<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.3 20070202//EN" "journalpublishing.dtd">
<article xml:lang="EN" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Big Data</journal-id>
<journal-title>Frontiers in Big Data</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Big Data</abbrev-journal-title>
<issn pub-type="epub">2624-909X</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="doi">10.3389/fdata.2022.897295</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Big Data</subject>
<subj-group>
<subject>Original Research</subject>
</subj-group>
</subj-group>
</article-categories>
<title-group>
<article-title>A Methodology for Evaluating Operator Usage of Machine Learning Recommendations for Power Grid Contingency Analysis</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author" corresp="yes">
<name><surname>Wenskovitch</surname> <given-names>John</given-names></name>
<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
<xref ref-type="corresp" rid="c001"><sup>&#x0002A;</sup></xref>
<uri xlink:href="http://loop.frontiersin.org/people/1722324/overview"/>
</contrib>
<contrib contrib-type="author">
<name><surname>Jefferson</surname> <given-names>Brett</given-names></name>
<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
<uri xlink:href="http://loop.frontiersin.org/people/1335364/overview"/>
</contrib>
<contrib contrib-type="author">
<name><surname>Anderson</surname> <given-names>Alexander</given-names></name>
<xref ref-type="aff" rid="aff2"><sup>2</sup></xref>
<uri xlink:href="http://loop.frontiersin.org/people/1836261/overview"/>
</contrib>
<contrib contrib-type="author">
<name><surname>Baweja</surname> <given-names>Jessica</given-names></name>
<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
<uri xlink:href="http://loop.frontiersin.org/people/1836085/overview"/>
</contrib>
<contrib contrib-type="author">
<name><surname>Ciesielski</surname> <given-names>Danielle</given-names></name>
<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
<uri xlink:href="http://loop.frontiersin.org/people/1836327/overview"/>
</contrib>
<contrib contrib-type="author">
<name><surname>Fallon</surname> <given-names>Corey</given-names></name>
<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
<uri xlink:href="http://loop.frontiersin.org/people/1097002/overview"/>
</contrib>
</contrib-group>
<aff id="aff1"><sup>1</sup><institution>Pacific Northwest National Laboratory, National Security Directorate</institution>, <addr-line>Richland, WA</addr-line>, <country>United States</country></aff>
<aff id="aff2"><sup>2</sup><institution>Pacific Northwest National Laboratory, Energy and Environment Directorate</institution>, <addr-line>Richland, WA</addr-line>, <country>United States</country></aff>
<author-notes>
<fn fn-type="edited-by"><p>Edited by: Christine Bauer, Utrecht University, Netherlands</p></fn>
<fn fn-type="edited-by"><p>Reviewed by: Alain Starke, Wageningen University and Research, Netherlands; Mario Garcia-Valdez, Instituto Tecnol&#x000F3;gico de Tijuana, Mexico</p></fn>
<corresp id="c001">&#x0002A;Correspondence: John Wenskovitch <email>john.wenskovitch&#x00040;pnnl.gov</email></corresp>
<fn fn-type="other" id="fn001"><p>This article was submitted to Recommender Systems, a section of the journal Frontiers in Big Data</p></fn></author-notes>
<pub-date pub-type="epub">
<day>14</day>
<month>06</month>
<year>2022</year>
</pub-date>
<pub-date pub-type="collection">
<year>2022</year>
</pub-date>
<volume>5</volume>
<elocation-id>897295</elocation-id>
<history>
<date date-type="received">
<day>16</day>
<month>03</month>
<year>2022</year>
</date>
<date date-type="accepted">
<day>29</day>
<month>04</month>
<year>2022</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#x000A9; 2022 Wenskovitch, Jefferson, Anderson, Baweja, Ciesielski and Fallon.</copyright-statement>
<copyright-year>2022</copyright-year>
<copyright-holder>Wenskovitch, Jefferson, Anderson, Baweja, Ciesielski and Fallon</copyright-holder>
<license xlink:href="http://creativecommons.org/licenses/by/4.0/"><p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</p></license> </permissions>
<abstract>
<p>This work presents the application of a methodology to measure domain expert trust and workload, elicit feedback, and understand the technological usability and impact when a machine learning assistant is introduced into contingency analysis for real-time power grid simulation. The goal of this framework is to rapidly collect and analyze a broad variety of human factors data in order to accelerate the development and evaluation loop for deploying machine learning applications. We describe our methodology and analysis, and we discuss insights gained from a pilot participant about the current usability state of an early technology readiness level (TRL) artificial neural network (ANN) recommender.</p></abstract>
<kwd-group>
<kwd>human-machine teaming</kwd>
<kwd>trust evaluation</kwd>
<kwd>cognitive load</kwd>
<kwd>power grid</kwd>
<kwd>contingency analysis</kwd>
</kwd-group>
<counts>
<fig-count count="6"/>
<table-count count="8"/>
<equation-count count="0"/>
<ref-count count="85"/>
<page-count count="19"/>
<word-count count="14027"/>
</counts>
</article-meta>
</front>
<body>
<sec sec-type="intro" id="s1">
<title>1. Introduction</title>
<p>The field of power systems represents an exemplar for domains that struggle to incorporate new technologies. Challenges with control room work culture tend to stifle technological innovation and prevent the evolution of technology (Kennedy, <xref ref-type="bibr" rid="B28">1995</xref>; Von Meier, <xref ref-type="bibr" rid="B79">1999</xref>; Nisar et al., <xref ref-type="bibr" rid="B52">2013</xref>). To an extent, this can be expected, as power grid operators are responsible for critical services, managing transmission and distribution of electricity to cities, residences, and other industrial loads. Their complex jobs involve maintaining situational awareness of their area of responsibility (AOR), monitoring voltage and frequency, balancing generation and load, responding to outages, and responding to emergency scenarios. With high workload and high stakes, operators must have reliable technology that doesn&#x00027;t interrupt the speed or quality of work. However, grid decarbonization, adoption of smart grid technologies, and displacement of traditional generation by distributed renewables will soon disrupt current power systems operational paradigms. As a result, a new generation of advanced power applications will be needed to ensure reliable, resilient, robust, safe, and economic operations.</p>
<p>Machine learning advances can make it possible to aid operators and engineers in critical action decisions, particularly when time pressure is involved. A notable implementation of machine assistance is accurate forecasting of total system load as well as solar and wind expectations for generation scheduling and energy market pricing (Lei et al., <xref ref-type="bibr" rid="B33">2009</xref>; Makarov et al., <xref ref-type="bibr" rid="B42">2011</xref>; Almalaq and Edwards, <xref ref-type="bibr" rid="B4">2017</xref>; Wang et al., <xref ref-type="bibr" rid="B80">2019</xref>; Lai et al., <xref ref-type="bibr" rid="B31">2020</xref>; Vanting et al., <xref ref-type="bibr" rid="B76">2021</xref>). Despite the forecasting benefits that machine learning can provide, a variety of reasons limit the adoption of these tools by electric utilities (see Section 2.1). One of the largest hurdles is that developers of future systems must consider not only the technical aspects of machine learning (architecture of the algorithm, training/ validation data quality, etc.), but also incorporate a wide range of operational considerations and, ultimately, measure whether new systems are usable by power system operators. These include consideration of both technology readiness levels (TRL) (Mankins, <xref ref-type="bibr" rid="B44">1995</xref>) and human readiness levels (HRL) (See et al., <xref ref-type="bibr" rid="B69">2019</xref>), adherence to existing operational procedures and increased workload during the adjustment process (Ludwick and Doucette, <xref ref-type="bibr" rid="B35">2009</xref>), as well as the impact of the tool on human-machine trust (Hoff and Bashir, <xref ref-type="bibr" rid="B24">2015</xref>), user autonomy (BenMessaoud et al., <xref ref-type="bibr" rid="B7">2011</xref>), operator situational awareness, and grid performance. As a result, the current tool deployment process in power grid control rooms is drawn out and deliberate.</p>
<p>We focus in this work on evaluating the introduction of machine learning to address the problem of contingency analysis in power systems. Contingency analysis (CA) is a process used to identify potential violations of equipment and operational limits due to unexpected loss of any single piece of physical equipment. Performing this analysis allows operators to identify the best course(s) of action to keep the power grid operational. Operators currently rely on predetermined procedures and their own experience to resolve contingencies in the power grid. This study evaluates the readiness and usability of a recommendation system called ACAT (Artificial Intelligence [AI]-Based Contingency Action Tool). This system makes use of an artificial neural network (ANN) to recommend contingency mitigation actions to operators in order to quickly address potential violations.</p>
<p>To emphasize the importance of operator workflows, human expertise, and how advancement on the HRL scale can facilitate TRL advancement, our research team considered an early stage TRL algorithm that was designed to provide recommendations to control room operators and engineers for mitigating potential power system violations. The disconnect between technology developers and end-users is a living obstacle in getting well-meaning technology in the hands of mission-critical personnel that have to work with these proposed tools and systems on a daily basis. Our work aims to provide an example of how a human factors study can be conducted with an end-user to provide actionable feedback to developers. We seek to accelerate the development and evaluation loop inherent to these development cycles by rapidly collecting information from domain experts that addresses these operational procedures. This includes the acquisition of objective, subjective, and qualitative feedback measures to address cognitive load, trust, human readiness, and the technological readiness, usability, and impact of a novel system. The captured data are aggregated and analyzed to report back on the current state of the system under evaluation.</p>
<p>In particular, we contribute:</p>
<list list-type="bullet">
<list-item><p>A methodology that measures domain expert trust, cognitive load, and technological usability of recommender systems, with the goal of rapidly acquiring and analyzing objective, subjective, and qualitative measures.</p></list-item>
<list-item><p>Results of the application of this methodology to an early-stage tool designed to provide contingency mitigation recommendations to power grid operators.</p></list-item>
<list-item><p>Insights gained from observing user interactions under individual scenario conditions and difficulties.</p></list-item>
</list>
<p>The methodology applied here provide a framework for developers and human factors experts evaluating recommender systems, with a particular focus on how humans respond to and rely upon the provided recommendations. Researchers can then apply this methodology when integrating those systems into a workflow. The methodology proposed should help to identifying limitations and shortcomings in the system or challenges in its integration into human operations. This will support improvement of the system under development and accelerate the integration of the system into operations.</p>
</sec>
<sec id="s2">
<title>2. Related Work</title>
<p>In this section, we discuss existing work in three topics related to this research. We briefly review common barriers to technology adoption (Section 2.1), we provide an overview of common terminology and discuss active research in human-machine trust (Section 2.2), and we describe the usage of heart rate variability as a proxy for understanding cognitive load (Section 2.3).</p>
<sec>
<title>2.1. Barriers to Technology Adoption</title>
<p>From the many barriers to the adoption of new technology identified by Rogers (<xref ref-type="bibr" rid="B63">1962</xref>), we focus our discussion here on two relevant categories: barriers caused by the technology itself (TRL) and barriers caused by the user&#x00027;s ability to use the technology effectively (HRL). From cloud computing (Zhang et al., <xref ref-type="bibr" rid="B85">2021</xref>) to smart grid technologies (Dedrick et al., <xref ref-type="bibr" rid="B15">2015</xref>) to system and information security (Schoenmakers, <xref ref-type="bibr" rid="B68">2013</xref>), the adoption of technology into control rooms encounters many of these barriers as well as others.</p>
<p>Characteristics that are inherent to the technology itself often are often the result of flaws with the system, including unreliability, failures, malfunctions, and low accuracy (Butler and Sellbom, <xref ref-type="bibr" rid="B8">2002</xref>; Al Farsi and West, <xref ref-type="bibr" rid="B3">2006</xref>; Kemper et al., <xref ref-type="bibr" rid="B27">2006</xref>; Randeree, <xref ref-type="bibr" rid="B59">2007</xref>; Schaeffer et al., <xref ref-type="bibr" rid="B67">2013</xref>). Beyond these direct issues lie other problems that may result from the deployment of new technology, including information flow disruption (Poon et al., <xref ref-type="bibr" rid="B57">2004</xref>; DePhillips, <xref ref-type="bibr" rid="B17">2007</xref>; Schaeffer et al., <xref ref-type="bibr" rid="B67">2013</xref>; Plaete et al., <xref ref-type="bibr" rid="B56">2015</xref>), issues with data continuity (Ross, <xref ref-type="bibr" rid="B64">2009</xref>; May et al., <xref ref-type="bibr" rid="B45">2011</xref>), and issues with data standardization and interoperability (Ludwick and Doucette, <xref ref-type="bibr" rid="B35">2009</xref>; Castillo et al., <xref ref-type="bibr" rid="B10">2010</xref>; Lycett et al., <xref ref-type="bibr" rid="B36">2014</xref>; Agalgaonkar et al., <xref ref-type="bibr" rid="B2">2016</xref>).</p>
<p>Barriers related to the effective utilization of technology by users are also varied. General challenges with system usability and related difficulties in use are often a significant concern of new adopters (Venkatesh, <xref ref-type="bibr" rid="B78">2000</xref>; L&#x000E6;rum et al., <xref ref-type="bibr" rid="B30">2001</xref>; Miller and Sim, <xref ref-type="bibr" rid="B50">2004</xref>; Meade et al., <xref ref-type="bibr" rid="B47">2009</xref>; Holden, <xref ref-type="bibr" rid="B25">2011</xref>). Related to these challenges are concerns about a loss of productivity while integrating a new tool into a workflow (Snoeyink and Ertmer, <xref ref-type="bibr" rid="B73">2001</xref>; Meinert, <xref ref-type="bibr" rid="B48">2005</xref>), as well as the accompanying increased workload that is inherent to the adjustment process (Reardon and Davidson, <xref ref-type="bibr" rid="B61">2007</xref>; Simon et al., <xref ref-type="bibr" rid="B71">2007</xref>; Ludwick and Doucette, <xref ref-type="bibr" rid="B35">2009</xref>; Rao et al., <xref ref-type="bibr" rid="B60">2011</xref>). When thinking specifically about the introduction of machine intelligence, loss of user autonomy and agency is also a concern raised by users (Ross, <xref ref-type="bibr" rid="B64">2009</xref>; BenMessaoud et al., <xref ref-type="bibr" rid="B7">2011</xref>; Wenskovitch et al., <xref ref-type="bibr" rid="B82">2021</xref>), as is a lack of trust in conclusions reached by the machine (discussed in the next subsection).</p>
</sec>
<sec>
<title>2.2. Human-Machine Trust</title>
<p>A critical consideration for introducing automation into an established process is ensuring that the human maintains an appropriate degree of trust in the automation (Wenskovitch and North, <xref ref-type="bibr" rid="B83">2020</xref>). Lee and See <xref ref-type="bibr" rid="B32">2004</xref> define trust as &#x0201C;the belief that a technology will help an individual accomplish his/her goals in situations of high uncertainty and complexity.&#x0201D; Lyons and Stokes argue that trust also captures one&#x00027;s willingness to be vulnerable to the machine entity (Lyons and Stokes, <xref ref-type="bibr" rid="B40">2012</xref>), while Onnasch et al. (<xref ref-type="bibr" rid="B54">2014</xref>) note that the consequences for automation errors are the most severe when the systems are exhibiting the highest levels of automation. Trust factors can be measured by the performance of the human, the machine, and/or the team as a whole (Damacharla et al., <xref ref-type="bibr" rid="B14">2018</xref>). These metrics fall into a variety of categories, such as measuring performance, safety, and efficiency. They can also be measured either subjectively or objectively.</p>
<p>Trust as an overall concept consists of three variable layers, identified by Hoff and Bashir (<xref ref-type="bibr" rid="B24">2015</xref>). <italic>Dispositional</italic> trust refers to the general tendency to trust automation, independent of both context and of specific systems. <italic>Situational</italic> trust depends on the current circumstances, exploring the development of trust with the current system and problem. <italic>Learned</italic> trust is an operator&#x00027;s evaluation of a system over time, drawn both from past experiences as well as the current interaction. Fostering the appropriate amount of trust in automation is a continuous challenge that optimizes the tradeoff between the capabilities of the system and the user&#x00027;s perception of those capabilities (Lee and See, <xref ref-type="bibr" rid="B32">2004</xref>). There are penalties for both overtrust and undertrust in the capabilities of a system: <italic>misuse</italic> or <italic>overtrust</italic> refers to failures that occur when people inadvertently violate critical assumptions and rely on automation inappropriately, whereas <italic>disuse</italic> or <italic>distrust</italic> refers to failures that occur when people reject the capabilities of automation.</p>
<p>There are a number of antecedents of trust that can be utilized to foster additional trust in a system. <italic>Familiarity</italic> is perhaps the most obvious trust factor; a user who has a substantial amount of contact with automation will have more time to develop trust in the automation, understanding how and why it operates in the way that it does. Hoff and Bashir (<xref ref-type="bibr" rid="B24">2015</xref>) present a literature review on trust in automation, noting the role of familiarity and learned trust. Both <italic>predictability</italic> and <italic>reliability</italic> also play important roles; working with an automation that is predictable (Lee and See, <xref ref-type="bibr" rid="B32">2004</xref>) and reliable (Hancock et al., <xref ref-type="bibr" rid="B20">2011</xref>) enhances trust with the system. If a system can predict upcoming difficulties and/or provide <italic>proactive assistance</italic> without prompting by the analyst (and that assistance is dependable), the user can develop additional trust in the system (Ho et al., <xref ref-type="bibr" rid="B23">2017</xref>). Finally, <italic>transparency</italic> provides a significant impact to trust in automation, including transparency of decision logic (Lyons et al., <xref ref-type="bibr" rid="B39">2016b</xref>; Sadler et al., <xref ref-type="bibr" rid="B66">2016</xref>; Wang et al., <xref ref-type="bibr" rid="B81">2021</xref>), the intent that underlies actions taken (Lyons, <xref ref-type="bibr" rid="B37">2013</xref>; Lyons et al., <xref ref-type="bibr" rid="B38">2016a</xref>), and current system state (Mercado et al., <xref ref-type="bibr" rid="B49">2016</xref>). The research presented in this study builds on Madsen and Gregor&#x00027;s Trust Questionnaire (Madsen and Gregor, <xref ref-type="bibr" rid="B41">2000</xref>), described in further detail in Section 3.3.</p>
