided a considerable forum for discussion and actions pertaining to these issues. The validation team will work closely with the TRAC Complex Operations Data Development Activity (CODDA) to develop and vet the data validation best practices, and ensure that is codified sufficiently for use in the analytic community.

9 Comments / Discussion 12 July th MOVES Research and Education Summit

CG Model Assessment Requirements 12 July th MOVES Research and Education Summit Assess the appropriateness of the CG model representation of the Conflict Ecosystem conceptual model, and whether the model referent provided appropriate underpinning to account for human socio-cultural behavior. Assess the appropriateness of the Social Network Representation within the CG Model and the whether this representation is generalizable to conflict ecosystems in any region. Assess the appropriateness of the representation of social science theory within the CG Model, specifically tracing the implementation of the Theory of Planned Behavior. Develop risk measures for using a model or simulation for a specified application. Develop criteria for assessing the risk of using a model or simulation based on consequence, error, and validation process. Characterize an approach toward validating the CG model based on the methodologies/insights/lessons learned from the tasks developed above.