U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Assessing the Validity of Multimedia Training Simulators

NCJ Number
190003
Journal
Security Journal Volume: 14 Issue: 3 Dated: 2001 Pages: 73-80
Author(s)
Christopher A. Chung; Abu M. Huda
Date Published
2001
Length
8 pages
Annotation
This paper provided security managers and security training program developers a set of guidelines that would ensure that a potential training simulator used for security-oriented training applications was properly examined with respect to training validity before widespread adoption.
Abstract
With the advancement in computer technology, corporations are able to have access to powerful multimedia personal computers. Their multimedia capability allow them to be used for effective corporate security training. The utilization of computerized training simulators can overcome cost, time, and operational limitations associated with conventional training. Unfortunately, what may occur is that these organizations adopt or develop training simulators that were not properly validated. Without the proper training validation, significant organizational effort is expended without realizing any improvement in operational performance. This paper offered a set of guidelines to make certain that a likely training simulator was correctly examined specifically regarding validity. To illustrate this approach, data from the Bomb Threat Training Simulator development project, for which the research and development were supported under a grant from the U.S. Department of Justice, National Institute of Justice were presented. Other training simulators are available for patrol operations, airport security checkpoint operations, and emergency management response procedures. Unfortunately, the validation process for these types of training simulators can be long and difficult, causing many corporate security managers and training developers not to subject the simulators to a rigorous validation process. This paper provided a framework for establishing a consistent approach for validating these types of simulators. Tables

Downloads

No download available

Availability