<p>Trust in automation remains a very active topic of research, exploring methods of enhancing trust, recognizing and addressing known challenges, and proposing a significant future research agenda. McDermott et al. (<xref ref-type="bibr" rid="B46">2018</xref>) provide a thorough guidebook that is designed to help system developers who are working to design trustworthy machine teammates, while Smith (<xref ref-type="bibr" rid="B72">2019</xref>) proposes a checklist and agreement framework for human-machine teams. Paul et al. (<xref ref-type="bibr" rid="B55">2019</xref>) present a research agenda that is specific to trust in human-machine teams for cybersecurity operations, identifying a need for better insight, context, and explainability in human-machine teams in this space. Several recent research endeavors have focused on producing guidelines for implementing artificial intelligence (AI) technologies into current workflows, as well providing advice for interacting with AI. The extensive guidelines produced by Amershi et al. (<xref ref-type="bibr" rid="B5">2019</xref>) include initial planning and overarching systems guidelines, guidelines that govern interactions, guidelines for handling when the AI is wrong, and guidelines that govern behavior with the system over time. Extending this work, Nushi et al. (<xref ref-type="bibr" rid="B53">2020</xref>) build a case for how to best apply these guidelines, including setting the right expectations for users, mitigating bias, and supporting interaction experiences over time.</p>
</sec>
<sec>
<title>2.3. Cognitive Load and Heart Rate Variability</title>
<p>Another consideration for integrating automation into a workflow is the effect on the cognitive load level of the human. If using the new system increases the difficulty of the task, then overall performance could be impacted by higher cognitive load, or the amount of information that is currently being processed within working memory (Sweller et al., <xref ref-type="bibr" rid="B75">1998</xref>).</p>
<p>Like trust, cognitive load can be measured by subjective or objective means. Subjective measures are typically evaluated by survey or debriefing following a task, and they include an evaluation of perceived difficulty or mental effort (DeLeeuw and Mayer, <xref ref-type="bibr" rid="B16">2008</xref>). A frequently-used survey is the NASA Task Load Index (TLX), a survey that evaluates workload subjectively by asking a user about the mental demand, physical demand, temporal demand, performance, effort, and frustration level when completing a task (Hart and Staveland, <xref ref-type="bibr" rid="B22">1988</xref>). Common objective measurements for cognitive load are often performance-based, including response time and number of errors (Sweller et al., <xref ref-type="bibr" rid="B75">1998</xref>).</p>
<p>Another quantitative measure of cognitive load is heart rate variability (HRV). HRV measures variation in time between heartbeats, or more precisely the variation in recorded intervals between R spikes, the peaks of an electrocardiogram wave. Measuring this variability in heart rate consistently shows that when mental workload is increased, HRV decreases (Aasman et al., <xref ref-type="bibr" rid="B1">1987</xref>; Porges, <xref ref-type="bibr" rid="B58">1992</xref>; Sweller et al., <xref ref-type="bibr" rid="B75">1998</xref>; Cinaz et al., <xref ref-type="bibr" rid="B13">2013</xref>). In contrast, studies that measure only the heart rate rather than the variability have found both increases (Harris et al., <xref ref-type="bibr" rid="B21">1990</xref>; Mulder, <xref ref-type="bibr" rid="B51">1992</xref>; Wilson, <xref ref-type="bibr" rid="B84">1993</xref>; Stuiver and Mulder, <xref ref-type="bibr" rid="B74">2014</xref>) and decreases (Casali and Wierwille, <xref ref-type="bibr" rid="B9">1983</xref>; Veltman and Gaillard, <xref ref-type="bibr" rid="B77">1996</xref>) in heart rate when cognitive load is increased. A benefit to using HRV as a means of measuring cognitive load is the unobtrusive nature of many of the devices used to acquire physiological measures, though this is coupled with the clear limitation of requiring specialized hardware. Kramer (<xref ref-type="bibr" rid="B29">2020</xref>) reviews how a variety of biometric measures can be obtained and measured through these sensors and devices, quickly detecting phasic shifts in mental workload.</p>
</sec>
</sec>
<sec id="s3">
<title>3. Methodology Components</title>
<p>In this section, we describe the components to the methodology that are employed to measure the impact of a new system on domain expert trust, cognitive load, and technological usability. The methodology and components are generalizable, although some of the particular metrics here are specific to the power systems domain. In Section 4, we describe the details of an experiment that demonstrates this methodology with an ideal user. This methodology incorporates the rapid acquisition of objective (Sections 3.1, 3.2), subjective (Section 3.3), and qualitative (Section 3.4) feedback from a participant. <xref ref-type="table" rid="T1">Table 1</xref> provides an overview of the data, measurements, tools, and processing for each section of this methodology.</p>
<table-wrap position="float" id="T1">
<label>Table 1</label>
<caption><p>Overview of the data, measure, tools, and processing for each component of the methodology.</p></caption>
<table frame="hsides" rules="groups">
<thead><tr>
<th valign="top" align="left"><bold>Data</bold></th>
<th valign="top" align="left"><bold>Measurement</bold></th>
<th valign="top" align="left"><bold>Tools required</bold></th>
<th valign="top" align="left"><bold>Processing method</bold></th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">HRV</td>
<td valign="top" align="left">Cognitive load</td>
<td valign="top" align="left">Zephyr bioharness</td>
<td valign="top" align="left">Neurokit2, custom code</td>
</tr>
<tr>
<td valign="top" align="left">Logs</td>
<td valign="top" align="left">Performance</td>
<td valign="top" align="left">PowerWorld</td>
<td valign="top" align="left">Custom code</td>
</tr>
<tr>
<td valign="top" align="left">Survey</td>
<td valign="top" align="left">Trust</td>
<td valign="top" align="left">Modified madsen and gregor</td>
<td valign="top" align="left">Statistical software</td>
</tr>
<tr>
<td valign="top" align="left">Interview</td>
<td valign="top" align="left">Insight</td>
<td valign="top" align="left">Survey and Conversation</td>
<td valign="top" align="left">Coding of responses within the research team</td>
</tr>
</tbody>
</table>
</table-wrap>
<sec>
<title>3.1. Heart Rate Variability</title>
<p>To capture the data needed to interpret heart rate variability (HRV), participants are fitted with a Zephyr bioharness<xref ref-type="fn" rid="fn0001"><sup>1</sup></xref>. This commercial device is capable of measuring six inputs and reporting more than 20 biometrics. Due to the demonstrated connection between increases in cognitive load and decreases in HRV (see Section 2.3), we use HRV as one proxy for understanding the cognitive load of a participant throughout the duration of an experimental trial. We also collect TLX data from each participant as a subjective measure of workload (see Section 3.3). The raw electrocardiogram (ECG) data are processed using NeuroKit2 (Makowski et al., <xref ref-type="bibr" rid="B43">2021</xref>), a Python library for neurophysical signal processing, to extract a clean R-R interval (distance between the characteristic tall peaks found on the ECG) signal. Standard computations of ECG data include:</p>
<list list-type="order">
<list-item><p><bold>SDNN:</bold> Measured in milliseconds, this is the standard deviation of N-N interbeat intervals that have been filtered and artifacts have been removed.</p></list-item>
<list-item><p><bold>RMSSD:</bold> Measured in milliseconds, this is the root mean square of successive R-R interval differences. R-R intervals are interbeat intervals between all successive heartbeats.</p></list-item>
<list-item><p><bold>LFn:</bold> This is the ratio of the low frequency power (0.04&#x02013;0.15 Hz) in the ECG frequency-domain to the total power.</p></list-item>
<list-item><p><bold>HFn:</bold> This is the ratio of the low frequency power (0.15&#x02013;0.4 Hz) in the ECG frequency-domain to the total power.</p></list-item>
<list-item><p><bold>LF/HF ratio:</bold> This is the ratio of LF power to HF power.</p></list-item>
</list>
<p>There are a number of reviews that compare and contrast these metrics as measures of mental workload (Shaffer and Ginsberg, <xref ref-type="bibr" rid="B70">2017</xref>). For short-term ECG recordings these metrics show the most promise for capturing workload consistently over the course of an experiment. Provided we required a more objective means to measure cognitive load, while balancing the ease of deploying sensors, other means of measuring workload (namely EEG and ERPs) were not used.</p>
</sec>
<sec>
<title>3.2. Performance Scoring</title>
<p>Performance for a given task is typically determined based on behavioral metrics and task relevant measures. When it comes to preventative actions, determining ground truth is a major challenge to measuring performance and impact. Part of the complication is that there is not just one way to mitigate potential violations and plan for contingencies.</p>
<p>When deploying the action recommendation algorithm, the research team decided to measure performance of operator actions through a mixture of well-studied behavioral markers and domain-specific measures. Below is a list of those metrics along with descriptions.</p>
<list list-type="order">
<list-item><p><bold>Completion time:</bold> This is a measure of time that starts with the time that the contingency is introduced to the participant until the time the mitigating plan is implemented. In control room environments, solving contingencies in a timely manner is key.</p></list-item>
<list-item><p><bold>Action Penalty:</bold> This is a measure of overall system changes implemented in order to solve contingencies. Discrete actions such as switching shunts or turning on and off generators are counted. Discrete actions are combined with continuous actions such as absolute generation changes to provide an overall score. This penalty score is derived from existing guidelines surrounding operator impact on power grid systems (Anderson et al., <xref ref-type="bibr" rid="B6">2022</xref>).</p></list-item>
<list-item><p><bold>System Penalty:</bold> This measure complements action penalty and measures the degree to which the current state of the system violates operating limits. Each unit component of the power system has defined operating limits. This measure is the simple sum of the exceedance or amount under operating limits each component in the grid is currently operating. We use this metric as an objective function for performance, in that this is what the operator should be optimizing during a given trial (Anderson et al., <xref ref-type="bibr" rid="B6">2022</xref>).</p></list-item>
</list>
<p>For real-world deployment, assistance algorithms are often engineered to obey strict rules about financial considerations, safety considerations, and operating limits. As an early stage TRL algorithm, ACAT development has been focused on providing meaningful and accurate feedback to operators. Our goal was to determine a set of useful metrics to aid in not only accurately describing objective performance, but also metrics that are useful to developers. While completion time provides a meaningful and often-used human factors measure, action and system penalties provide accuracy measures that could be useful for ACAT development. This is an example of how one might consider incorporating domain-relevant metrics with AI-relevant metrics in a usability assessment.</p>
</sec>
<sec>
<title>3.3. Surveys</title>
<p>After each trial, participants receive a modified version of Madsen and Gregor&#x00027;s Trust Questionnaire (Madsen and Gregor, <xref ref-type="bibr" rid="B41">2000</xref>). This questionnaire measures several constructs that underlie trust in a system. These constructs can be divided into Cognitive-Based trust components (e.g., system understandability, technical accuracy, and reliability) and Emotion-Based trust components (e.g., faith and personal attachment to the system). See <xref ref-type="table" rid="T2">Table 2</xref> for a description of each construct. With respect to the Cognitive trust components, it is important to note that this survey measures <italic>perceived</italic> reliability and accuracy, which may differ from the actual system performance. For each item, participants are asked to rate their agreement with a statement. Participant agreement is measured on a five-point Likert-scale with anchors ranging from 1 (Strongly Disagree) to 5 (Strongly Agree).</p>
<table-wrap position="float" id="T2">
<label>Table 2</label>
<caption><p>The descriptions of each construct measured in our trust questionnaire.</p></caption>
<table frame="hsides" rules="groups">
<thead><tr>
<th valign="top" align="left"><bold>Construct</bold></th>
<th valign="top" align="left"><bold>Description</bold></th>
<th valign="top" align="left"><bold>Component</bold></th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">Reliable</td>
<td valign="top" align="left">The system performs consistently.</td>
<td valign="top" align="left">Cognitive-based trust</td>
</tr>
<tr>
<td valign="top" align="left">Technical competence</td>
<td valign="top" align="left">The system performances accurately and correctly.</td>
<td/>
</tr>
<tr>
<td valign="top" align="left">Understandable</td>
<td valign="top" align="left">A user can understand how the system works and predict its performance.</td>
<td/>
</tr>
<tr style="border-top: thin solid #000000;">
<td valign="top" align="left">Faith</td>
<td valign="top" align="left">Belief that the system can perform well in the future, even in situations when it is untested.</td>
<td valign="top" align="left">Emotion-based trust</td>
</tr>
<tr>
<td valign="top" align="left">Personal attachment</td>
<td valign="top" align="left">A strong preference for working with the system.</td>
<td/>
</tr>
</tbody>
</table>
</table-wrap>
<p>Two modified versions of the questionnaire are administered. One version is designed to measure trust in ACAT. For this version the language was modified to address ACAT specifically. For example, the item from the original questionnaire &#x0201C;The system analyzes problems consistently&#x0201D; is changed to &#x0201C;ACAT analyzes CA violation problems consistently.&#x0201D;</p>
<p>In the control condition of this experiment, participants did not use ACAT and instead rely completely on their operational procedures. A second version of the trust questionnaire is modified to assess trust in the operations procedures used during the control condition. For this version, the language is modified to address operations procedures specifically. For example, the item from the original questionnaire &#x0201C;The system analyzes problems consistently&#x0201D; was changed to &#x0201C;My operation procedures help me to analyze CA violation problems consistently.&#x0201D;</p>
<p>After each trial, participants also received the NASA Task-load Index (TLX). This self-report measure assesses a person&#x00027;s workload on six dimensions (Hart and Staveland, <xref ref-type="bibr" rid="B22">1988</xref>). Three dimensions require one to consider the demands imposed on them by the task or environment. These dimensions include mental, physical and temporal demands. The other three dimensions ask participants to assess their own ability to manage these demands. These dimensions include self-rated performance, effort and frustration. Each dimension is measured by one item and the items are phrased as questions. Rubio et al. (<xref ref-type="bibr" rid="B65">2004</xref>) found support for the measures validity demonstrating high correlations (0.97 and 0.98) with other self-report measures of workload.</p>
<p>Participants rated their workload on each dimension using a six-point Likert scale. In our study, participants were asked to answer each question considering their workload during the scenario trial they just completed. For example, one item asks participants to consider &#x0201C;How mentally demanding was the trial?&#x0201D;</p>
</sec>
<sec>
<title>3.4. Semi-structured Interview Feedback</title>
<p>During each trial, we collect qualitative feedback as the participant comments on their actions and describes their approach toward mitigating a contingency. In order to maintain their focus on exploring the scenario and to enable us to accurately measure cognitive load, participants are not asked to follow any think-aloud protocol. Instead, we capture any spontaneous commentary as the participant works through each scenario. After the participant submits their final solution and begins work on the post-trial survey, we conduct a brief semi-structured interview, gathering additional feedback on the technological readiness of the system. A similar semi-structured debrief is also conducted at the end of the experiment, capturing the overarching thoughts and opinions of the participant after experiencing the ACAT system in a variety of scenario conditions.</p>
</sec>
</sec>
<sec id="s4">
<title>4. Experimental Design</title>
<p>In this section, we describe the parameters of our experiment to evaluate the current usability state of the ACAT recommender tool. We describe the control room environment (Section 4.1) and the software (Section 4.2) available to the participant, summarize the experimental procedures (Section 4.3), provide a reference overview of the scenarios used in the experiment (Section 4.4), and present an example scenario that is representative of the contingencies that the participant is resolving in this study (Section 4.5).</p>
<sec>
<title>4.1. Control Room</title>
<p>The experiment was conducted in the Electricity Infrastructure Operations Center (EIOC) West Control Room at Pacific Northwest National Laboratory (PNNL), shown in <xref ref-type="fig" rid="F1">Figure 1</xref>. The EIOC provides a realistic replica of a utility control room for transmission and distribution system operations. The control room includes 16 operator consoles arranged at three control desks, all of which are connected to a dedicated network and server enclave. At the front of the room is a large video wall system consisting of 40 individual monitors. The individual operator consoles and control desks can be configured to enable role-play between multiple participants serving as various North American Electric Reliability Corporation (NERC) functional entities, including reliability coordinator, balancing authority, transmission operator, distribution operator, and generation facility operator. This simulated control room environment provides opportunities for the evaluation of new systems, experiments designed to understand human factors, and realistic training scenarios. Due to COVID safety considerations and restrictions on room capacity, we focus this study on the interactions between a participant (rather than a full team of operators) and the ACAT recommender, seeking human subjects with substantial expertise in real-time contingency analysis and control room operational procedures.</p>
