Framework for Developing a Brief Interview to Understand Cyber Defense Work: An Experience Report

Cyber defense is increasingly important for the wellbeing of our economy and our national defense. Universities can help meet our growing cybersecurity needs by training the next generation of cyber defenders, and it is crucial that the curricula for such programs are designed to prepare students fo...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Proceedings of the Human Factors and Ergonomics Society Annual Meeting 2017-09, Vol.61 (1), p.1318-1322
Hauptverfasser: Armstrong, Miriam E., Jones, Keith S., Namin, Akbar Siami
Format: Artikel
Sprache:eng
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1322
container_issue 1
container_start_page 1318
container_title Proceedings of the Human Factors and Ergonomics Society Annual Meeting
container_volume 61
creator Armstrong, Miriam E.
Jones, Keith S.
Namin, Akbar Siami
description Cyber defense is increasingly important for the wellbeing of our economy and our national defense. Universities can help meet our growing cybersecurity needs by training the next generation of cyber defenders, and it is crucial that the curricula for such programs are designed to prepare students for the type of work that is performed in the field. Unfortunately, collecting data about cyber work is hindered in situations where cybersecurity professionals are uncomfortable with traditional human factors work analysis methods. Four potential constraints are 1) no naturalistic observations, 2) anonymity and safety, 3) short data collection time, and 4) no deep process questions. We developed a brief interview technique that allowed us to measure the importance of knowledge, skills, and abilities related to offensive and defensive cyber work. Based on our experience using this technique, it fits within the four potential constraints to cyber research and produces information that is directly applicable to the development of cybersecurity curricula. Our technique could potentially be used for other research purposes and personnel selection and by researchers interested in other high-security populations.
doi_str_mv 10.1177/1541931213601812
format Article
fullrecord <record><control><sourceid>sage_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1177_1541931213601812</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sage_id>10.1177_1541931213601812</sage_id><sourcerecordid>10.1177_1541931213601812</sourcerecordid><originalsourceid>FETCH-LOGICAL-c239t-386569626d7facec37d6cd818702cf812696aaf15b9dc2d0b1c416a349e136eb3</originalsourceid><addsrcrecordid>eNp1kMFOwzAQRC0EEqVw5-gfCHjtxE64ldJCpUpIiIpj5NjrKqV1Iju09O9JVE5InPYw-0YzQ8gtsDsApe4hS6EQwEFIBjnwMzLiIIskY1Kdk9EgJ4N-Sa5i3DDGhRLpiOh50Ds8NOGTuibQJ9zjtmlrv6aaPoYaHV34DsO-xgPtGrryFkPstLd0eqxwABz6iPSjd3igE09n3y32nDdI37BtQndNLpzeRrz5vWOyms_epy_J8vV5MZ0sE8NF0SUil5ksJJdWOW3QCGWlsTnkinHj-kK9qLWDrCqs4ZZVYFKQWqQF9pWxEmPCTr4mNDEGdGUb6p0OxxJYOUxU_p2oR5ITEvUay03zFXyf8P__H-zGZgs</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Framework for Developing a Brief Interview to Understand Cyber Defense Work: An Experience Report</title><source>Access via SAGE</source><creator>Armstrong, Miriam E. ; Jones, Keith S. ; Namin, Akbar Siami</creator><creatorcontrib>Armstrong, Miriam E. ; Jones, Keith S. ; Namin, Akbar Siami</creatorcontrib><description>Cyber defense is increasingly important for the wellbeing of our economy and our national defense. Universities can help meet our growing cybersecurity needs by training the next generation of cyber defenders, and it is crucial that the curricula for such programs are designed to prepare students for the type of work that is performed in the field. Unfortunately, collecting data about cyber work is hindered in situations where cybersecurity professionals are uncomfortable with traditional human factors work analysis methods. Four potential constraints are 1) no naturalistic observations, 2) anonymity and safety, 3) short data collection time, and 4) no deep process questions. We developed a brief interview technique that allowed us to measure the importance of knowledge, skills, and abilities related to offensive and defensive cyber work. Based on our experience using this technique, it fits within the four potential constraints to cyber research and produces information that is directly applicable to the development of cybersecurity curricula. Our technique could potentially be used for other research purposes and personnel selection and by researchers interested in other high-security populations.</description><identifier>ISSN: 1541-9312</identifier><identifier>ISSN: 1071-1813</identifier><identifier>EISSN: 2169-5067</identifier><identifier>DOI: 10.1177/1541931213601812</identifier><language>eng</language><publisher>Los Angeles, CA: SAGE Publications</publisher><ispartof>Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 2017-09, Vol.61 (1), p.1318-1322</ispartof><rights>2017 Human Factors and Ergonomics Society</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c239t-386569626d7facec37d6cd818702cf812696aaf15b9dc2d0b1c416a349e136eb3</citedby><cites>FETCH-LOGICAL-c239t-386569626d7facec37d6cd818702cf812696aaf15b9dc2d0b1c416a349e136eb3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://journals.sagepub.com/doi/pdf/10.1177/1541931213601812$$EPDF$$P50$$Gsage$$H</linktopdf><linktohtml>$$Uhttps://journals.sagepub.com/doi/10.1177/1541931213601812$$EHTML$$P50$$Gsage$$H</linktohtml><link.rule.ids>314,780,784,21819,27924,27925,43621,43622</link.rule.ids></links><search><creatorcontrib>Armstrong, Miriam E.</creatorcontrib><creatorcontrib>Jones, Keith S.