2010
DOI: 10.1057/ivs.2010.5
|View full text |Cite
|
Sign up to set email alerts
|

A Multi-Phase Network Situational Awareness Cognitive Task Analysis

Abstract: The goal of our project is to create a set of next-generation cyber situational-awareness capabilities with applications to other domains in the long term. The objective is to improve the decision-making process to enable decision makers to choose better actions. To this end, we put extensive effort into making certain that we had feedback from network analysts and managers and understand what their genuine needs are. This article discusses the cognitive task-analysis methodology that we followed to acquire fe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
44
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 48 publications
(45 citation statements)
references
References 12 publications
1
44
0
Order By: Relevance
“…This finding echoes those of prior work 6,7,11,15 . If cybersecurity is to change from being a largely reactive endeavor to a proactive defense, better access to real time data by analysts in all operational domains will be critical.…”
Section: Implications For Future Researchsupporting
confidence: 91%
“…This finding echoes those of prior work 6,7,11,15 . If cybersecurity is to change from being a largely reactive endeavor to a proactive defense, better access to real time data by analysts in all operational domains will be critical.…”
Section: Implications For Future Researchsupporting
confidence: 91%
“…We have proposed a system focused on the reduction of scope of analysis in conjunction with intrusion detection and forensic techniques to make insider threat detection feasible. Cognitive task analysis (CTA) [5] [7][13] will be critical to identify what techniques are truly needed by analysts. Such CTAs must be performed specifically for the tasks identified in this paper.…”
Section: Discussionmentioning
confidence: 99%
“…The papers that were used for the purpose of this research were: D'Amico et al [10], D'Amico et al [11], Erbacher et al [12], Fink et al [13] and Mckenna et al [16]. The reasons these papers were chosen was because of the data they presented.…”
Section: A Familiarizing With Datamentioning
confidence: 99%
“…D'Amico et al [10] and D'Amico et al [11] gave insight into roles of analysts and the tasks they perform in organizations. Erbacher et al [12] presents interviews with analysts for the specific purpose of cyber-security visualization. Fink et al [13] presents a variety of information about how to make visualizations useful for security analysts and Mckenna et al [16] formed the basis of this study and helped understand how to research these papers and take out the relevant elements from it.…”
Section: A Familiarizing With Datamentioning
confidence: 99%
See 1 more Smart Citation