<fig id="F1" position="float">
<label>Figure 1</label>
<caption><p>A photo of the electricity infrastructure operations center (EIOC) west control room at pacific northwest national laboratory (PNNL). On screen are a geographical schematic of the IEEE 118 Bus network, several instances of the PowerWorld Simulator, and the ACAT recommender.</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="fdata-05-897295-g0001.tif"/>
</fig>
</sec>
<sec>
<title>4.2. Software</title>
<p>The participant in this study made use of two software systems during the experiment. Participant interactions were performed within PowerWorld Simulator, a commonly-used program within control room environments for exploring the effects of changes to the power grid. ACAT, the system under review in this study, is a recommendation system intended to direct operators toward optimal solutions for resolving contingencies.</p>
<sec>
<title>4.2.1. PowerWorld</title>
<p>PowerWorld Simulator<xref ref-type="fn" rid="fn0002"><sup>2</sup></xref> is a commercially available software package used by utilities and researchers to perform common analysis and simulation tasks for high voltage power systems on a time frame ranging from several minutes to several days. It is able to import model files from a wide variety of other software packages and display them in an intuitive graphical user interface.</p>
<p>For the experiment, the participant was given three PowerWorld displays (seen in <xref ref-type="fig" rid="F1">Figure 1</xref>) containing a tabular summary of equipment statuses, a one-line diagram with a semi-geographic view of the power grid, and a tabular summary of contingency analysis results. Equipment violations to be resolved by the participant were highlighted in the tabular display as well as with pie chart flow indicators on the one-line diagram.</p>
<p>Additionally, a custom logging script was written to record the actions taken by the participant in PowerWorld over the course of the experiment. This log file contained records of the particular piece of equipment operated by the participant (generator, line, shunt capacitor, etc.), new setting values for the equipment, and timestamps logging when the participant updated the power flow solution and contingency analysis results.</p>
</sec>
<sec>
<title>4.2.2. ACAT</title>
<p>ACAT is the technology under evaluation in this study. At the time of this study, ACAT has a Technology Readiness Level (TRL) of 3 (on a 9-point scale) due to the fact that it had been trained to consider line and transformer outages on a single power system model with a fixed topology (Mankins, <xref ref-type="bibr" rid="B44">1995</xref>). A TRL of 3 means that the technology demonstrates some core ability to address concepts of interest experimentally and analytically, but hasn&#x00027;t demonstrated that capability in the applied environment or in a laboratory environment. ACAT serves as a recommendation provider, displaying effective corrective action recommendations to remediate real-time contingency analysis (RTCA) violations. The system itself makes use of an artificial neural network and a semi-supervised corrective action algorithm (Chen et al., <xref ref-type="bibr" rid="B12">2019</xref>). A large number of simulation base cases are generated that are unique to a specific grid, varying load and generation to represent a wide range of operating conditions (Chen et al., <xref ref-type="bibr" rid="B11">2016</xref>). These simulation base cases are then passed to a contingency analysis tool (Huang et al., <xref ref-type="bibr" rid="B26">2009</xref>) to identify violations and evaluate their severity. The ANN is then trained on the simulation base cases and accompanying violations. Currently, ACAT is a PNNL developed tool that is not publicly available. However, there is active research in developing prototype tools to aid control room operators in decision-making and to that end, the ACAT tool serves as a specific instance of a recommender system.</p>
<p>Solutions to new contingencies fed into the model are generated via the corrective action algorithm. This algorithm uses an iterative process to compare known stable system states to the load and generation profile under evaluation, developing a mitigation procedure to transition from a state with a violation to one without. This mitigation procedure is validated by the ANN to identify any potential follow-up violations that may result from applying the solution. Following this validation step, a sequence of control actions is then displayed to the operator as a recommended procedure for resolving the contingency. Recommendations generated by ACAT take the form of text on a large monitor in the control room, and they identify substations on the 118-bus system and what actions (shedding load, redistributing power, etc.) should be taken. The recommendations span the general class of actions that human operators can take as corrective actions. Operators are not required to act on these recommendations but can.</p>
</sec>
</sec>
<sec>
<title>4.3. Experiment Procedures</title>
<p>Rather than collecting a team of participants to fill the collection of control room roles in a normal operating environment (e.g., a reliability coordinator, a balancing authority, and a transmission operator), this research focused on the interaction between a single participant and the ACAT recommender. We made this determination to maintain focus on interactions with the ACAT recommender, allowing us to better measure performance, trust, and the operator&#x00027;s real-time opinions about the quality of the tool and its recommendations during trials when ACAT was present. During each trial, the participant was responsible for identifying the contingency analysis violation, determining the proper mitigating actions, and implementing those actions in the PowerWorld simulation. The workflow deployed in this experiment is modeled off of actual workflows for power system engineers. The general steps include presentation of a scenario, an exploratory solving phase, a final solution implementation, and completing a post-scenario survey.</p>
<p>Two adjacent consoles were configured with two instances of the PowerWorld power system simulation software. The left console was set up as the simulated real-world Supervisory Control and Data Acquisition (SCADA) interface and one-line diagram. The right console was configured as a &#x0201C;study-mode&#x0201D; session, with two monitors containing tabular displays and one-line diagram from ACAT and PowerWorld. In the performance results presented in Section 5.2, these are labeled as &#x0201C;SCADA&#x0201D; and &#x0201C;study-mode&#x0201D; respectively. A paper copy of the power system operations manual was also available for the participant to consult at all times during the experiment. This operations manual contains instructions for resolving common contingencies in the grid and evaluating the severity of violations, as well as finding use in training sessions.</p>
<p>The experiment took place over the course of three partial-day sessions. At the beginning of each day, the participant was fitted with the Zephyr bioharness. The first day included a training session, so that the participant could gain exposure to the layout of the room and consoles, had time to work with the IEEE 118 Bus network that was used in the scenarios<xref ref-type="fn" rid="fn0003"><sup>3</sup></xref>, and had an opportunity to practice using both the PowerWorld and ACAT software. Additionally, training is assumed to be sufficient enough to dampen learning effects and performance variability associated with unfamiliarity. A tutorial introduced the participant to the naming and location of generators, the topology of the lines, and the overall power distribution in the network, as well as time to read the 118 Bus system manual. The participant was also informed about the data collected, including button presses and hovers, decisions made in the network, and free response answers to interviewer questions.</p>
<p>Following the training session, the participant was presented with scenarios of varying difficulty (described in Section 4.4) and asked to resolve the contingencies in each scenario. Trials alternated between solving a scenario with and without the presence of an ACAT recommendation. Each of the scenarios that we created were tested under both experimental conditions, but the order of the trials was designed so that the participant did not see a scenario twice on the same day. Following each trial, the participant completed a copy of the survey appropriate for the trial condition (see Section 3.3 for details of the differences).</p>
<p>In this study we are particularly interested in how the human responds to and relies on (or not) ACAT recommendations. We only evaluate ACAT recommendations to the extent that it can provide insight for what the human operator does in a given scenario. In cases where ACAT&#x00027;s recommendations were not perceived as appropriate by the participant, we attempt to capture the human&#x00027;s perception of ACAT rather than explaining ACAT&#x00027;s technical process.</p>
</sec>
<sec>
<title>4.4. Scenarios</title>
<p>For this evaluation, we constructed a collection of scenarios based on the IEEE 118 Bus network. Some of these scenarios were set aside for use only in the training session. Seven scenarios were used in the experimental trials, which we judge to have three levels of difficulty based on expert power system engineer feedback. Readers less familiar with power systems should take away that scenarios were designed with varying difficulties to resolve contingencies without an aid. We include the technical aspects for the interested reader. The scenario numbers are included in the sections that follow for easy reference to the difficulty of each scenario.</p>
<list list-type="simple">
<list-item><p>E1. <bold>NOA LIGHTLOAD-HIGHVOLT:</bold> An <bold>easy</bold> scenario that is initialized with light load throughout the grid, but the loss of a 138kV line between substations<xref ref-type="fn" rid="fn0004"><sup>4</sup></xref> WMVERN-1 and N.NEWA-1 begins to cause high voltages in the North region because of reactive power injected into the system by shunt capacitors.</p></list-item>
<list-item><p>E2. <bold>WOA LIGHTLOAD-HIGHVOLT:</bold> An <bold>easy</bold> scenario that is initialized with light load throughout the grid, but the loss of a 345kV line between BEQUIN-1 and BREED-1 begins to cause high voltages in the West region because of an open-ended line.</p></list-item>
<list-item><p>E3. <bold>WOA TANNRS-SORENS:</bold> An <bold>easy</bold> scenario centered around the large interchange between the North and West regions. The loss of a 345kV line between TANNRS-1 and SORENS-1 causes power imported by the West region to now come exclusively through long 138kV tie lines, with some lines encountering thermal limits.</p></list-item>
<list-item><p>M4. <bold>SOA KANAWH-CABINC:</bold> A <bold>medium</bold> scenario beginning with low generation in the southeastern portion of the South region. The loss of a 345kV-138kV transformer between KANAWH-1 and CABINC causes an overload in the South region.</p></list-item>
<list-item><p>M5. <bold>NOA EASTLI-MUSKNG:</bold> A <bold>medium</bold> scenario centered around the large interchange between the North and West regions. The loss of a 345kV line between EASTLI-1 and MUSKNG-1 risks voltage collapse due to power imported by the West region now coming exclusively through long 138kV tie lines.</p></list-item>
<list-item><p>M6. <bold>WOA OLIVE IROL 2:</bold> A <bold>medium</bold> scenario centered around the large interchange between the North and West regions. The loss of a 345kV-138kV transfomer from OLIVE-1 to OLIVE-2 causes voltage collapse throughout the West region.</p></list-item>
<list-item><p>H7. <bold>SOA CA SOLUTION FAILURE:</bold> A <bold>hard</bold> scenario centered around the large interchange between the North and South regions. The loss of a 345kV line between EASTLI-1 and MUSKNG-1 could lead to a possible system blackout due to angle instability along the tie lines connecting the West and South regions.</p></list-item>
</list>
</sec>
<sec>
<title>4.5. Example Scenario Approach and Resolution</title>
<p>The experiment was designed to replicate the naturalistic decision making processes used by power system operators first documented by Greitzer et al. (<xref ref-type="bibr" rid="B19">2010</xref>) and Greitzer and Podmore (<xref ref-type="bibr" rid="B18">2008</xref>). The approach used by operators to resolve CA violations is based on their familiarity with the particular power system, their real-time situational awareness, and their knowledge of historical events and usual causes of common problems in the network. Within a control room, operators synthesize numerous inputs from multiple computer displays regarding system frequency, local voltage, power flow direction, breaker statuses, and whether various power plants are online or offline. They use this information in real time to assess impacts of various contingencies, notably verifying that no thermal limits or stability limits will be violated as a result of a particular contingency.</p>
<p>Operators will refer to the guidelines in their operations manual to evaluate the severity of a particular violation, and the required timeline for which the contingency must be mitigated. <xref ref-type="table" rid="T3">Table 3</xref> presents one of the tables regarding voltage violation guidelines from the operations manual given to the participant during the experiment.</p>
<table-wrap position="float" id="T3">
<label>Table 3</label>
<caption><p>Acceptable actions and timeline for simulated post-contingency voltage violations.</p></caption>
<table frame="hsides" rules="groups">
<thead><tr>
<th valign="top" align="left"><bold>Voltage limit violated</bold></th>
<th valign="top" align="left"><bold>Voltage limit value</bold></th>
<th valign="top" align="left"><bold>Acceptable control action</bold></th>
<th valign="top" align="left"><bold>Time to correct</bold></th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">Emergency high</td>
<td valign="top" align="left">1.10 pu / 110%</td>
<td valign="top" align="left">All effective non-cost actions</td>
<td valign="top" align="left">Within 30 min</td>
</tr>
<tr>
<td valign="top" align="left">Normal high</td>
<td valign="top" align="left">1.05 pu / 105%</td>
<td valign="top" align="left">All effective non-cost actions</td>
<td valign="top" align="left">N/A</td>
</tr>
<tr>
<td valign="top" align="left">Normal low</td>
<td valign="top" align="left">0.95 pu / 95%</td>
<td valign="top" align="left">All effective non-cost actions</td>
<td valign="top" align="left">N/A</td>
</tr>
<tr>
<td valign="top" align="left">Emergency low</td>
<td valign="top" align="left">0.92 pu / 92%</td>
<td valign="top" align="left">All effective non-cost actions <bold>except</bold> load shedding</td>
<td valign="top" align="left">Within 15 min</td>
</tr>
<tr>
<td valign="top" align="left">Load dump low</td>
<td valign="top" align="left">0.90 pu / 90%</td>
<td valign="top" align="left">All effective non-cost actions <bold>including</bold> load shedding if voltage collapse possible</td>
<td valign="top" align="left">Within 15 min</td>
</tr>
<tr>
<td valign="top" align="left">Post-contingency IROL transfer limit</td>
<td/>
<td valign="top" align="left">All effective non-cost actions <bold>including</bold> load shedding if voltage collapse possible</td>
<td valign="top" align="left">Within 15 min</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>To resolve CA violations, operators use a sequential decision process that involves projecting the impact of a particular contingency, tracing the root cause of the violation, and identifying available equipment near source of the problem. The decision process typically follows a series of yes/no questions that operators ask themselves while resolving the CA violation.</p>
<p>The typical process used by operators for resolving undervoltage violations can be illustrated by tracing a decision tree for a sample violation. A snapshot of the PowerWorld interface for the particular scenario is shown in <xref ref-type="fig" rid="F2">Figure 2</xref>. An operator resolving the particular scenario will observe that the CA results in the right pane of PowerWorld indicates that loss of the LOGAN-SPRIGG transmission line (&#x0201C;Contingency Location&#x0201D; in <xref ref-type="fig" rid="F2">Figure 2</xref>) will result in voltages collapsing to 0.80 per unit (&#x0201C;Worst Violation Location&#x0201D; in <xref ref-type="fig" rid="F2">Figure 2</xref>), which is far below the Load Dump Low threshold given in <xref ref-type="table" rid="T3">Table 3</xref>. To resolve this contingency, action up to and including load shedding must be taken within 15 min.</p>
<fig id="F2" position="float">
<label>Figure 2</label>
<caption><p>An annotated view of PowerWorld, demonstrating the observations made by an operator seeking to resolve the undervoltage violation described in Section 4.5.</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="fdata-05-897295-g0002.tif"/>
</fig>
<p>The operator will examine the system and identify the source of the problem is the large load at HOLSTO substation without any voltage support (&#x0201C;Root Cause Location&#x0201D; in <xref ref-type="fig" rid="F2">Figure 2</xref>). They will then sequentially ask themselves the questions:</p>
<list list-type="order">
<list-item><p><bold>Q:</bold> Under 0.92 per unit (pu)? <bold>A:</bold> Yes.</p></list-item>
<list-item><p><bold>Q:</bold> Nearby capacitor or reactors? <bold>A:</bold> No.</p></list-item>
<list-item><p><bold>Q:</bold> Nearby generators? <bold>A:</bold> The closest is at GLEN L substation (&#x0201C;Nearest Generator&#x0201D; in <xref ref-type="fig" rid="F2">Figure 2</xref>).</p></list-item>
<list-item><p><bold>Q:</bold> Generators online? <bold>A:</bold> No.</p></list-item>
<list-item><p><bold>Q:</bold> Nearby generators available? <bold>A:</bold> Yes. Request GLEN L generator to start.</p></list-item>
<list-item><p><bold>Q:</bold> Under 0.92 pu? <bold>A:</bold> Yes.</p></list-item>
<list-item><p><bold>Q:</bold> Nearby generators: <bold>A:</bold> No.</p></list-item>
<list-item><p><bold>Q:</bold> Load shedding required? <bold>A:</bold> Yes. Initiate emergency load shed at HOLSTO-1 (&#x0201C;Root Cause Location&#x0201D; in <xref ref-type="fig" rid="F2">Figure 2</xref>).</p></list-item>
</list>
<p>After completing this decision process in the simulator, the operator will ensure that no new CA violations were created by the solution, and will then proceed to communicate, coordinate, and execute the mitigation actions selected.</p>
<p>In cases where ACAT recommendations are provided to the participant, this process of tracing through the decision flowchart and consulting operation manuals is supplemented by the availability of a proposed solution. The participant was not required to follow this sequence of mitigation steps and can freely choose to ignore the system recommendation. Alternatively, they can explore the recommendation and possibly choose to further refine the solution based on their personal tendencies and knowledge of the system.</p>