</creatorcontrib><creatorcontrib>Namin, Akbar Siami</creatorcontrib><title>Framework for Developing a Brief Interview to Understand Cyber Defense Work: An Experience Report</title><title>Proceedings of the Human Factors and Ergonomics Society Annual Meeting</title><description>Cyber defense is increasingly important for the wellbeing of our economy and our national defense. Universities can help meet our growing cybersecurity needs by training the next generation of cyber defenders, and it is crucial that the curricula for such programs are designed to prepare students for the type of work that is performed in the field. Unfortunately, collecting data about cyber work is hindered in situations where cybersecurity professionals are uncomfortable with traditional human factors work analysis methods. Four potential constraints are 1) no naturalistic observations, 2) anonymity and safety, 3) short data collection time, and 4) no deep process questions. We developed a brief interview technique that allowed us to measure the importance of knowledge, skills, and abilities related to offensive and defensive cyber work. Based on our experience using this technique, it fits within the four potential constraints to cyber research and produces information that is directly applicable to the development of cybersecurity curricula. Our technique could potentially be used for other research purposes and personnel selection and by researchers interested in other high-security populations.</description><issn>1541-9312</issn><issn>1071-1813</issn><issn>2169-5067</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><recordid>eNp1kMFOwzAQRC0EEqVw5-gfCHjtxE64ldJCpUpIiIpj5NjrKqV1Iju09O9JVE5InPYw-0YzQ8gtsDsApe4hS6EQwEFIBjnwMzLiIIskY1Kdk9EgJ4N-Sa5i3DDGhRLpiOh50Ds8NOGTuibQJ9zjtmlrv6aaPoYaHV34DsO-xgPtGrryFkPstLd0eqxwABz6iPSjd3igE09n3y32nDdI37BtQndNLpzeRrz5vWOyms_epy_J8vV5MZ0sE8NF0SUil5ksJJdWOW3QCGWlsTnkinHj-kK9qLWDrCqs4ZZVYFKQWqQF9pWxEmPCTr4mNDEGdGUb6p0OxxJYOUxU_p2oR5ITEvUay03zFXyf8P__H-zGZgs</recordid><startdate>201709</startdate><enddate>201709</enddate><creator>Armstrong, Miriam E.</creator><creator>Jones, Keith S.</creator><creator>Namin, Akbar Siami</creator><general>SAGE Publications</general><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>201709</creationdate><title>Framework for Developing a Brief Interview to Understand Cyber Defense Work: An Experience Report</title><author>Armstrong, Miriam E. ; Jones, Keith S. ; Namin, Akbar Siami</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c239t-386569626d7facec37d6cd818702cf812696aaf15b9dc2d0b1c416a349e136eb3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Armstrong, Miriam E.</creatorcontrib><creatorcontrib>Jones, Keith S.</creatorcontrib><creatorcontrib>Namin, Akbar Siami</creatorcontrib><collection>CrossRef</collection><jtitle>Proceedings of the Human Factors and Ergonomics Society Annual Meeting</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Armstrong, Miriam E.</au><au>Jones, Keith S.</au><au>Namin, Akbar Siami</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Framework for Developing a Brief Interview to Understand Cyber Defense Work: An Experience Report</atitle><jtitle>Proceedings of the Human Factors and Ergonomics Society Annual Meeting</jtitle><date>2017-09</date><risdate>2017</risdate><volume>61</volume><issue>1</issue><spage>1318</spage><epage>1322</epage><pages>1318-1322</pages><issn>1541-9312</issn><issn>1071-1813</issn><eissn>2169-5067</eissn><abstract>Cyber defense is increasingly important for the wellbeing of our economy and our national defense. Universities can help meet our growing cybersecurity needs by training the next generation of cyber defenders, and it is crucial that the curricula for such programs are designed to prepare students for the type of work that is performed in the field. Unfortunately, collecting data about cyber work is hindered in situations where cybersecurity professionals are uncomfortable with traditional human factors work analysis methods. Four potential constraints are 1) no naturalistic observations, 2) anonymity and safety, 3) short data collection time, and 4) no deep process questions. We developed a brief interview technique that allowed us to measure the importance of knowledge, skills, and abilities related to offensive and defensive cyber work. Based on our experience using this technique, it fits within the four potential constraints to cyber research and produces information that is directly applicable to the development of cybersecurity curricula. Our technique could potentially be used for other research purposes and personnel selection and by researchers interested in other high-security populations.</abstract><cop>Los Angeles, CA</cop><pub>SAGE Publications</pub><doi>10.1177/1541931213601812</doi><tpages>5</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1541-9312
ispartof Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 2017-09, Vol.61 (1), p.1318-1322
issn 1541-9312
1071-1813
2169-5067
language eng
recordid cdi_crossref_primary_10_1177_1541931213601812
source Access via SAGE
title Framework for Developing a Brief Interview to Understand Cyber Defense Work: An Experience Report
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T03%3A27%3A53IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-sage_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Framework%20for%20Developing%20a%20Brief%20Interview%20to%20Understand%20Cyber%20Defense%20Work:%20An%20Experience%20Report&rft.jtitle=Proceedings%20of%20the%20Human%20Factors%20and%20Ergonomics%20Society%20Annual%20Meeting&rft.au=Armstrong,%20Miriam%20E.&rft.date=2017-09&rft.volume=61&rft.issue=1&rft.spage=1318&rft.epage=1322&rft.pages=1318-1322&rft.issn=1541-9312&rft.eissn=2169-5067&rft_id=info:doi/10.1177/1541931213601812&rft_dat=%3Csage_cross%3E10.1177_1541931213601812%3C/sage_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_sage_id=10.1177_1541931213601812&rfr_iscdi=true