2018
DOI: 10.1177/1541931218621056
|View full text |Cite
|
Sign up to set email alerts
|

Cognitive and Affective Eye Tracking Metrics for Detecting Insider Threat: A Study of Simulated Espionage

Abstract: Insider Threat (IT) is a growing cybersecurity issue. Countermeasures based on cognitive engineering may utilize diagnostic eye fixation responses indicative of insider intent, elicited by Active Indicator Probes (AIPs). The current study embedded AIPs into an immersive simulation of espionage activities. Participants allocated to an insider role were required to monitor building images for cues to a terrorist person-of-interest, and communicate information to an external handler. Control participants performe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…In the process of examining each article's reference list, materials that were frequently mentioned [18]- [24] were added to the final list even though they were not published recently. We also included three papers that attempted a novel approach [25]- [27], one article that investigated network-based detection in IoT environments [28], one article about insider threat detection in IoTs [29], and two articles of attack vectors considering IoTs [12], [16]. Deep-learning related ITD researches [30], [31] that show the excellent capabilities of detecting unseen behavior patterns have also been added.…”
Section: A Survey Approachmentioning
confidence: 99%
See 1 more Smart Citation
“…In the process of examining each article's reference list, materials that were frequently mentioned [18]- [24] were added to the final list even though they were not published recently. We also included three papers that attempted a novel approach [25]- [27], one article that investigated network-based detection in IoT environments [28], one article about insider threat detection in IoTs [29], and two articles of attack vectors considering IoTs [12], [16]. Deep-learning related ITD researches [30], [31] that show the excellent capabilities of detecting unseen behavior patterns have also been added.…”
Section: A Survey Approachmentioning
confidence: 99%
“…The active indicator based detection method analyzes the feedback of the insider after stimulating a special significance to the insider (Active Indicator). Matthews et al [27] experimented using a purpose-built simulation environment. Under the simulation environment, participants support intelligence in uncovering information about terrorist plots and installed eye-tracking devices monitoring participants for detecting illicit activity.…”
Section: ) Active Indicator Basedmentioning
confidence: 99%