</sec>
</sec>
<sec sec-type="results" id="s5">
<title>5. Results</title>
<p>Mirroring the structure of our methodology presented in Section 3, we structure the overarching results of our evaluation of ACAT by first reporting the objective HRV and cognitive load findings in Section 5.1, followed by the performance analysis in Section 5.2. These are followed by our evaluation of the subjective trust data acquired via our surveys (Section 5.3) and a summary of the qualitative feedback collected about ACAT (Section 5.4). In Section 6, we explore the details of individual scenarios and trials to better understand how interactions with ACAT change over time.</p>
<sec>
<title>5.1. Heart Rate Variability</title>
<p>ECG data was measured to assess cognitive workload experienced by the participant. We included a training session to allow for learning effects and familiarity of working with ACAT to stabilize. Given this training, we assume that cognitive load is a measure of both scenario difficulty and additional burden (or not) of working with ACAT, and not changing over the course of the experiment. As shown in <xref ref-type="fig" rid="F3">Figure 3</xref>, the participant had higher workload when ACAT is present for the scenarios NOA EASTLI-MUSKNG (M5), SOA CA SOLUTION FAILURE (H7), and WOA LIGHTLOAD-HIGHVOLT (E2). Both the time and frequency domain metrics provide evidence in these scenarios. The WOA OLIVE IROL 2 (M6) scenario also provides evidence for higher workload when working with ACAT but only for the time domain metrics. SOA KANAWH-CABINC (M4) represents the only scenario where there is evidence from all metrics that workload increases without ACAT. The remaining scenario, WOA TANNRS-SORENS (E3), has mixed results across the metrics. NOA LIGHTLOAD-HIGHVOLT (E1) was excluded from this analysis because the participant resolved the scenario based on memory and did not allow time to collect enough data for analysis.</p>
<fig id="F3" position="float">
<label>Figure 3</label>
<caption><p>HRV metrics computed for each trial. Descriptions of each metric are provided in Section 3.1.</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="fdata-05-897295-g0003.tif"/>
</fig>
<p>Two metrics were most expressive across the scenarios, SDNN and LF/HF. A manual clustering was performed on the scatter plot of absolute metric values with respect to SDNN (standard deviation of the N-N interval) against LF/HF (ratio of low-frequency power to high-frequency power) to understand where there was corroborating evidence for higher workload among the metrics. Here we included both no ACAT and ACAT trials together. When SDNN is low and LF/HF is high then there is evidence from both metrics that workload is high. We found four clusters in this analysis (<xref ref-type="fig" rid="F4">Figure 4</xref>):</p>
<list list-type="order">
<list-item><p><bold>(High SDNN, Low LF/HF)</bold>: WOA OLIVE IROL 2 (M6, No-ACAT), NOA LIGHTLOAD-HIGHVOLT (E1, No-ACAT), SOA KANAWH-CABINC (M4, both conditions)</p></list-item>
<list-item><p><bold>(Medium SDNN, Low LF/HF)</bold>: SOA CA SOLUTION FAILURE (H7, No-ACAT), WOA OLIVE IROL 2 (M6, ACAT), NOA EASTLI-MUSKNG (M5, No-ACAT)</p></list-item>
<list-item><p><bold>(Low SDNN, Middle-Low LF/HF)</bold>: WOA TANNRS-SORENS (E3, ACAT), NOA EASTLI-MUSKNG (M5, ACAT), WOA LIGHTLOAD-HIGHVOLT (E2, ACAT)</p></list-item>
<list-item><p><bold>(Low SDNN, High LF/HF)</bold>: WOA TANNRS-SORENS (E3, No-ACAT), SOA CA SOLUTION FAILURE (H7, ACAT)</p></list-item>
</list>
<fig id="F4" position="float">
<label>Figure 4</label>
<caption><p>HRV clusters identified in a scatter plot of SDNN vs. LF/HF.</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="fdata-05-897295-g0004.tif"/>
</fig>
<p>The third and fourth clusters indicate higher cognitive load trials than the first two clusters. Noticeably, Cluster 3 only contains ACAT trials and Cluster 4 contains the hard scenario in the ACAT condition. This scatter plot also highlights that trials where ACAT was used (marked with an &#x02018;x&#x00027; in the figure), corresponding in most cases to either lower SDNN or higher LF/HF.</p>
</sec>
<sec>
<title>5.2. Performance Scoring</title>
<sec>
<title>5.2.1. Completion Times</title>
<p>As a measure of performance, we note that completion times tended to decrease throughout the experiment despite changes in difficulty and counter balanced ACAT/No-ACAT trials. This may be an indicator that the participant was still optimizing a strategy for resolving contingencies generally. We note that the participant did not have previous exposure to the 118 bus system, the ACAT tool, or the procedures manual prior to the experiment. The participant did complete a 1-day training session during the first day of the experiment, where he familiarized himself with the ACAT algorithm and 118 bus system.</p>
<p>Completion times cannot be completely explained by learning effects. The scenario, WOA OLIVE IROL 2 (M6), is a scenario where the participant was faster with ACAT although ACAT was used first. In a second scenario, SOA KANAWH-CABINC (M4), the participant was slower with ACAT with this trial being the second time the participant was in this scenario. When scenarios are separated out by difficulty and by ACAT use, there is an ordering where more difficult scenarios required longer completion times (see <xref ref-type="table" rid="T4">Table 4</xref>). Generally, however, when working with ACAT, our participant was slower at resolving contingencies. A two-way ANOVA did not reveal that neither ACAT nor difficulty was a significant predictor of completion times (see <xref ref-type="table" rid="T5">Table 5</xref>).</p>
<table-wrap position="float" id="T4">
<label>Table 4</label>
<caption><p>Completion times for each scenario.</p></caption>
<table frame="hsides" rules="groups">
<thead><tr>
<th valign="top" align="left"><bold>ACAT status</bold></th>
<th valign="top" align="center" colspan="2"><bold>Off</bold></th>
<th valign="top" align="center"><bold>On</bold></th>
</tr>
<tr>
<th valign="top" align="left"><bold>Scenario</bold></th>
<th valign="top" align="center"><bold>Original</bold></th>
<th valign="top" align="center"><bold>Rerun</bold></th>
<th valign="top" align="center"><bold>Original</bold></th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">NOA EASTLI-MUSKNG</td>
<td valign="top" align="center">605.0</td>
<td valign="top" align="center">-</td>
<td valign="top" align="center">721.0</td>
</tr>
<tr>
<td valign="top" align="left">NOA LIGHTLOAD-HIGHVOLT</td>
<td valign="top" align="center">591.0</td>
<td valign="top" align="center">194.0</td>
<td valign="top" align="center">0.0</td>
</tr>
<tr>
<td valign="top" align="left">SOA CA SOLUTION FAILURE</td>
<td valign="top" align="center">560.0</td>
<td valign="top" align="center">-</td>
<td valign="top" align="center">746.0</td>
</tr>
<tr>
<td valign="top" align="left">SOA KANAWH-CABINC</td>
<td valign="top" align="center">468.0</td>
<td valign="top" align="center">150.0</td>
<td valign="top" align="center">918.0</td>
</tr>
<tr>
<td valign="top" align="left">WOA LIGHTLOAD-HIGHVOLT</td>
<td valign="top" align="center">462.0</td>
<td valign="top" align="center">190.0</td>
<td valign="top" align="center">103.0</td>
</tr>
<tr>
<td valign="top" align="left">WOA OLIVE IROL 2</td>
<td valign="top" align="center">289.0</td>
<td valign="top" align="center">-</td>
<td valign="top" align="center">148.0</td>
</tr>
<tr>
<td valign="top" align="left">WOA TANNRS-SORENS</td>
<td valign="top" align="center">417.0</td>
<td valign="top" align="center">-</td>
<td valign="top" align="center">630.0</td>
</tr>
</tbody>
</table>
</table-wrap>
<table-wrap position="float" id="T5">
<label>Table 5</label>
<caption><p>Two Way ANOVA to predict completion time from ACAT and difficulty.</p></caption>
<table frame="hsides" rules="groups">
<thead><tr>
<th/>
<th valign="top" align="center"><bold>Sum sq</bold></th>
<th valign="top" align="center"><bold>df</bold></th>
<th valign="top" align="center"><bold>F</bold></th>
<th valign="top" align="center"><bold>PR(&#x0003E;<italic>F</italic>)</bold></th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">ACAT</td>
<td valign="top" align="center">7683.16</td>
<td valign="top" align="center">1.00</td>
<td valign="top" align="center">0.16</td>
<td valign="top" align="center">0.69</td>
</tr>
<tr>
<td valign="top" align="left">Scenario difficulty</td>
<td valign="top" align="center">334146.65</td>
<td valign="top" align="center">2.00</td>
<td valign="top" align="center">3.53</td>
<td valign="top" align="center">0.06</td>
</tr>
<tr>
<td valign="top" align="left">ACAT: Scenario difficulty</td>
<td valign="top" align="center">241179.76</td>
<td valign="top" align="center">2.00</td>
<td valign="top" align="center">2.54</td>
<td valign="top" align="center">0.12</td>
</tr>
<tr>
<td valign="top" align="left">Residual</td>
<td valign="top" align="center">568795.30</td>
<td valign="top" align="center">12.00</td>
<td valign="top" align="center">-</td>
<td valign="top" align="center">-</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec>
<title>5.2.2. Action Penalty</title>
<p>Action penalties were computed according to the formula provided in Anderson et al. (<xref ref-type="bibr" rid="B6">2022</xref>). This metric is a coarse measure of the amount of change the operator inflicts on the system in order to resolve the contingency. This measure is formulated as a penalty function since there is often a direct financial cost associated with re-dispatching generation and inherent risk of equipment failure when opening and closing high voltage circuit breakers. There are two types of data to which action penalties are applied. The first are study-mode data and the second are SCADA console data (see <xref ref-type="table" rid="T6">Table 6</xref>). As difficulty increases, action penalties also increase. This is true for both the study-mode and SCADA data, with a larger increase from medium to hard in study-mode. Across the two modes, SCADA action penalties are less than study-mode action penalties. Considering ACAT assistance, in four of the scenarios, action penalties increase when ACAT is used. The three exceptions are NOA LIGHTLOAD-HIGHVOLT (E1), SOA KANAWH-CABINC (M4), and WOA TANNRS-SORENS (E3), where in the first, the difference is negligible and in the latter two action penalties decrease (<xref ref-type="fig" rid="F5">Figure 5</xref>).</p>
<table-wrap position="float" id="T6">
<label>Table 6</label>
<caption><p>Action penalties for each scenario.</p></caption>
<table frame="hsides" rules="groups">
<thead><tr>
<th valign="top" align="left"><bold>Action type</bold></th>
<th valign="top" align="center" colspan="3" style="border-bottom: thin solid #000000;"><bold>Study-mode actions</bold></th>
<th valign="top" align="center" colspan="3" style="border-bottom: thin solid #000000;"><bold>SCADA actions</bold></th>
</tr>
<tr>
<th valign="top" align="left"><bold>ACAT status</bold></th>
<th valign="top" align="center" colspan="2"><bold>Off</bold></th>
<th valign="top" align="center"><bold>On</bold></th>
<th valign="top" align="center" colspan="2"><bold>Off</bold></th>
<th valign="top" align="center"><bold>On</bold></th>
</tr>
<tr>
<th valign="top" align="left"><bold>Scenario</bold></th>
<th valign="top" align="center"><bold>Original</bold></th>
<th valign="top" align="center"><bold>Rerun</bold></th>
<th valign="top" align="center"><bold>Original</bold></th>
<th valign="top" align="center"><bold>Original</bold></th>
<th valign="top" align="center"><bold>Rerun</bold></th>
<th valign="top" align="center"><bold>Original</bold></th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">NOA EASTLI-MUSKNG</td>
<td valign="top" align="center">394.08</td>
<td valign="top" align="center">-</td>
<td valign="top" align="center">646.84</td>
<td valign="top" align="center">447.54</td>
<td valign="top" align="center">-</td>
<td valign="top" align="center">592.28</td>
</tr>
<tr>
<td valign="top" align="left">NOA LIGHTLOAD-HIGHVOLT</td>
<td valign="top" align="center">2.29</td>
<td valign="top" align="center">3.45</td>
<td valign="top" align="center">1.15</td>
<td valign="top" align="center">2.29</td>
<td valign="top" align="center">1.15</td>
<td valign="top" align="center">1.20</td>
</tr>
<tr>
<td valign="top" align="left">SOA CA SOLUTION FAILURE</td>
<td valign="top" align="center">809.19</td>
<td valign="top" align="center">-</td>
<td valign="top" align="center">947.71</td>
<td valign="top" align="center">565.31</td>
<td valign="top" align="center">-</td>
<td valign="top" align="center">876.23</td>
</tr>
<tr>
<td valign="top" align="left">SOA KANAWH-CABINC</td>
<td valign="top" align="center">368.90</td>
<td valign="top" align="center">285.24</td>
<td valign="top" align="center">200.84</td>
<td valign="top" align="center">368.93</td>
<td valign="top" align="center">285.30</td>
<td valign="top" align="center">182.30</td>
</tr>
<tr>
<td valign="top" align="left">WOA LIGHTLOAD-HIGHVOLT</td>
<td valign="top" align="center">97.62</td>
<td valign="top" align="center">296.57</td>
<td valign="top" align="center">296.57</td>
<td valign="top" align="center">77.09</td>
<td valign="top" align="center">295.57</td>
<td valign="top" align="center">295.57</td>
</tr>
<tr>
<td valign="top" align="left">WOA OLIVE IROL 2</td>
<td valign="top" align="center">203.43</td>
<td valign="top" align="center">-</td>
<td valign="top" align="center">527.92</td>
<td valign="top" align="center">203.43</td>
<td valign="top" align="center">-</td>
<td valign="top" align="center">370.45</td>
</tr>
<tr>
<td valign="top" align="left">WOA TANNRS-SORENS</td>
<td valign="top" align="center">757.91</td>
<td valign="top" align="center">-</td>
<td valign="top" align="center">528.40</td>
<td valign="top" align="center">567.80</td>
<td valign="top" align="center">-</td>
<td valign="top" align="center">491.35</td>
</tr>
</tbody>
</table>
</table-wrap>
<fig id="F5" position="float">
<label>Figure 5</label>
<caption><p>Performance measures computed for each trial.</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="fdata-05-897295-g0005.tif"/>
</fig>
</sec>
<sec>
<title>5.2.3. System Penalty</title>
<p>For most of the scenarios, system penalties (Anderson et al., <xref ref-type="bibr" rid="B6">2022</xref>) were zero, which indicates that all contingency violations were resolved and that the operator did not create new violations in a different part of the system. The three scenarios where non-zero values were computed were NOA LIGHTLOAD-HIGHVOLT (E1), WOA OLIVE IROL 2 (M6), and SOA CA SOLUTION FAILURE (H7) (see <xref ref-type="table" rid="T7">Table 7</xref>). For NOA LIGHTLOAD-HIGHVOLT (E1), SCADA penalty and study-mode penalty without ACAT for the first run matched at 112.69. Similarly the SCADA penalty and study-mode penalty match at 8.41 in the final run with ACAT. However, during the second run (without ACAT), the operator&#x00027;s study-mode system penalty is higher than the SCADA system penalty. The solution on the SCADA console was, in fact, different from the solution on the study-mode console. The participant discovered a solution during this run and rather than implementing on the study-mode console, moved directly to the SCADA console for implementation. The solution of this second run was implemented on the third run where ACAT was available.</p>
<table-wrap position="float" id="T7">
<label>Table 7</label>
<caption><p>System penalties for each scenario.</p></caption>
<table frame="hsides" rules="groups">
<thead><tr>
<th valign="top" align="left"><bold>System type</bold></th>
<th valign="top" align="center" colspan="3" style="border-bottom: thin solid #000000;"><bold>Study-mode system</bold></th>
<th valign="top" align="center" colspan="3" style="border-bottom: thin solid #000000;"><bold>SCADA system</bold></th>
</tr>
<tr>
<th valign="top" align="left"><bold>ACAT status</bold></th>
<th valign="top" align="center" colspan="2"><bold>Off</bold></th>
<th valign="top" align="center"><bold>On</bold></th>
<th valign="top" align="center" colspan="2"><bold>Off</bold></th>
<th valign="top" align="center"><bold>On</bold></th>
</tr>
<tr>
<th valign="top" align="left"><bold>Run</bold></th>
<th valign="top" align="center"><bold>Original</bold></th>
<th valign="top" align="center"><bold>Rerun</bold></th>
<th valign="top" align="center"><bold>Original</bold></th>
<th valign="top" align="center"><bold>Original</bold></th>
<th valign="top" align="center"><bold>Rerun</bold></th>
<th valign="top" align="center"><bold>Original</bold></th>
</tr>
<tr>
<th valign="top" align="left"><bold>Scenario</bold></th>
<th/>
<th/>
<th/>
<th/>
<th/>
<th/>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">NOA EASTLI-MUSKNG</td>
<td valign="top" align="center">0.00</td>
<td valign="top" align="center">-</td>
<td valign="top" align="center">0.00</td>
<td valign="top" align="center">0.00</td>
<td valign="top" align="center">-</td>
<td valign="top" align="center">0.00</td>
</tr>
<tr>
<td valign="top" align="left">NOA LIGHTLOAD-HIGHVOLT</td>
<td valign="top" align="center">112.69</td>
<td valign="top" align="center">112.06</td>
<td valign="top" align="center">8.41</td>
<td valign="top" align="center">112.69</td>
<td valign="top" align="center">8.41</td>
<td valign="top" align="center">8.41</td>
</tr>
<tr>
<td valign="top" align="left">SOA CA SOLUTION FAILURE</td>
<td valign="top" align="center">82.46</td>
<td valign="top" align="center">-</td>
<td valign="top" align="center">0.00</td>
<td valign="top" align="center">0.88</td>
<td valign="top" align="center">-</td>
<td valign="top" align="center">0.00</td>
</tr>
<tr>
<td valign="top" align="left">SOA KANAWH-CABINC</td>
<td valign="top" align="center">0.00</td>
<td valign="top" align="center">0.00</td>
<td valign="top" align="center">0.00</td>
<td valign="top" align="center">0.00</td>
<td valign="top" align="center">0.00</td>
<td valign="top" align="center">0.00</td>
</tr>
<tr>
<td valign="top" align="left">WOA LIGHTLOAD-HIGHVOLT</td>
<td valign="top" align="center">0.00</td>
<td valign="top" align="center">0.00</td>
<td valign="top" align="center">0.00</td>
<td valign="top" align="center">0.00</td>
<td valign="top" align="center">0.00</td>
<td valign="top" align="center">0.00</td>
</tr>
<tr>
<td valign="top" align="left">WOA OLIVE IROL 2</td>
<td valign="top" align="center">45.63</td>
<td valign="top" align="center">-</td>
<td valign="top" align="center">0.00</td>
<td valign="top" align="center">45.63</td>
<td valign="top" align="center">-</td>
<td valign="top" align="center">78.99</td>
</tr>
<tr>
<td valign="top" align="left">WOA TANNRS-SORENS</td>
<td valign="top" align="center">0.00</td>
<td valign="top" align="center">-</td>
<td valign="top" align="center">0.00</td>
<td valign="top" align="center">0.00</td>
<td valign="top" align="center">-</td>
<td valign="top" align="center">0.00</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>Similarly, in the SOA CA SOLUTION FAILURE (H7) scenario, the participant implemented a better solution on the SCADA console than the study-mode console for the run without ACAT. However, with ACAT the system penalties (SCADA and study-mode) were both zero.</p>
<p>Unexpected penalty results are seen in scenario WOA OLIVE IROL 2 (M6). While the penalties for trials without ACAT are comparable across study-mode and SCADA, the trials with ACAT exhibit a higher penalty for the SCADA solution than the study-mode. In study-mode, the participant resolves the contingency with a penalty of zero, but when switching to the SCADA console, the system penalty increases to 78.99. Upon further examination, the participant did not implement the study-mode solution and instead believed fewer actions (not switching a reactor) would resolve the contingency. The participant had high confidence this single action would resolve the contingency.</p>
