2013
DOI: 10.1007/978-3-642-39454-6_44
|View full text |Cite
|
Sign up to set email alerts
|

Human Dimension in Cyber Operations Research and Development Priorities

Abstract: Within cyber security, the human element represents one of the greatest untapped opportunities for increasing the effectiveness of network defenses. However, there has been little research to understand the human dimension in cyber operations. To better understand the needs and priorities for research and development to address these issues, a workshop was conducted August 28-29, 2012 in Washington DC. A synthesis was developed that captured the key issues and associated research questions.Research and develop… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…This helps facilitate that involved partners can develop and calibrate shared CSA so that decisions incorporate both tactical and strategic approaches in both the physical and cyber domain (Knox et al, 2018). Good cyber defense relies on effective team coordination (Forsythe et al, 2013) and COs working in teams must actively engage in dynamic problem solving to acquire knowledge from each other and the environment (Jøsok et al, 2017). In line with the shifting task demands of the HS, the HS might move along its axis as the focus of the team changes (Figure 1, d;Jøsok et al, 2017) thus changing communicational needs.…”
Section: Cognitive Aspects Of Cybersecurity Performance and Implicati...mentioning
confidence: 99%
“…This helps facilitate that involved partners can develop and calibrate shared CSA so that decisions incorporate both tactical and strategic approaches in both the physical and cyber domain (Knox et al, 2018). Good cyber defense relies on effective team coordination (Forsythe et al, 2013) and COs working in teams must actively engage in dynamic problem solving to acquire knowledge from each other and the environment (Jøsok et al, 2017). In line with the shifting task demands of the HS, the HS might move along its axis as the focus of the team changes (Figure 1, d;Jøsok et al, 2017) thus changing communicational needs.…”
Section: Cognitive Aspects Of Cybersecurity Performance and Implicati...mentioning
confidence: 99%
“…Self-regulation should therefore be explored in relation to displays of cognitive agility and performance in cyber operations. A challenge that remains is establishing consensus of how to assess operator performance in cyber operations (Forsythe et al, 2013). Previous research points to agility and flexible cognitive strategies as pathways to performance in cyber operations (Knox B. et al, 2018).…”
Section: Cyber Operator Cognitive Demands and Performancementioning
confidence: 99%
“…While technical cyber competence is paramount to operate in the cyber domain, the soft skills and cognitive competencies have started to receive more attention. The high cognitive demands of cyber operators have been widely acknowledged (Tapscott, 2014; Røislien, 2015; D’Amico et al, 2016; Buchler et al, 2018); however, the soft skills 1 and cognitive competencies 2 contribution to cyber operator performance is yet to be empirically validated (Forsythe et al, 2013; Lathrop et al, 2016; Helkala et al, 2017; Knox B. et al, 2018).…”
Section: Introductionmentioning
confidence: 99%
“…This methodology and the data collected with it could be used to develop objectives for courses, group exercises (Patriciu & Furtuna, 2009), and simulation training (Pastor, Diaz, & Castro, 2010) within cybersecurity. Because there is little data to guide personnel selection for cybersecurity jobs (Forsythe, Silva, Stevens-Adams, & Bradshaw, 2013;Mancuso et al, 2014), hiring managers may wish to interview their top performers to determine the KSAs they should prioritize during hiring decisions. The brief interview technique could be customized to fit other research goals in and outside of the cybersecurity field.…”
Section: Lessons Learnedmentioning
confidence: 99%