Framework for Developing a Brief Interview to Understand Cyber Defense Work: An Experience Report
Cyber defense is increasingly important for the wellbeing of our economy and our national defense. Universities can help meet our growing cybersecurity needs by training the next generation of cyber defenders, and it is crucial that the curricula for such programs are designed to prepare students fo...
Gespeichert in:
Veröffentlicht in: | Proceedings of the Human Factors and Ergonomics Society Annual Meeting 2017-09, Vol.61 (1), p.1318-1322 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1322 |
---|---|
container_issue | 1 |
container_start_page | 1318 |
container_title | Proceedings of the Human Factors and Ergonomics Society Annual Meeting |
container_volume | 61 |
creator | Armstrong, Miriam E. Jones, Keith S. Namin, Akbar Siami |
description | Cyber defense is increasingly important for the wellbeing of our economy and our national defense. Universities can help meet our growing cybersecurity needs by training the next generation of cyber defenders, and it is crucial that the curricula for such programs are designed to prepare students for the type of work that is performed in the field. Unfortunately, collecting data about cyber work is hindered in situations where cybersecurity professionals are uncomfortable with traditional human factors work analysis methods. Four potential constraints are 1) no naturalistic observations, 2) anonymity and safety, 3) short data collection time, and 4) no deep process questions. We developed a brief interview technique that allowed us to measure the importance of knowledge, skills, and abilities related to offensive and defensive cyber work. Based on our experience using this technique, it fits within the four potential constraints to cyber research and produces information that is directly applicable to the development of cybersecurity curricula. Our technique could potentially be used for other research purposes and personnel selection and by researchers interested in other high-security populations. |
doi_str_mv | 10.1177/1541931213601812 |
format | Article |
fullrecord | <record><control><sourceid>sage_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1177_1541931213601812</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sage_id>10.1177_1541931213601812</sage_id><sourcerecordid>10.1177_1541931213601812</sourcerecordid><originalsourceid>FETCH-LOGICAL-c239t-386569626d7facec37d6cd818702cf812696aaf15b9dc2d0b1c416a349e136eb3</originalsourceid><addsrcrecordid>eNp1kMFOwzAQRC0EEqVw5-gfCHjtxE64ldJCpUpIiIpj5NjrKqV1Iju09O9JVE5InPYw-0YzQ8gtsDsApe4hS6EQwEFIBjnwMzLiIIskY1Kdk9EgJ4N-Sa5i3DDGhRLpiOh50Ds8NOGTuibQJ9zjtmlrv6aaPoYaHV34DsO-xgPtGrryFkPstLd0eqxwABz6iPSjd3igE09n3y32nDdI37BtQndNLpzeRrz5vWOyms_epy_J8vV5MZ0sE8NF0SUil5ksJJdWOW3QCGWlsTnkinHj-kK9qLWDrCqs4ZZVYFKQWqQF9pWxEmPCTr4mNDEGdGUb6p0OxxJYOUxU_p2oR5ITEvUay03zFXyf8P__H-zGZgs</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Framework for Developing a Brief Interview to Understand Cyber Defense Work: An Experience Report</title><source>Access via SAGE</source><creator>Armstrong, Miriam E. ; Jones, Keith S. ; Namin, Akbar Siami</creator><creatorcontrib>Armstrong, Miriam E. ; Jones, Keith S. ; Namin, Akbar Siami</creatorcontrib><description>Cyber defense is increasingly important for the wellbeing of our economy and our national defense. Universities can help meet our growing cybersecurity needs by training the next generation of cyber defenders, and it is crucial that the curricula for such programs are designed to prepare students for the type of work that is performed in the field. Unfortunately, collecting data about cyber work is hindered in situations where cybersecurity professionals are uncomfortable with traditional human factors work analysis methods. Four potential constraints are 1) no naturalistic observations, 2) anonymity and safety, 3) short data collection time, and 4) no deep process questions. We developed a brief interview technique that allowed us to measure the importance of knowledge, skills, and abilities related to offensive and defensive cyber work. Based on our experience using this technique, it fits within the four potential constraints to cyber research and produces information that is directly applicable to the development of cybersecurity curricula. Our technique could potentially be used for other research purposes and personnel selection and by researchers interested in other high-security populations.</description><identifier>ISSN: 1541-9312</identifier><identifier>ISSN: 1071-1813</identifier><identifier>EISSN: 2169-5067</identifier><identifier>DOI: 10.1177/1541931213601812</identifier><language>eng</language><publisher>Los Angeles, CA: SAGE Publications</publisher><ispartof>Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 2017-09, Vol.61 (1), p.1318-1322</ispartof><rights>2017 Human Factors and Ergonomics Society</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c239t-386569626d7facec37d6cd818702cf812696aaf15b9dc2d0b1c416a349e136eb3</citedby><cites>FETCH-LOGICAL-c239t-386569626d7facec37d6cd818702cf812696aaf15b9dc2d0b1c416a349e136eb3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://journals.sagepub.com/doi/pdf/10.1177/1541931213601812$$EPDF$$P50$$Gsage$$H</linktopdf><linktohtml>$$Uhttps://journals.sagepub.com/doi/10.1177/1541931213601812$$EHTML$$P50$$Gsage$$H</linktohtml><link.rule.ids>314,780,784,21819,27924,27925,43621,43622</link.rule.ids></links><search><creatorcontrib>Armstrong, Miriam E.</creatorcontrib><creatorcontrib>Jones, Keith S.