</sec>
</sec>
<sec>
<title>5.3. Survey Outcomes</title>
<p>The researchers compared trust in ACAT to the participant&#x00027;s Operations Procedures in seven scenarios. In five of these scenarios, operator trust in ACAT was lower than their trust in Operations Procedures for all constructs. Average trust in ACAT ratings in these five scenarios ranged from <italic>M</italic> = 1.73 (<italic>SD</italic> = 0.31) to M = 2.29 (<italic>SD</italic> = 0.48), one point lower than their in Operations Procedures that ranged from <italic>M</italic> = 3.00 (<italic>SD</italic> = 1.77) to <italic>M</italic> = 3.33 (<italic>SD</italic> = 0.00) (<xref ref-type="fig" rid="F6">Figure 6</xref>).</p>
<fig id="F6" position="float">
<label>Figure 6</label>
<caption><p>Participant trust levels in both operational procedures (blue) and ACAT (red) for each of the seven scenarios <bold>(A)</bold> NOA EASTLI-MUSKNG, <bold>(B)</bold> SOA CA SOLUTION FAILURE, <bold>(C)</bold> WOA OLIVE IROL 2, <bold>(D)</bold> WOA TANNERS-SORENS, <bold>(E)</bold> SOA KANAWH-CABINC, <bold>(F)</bold> NOA LIGHTLOAD-HIGHVOLT, and <bold>(G)</bold> WOA LIGHTLOAD-HIGHVOLT.</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="fdata-05-897295-g0006.tif"/>
</fig>
<p>The only scenarios tested that did not reveal consistently lower trust in ACAT across constructs were NOA EASTLI-MUSKNG (M5) and WOA OLIVE IROL 2 (M6). For the NOA EASTLI-MUSKNG (M5) scenario, Cognitive-Based Trust (i.e., Reliability, Technical Competence, Understandability) in ACAT was comparable to Cognitive-Based Trust in Operations Procedures. In contrast, Emotion-Based Trust (i.e., Faith, Personal Attachment) was considerably lower for ACAT when compared to operations procedures (<xref ref-type="fig" rid="F6">Figure 6A</xref>). When rating trust in ACAT, the construct Understandability showed the greatest variability across all scenarios. A major source of this variability was due to the item &#x0201C;I understand how ACAT will assist me with decisions I have to make&#x0201D; which was consistently rated lower than the other Understandability items. See <xref ref-type="table" rid="T8">Table 8</xref> for each Understandability item and its mean rating.</p>
<table-wrap position="float" id="T8">
<label>Table 8</label>
<caption><p>Understandability items and their associated rating averaged across all scenarios.</p></caption>
<table frame="hsides" rules="groups">
<thead><tr>
<th valign="top" align="left"><bold>Item &#x00023;</bold></th>
<th valign="top" align="left"><bold>Description</bold></th>
<th valign="top" align="center"><bold>ACAT condition mean</bold></th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">1</td>
<td valign="top" align="left">I know what will happen the next time I use ACAT because I understand how it behaves.</td>
<td valign="top" align="center"><italic>M</italic> = 2.57</td>
</tr>
<tr>
<td valign="top" align="left">2</td>
<td valign="top" align="left">I understand how ACAT will assist me with decisions I have to make.</td>
<td valign="top" align="center"><italic>M</italic> = 1.86</td>
</tr>
<tr>
<td valign="top" align="left">3</td>
<td valign="top" align="left">Although I may now know exactly how the AI/ML algorithm works, I know how to use ACAT to make decisions about the problem.</td>
<td valign="top" align="center"><italic>M</italic> = 2.57</td>
</tr>
<tr>
<td valign="top" align="left">4</td>
<td valign="top" align="left">It is easy to follow what ACAT does.</td>
<td valign="top" align="center"><italic>M</italic> = 2.43</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>For the WOA OLIVE IROL 2 (M6) scenario, trust in the Operation Procedures was higher for all constructs except Faith. Faith in both ACAT and Operation Procedures was low (<italic>M</italic> = 2.00) for this scenario (<xref ref-type="fig" rid="F6">Figure 6C</xref>). Faith in ACAT was comparable to other scenarios. However, Faith in Operation Procedures for was lower for WOA OLIVE IROL 2 (<italic>M</italic> = 2.00) when compared to the average Faith rating across all other scenarios (<italic>M</italic> = 3.00). Survey data did not provide any additional insights into the participant&#x00027;s lack of faith in the procedures during the WOA OLIVE IROL 2 (M6) scenario. The participant did not identify any portions of the procedures that led to a lack of faith during this scenario.</p>
<p>Perceived workload was measured using the NASA TLX. Results revealed very little effect of tool use on workload. The average ratings for Mental Demand, Temporal Demand, Effort and Frustration across all scenarios were lower than average on a 0 to 5 point Likert scale (<italic>M</italic> = 1.29 to <italic>M</italic> = 1.86). Physical demand was non-existent (<italic>M</italic> = 0.00) and perceived performance received the highest possible rating for all scenarios (<italic>M</italic> = 5.00). On average we found very little difference in perceived workload between conditions (<xref ref-type="fig" rid="F6">Figure 6D</xref>). The scenario that showed the greatest difference in perceived workload between the two conditions was SOA KANAWH-CABINC (M4). Mental Demand, Temporal Demand, and Effort were all rated higher when working with ACAT when compared to the No ACAT condition in this scenario (<xref ref-type="fig" rid="F6">Figure 6E</xref>).</p>
</sec>
<sec>
<title>5.4. Qualitative Feedback</title>
<p>Our debrief captured participant feedback about both the current state of ACAT and the struggles that the participant encountered when evaluating the system recommendations during the experiment trials. Overall, the participant reported that it took more time to interpret ACAT results than it did to implement the solution without ACAT. The participant also identified several usability issues that were not considered by the developers of the tool. Most notably, ACAT used bus numbers rather than substation names when delivering recommendations. Because operators are more familiar with the names, they would encounter additional work in converting the ACAT recommendation into an actionable recommendation. This is not something that operators would have time to do in emergency situations with regulator time constraints.</p>
<p>The recommendations generated by ACAT also differed from common operational practices, in particular recommending shedding load too often (a last resort step for operators) and not increasing power generation often enough. The participant was able to resolve all scenarios without load shedding, despite the ACAT recommendations. The load shedding steps also were not accompanied with other information that an operator would need to know, such as reactive power output. Other common mitigation steps such as line switching and bringing offline power plant units into service were not provided as recommended actions by ACAT.</p>
</sec>
</sec>
<sec id="s6">
<title>6. Scenario Insights</title>
<p>In this section, we explore some of the individual scenarios, obtaining insights regarding participant interactions with the system under varying scenario conditions and difficulties.</p>
<sec>
<title>6.1. SOA KANAWH-CABINC Scenario (M4)</title>
<p>The SOA KANAWH-CABINC scenario serves as a representative example for a case where the positives of the ACAT recommender outweigh the negatives. In this medium-difficulty scenario, the loss of a transformer has led to some line overloads, low power generation in a substantial region of the grid, and low voltages in some distant buses. Mitigating this contingency requires a participant to redispatch multiple generation units which keeping line thermal lines in mind. This scenario was encountered near the middle of both trial days, and the trial without access to the ACAT recommender was encountered prior to the trial with ACAT assistance.</p>
<p>The HRV data indicate that the participant had approximately the same cognitive workload in both trials, with slightly higher workload during the first trial without ACAT assistance. Although ACAT assistance was provided after the participant had already seen this scenario, the similar cognitive workload in the ACAT condition is backed up in the survey data. The participant showed consistently lower trust in ACAT than in the operational procedures, and the TLX ratings were higher when the participant was working with ACAT. The participant also had a higher completion time in the ACAT condition, and also performed more system checks to confirm the ACAT recommendation. Despite this higher workload, higher effort, and lack of trust in ACAT, the performance results showed that ACAT was helpful, with lower penalties in both study mode and in the SCADA console solution during the ACAT condition.</p>
<p>Overall, this shows that ACAT objectively helped the participant to mitigate the contingency, supporting the technical correctness of the tool. However, the lower trust and higher workload outcomes in the ACAT condition demonstrates the lack of human readiness of the tool. The participant&#x00027;s opinion of the tool had already stabilized in both cognitive and emotional trust constructs, and the assistance of the tool did not affect those opinions.</p>
</sec>
<sec>
<title>6.2. NOA EASTLI-MUSKNG Scenario (M5)</title>
<p>Following the training sessions, the first scenario encountered by the participant is NOA EASTLI-MUSKNG, a medium-difficulty scenario in which there is a risk of voltage collapse at multiple substations because of power flow across very long tie lines. Mitigating this contingency requires a participant to redispatch multiple generation units while also keeping in mind transfer path limits and power balance. This trial is also performed with access to the ACAT recommender in the first condition, with the second condition run on the next day with only procedures available. This setup provides an opportunity to understand early participant trust in the system.</p>
<p>Indeed, the survey results showed this scenario to be a trust outlier when compared to the other scenarios. The cognitive components of trust were nearly equal between the ACAT and No-ACAT trials (with the values representing trust in ACAT and trust in procedures, respectively), which stands in contrast to the other scenarios in which the No-ACAT trials were consistently higher that the ACAT trials. The emotional components of trust displayed the opposite pattern; these values were minimal in this scenario, with a wide difference between the ACAT and No-ACAT trials. In the other scenarios, the emotional components of trust were still consistently lower for the ACAT trials, but the gap between ACAT and No-ACAT was smaller.</p>
<p>These results show the evolution of trust in the ACAT system, where the cognitive components of trust (reliability, technical competence, understandability) decreased whereas the emotional components of trust (faith, personal attachment) increased across the early trials. Both evolution trends were rapid, with both cognitive and emotional trust in ACAT stabilizing across the later trials (<xref ref-type="fig" rid="F6">Figure 6</xref>).</p>
</sec>
<sec>
<title>6.3. WOA TANNRS-SORENS Scenario (E3)</title>
<p>WOA TANNRS-SORENS was another of the early scenarios encountered, appearing as the third scenario. This also represents another scenario in which the participant has access to the ACAT recommender first, with the No-ACAT trial encountered on the next day. This scenario is judged to be easy in difficulty, recovering from a loss of a 345 kV line which causes a few line thermal overloads elsewhere in the grid. Mitigating this contingency also requires a small number of redispatched generation units while also keeping in mind the line thermal limits.</p>
<p>The performance results of this scenario show that the action penalties were substantially lower in the ACAT condition than in the No-ACAT condition (<xref ref-type="fig" rid="F5">Figure 5</xref>). This stands in contrast to the other scenarios, in which the gap between ACAT and No-ACAT was either smaller or the No-ACAT condition showed better performance. Despite the better performance with ACAT, the trust levels in the system had already begun to stabilize by this point, with participant trust in the procedures higher than in the ACAT recommendations. This shows that the tool objectively helps the operator to perform better, yet the participant still does not have trust in the ACAT recommendations.</p>
<p>Some indications of this lack of trust are seen in the performance results. While the HRV data shows comparable cognitive load, the participant spent more time mitigating the contingency in the ACAT condition and also performed more system checks to evaluate the quality of the recommendation. The ACAT solution also required more steps to implement, resulting in a higher discrete action penalty score in this condition.</p>
</sec>
<sec>
<title>6.4. SOA CA SOLUTION FAILURE Scenario (H7)</title>
<p>The SOA CA SOLUTION FAILURE scenario is unique in this collection of experimental trials, both because of its overall difficulty and because the PowerWorld solver was unable to converge to a contingency analysis solution, leaving the participant without that system and therefore fully dependent on the operational procedures and on ACAT when it was available. In this scenario, the loss of a 345 kV line has lead to angle instability in the tie lines connecting the WOA and SOA regions, and the power system is possibly one contingency away from total blackout. Should similar circumstances occur in the real power grid rather than in a simulation, the looming blackout and lack of a contingency analysis tool solution can easily lead to operator panic as they respond to a time-sensitive issue.</p>
<p>The participant encountered the experimental condition with ACAT assistance first and was able to mitigate the contingency. The performance values were roughly the same, with the ACAT trial demonstrating slightly higher action penalties and equal system penalties, but with more system checks performed in the No-ACAT trial. The HRV data was also similar between the two experimental conditions, indicative of the high cognitive load required when exploring and solving this challenge. The TLX survey results were also approximately identical, with only the Effort dimension differing (one point higher for ACAT).</p>
<p>Despite these similarities in workload and performance, the participant rated their trust in the operational procedures much higher than their trust in ACAT across all trust components (<xref ref-type="fig" rid="F6">Figure 6B</xref>). This result is similar to what we detected in other scenarios, with ACAT demonstrating technical assistance but a lack of user trust. It is particularly noteworthy that the ACAT condition of this scenario was the second trial encountered by the participant, immediately after the ACAT NOA EASTLI-MUSKNG (M5) scenario described in Section 6.2. The trust survey results show that the participant&#x00027;s cognitive trust in the ACAT tool dropped quickly, though their emotional trust rose slightly as they had slightly more experience with ACAT.</p>
</sec>
</sec>
<sec sec-type="discussion" id="s7">
<title>7. Discussion</title>
<p>While ACAT is a low TRL algorithm, there is value in early stage engagement from end users, in this case, from control room operators and engineers. By studying the performance of ACAT with a representative user, we can identify shortcomings in both the technical reliability and human usability of the tool. Overall, we found ACAT to be underperformant across our testing scenarios. In many cases, this underperformance fell in the usability category (as seen in the trust survey results), but there were also technical limitations of ACAT identified in the debrief. Because it required more time to interpret ACAT results than to implement the solution without ACAT, the participant avoided using the system in many of the scenarios where the system recommendations were available. Both technical and usability issues led to participant disuse of the tool in multiple scenarios, where personal expertise and formal operational procedures were preferred for decision-making.</p>
<p>As noted in the overarching results in Section 5, system penalties were typically low in both the ACAT and No-ACAT conditions, indicating contingency mitigation solutions of similar quality in both conditions. This was true regardless of whether the participant encountered the ACAT or No-ACAT trial first. Action penalties presented somewhat more variability in scale, with some trials showing better performance with ACAT and others showing better performance without the recommender.</p>
<p>Results suggest it may not be enough to simply improve system transparency as a technique for building trust. Two key points that the participant identified for improvement are the quality of ACAT recommendations and the interpretability of those recommendations. Because ACAT recommendations did not match common operational procedures and were too aggressive in load shedding, the operator was hesitant to implement those recommendations. Similarly, the challenge of interpreting bus numbers rather than substation names added unnecessary cognitive load to the trials. The identification of these challenges with the system provides actionable feedback for developers working on the next version of ACAT.</p>
<p>The lower initial ACAT emotional trust ratings seen in the NOA EASTLI-MUSKNG (M5) scenario are likely related to its position as the first scenario encountered in the overall experiment. There is some empirical evidence and theoretical support for this explanation. Lowery et al. found the construct Faith lagged behind other constructs as trust in a new system increased with exposure Lowry et al. (<xref ref-type="bibr" rid="B34">2018</xref>). In addition, one classic model of trust suggests that Faith is the last component of trust to develop in a relationship (Rempel et al., <xref ref-type="bibr" rid="B62">1985</xref>).</p>
<p>Lastly, the construct Understandability showed the greatest variability across all scenarios. A potential explanation for the lower ACAT condition mean for this item may be the focus on the utility of ACAT in the prompt provided during the experiment. Perhaps the participant is distinguishing between understanding the system (Items 1, 3, and 4) and understanding how the system can provide value to the decision-making task (Item 2).</p>
<sec>
<title>7.1. Limitations</title>
<p>One concern with the design of this study is the introduction of learning effects, in which the participant recalls a previous solution or a previous sequence of operations that are unique to a scenario, therefore enabling a more rapid solution in the second trial with that scenario. Our results showed that while completion times did generally decrease over the course of the experiment, there is no correlation between penalty scores and trial order. Further, we found that many scenarios exhibit different penalty scores, indicative of different strategies being pursued and different solutions being generated in the ACAT and No-ACAT trials.</p>
