Javascript must be enabled to continue!
Information behaviors and cognitive modes used for cyber situation assessment
View through CrossRef
The purpose of this dissertation research was to examine the information behaviors and cognitive modes used by expert cyber defenders when completing cyber situation assessment tasks (SA-tasks) of different complexities. Theoretical propositions from Library and Information Science (LIS) task-complexity research and the Cognitive Continuum Theory (CCT) informed the theoretical framework. LIS task-complexity research predicts that increased task complexity results in numerous changes in information-source and information-type use. The CCT predicts that increased task complexity results in a shift from analytical to intuitive cognition. A multiple-case studies design was selected as the research approach. The Critical Decision Method served as the basis for semi-structured, retrospective interviews conducted with 21 expert cyber defenders from small defense companies. The data analysis techniques included directed content analysis, pattern matching, and statistical analysis (the Freeman-Halton extension of Fisher's Exact test). The main findings of this study are as cyber SA-task complexity increased, the expert cyber defenders sought more technical information, used more external sources, including external experts, and based their information behaviors on intuitive cognition. These findings support several of the theoretical predictions from LIS task-complexity research and the CCT. The findings are important because they show that the expert cyber defenders base their information behaviors on years of experience in the cyber defense domain and on years of experience in designing their own companies' security postures. Each company has its own security posture as well as its own level of acceptance of risk. Therefore, cyber situation assessment tools need a design that can be tailored for each company. Additionally, methods are needed to elicit the intuitive processes used by expert cyber defenders in order to train novice cyber defenders as well as other expert cyber professionals taking over the experts' localized cyber defense roles.
Title: Information behaviors and cognitive modes used for cyber situation assessment
Description:
The purpose of this dissertation research was to examine the information behaviors and cognitive modes used by expert cyber defenders when completing cyber situation assessment tasks (SA-tasks) of different complexities.
Theoretical propositions from Library and Information Science (LIS) task-complexity research and the Cognitive Continuum Theory (CCT) informed the theoretical framework.
LIS task-complexity research predicts that increased task complexity results in numerous changes in information-source and information-type use.
The CCT predicts that increased task complexity results in a shift from analytical to intuitive cognition.
A multiple-case studies design was selected as the research approach.
The Critical Decision Method served as the basis for semi-structured, retrospective interviews conducted with 21 expert cyber defenders from small defense companies.
The data analysis techniques included directed content analysis, pattern matching, and statistical analysis (the Freeman-Halton extension of Fisher's Exact test).
The main findings of this study are as cyber SA-task complexity increased, the expert cyber defenders sought more technical information, used more external sources, including external experts, and based their information behaviors on intuitive cognition.
These findings support several of the theoretical predictions from LIS task-complexity research and the CCT.
The findings are important because they show that the expert cyber defenders base their information behaviors on years of experience in the cyber defense domain and on years of experience in designing their own companies' security postures.
Each company has its own security posture as well as its own level of acceptance of risk.
Therefore, cyber situation assessment tools need a design that can be tailored for each company.
Additionally, methods are needed to elicit the intuitive processes used by expert cyber defenders in order to train novice cyber defenders as well as other expert cyber professionals taking over the experts' localized cyber defense roles.
Related Results
An Empirical Study on Cyber Crimes Against Women and Children in India
An Empirical Study on Cyber Crimes Against Women and Children in India
The aim of the study is to understand the Cyber-crimes against women and Children in India for a period of five years from 2017 to 2021. The study is based on Secondary data collec...
Cyber operational risk scenarios for insurance companies
Cyber operational risk scenarios for insurance companies
Abstract
Cyber Operational Risk: Cyber risk is routinely cited as one of the most important sources of operational risks facing organisations today, in various publications and ...
Cyber Espionage
Cyber Espionage
Cyberspace gives rise to risks as well as opportunities, and a prominent threat emerging from this domain is cyber espionage. Because no internationally and legally recognized defi...
The challenges of cybersecurity insurance development: The case of Latvia
The challenges of cybersecurity insurance development: The case of Latvia
Purpose. This paper aims to provide an overview of the current challenges of cybersecurity insurance, focusing on the identification of development constraints and opportunities an...
CYBER SECURITY UNVEILED PROTECTING THE DIGITAL FRONTIER
CYBER SECURITY UNVEILED PROTECTING THE DIGITAL FRONTIER
“CYBER SECURITY UNVEILED: PROTECTING THE DIGITAL FRONTIER” is a comprehensive guide designed to illuminate the multifaceted world of cyber security, offering both novices and exper...
Comprehensive Analysis of Cyber-Manufacturing Attacks Using a Cyber-Manufacturing Testbed
Comprehensive Analysis of Cyber-Manufacturing Attacks Using a Cyber-Manufacturing Testbed
Abstract
Cyber-Manufacturing Systems (CMS) are vulnerable to cyber-manufacturing attacks ironically because of its very beneficial advance: seamless integration with...
Self-Control sebagai Moderator Hubungan Celebrity Worship dan Cyber Aggression
Self-Control sebagai Moderator Hubungan Celebrity Worship dan Cyber Aggression
Abstract. The phenomenon of celebrity worship is common in K-pop fandom culture and may lead to negative behaviors such as cyber aggression, which refers to verbal aggression on so...
पाल्पाली सष्टाका उपन्यासमा साइबरपयाग {Cyberpag in Palpali Sashta's novel}
पाल्पाली सष्टाका उपन्यासमा साइबरपयाग {Cyberpag in Palpali Sashta's novel}
पाल्पाली सष्टाका उपन्यासमा साइबरपयाग {Cyberpag in Palpali Sashta's novel} प्रस्तुत लेख पाल्पाली स्रष्टाहरूद्वारा लेखिएका उपन्यासहरूमध्ये साइबरको प्रभावमा केन्द्रित रहेर लेखिएकाउपन्...