</creatorcontrib><creatorcontrib>Namin, Akbar Siami</creatorcontrib><title>Framework for Developing a Brief Interview to Understand Cyber Defense Work: An Experience Report</title><title>Proceedings of the Human Factors and Ergonomics Society Annual Meeting</title><description>Cyber defense is increasingly important for the wellbeing of our economy and our national defense. Universities can help meet our growing cybersecurity needs by training the next generation of cyber defenders, and it is crucial that the curricula for such programs are designed to prepare students for the type of work that is performed in the field. Unfortunately, collecting data about cyber work is hindered in situations where cybersecurity professionals are uncomfortable with traditional human factors work analysis methods. Four potential constraints are 1) no naturalistic observations, 2) anonymity and safety, 3) short data collection time, and 4) no deep process questions. We developed a brief interview technique that allowed us to measure the importance of knowledge, skills, and abilities related to offensive and defensive cyber work. Based on our experience using this technique, it fits within the four potential constraints to cyber research and produces information that is directly applicable to the development of cybersecurity curricula. Our technique could potentially be used for other research purposes and personnel selection and by researchers interested in other high-security populations.</description><issn>1541-9312</issn><issn>1071-1813</issn><issn>2169-5067</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><recordid>eNp1kMFOwzAQRC0EEqVw5-gfCHjtxE64ldJCpUpIiIpj5NjrKqV1Iju09O9JVE5InPYw-0YzQ8gtsDsApe4hS6EQwEFIBjnwMzLiIIskY1Kdk9EgJ4N-Sa5i3DDGhRLpiOh50Ds8NOGTuibQJ9zjtmlrv6aaPoYaHV34DsO-xgPtGrryFkPstLd0eqxwABz6iPSjd3igE09n3y32nDdI37BtQndNLpzeRrz5vWOyms_epy_J8vV5MZ0sE8NF0SUil5ksJJdWOW3QCGWlsTnkinHj-kK9qLWDrCqs4ZZVYFKQWqQF9pWxEmPCTr4mNDEGdGUb6p0OxxJYOUxU_p2oR5ITEvUay03zFXyf8P__H-zGZgs</recordid><startdate>201709</startdate><enddate>201709</enddate><creator>Armstrong, Miriam E.</creator><creator>Jones, Keith S.</creator><creator>Namin, Akbar Siami</creator><general>SAGE Publications</general><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>201709</creationdate><title>Framework for Developing a Brief Interview to Understand Cyber Defense Work: An Experience Report</title><author>Armstrong, Miriam E. ; Jones, Keith S. ; Namin, Akbar Siami</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c239t-386569626d7facec37d6cd818702cf812696aaf15b9dc2d0b1c416a349e136eb3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Armstrong, Miriam E.</creatorcontrib><creatorcontrib>Jones, Keith S.</creatorcontrib><creatorcontrib>Namin, Akbar Siami</creatorcontrib><collection>CrossRef</collection><jtitle>Proceedings of the Human Factors and Ergonomics Society Annual Meeting</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Armstrong, Miriam E.</au><au>Jones, Keith S.</au><au>Namin, Akbar Siami</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Framework for Developing a Brief Interview to Understand Cyber Defense Work: An Experience Report</atitle><jtitle>Proceedings of the Human Factors and Ergonomics Society Annual Meeting</jtitle><date>2017-09</date><risdate>2017</risdate><volume>61</volume><issue>1</issue><spage>1318</spage><epage>1322</epage><pages>1318-1322</pages><issn>1541-9312</issn><issn>1071-1813</issn><eissn>2169-5067</eissn><abstract>Cyber defense is increasingly important for the wellbeing of our economy and our national defense. Universities can help meet our growing cybersecurity needs by training the next generation of cyber defenders, and it is crucial that the curricula for such programs are designed to prepare students for the type of work that is performed in the field. Unfortunately, collecting data about cyber work is hindered in situations where cybersecurity professionals are uncomfortable with traditional human factors work analysis methods. Four potential constraints are 1) no naturalistic observations, 2) anonymity and safety, 3) short data collection time, and 4) no deep process questions. We developed a brief interview technique that allowed us to measure the importance of knowledge, skills, and abilities related to offensive and defensive cyber work. Based on our experience using this technique, it fits within the four potential constraints to cyber research and produces information that is directly applicable to the development of cybersecurity curricula. Our technique could potentially be used for other research purposes and personnel selection and by researchers interested in other high-security populations.</abstract><cop>Los Angeles, CA</cop><pub>SAGE Publications</pub><doi>10.1177/1541931213601812</doi><tpages>5</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1541-9312 |
ispartof | Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 2017-09, Vol.61 (1), p.1318-1322 |
issn | 1541-9312 1071-1813 2169-5067 |
language | eng |
recordid | cdi_crossref_primary_10_1177_1541931213601812 |
source | Access via SAGE |
title | Framework for Developing a Brief Interview to Understand Cyber Defense Work: An Experience Report |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T03%3A27%3A53IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-sage_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Framework%20for%20Developing%20a%20Brief%20Interview%20to%20Understand%20Cyber%20Defense%20Work:%20An%20Experience%20Report&rft.jtitle=Proceedings%20of%20the%20Human%20Factors%20and%20Ergonomics%20Society%20Annual%20Meeting&rft.au=Armstrong,%20Miriam%20E.&rft.date=2017-09&rft.volume=61&rft.issue=1&rft.spage=1318&rft.epage=1322&rft.pages=1318-1322&rft.issn=1541-9312&rft.eissn=2169-5067&rft_id=info:doi/10.1177/1541931213601812&rft_dat=%3Csage_cross%3E10.1177_1541931213601812%3C/sage_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_sage_id=10.1177_1541931213601812&rfr_iscdi=true |