<p>The participant also reported not feeling comfortable with trusting ACAT recommendations because he did not have sufficient exposure to the system in advance, and so did not have a good understanding of its reliability. Without that comfort, operators will have a tendency to avoid using the tool regardless of its quality. The participant also noted a lack of familiarity with the operational procedures. Since many contingency violations are resolved based on operator knowledge, additional training with both the grid and ACAT are both necessary in future experiments.</p>
</sec>
</sec>
<sec sec-type="conclusions" id="s8">
<title>8. Conclusion</title>
<p>This work presents an evaluation of ACAT, an early TRL recommendation system designed to aid power system operators in their decision-making process for contingency analysis and maintaining an operational power grid. To perform this evaluation, we apply a methodology that captures objective, subjective, and qualitative measures of both technical accuracy and the readiness of human operators to employ the system regularly. These measures enable us to quickly evaluate the impacts of including machine learning into an operator&#x00027;s existing workflow on several dimensions simultaneously. The method supports diagnosing and identifying key areas during the development process for successful integration when deployed into the field. We measure performance and workload in two experimental conditions, one in which the ACAT recommender is available and another in which the operator only has access to fixed procedures.</p>
<p>In addition to compiling overall performance results across all trials, we performed a detailed exploration of individual scenarios to better understand the nuances of how the participant interacted with ACAT. In our experiment, we identified several key issues with the ACAT system, ranging from usability concerns (e.g., recommendations using bus numbers rather than substation names) to mismatches between the system recommendations and current operational procedures (e.g., the frequent occurrence of load shedding in the recommendations). Communicating these technical and usability challenges to developers will further enhance both the TRL and HRL of ACAT in the next release of the tool.</p>
</sec>
<sec sec-type="data-availability" id="s9">
<title>Data Availability Statement</title>
<p>The raw data supporting the conclusions of this article will be made available by the authors, without undue reservation.</p>
</sec>
<sec id="s10">
<title>Ethics Statement</title>
<p>The studies involving human participants were reviewed and approved by Institutional Review Board (IRB) at Pacific Northwest National Laboratory (PNNL). The patients/participants provided their written informed consent to participate in this study.</p>
</sec>
<sec id="s11">
<title>Author Contributions</title>
<p>JW, BJ, AA, DC, and CF contributed to the conception and design of the study. AA was on-site during the study and handled much of the data collection. All authors contributed to data analysis, and interpretation, writing to the manuscript, and approved the submitted version.</p>
</sec>
<sec sec-type="funding-information" id="s12">
<title>Funding</title>
<p>The research described in this paper is part of the MARS Initiative at Pacific Northwest National Laboratory. It was conducted under the Laboratory Directed Research and Development Program at PNNL, a Multiprogram National Laboratory operated by Battelle Memorial Institute for the U.S. Department of Energy under Contract DE-AC05-76RL01830.</p>
</sec>
<sec sec-type="COI-statement" id="conf1">
<title>Conflict of Interest</title>
<p>The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
</sec>
<sec sec-type="disclaimer" id="s13">
<title>Publisher&#x00027;s Note</title>
<p>All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.</p>
</sec> </body>
<back>
<ack>
<p>The authors would like to acknowledge Dr. Yousu Chen, Ms. Lyndsey Franklin, Dr. Slaven Kincic, and Mr. Blaine Mcgary for their contributions to this project.</p>
</ack>
<ref-list>
<title>References</title>
<ref id="B1">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Aasman</surname> <given-names>J.</given-names></name> <name><surname>Mulder</surname> <given-names>G.</given-names></name> <name><surname>Mulder</surname> <given-names>L. J.</given-names></name></person-group> (<year>1987</year>). <article-title>Operator effort and the measurement of heart-rate variability</article-title>. <source>Hum. Factors</source> <volume>29</volume>, <fpage>161</fpage>&#x02013;<lpage>170</lpage>. <pub-id pub-id-type="doi">10.1177/001872088702900204</pub-id><pub-id pub-id-type="pmid">3610181</pub-id></citation></ref>
<ref id="B2">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Agalgaonkar</surname> <given-names>Y. P.</given-names></name> <name><surname>Marinovici</surname> <given-names>M. C.</given-names></name> <name><surname>Vadari</surname> <given-names>S. V.</given-names></name> <name><surname>Schneider</surname> <given-names>K. P.</given-names></name> <name><surname>Melton</surname> <given-names>R. B.</given-names></name></person-group> (<year>2016</year>). <source>Adms state of the industry and gap analysis</source>. <publisher-name>Technical report, Pacific Northwest National Lab (PNNL)</publisher-name>, <publisher-loc>Richland, WA</publisher-loc>.</citation>
</ref>
<ref id="B3">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Al Farsi</surname> <given-names>M.</given-names></name> <name><surname>West</surname> <given-names>D. J.</given-names></name></person-group> (<year>2006</year>). <article-title>Use of electronic medical records in oman and physician satisfaction</article-title>. <source>J. Med. Syst</source>. <volume>30</volume>, <fpage>17</fpage>&#x02013;<lpage>22</lpage>. <pub-id pub-id-type="doi">10.1007/s10916-006-7399-7</pub-id><pub-id pub-id-type="pmid">16548410</pub-id></citation></ref>
<ref id="B4">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Almalaq</surname> <given-names>A.</given-names></name> <name><surname>Edwards</surname> <given-names>G.</given-names></name></person-group> (<year>2017</year>). <article-title>&#x0201C;A review of deep learning methods applied on load forecasting,&#x0201D;</article-title> in <source>2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA)</source> (<publisher-loc>Cancun</publisher-loc>: <publisher-name>IEEE</publisher-name>), <fpage>511</fpage>&#x02013;<lpage>516</lpage>.</citation>
</ref>
<ref id="B5">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Amershi</surname> <given-names>S.</given-names></name> <name><surname>Weld</surname> <given-names>D.</given-names></name> <name><surname>Vorvoreanu</surname> <given-names>M.</given-names></name> <name><surname>Fourney</surname> <given-names>A.</given-names></name> <name><surname>Nushi</surname> <given-names>B.</given-names></name> <name><surname>Collisson</surname> <given-names>P.</given-names></name> <etal/></person-group>. (<year>2019</year>). <article-title>&#x0201C;Guidelines for human-ai interaction,&#x0201D;</article-title> in <source>Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems</source> (<publisher-loc>New York, NY</publisher-loc>), <fpage>1</fpage>&#x02013;<lpage>13</lpage>.</citation>
</ref>
<ref id="B6">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Anderson</surname> <given-names>A.</given-names></name> <name><surname>Chen</surname> <given-names>Y.</given-names></name> <name><surname>Kincic</surname> <given-names>S.</given-names></name> <name><surname>Jefferson</surname> <given-names>B.</given-names></name> <name><surname>Fallon</surname> <given-names>C.</given-names></name> <name><surname>Wenskovitch</surname> <given-names>J.</given-names></name></person-group> (<year>2022</year>). <article-title>Performance and trust indices for evaluation of ai-based contingency analysis tools</article-title>. <source>IEEE Access</source>. <publisher-name>under review</publisher-name>.</citation>
</ref>
<ref id="B7">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>BenMessaoud</surname> <given-names>C.</given-names></name> <name><surname>Kharrazi</surname> <given-names>H.</given-names></name> <name><surname>MacDorman</surname> <given-names>K. F.</given-names></name></person-group> (<year>2011</year>). <article-title>Facilitators and barriers to adopting robotic-assisted surgery: contextualizing the unified theory of acceptance and use of technology</article-title>. <source>PLoS ONE</source> <volume>6</volume>, <fpage>e16395</fpage>. <pub-id pub-id-type="doi">10.1371/journal.pone.0016395</pub-id><pub-id pub-id-type="pmid">21283719</pub-id></citation></ref>
<ref id="B8">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Butler</surname> <given-names>D. L.</given-names></name> <name><surname>Sellbom</surname> <given-names>M.</given-names></name></person-group> (<year>2002</year>). <article-title>Barriers to adopting technology</article-title>. <source>Educ. Q</source>. <volume>2</volume>, <fpage>22</fpage>&#x02013;<lpage>28</lpage>.</citation>
</ref>
<ref id="B9">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Casali</surname> <given-names>J. G.</given-names></name> <name><surname>Wierwille</surname> <given-names>W. W.</given-names></name></person-group> (<year>1983</year>). <article-title>A comparison of rating scale, secondary-task, physiological, and primary-task workload estimation techniques in a simulated flight task emphasizing communications load</article-title>. <source>Hum. Factors</source> <volume>25</volume>, <fpage>623</fpage>&#x02013;<lpage>641</lpage>. <pub-id pub-id-type="doi">10.1177/001872088302500602</pub-id><pub-id pub-id-type="pmid">6671647</pub-id></citation></ref>
<ref id="B10">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Castillo</surname> <given-names>V. H.</given-names></name> <name><surname>Mart&#x000ED;nez-Garc&#x000ED;a</surname> <given-names>A. I.</given-names></name> <name><surname>Pulido</surname> <given-names>J.</given-names></name></person-group> (<year>2010</year>). <article-title>A knowledge-based taxonomy of critical factors for adopting electronic health record systems by physicians: a systematic literature review</article-title>. <source>BMC Med. Inform. Decis. Mak</source>. <volume>10</volume>, <fpage>1</fpage>&#x02013;<lpage>17</lpage>. <pub-id pub-id-type="doi">10.1186/1472-6947-10-60</pub-id><pub-id pub-id-type="pmid">20950458</pub-id></citation></ref>
<ref id="B11">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Chen</surname> <given-names>Y.</given-names></name> <name><surname>Etingov</surname> <given-names>P.</given-names></name> <name><surname>Ren</surname> <given-names>H.</given-names></name> <name><surname>Hou</surname> <given-names>Z.</given-names></name> <name><surname>Rice</surname> <given-names>M.</given-names></name> <name><surname>Makarov</surname> <given-names>Y. V.</given-names></name></person-group> (<year>2016</year>). <article-title>&#x0201C;A look-ahead probabilistic contingency analysis framework incorporating smart sampling techniques,&#x0201D;</article-title> in <source>2016 IEEE Power and Energy Society General Meeting (PESGM)</source> (<publisher-loc>New York, NY</publisher-loc>: <publisher-name>IEEE</publisher-name>), <fpage>1</fpage>&#x02013;<lpage>5</lpage>.</citation>
</ref>
<ref id="B12">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Chen</surname> <given-names>Y.</given-names></name> <name><surname>Yin</surname> <given-names>T.</given-names></name> <name><surname>Huang</surname> <given-names>R.</given-names></name> <name><surname>Fan</surname> <given-names>X.</given-names></name> <name><surname>Huang</surname> <given-names>Q.</given-names></name></person-group> (<year>2019</year>). <article-title>&#x0201C;Big data analytic for cascading failure analysis,&#x0201D;</article-title> in <source>2019 IEEE International Conference on Big Data (Big Data)</source> (<publisher-loc>New York, NY</publisher-loc>: <publisher-name>IEEE</publisher-name>), <fpage>1625</fpage>&#x02013;<lpage>1630</lpage>.</citation>
</ref>
<ref id="B13">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Cinaz</surname> <given-names>B.</given-names></name> <name><surname>Arnrich</surname> <given-names>B.</given-names></name> <name><surname>La Marca</surname> <given-names>R.</given-names></name> <name><surname>Tr&#x000F6;ster</surname> <given-names>G.</given-names></name></person-group> (<year>2013</year>). <article-title>Monitoring of mental workload levels during an everyday life office-work scenario</article-title>. <source>Pers. Ubiquitous Comput</source>. <volume>17</volume>, <fpage>229</fpage>&#x02013;<lpage>239</lpage>. <pub-id pub-id-type="doi">10.1007/s00779-011-0466-1</pub-id></citation>
</ref>
<ref id="B14">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Damacharla</surname> <given-names>P.</given-names></name> <name><surname>Javaid</surname> <given-names>A. Y.</given-names></name> <name><surname>Gallimore</surname> <given-names>J. J.</given-names></name> <name><surname>Devabhaktuni</surname> <given-names>V. K.</given-names></name></person-group> (<year>2018</year>). <article-title>Common metrics to benchmark human-machine teams (hmt): a review</article-title>. <source>IEEE Access</source> <volume>6</volume>:<fpage>38637</fpage>&#x02013;<lpage>38655</lpage>. <pub-id pub-id-type="doi">10.1109/ACCESS.2018.2853560</pub-id></citation>
</ref>
<ref id="B15">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Dedrick</surname> <given-names>J.</given-names></name> <name><surname>Venkatesh</surname> <given-names>M.</given-names></name> <name><surname>Stanton</surname> <given-names>J. M.</given-names></name> <name><surname>Zheng</surname> <given-names>Y.</given-names></name> <name><surname>Ramnarine-Rieks</surname> <given-names>A.</given-names></name></person-group> (<year>2015</year>). <article-title>Adoption of smart grid technologies by electric utilities: factors influencing organizational innovation in a regulated environment</article-title>. <source>Electron. Mark</source>. <volume>25</volume>, <fpage>17</fpage>&#x02013;<lpage>29</lpage>. <pub-id pub-id-type="doi">10.1007/s12525-014-0166-6</pub-id></citation>
</ref>
<ref id="B16">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>DeLeeuw</surname> <given-names>K. E.</given-names></name> <name><surname>Mayer</surname> <given-names>R. E.</given-names></name></person-group> (<year>2008</year>). <article-title>A comparison of three measures of cognitive load: evidence for separable measures of intrinsic, extraneous, and germane load</article-title>. <source>J. Educ. Psychol</source>. <volume>100</volume>, 223. <pub-id pub-id-type="doi">10.1037/0022-0663.100.1.223</pub-id></citation>
</ref>
<ref id="B17">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>DePhillips</surname> <given-names>H. A.</given-names></name></person-group> (<year>2007</year>). <article-title>Initiatives and barriers to adopting health information technology</article-title>. <source>Dis. Manag. Health Outcomes</source> <volume>15</volume>, <fpage>1</fpage>&#x02013;<lpage>6</lpage>. <pub-id pub-id-type="doi">10.2165/00115677-200715010-00001</pub-id></citation>
</ref>
<ref id="B18">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Greitzer</surname> <given-names>F. L.</given-names></name> <name><surname>Podmore</surname> <given-names>R.</given-names></name></person-group> (<year>2008</year>). <source>Naturalistic decision making in power grid operations: Implications for dispatcher training and usability testing</source>. <publisher-name>Technical report, Pacific Northwest National Lab (PNNL)</publisher-name>, <publisher-loc>Richland, WA</publisher-loc>.</citation>
</ref>
<ref id="B19">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Greitzer</surname> <given-names>F. L.</given-names></name> <name><surname>Podmore</surname> <given-names>R.</given-names></name> <name><surname>Robinson</surname> <given-names>M.</given-names></name> <name><surname>Ey</surname> <given-names>P.</given-names></name></person-group> (<year>2010</year>). <article-title>Naturalistic decision making for power system operators</article-title>. <source>Intl. J. Hum. Comput. Interact</source>. <volume>26</volume>, <fpage>278</fpage>&#x02013;<lpage>291</lpage>. <pub-id pub-id-type="doi">10.1080/10447310903499070</pub-id></citation>
</ref>
<ref id="B20">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Hancock</surname> <given-names>P. A.</given-names></name> <name><surname>Billings</surname> <given-names>D. R.</given-names></name> <name><surname>Schaefer</surname> <given-names>K. E.</given-names></name> <name><surname>Chen</surname> <given-names>J. Y.</given-names></name> <name><surname>De Visser</surname> <given-names>E. J.</given-names></name> <name><surname>Parasuraman</surname> <given-names>R.</given-names></name></person-group> (<year>2011</year>). <article-title>A meta-analysis of factors affecting trust in human-robot interaction</article-title>. <source>Hum. Factors</source> <volume>53</volume>, <fpage>517</fpage>&#x02013;<lpage>527</lpage>. <pub-id pub-id-type="doi">10.1177/0018720811417254</pub-id><pub-id pub-id-type="pmid">22046724</pub-id></citation></ref>
<ref id="B21">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Harris Sr</surname> <given-names>R. L.</given-names></name> <name><surname>Bonadies</surname> <given-names>G. A.</given-names></name> <name><surname>Comstock Jr</surname> <given-names>J. R.</given-names></name></person-group> (<year>1990</year>). <article-title>&#x0201C;Usefulness of heart measures in flight simulation,&#x0201D;</article-title> in <source>NASA, Lyndon B. Johnson Space Center, Third Annual Workshop on Space Operations Automation and Robotics (SOAR 1989)</source> (<publisher-loc>Houston, TX</publisher-loc>).</citation>
</ref>
<ref id="B22">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Hart</surname> <given-names>S. G.</given-names></name> <name><surname>Staveland</surname> <given-names>L. E.</given-names></name></person-group> (<year>1988</year>). <article-title>Development of nasa-tlx (task load index): results of empirical and theoretical research</article-title>. <source>Adv. Psychol</source>. <volume>52</volume>, <fpage>139</fpage>&#x02013;<lpage>183</lpage>. <pub-id pub-id-type="doi">10.1016/S0166-4115(08)62386-9</pub-id></citation>
</ref>
<ref id="B23">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ho</surname> <given-names>N.</given-names></name> <name><surname>Sadler</surname> <given-names>G. G.</given-names></name> <name><surname>Hoffmann</surname> <given-names>L. C.</given-names></name> <name><surname>Zemlicka</surname> <given-names>K.</given-names></name> <name><surname>Lyons</surname> <given-names>J.</given-names></name> <name><surname>Fergueson</surname> <given-names>W.</given-names></name> <etal/></person-group>. (<year>2017</year>). <article-title>A longitudinal field study of auto-gcas acceptance and trust: first-year results and implications</article-title>. <source>J. Cogn. Eng. Decis. Mak</source>. <volume>11</volume>, <fpage>239</fpage>&#x02013;<lpage>251</lpage>. <pub-id pub-id-type="doi">10.1177/1555343417701019</pub-id></citation>
</ref>
<ref id="B24">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Hoff</surname> <given-names>K. A.</given-names></name> <name><surname>Bashir</surname> <given-names>M.</given-names></name></person-group> (<year>2015</year>). <article-title>Trust in automation: Integrating empirical evidence on factors that influence trust</article-title>. <source>Hum. Factors</source> <volume>57</volume>, <fpage>407</fpage>&#x02013;<lpage>434</lpage>. <pub-id pub-id-type="doi">10.1177/0018720814547570</pub-id><pub-id pub-id-type="pmid">25875432</pub-id></citation></ref>
<ref id="B25">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Holden</surname> <given-names>R. J.</given-names></name></person-group> (<year>2011</year>). <article-title>What stands in the way of technology-mediated patient safety improvements? a study of facilitators and barriers to physicians&#x00027; use of electronic health records</article-title>. <source>J. Patient Safety</source> <volume>7</volume>, <fpage>193</fpage>. <pub-id pub-id-type="doi">10.1097/PTS.0b013e3182388cfa</pub-id><pub-id pub-id-type="pmid">22064624</pub-id></citation></ref>
<ref id="B26">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Huang</surname> <given-names>Z.</given-names></name> <name><surname>Chen</surname> <given-names>Y.</given-names></name> <name><surname>Nieplocha</surname> <given-names>J.</given-names></name></person-group> (<year>2009</year>). <article-title>&#x0201C;Massive contingency analysis with high performance computing,&#x0201D;</article-title> in <source>2009 IEEE Power and Energy Society General Meeting</source> (<publisher-loc>Calgary, AB</publisher-loc>: <publisher-name>IEEE</publisher-name>), <fpage>1</fpage>&#x02013;<lpage>80</lpage>.<pub-id pub-id-type="pmid">20529923</pub-id></citation></ref>
<ref id="B27">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Kemper</surname> <given-names>A. R.</given-names></name> <name><surname>Uren</surname> <given-names>R. L.</given-names></name> <name><surname>Clark</surname> <given-names>S. J.</given-names></name></person-group> (<year>2006</year>). <article-title>Adoption of electronic health records in primary care pediatric practices</article-title>. <source>Pediatrics</source> <volume>118</volume>, <fpage>e20</fpage>-e24. <pub-id pub-id-type="doi">10.1542/peds.2005-3000</pub-id><pub-id pub-id-type="pmid">16818534</pub-id></citation></ref>
<ref id="B28">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Kennedy</surname> <given-names>T.</given-names></name></person-group> (<year>1995</year>). <article-title>A system operator&#x00027;s view of evolving applications</article-title>. <source>IEEE Comput. Appl. Power</source> <volume>8</volume>, <fpage>25</fpage>&#x02013;<lpage>29</lpage>. <pub-id pub-id-type="doi">10.1109/67.372672</pub-id></citation>
</ref>
<ref id="B29">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Kramer</surname> <given-names>A. F.</given-names></name></person-group> (<year>2020</year>). <article-title>&#x0201C;Physiological metrics of mental workload: a review of recent progress,&#x0201D;</article-title> in <source>Multiple-Task Performance</source> (<publisher-loc>Washington, DC</publisher-loc>), <fpage>279</fpage>&#x02013;<lpage>328</lpage>.</citation>
</ref>
<ref id="B30">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>L&#x000E6;rum</surname> <given-names>H.</given-names></name> <name><surname>Ellingsen</surname> <given-names>G.</given-names></name> <name><surname>Faxvaag</surname> <given-names>A.</given-names></name></person-group> (<year>2001</year>). <article-title>Doctors&#x00027; use of electronic medical records systems in hospitals: cross sectional survey</article-title>. <source>BMJ</source> <volume>323</volume>, <fpage>1344</fpage>&#x02013;<lpage>1348</lpage>. <pub-id pub-id-type="doi">10.1136/bmj.323.7325.1344</pub-id><pub-id pub-id-type="pmid">11739222</pub-id></citation></ref>
<ref id="B31">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Lai</surname> <given-names>J.-P.</given-names></name> <name><surname>Chang</surname> <given-names>Y.-M.</given-names></name> <name><surname>Chen</surname> <given-names>C.-H.</given-names></name> <name><surname>Pai</surname> <given-names>P.-F.</given-names></name></person-group> (<year>2020</year>). <article-title>A survey of machine learning models in renewable energy predictions</article-title>. <source>Appl. Sci</source>. <volume>10</volume>, 5975. <pub-id pub-id-type="doi">10.3390/app10175975</pub-id></citation>
</ref>
<ref id="B32">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Lee</surname> <given-names>J. D.</given-names></name> <name><surname>See</surname> <given-names>K. A.</given-names></name></person-group> (<year>2004</year>). <article-title>Trust in automation: designing for appropriate reliance</article-title>. <source>Hum. Factors</source> <volume>46</volume>, <fpage>50</fpage>&#x02013;<lpage>80</lpage>. <pub-id pub-id-type="doi">10.1518/hfes.46.1.50.30392</pub-id><pub-id pub-id-type="pmid">15151155</pub-id></citation></ref>
<ref id="B33">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Lei</surname> <given-names>M.</given-names></name> <name><surname>Shiyan</surname> <given-names>L.</given-names></name> <name><surname>Chuanwen</surname> <given-names>J.</given-names></name> <name><surname>Hongling</surname> <given-names>L.</given-names></name> <name><surname>Yan</surname> <given-names>Z.</given-names></name></person-group> (<year>2009</year>). <article-title>A review on the forecasting of wind speed and generated power</article-title>. <source>Renew. Sustain. Energy Rev</source>. <volume>13</volume>, <fpage>915</fpage>&#x02013;<lpage>920</lpage>. <pub-id pub-id-type="doi">10.1016/j.rser.2008.02.002</pub-id></citation>
</ref>
<ref id="B34">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Lowry</surname> <given-names>K. M.</given-names></name> <name><surname>Kamp</surname> <given-names>E.</given-names></name> <name><surname>Fallon</surname> <given-names>C. K.</given-names></name> <name><surname>McGhee</surname> <given-names>R.</given-names></name></person-group> (<year>2018</year>). <article-title>I &#x0201C;nvestigating attorney trust in machine-enabled legal research: a mixed methods approach,&#x0201D;</article-title> in <source>Proceedings of the Human Factors and Ergonomics Society Annual Meeting, Vol. 62</source> (<publisher-loc>Los Angeles, CA</publisher-loc>: <publisher-name>SAGE Publications Sage CA</publisher-name>), <fpage>1997</fpage>&#x02013;<lpage>2002</lpage>.</citation>
</ref>
<ref id="B35">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ludwick</surname> <given-names>D. A.</given-names></name> <name><surname>Doucette</surname> <given-names>J.</given-names></name></person-group> (<year>2009</year>). <article-title>Adopting electronic medical records in primary care: lessons learned from health information systems implementation experience in seven countries</article-title>. <source>Int. J. Med. Inform</source>. <volume>78</volume>, <fpage>22</fpage>&#x02013;<lpage>31</lpage>. <pub-id pub-id-type="doi">10.1016/j.ijmedinf.2008.06.005</pub-id><pub-id pub-id-type="pmid">18644745</pub-id></citation></ref>
<ref id="B36">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Lycett</surname> <given-names>K.</given-names></name> <name><surname>Wittert</surname> <given-names>G.</given-names></name> <name><surname>Gunn</surname> <given-names>J.</given-names></name> <name><surname>Hutton</surname> <given-names>C.</given-names></name> <name><surname>Clifford</surname> <given-names>S. A.</given-names></name> <name><surname>Wake</surname> <given-names>M.</given-names></name></person-group> (<year>2014</year>). <article-title>The challenges of real-world implementation of web-based shared care software: The hopscotch shared-care obesity trial in children</article-title>. <source>BMC Med. Inform. Decis. Mak</source>. <volume>14</volume>, <fpage>1</fpage>&#x02013;<lpage>8</lpage>. <pub-id pub-id-type="doi">10.1186/1472-6947-14-61</pub-id><pub-id pub-id-type="pmid">25056431</pub-id></citation></ref>
<ref id="B37">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Lyons</surname> <given-names>J. B.</given-names></name></person-group> (<year>2013</year>). <article-title>&#x0201C;Being transparent about transparency: a model for human-robot interaction,&#x0201D;</article-title> in <source>2013 AAAI Spring Symposium Series</source> (<publisher-loc>Palo Alto, CA</publisher-loc>).</citation>
</ref>
<ref id="B38">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Lyons</surname> <given-names>J. B.</given-names></name> <name><surname>Ho</surname> <given-names>N. T.</given-names></name> <name><surname>Fergueson</surname> <given-names>W. E.</given-names></name> <name><surname>Sadler</surname> <given-names>G. G.</given-names></name> <name><surname>Cals</surname> <given-names>S. D.</given-names></name> <name><surname>Richardson</surname> <given-names>C. E.</given-names></name> <etal/></person-group>. (<year>2016a</year>). <article-title>Trust of an automatic ground collision avoidance technology: a fighter pilot perspective</article-title>. <source>Military Psychol</source>. <volume>28</volume>, <fpage>271</fpage>&#x02013;<lpage>277</lpage>. <pub-id pub-id-type="doi">10.1037/mil0000124</pub-id></citation>
</ref>
<ref id="B39">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Lyons</surname> <given-names>J. B.</given-names></name> <name><surname>Koltai</surname> <given-names>K. S.</given-names></name> <name><surname>Ho</surname> <given-names>N. T.</given-names></name> <name><surname>Johnson</surname> <given-names>W. B.</given-names></name> <name><surname>Smith</surname> <given-names>D. E.</given-names></name> <name><surname>Shively</surname> <given-names>R. J.</given-names></name></person-group> (<year>2016b</year>). <article-title>Engineering trust in complex automated systems</article-title>. <source>Ergon. Design</source> <volume>24</volume>, <fpage>13</fpage>&#x02013;<lpage>17</lpage>. <pub-id pub-id-type="doi">10.1177/1064804615611272</pub-id></citation>
</ref>
<ref id="B40">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Lyons</surname> <given-names>J. B.</given-names></name> <name><surname>Stokes</surname> <given-names>C. K.</given-names></name></person-group> (<year>2012</year>). <article-title>Human-human reliance in the context of automation</article-title>. <source>Hum. Factors</source> <volume>54</volume>, <fpage>112</fpage>&#x02013;<lpage>121</lpage>. <pub-id pub-id-type="doi">10.1177/0018720811427034</pub-id><pub-id pub-id-type="pmid">22409106</pub-id></citation></ref>
<ref id="B41">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Madsen</surname> <given-names>M.</given-names></name> <name><surname>Gregor</surname> <given-names>S.</given-names></name></person-group> (<year>2000</year>). <article-title>&#x0201C;Measuring human-computer trust,&#x0201D;</article-title> in <source>11th Australasian Conference on Information Systems, Vol</source>. <volume>53</volume> (<publisher-loc>Brisbane, QLD</publisher-loc>), <fpage>6</fpage>&#x02013;<lpage>8</lpage>.<pub-id pub-id-type="pmid">33105545</pub-id></citation></ref>
<ref id="B42">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Makarov</surname> <given-names>Y. V.</given-names></name> <name><surname>Etingov</surname> <given-names>P. V.</given-names></name> <name><surname>Ma</surname> <given-names>J.</given-names></name> <name><surname>Huang</surname> <given-names>Z.</given-names></name> <name><surname>Subbarao</surname> <given-names>K.</given-names></name></person-group> (<year>2011</year>). <article-title>Incorporating uncertainty of wind power generation forecast into power system operation, dispatch, and unit commitment procedures</article-title>. <source>IEEE Trans. Sustain. Energy</source> <volume>2</volume>, <fpage>433</fpage>&#x02013;<lpage>442</lpage>. <pub-id pub-id-type="doi">10.1109/TSTE.2011.2159254</pub-id></citation>
</ref>
<ref id="B43">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Makowski</surname> <given-names>D.</given-names></name> <name><surname>Pham</surname> <given-names>T.</given-names></name> <name><surname>Lau</surname> <given-names>Z. J.</given-names></name> <name><surname>Brammer</surname> <given-names>J. C.</given-names></name> <name><surname>Lespinasse</surname> <given-names>F.</given-names></name> <name><surname>Pham</surname> <given-names>H.</given-names></name> <etal/></person-group>. (<year>2021</year>). <article-title>NeuroKit2: A python toolbox for neurophysiological signal processing</article-title>. <source>Behav. Res. Methods</source> <volume>53</volume>, <fpage>1689</fpage>&#x02013;<lpage>1696</lpage>. <pub-id pub-id-type="doi">10.3758/s13428-020-01516-y</pub-id><pub-id pub-id-type="pmid">33528817</pub-id></citation></ref>
<ref id="B44">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Mankins</surname> <given-names>J. C.</given-names></name></person-group> (1995, April 6). <article-title>Technology readiness levels</article-title>. <source>White Paper</source>.</citation>
</ref>
<ref id="B45">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>May</surname> <given-names>C. R.</given-names></name> <name><surname>Finch</surname> <given-names>T. L.</given-names></name> <name><surname>Cornford</surname> <given-names>J.</given-names></name> <name><surname>Exley</surname> <given-names>C.</given-names></name> <name><surname>Gately</surname> <given-names>C.</given-names></name> <name><surname>Kirk</surname> <given-names>S.</given-names></name> <etal/></person-group>. (<year>2011</year>). <article-title>Integrating telecare for chronic disease management in the community: what needs to be done?</article-title> <source>BMC Health Serv. Res</source>. <volume>11</volume>, <fpage>1</fpage>&#x02013;<lpage>11</lpage>. <pub-id pub-id-type="doi">10.1186/1472-6963-11-131</pub-id><pub-id pub-id-type="pmid">21619596</pub-id></citation></ref>
<ref id="B46">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>McDermott</surname> <given-names>P.</given-names></name> <name><surname>Dominguez</surname> <given-names>C.</given-names></name> <name><surname>Kasdaglis</surname> <given-names>N.</given-names></name> <name><surname>Ryan</surname> <given-names>M.</given-names></name> <name><surname>Trhan</surname> <given-names>I.</given-names></name> <name><surname>Nelson</surname> <given-names>A.</given-names></name></person-group> (<year>2018</year>). <source>Human-machine teaming systems engineering guide</source>. <publisher-name>Technical report, MITRE Corp</publisher-name>, <publisher-loc>Bedford MA, United States</publisher-loc>.<pub-id pub-id-type="pmid">29578376</pub-id></citation></ref>
<ref id="B47">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Meade</surname> <given-names>B.</given-names></name> <name><surname>Buckley</surname> <given-names>D.</given-names></name> <name><surname>Boland</surname> <given-names>M.</given-names></name></person-group> (<year>2009</year>). <article-title>What factors affect the use of electronic patient records by irish gps?</article-title> <source>Int. J. Med. Inform</source>. <volume>78</volume>, <fpage>551</fpage>&#x02013;<lpage>558</lpage>. <pub-id pub-id-type="doi">10.1016/j.ijmedinf.2009.03.004</pub-id><pub-id pub-id-type="pmid">19375381</pub-id></citation></ref>
<ref id="B48">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Meinert</surname> <given-names>D. B.</given-names></name></person-group> (<year>2005</year>). <article-title>Resistance to electronic medical records (emrs): a barrier to improved quality of care</article-title>. <source>Inform. Sci</source>. <volume>2</volume>:<fpage>493</fpage>&#x02013;<lpage>504</lpage>. <pub-id pub-id-type="doi">10.28945/846</pub-id></citation>
</ref>
<ref id="B49">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Mercado</surname> <given-names>J. E.</given-names></name> <name><surname>Rupp</surname> <given-names>M. A.</given-names></name> <name><surname>Chen</surname> <given-names>J. Y.</given-names></name> <name><surname>Barnes</surname> <given-names>M. J.</given-names></name> <name><surname>Barber</surname> <given-names>D.</given-names></name> <name><surname>Procci</surname> <given-names>K.</given-names></name></person-group> (<year>2016</year>). <article-title>Intelligent agent transparency in human-agent teaming for multi-uxv management</article-title>. <source>Hum. Factors</source> <volume>58</volume>, <fpage>401</fpage>&#x02013;<lpage>415</lpage>. <pub-id pub-id-type="doi">10.1177/0018720815621206</pub-id><pub-id pub-id-type="pmid">26867556</pub-id></citation></ref>
<ref id="B50">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Miller</surname> <given-names>R. H.</given-names></name> <name><surname>Sim</surname> <given-names>I.</given-names></name></person-group> (<year>2004</year>). <article-title>Physicians&#x00027; use of electronic medical records: Barriers and solutions</article-title>. <source>Health Affairs</source> <volume>23</volume>, <fpage>116</fpage>&#x02013;<lpage>126</lpage>. <pub-id pub-id-type="doi">10.1377/hlthaff.23.2.116</pub-id><pub-id pub-id-type="pmid">15046136</pub-id></citation></ref>
<ref id="B51">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Mulder</surname> <given-names>L. J.</given-names></name></person-group> (<year>1992</year>). <article-title>Measurement and analysis methods of heart rate and respiration for use in applied environments</article-title>. <source>Biol. Psychol</source>. <volume>34</volume>, <fpage>205</fpage>&#x02013;<lpage>236</lpage>. <pub-id pub-id-type="doi">10.1016/0301-0511(92)90016-N</pub-id><pub-id pub-id-type="pmid">1467394</pub-id></citation></ref>
<ref id="B52">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Nisar</surname> <given-names>A.</given-names></name> <name><surname>Ruiz</surname> <given-names>F.</given-names></name> <name><surname>Palacios</surname> <given-names>M.</given-names></name></person-group> (<year>2013</year>). <article-title>Organisational learning, strategic rigidity and technology adoption: Implications for electric utilities and renewable energy firms</article-title>. <source>Renew. Sustain. Energy Rev</source>. <volume>22</volume>:<fpage>438</fpage>&#x02013;<lpage>445</lpage>. <pub-id pub-id-type="doi">10.1016/j.rser.2013.01.039</pub-id></citation>
</ref>
<ref id="B53">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Nushi</surname> <given-names>B.</given-names></name> <name><surname>Amershi</surname> <given-names>S.</given-names></name> <name><surname>Kamar</surname> <given-names>E.</given-names></name> <name><surname>Bansal</surname> <given-names>G.</given-names></name> <name><surname>Weld</surname> <given-names>D.</given-names></name> <name><surname>Vorvoreanu</surname> <given-names>M.</given-names></name> <etal/></person-group>. (<year>2020</year>). <source>How to Build Effective Human-ai Interaction: Considerations for Machine Learning and Software Engineering</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.microsoft.com/en-us/research/project/guidelines-for-human-ai-interaction/articles/how-to-build-effective-human-ai-interaction-considerations-for-machine-learning-and-software-engineering/">https://www.microsoft.com/en-us/research/project/guidelines-for-human-ai-interaction/articles/how-to-build-effective-human-ai-interaction-considerations-for-machine-learning-and-software-engineering/</ext-link> (accessed February 1, 2021).</citation>
</ref>
<ref id="B54">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Onnasch</surname> <given-names>L.</given-names></name> <name><surname>Wickens</surname> <given-names>C. D.</given-names></name> <name><surname>Li</surname> <given-names>H.</given-names></name> <name><surname>Manzey</surname> <given-names>D.</given-names></name></person-group> (<year>2014</year>). <article-title>Human performance consequences of stages and levels of automation: an integrated meta-analysis</article-title>. <source>Hum. Factors</source> <volume>56</volume>, <fpage>476</fpage>&#x02013;<lpage>488</lpage>. <pub-id pub-id-type="doi">10.1177/0018720813501549</pub-id><pub-id pub-id-type="pmid">24930170</pub-id></citation></ref>
<ref id="B55">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Paul</surname> <given-names>C. L.</given-names></name> <name><surname>Blaha</surname> <given-names>L. M.</given-names></name> <name><surname>Fallon</surname> <given-names>C. K.</given-names></name> <name><surname>Gonzalez</surname> <given-names>C.</given-names></name> <name><surname>Gutzwiller</surname> <given-names>R. S.</given-names></name></person-group> (<year>2019</year>). <article-title>&#x0201C;Opportunities and challenges for human-machine teaming in cybersecurity operations,&#x0201D;</article-title> in <source>Proceedings of the Human Factors and Ergonomics Society Annual Meeting, volume 63</source> (<publisher-loc>Los Angeles, CA</publisher-loc>: <publisher-name>SAGE Publications Sage CA</publisher-name>), <fpage>442</fpage>&#x02013;<lpage>446</lpage>.</citation>
</ref>
<ref id="B56">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Plaete</surname> <given-names>J.</given-names></name> <name><surname>Crombez</surname> <given-names>G.</given-names></name> <name><surname>DeSmet</surname> <given-names>A.</given-names></name> <name><surname>Deveugele</surname> <given-names>M.</given-names></name> <name><surname>Verloigne</surname> <given-names>M.</given-names></name> <name><surname>De Bourdeaudhuij</surname> <given-names>I.</given-names></name></person-group> (<year>2015</year>). <article-title>What do general practitioners think about an online self-regulation programme for health promotion? focus group interviews</article-title>. <source>BMC Family Pract</source>. <volume>16</volume>, <fpage>1</fpage>&#x02013;<lpage>11</lpage>. <pub-id pub-id-type="doi">10.1186/s12875-014-0214-5</pub-id><pub-id pub-id-type="pmid">25608851</pub-id></citation></ref>
<ref id="B57">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Poon</surname> <given-names>E. G.</given-names></name> <name><surname>Blumenthal</surname> <given-names>D.</given-names></name> <name><surname>Jaggi</surname> <given-names>T.</given-names></name> <name><surname>Honour</surname> <given-names>M. M.</given-names></name> <name><surname>Bates</surname> <given-names>D. W.</given-names></name> <name><surname>Kaushal</surname> <given-names>R.</given-names></name></person-group> (<year>2004</year>). <article-title>Overcoming barriers to adopting and implementing computerized physician order entry systems in us hospitals</article-title>. <source>Health Affairs</source> <volume>23</volume>, <fpage>184</fpage>&#x02013;<lpage>190</lpage>. <pub-id pub-id-type="doi">10.1377/hlthaff.23.4.184</pub-id><pub-id pub-id-type="pmid">15318579</pub-id></citation></ref>
<ref id="B58">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Porges</surname> <given-names>S. W.</given-names></name></person-group> (<year>1992</year>). <article-title>&#x0201C;Autonomic regulation and attention,&#x0201D;</article-title> in <source>Attention and Information Processing in Infants and Adults</source> (<publisher-loc>Hillsdale, NJ</publisher-loc>), <fpage>201</fpage>&#x02013;<lpage>223</lpage>.</citation>
</ref>
<ref id="B59">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Randeree</surname> <given-names>E.</given-names></name></person-group> (<year>2007</year>). <article-title>Exploring physician adoption of emrs: a multi-case analysis</article-title>. <source>J. Med. Syst</source>. <volume>31</volume>, <fpage>489</fpage>&#x02013;<lpage>496</lpage>. <pub-id pub-id-type="doi">10.1007/s10916-007-9089-5</pub-id><pub-id pub-id-type="pmid">18041282</pub-id></citation></ref>
<ref id="B60">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Rao</surname> <given-names>S. R.</given-names></name> <name><surname>DesRoches</surname> <given-names>C. M.</given-names></name> <name><surname>Donelan</surname> <given-names>K.</given-names></name> <name><surname>Campbell</surname> <given-names>E. G.</given-names></name> <name><surname>Miralles</surname> <given-names>P. D.</given-names></name> <name><surname>Jha</surname> <given-names>A. K.</given-names></name></person-group> (<year>2011</year>). <article-title>Electronic health records in small physician practices: availability, use, and perceived benefits</article-title>. <source>J. Am. Med. Inform. Assoc</source>. <volume>18</volume>, <fpage>271</fpage>&#x02013;<lpage>275</lpage>. <pub-id pub-id-type="doi">10.1136/amiajnl-2010-000010</pub-id><pub-id pub-id-type="pmid">21705459</pub-id></citation></ref>
<ref id="B61">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Reardon</surname> <given-names>J. L.</given-names></name> <name><surname>Davidson</surname> <given-names>E.</given-names></name></person-group> (<year>2007</year>). <article-title>An organizational learning perspective on the assimilation of electronic medical records among small physician practices</article-title>. <source>Eur. J. Inform. Syst</source>. <volume>16</volume>, <fpage>681</fpage>&#x02013;<lpage>694</lpage>. <pub-id pub-id-type="doi">10.1057/palgrave.ejis.3000714</pub-id></citation>
</ref>
<ref id="B62">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Rempel</surname> <given-names>J. K.</given-names></name> <name><surname>Holmes</surname> <given-names>J. G.</given-names></name> <name><surname>Zanna</surname> <given-names>M. P.</given-names></name></person-group> (<year>1985</year>). <article-title>Trust in close relationships</article-title>. <source>J. Pers. Soc. Psychol</source>. <volume>49</volume>, 95. <pub-id pub-id-type="doi">10.1037/0022-3514.49.1.95</pub-id></citation>
</ref>
<ref id="B63">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Rogers</surname> <given-names>E. M.</given-names></name></person-group> (<year>1962</year>). <source>Diffusion of Innovations</source>. <publisher-loc>New York, NY</publisher-loc>: <publisher-name>Simon and Schuster</publisher-name>.</citation>
</ref>
<ref id="B64">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ross</surname> <given-names>S.</given-names></name></person-group> (<year>2009</year>). <article-title>Results of a survey of an online physician community regarding use of electronic medical records in office practices</article-title>. <source>J. Med. Pract. Manag</source>. <volume>24</volume>, <fpage>254</fpage>.<pub-id pub-id-type="pmid">19288653</pub-id></citation></ref>
<ref id="B65">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Rubio</surname> <given-names>S.</given-names></name> <name><surname>D&#x000ED;az</surname> <given-names>E.</given-names></name> <name><surname>Mart&#x000ED;n</surname> <given-names>J.</given-names></name> <name><surname>Puente</surname> <given-names>J. M.</given-names></name></person-group> (<year>2004</year>). <article-title>Evaluation of subjective mental workload: a comparison of swat, nasa-tlx, and workload profile methods</article-title>. <source>Appl. Psychol</source>. <volume>53</volume>, <fpage>61</fpage>&#x02013;<lpage>86</lpage>. <pub-id pub-id-type="doi">10.1111/j.1464-0597.2004.00161.x</pub-id></citation>
</ref>
<ref id="B66">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Sadler</surname> <given-names>G.</given-names></name> <name><surname>Battiste</surname> <given-names>H.</given-names></name> <name><surname>Ho</surname> <given-names>N.</given-names></name> <name><surname>Hoffmann</surname> <given-names>L.</given-names></name> <name><surname>Johnson</surname> <given-names>W.</given-names></name> <name><surname>Shively</surname> <given-names>R.</given-names></name> <etal/></person-group>. (<year>2016</year>). <article-title>&#x0201C;Effects of transparency on pilot trust and agreement in the autonomous constrained flight planner,&#x0201D;</article-title> in <source>2016 IEEE/AIAA 35th Digital Avionics Systems Conference (DASC)</source> (<publisher-loc>Sacramento, CA</publisher-loc>: <publisher-name>IEEE</publisher-name>), <fpage>1</fpage>&#x02013;<lpage>9</lpage>.</citation>
</ref>
<ref id="B67">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Schaeffer</surname> <given-names>B. A.</given-names></name> <name><surname>Schaeffer</surname> <given-names>K. G.</given-names></name> <name><surname>Keith</surname> <given-names>D.</given-names></name> <name><surname>Lunetta</surname> <given-names>R. S.</given-names></name> <name><surname>Conmy</surname> <given-names>R.</given-names></name> <name><surname>Gould</surname> <given-names>R. W.</given-names></name></person-group> (<year>2013</year>). <article-title>Barriers to adopting satellite remote sensing for water quality management</article-title>. <source>Int. J. Remote Sens</source>. <volume>34</volume>, <fpage>7534</fpage>&#x02013;<lpage>7544</lpage>. <pub-id pub-id-type="doi">10.1080/01431161.2013.823524</pub-id></citation>
</ref>
<ref id="B68">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Schoenmakers</surname> <given-names>F. A.</given-names></name></person-group> (<year>2013</year>). <source>Perspectives on Control System Security: Assessing security risks resulting from contradicting values between Operational and Information Technology. Masters Thesis, TU Delft</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://repository.tudelft.nl/islandora/object/uuid:5b2e19c4-c493-4575-972d-d91825d4ef67">https://repository.tudelft.nl/islandora/object/uuid:5b2e19c4-c493-4575-972d-d91825d4ef67</ext-link></citation>
</ref>
<ref id="B69">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>See</surname> <given-names>J. E.</given-names></name> <name><surname>Craft</surname> <given-names>R. L.</given-names></name> <name><surname>Morris</surname> <given-names>J. D.</given-names></name></person-group> (<year>2019</year>). <source>Human Readiness Levels in the Systems Engineering Process at Sandia National Laboratories</source>. <publisher-name>Technical report Sandia National Lab (SNL-NM)</publisher-name>, <publisher-loc>Albuquerque, NM</publisher-loc>.</citation>
</ref>
<ref id="B70">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Shaffer</surname> <given-names>F.</given-names></name> <name><surname>Ginsberg</surname> <given-names>J. P.</given-names></name></person-group> (<year>2017</year>). <article-title>An overview of heart rate variability metrics and norms</article-title>. <source>Front. Public Health</source> <volume>5</volume>, <fpage>258</fpage>. <pub-id pub-id-type="doi">10.3389/fpubh.2017.00258</pub-id><pub-id pub-id-type="pmid">29034226</pub-id></citation></ref>
<ref id="B71">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Simon</surname> <given-names>S. R.</given-names></name> <name><surname>Kaushal</surname> <given-names>R.</given-names></name> <name><surname>Cleary</surname> <given-names>P. D.</given-names></name> <name><surname>Jenter</surname> <given-names>C. A.</given-names></name> <name><surname>Volk</surname> <given-names>L. A.</given-names></name> <name><surname>Poon</surname> <given-names>E. G.</given-names></name> <etal/></person-group>. (<year>2007</year>). <article-title>Correlates of electronic health record adoption in office practices: a statewide survey</article-title>. <source>J. Am. Med. Inform. Assoc</source>. <volume>14</volume>, <fpage>110</fpage>&#x02013;<lpage>117</lpage>. <pub-id pub-id-type="doi">10.1197/jamia.M2187</pub-id><pub-id pub-id-type="pmid">17238717</pub-id></citation></ref>
<ref id="B72">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Smith</surname> <given-names>C. J.</given-names></name></person-group> (<year>2019</year>). <source>Designing trustworthy ai: A human-machine teaming framework to guide development</source>. <publisher-name>Technical report, Carnegie Mellon University, Software Engineering Institute, Pittsburgh, United States</publisher-name>.</citation>
</ref>
<ref id="B73">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Snoeyink</surname> <given-names>R.</given-names></name> <name><surname>Ertmer</surname> <given-names>P. A.</given-names></name></person-group> (<year>2001</year>). <article-title>Thrust into technology: how veteran teachers respond</article-title>. <source>J. Educ. Technol. Syst</source>. <volume>30</volume>, <fpage>85</fpage>&#x02013;<lpage>111</lpage>. <pub-id pub-id-type="doi">10.2190/YDL7-XH09-RLJ6-MTP1</pub-id></citation>
</ref>
<ref id="B74">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Stuiver</surname> <given-names>A.</given-names></name> <name><surname>Mulder</surname> <given-names>B.</given-names></name></person-group> (<year>2014</year>). <article-title>Cardiovascular state changes in simulated work environments</article-title>. <source>Front. Neurosci</source>. <volume>8</volume>, 399. <pub-id pub-id-type="doi">10.3389/fnins.2014.00399</pub-id><pub-id pub-id-type="pmid">25538553</pub-id></citation></ref>
<ref id="B75">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Sweller</surname> <given-names>J.</given-names></name> <name><surname>Van Merrienboer</surname> <given-names>J. J.</given-names></name> <name><surname>Paas</surname> <given-names>F. G.</given-names></name></person-group> (<year>1998</year>). <article-title>Cognitive architecture and instructional design</article-title>. <source>Educ. Psychol. Rev</source>. <volume>10</volume>, <fpage>251</fpage>&#x02013;<lpage>296</lpage>. <pub-id pub-id-type="doi">10.1023/A:1022193728205</pub-id></citation>
</ref>
<ref id="B76">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Vanting</surname> <given-names>N. B.</given-names></name> <name><surname>Ma</surname> <given-names>Z.</given-names></name> <name><surname>J&#x000F8;rgensen</surname> <given-names>B. N.</given-names></name></person-group> (<year>2021</year>). <article-title>A scoping review of deep neural networks for electric load forecasting</article-title>. <source>Energy Inform</source>. <volume>4</volume>, <fpage>1</fpage>&#x02013;<lpage>13</lpage>. <pub-id pub-id-type="doi">10.1186/s42162-021-00148-6</pub-id></citation>
</ref>
<ref id="B77">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Veltman</surname> <given-names>J.</given-names></name> <name><surname>Gaillard</surname> <given-names>A.</given-names></name></person-group> (<year>1996</year>). <article-title>Physiological indices of workload in a simulated flight task</article-title>. <source>Biol. Psychol</source>. <volume>42</volume>, <fpage>323</fpage>&#x02013;<lpage>342</lpage>. <pub-id pub-id-type="doi">10.1016/0301-0511(95)05165-1</pub-id><pub-id pub-id-type="pmid">8652751</pub-id></citation></ref>
<ref id="B78">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Venkatesh</surname> <given-names>V.</given-names></name></person-group> (<year>2000</year>). <article-title>Determinants of perceived ease of use: Integrating control, intrinsic motivation, and emotion into the technology acceptance model</article-title>. <source>Inf. Syst. Res</source>. <volume>11</volume>, <fpage>342</fpage>&#x02013;<lpage>365</lpage>. <pub-id pub-id-type="doi">10.1287/isre.11.4.342.11872</pub-id></citation>
</ref>
<ref id="B79">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Von Meier</surname> <given-names>A.</given-names></name></person-group> (<year>1999</year>). <article-title>Occupational cultures as a challenge to technological innovation</article-title>. <source>IEEE Trans. Eng. Manag</source>. <volume>46</volume>, <fpage>101</fpage>&#x02013;<lpage>114</lpage>. <pub-id pub-id-type="doi">10.1109/17.740041</pub-id></citation>
</ref>
<ref id="B80">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Wang</surname> <given-names>H.</given-names></name> <name><surname>Lei</surname> <given-names>Z.</given-names></name> <name><surname>Zhang</surname> <given-names>X.</given-names></name> <name><surname>Zhou</surname> <given-names>B.</given-names></name> <name><surname>Peng</surname> <given-names>J.</given-names></name></person-group> (<year>2019</year>). <article-title>A review of deep learning for renewable energy forecasting</article-title>. <source>Energy Convers. Manag</source>. <volume>198</volume>, 111799. <pub-id pub-id-type="doi">10.1016/j.enconman.2019.111799</pub-id><pub-id pub-id-type="pmid">22489541</pub-id></citation></ref>
<ref id="B81">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Wang</surname> <given-names>M.</given-names></name> <name><surname>Wenskovitch</surname> <given-names>J.</given-names></name> <name><surname>House</surname> <given-names>L.</given-names></name> <name><surname>Polys</surname> <given-names>N.</given-names></name> <name><surname>North</surname> <given-names>C.</given-names></name></person-group> (<year>2021</year>). <article-title>Bridging cognitive gaps between user and model in interactive dimension reduction</article-title>. <source>Visual Inform</source>. <volume>5</volume>, <fpage>13</fpage>&#x02013;<lpage>25</lpage>. <pub-id pub-id-type="doi">10.1016/j.visinf.2021.03.002</pub-id></citation>
</ref>
<ref id="B82">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Wenskovitch</surname> <given-names>J.</given-names></name> <name><surname>Fallon</surname> <given-names>C.</given-names></name> <name><surname>Miller</surname> <given-names>K.</given-names></name> <name><surname>Dasgupta</surname> <given-names>A.</given-names></name></person-group> (<year>2021</year>). <article-title>&#x0201C;Beyond visual analytics: Human-teaming teaming for ai-driven sensemaking,&#x0201D;</article-title> in <source>Proceedings of the IEEE VIS Workshop on Trust and Expertise in Visual Analytics (TREX), TREX&#x00027;21</source> (<publisher-loc>New Orleans, LA</publisher-loc>: <publisher-name>IEEE</publisher-name>).</citation>
</ref>
<ref id="B83">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Wenskovitch</surname> <given-names>J.</given-names></name> <name><surname>North</surname> <given-names>C.</given-names></name></person-group> (<year>2020</year>). <article-title>Interactive artificial intelligence: designing for the "two black boxes" problem</article-title>. <source>Computer</source> <volume>53</volume>, <fpage>29</fpage>&#x02013;<lpage>39</lpage>. <pub-id pub-id-type="doi">10.1109/MC.2020.2996416</pub-id></citation>
</ref>
<ref id="B84">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Wilson</surname> <given-names>G. F.</given-names></name></person-group> (<year>1993</year>). <article-title>Air-to-ground training missions: a psychophysiological workload analysis</article-title>. <source>Ergonomics</source> <volume>36</volume>, <fpage>1071</fpage>&#x02013;<lpage>1087</lpage>. <pub-id pub-id-type="doi">10.1080/00140139308967979</pub-id><pub-id pub-id-type="pmid">8404836</pub-id></citation></ref>
<ref id="B85">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Zhang</surname> <given-names>S.</given-names></name> <name><surname>Pandey</surname> <given-names>A.</given-names></name> <name><surname>Luo</surname> <given-names>X.</given-names></name> <name><surname>Powell</surname> <given-names>M.</given-names></name> <name><surname>Banerji</surname> <given-names>R.</given-names></name> <name><surname>Fan</surname> <given-names>L.</given-names></name> <etal/></person-group>. (<year>2021</year>). <article-title>Practical adoption of cloud computing in power systems: drivers, challenges, guidance, and real-world use cases</article-title>. <source>arXiv preprint arXiv:2108.00303</source>. <pub-id pub-id-type="doi">10.1109/TSG.2022.3148978</pub-id></citation>
</ref>
</ref-list>
<fn-group>
<fn id="fn0001"><p><sup>1</sup><ext-link ext-link-type="uri" xlink:href="https://www.zephyranywhere.com/">https://www.zephyranywhere.com/</ext-link></p></fn>
<fn id="fn0002"><p><sup>2</sup><ext-link ext-link-type="uri" xlink:href="https://www.powerworld.com/">https://www.powerworld.com/</ext-link></p></fn>
<fn id="fn0003"><p><sup>3</sup><ext-link ext-link-type="uri" xlink:href="http://labs.ece.uw.edu/pstca/pf118/pg_tca118bus.htm">http://labs.ece.uw.edu/pstca/pf118/pg_tca118bus.htm</ext-link></p></fn>
<fn id="fn0004"><p><sup>4</sup>The capitalized names within each scenario description refer to substations in the IEEE 118 Bus grid. The scenario names are then formed from combinations of these substation names and conditions associated with the contingencies.</p></fn>
</fn-group>
</back>
</article> 