Training organizational supervisors to detect and prevent cyber insider threats: two approaches
Cyber insider threat is intentional theft from, or sabotage of, a cyber system by someone within the organization. This article explores the use of advanced cognitive and instructional principles to accelerate learning in organizational supervisors to mitigate the cyber threat. It examines the poten...
Main Authors: | , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
European Alliance for Innovation (EAI)
2013-05-01
|
Series: | EAI Endorsed Transactions on Security and Safety |
Subjects: | |
Online Access: | http://eudl.eu/doi/10.4108/trans.sesa.01-06.2013.e4 |
_version_ | 1828742814785077248 |
---|---|
author | Dee H. Andrews Jared Freeman Terence S. Andre John Feeney Alan Carlin Cali M. Fidopiastis Patricia Fitzgerald |
author_facet | Dee H. Andrews Jared Freeman Terence S. Andre John Feeney Alan Carlin Cali M. Fidopiastis Patricia Fitzgerald |
author_sort | Dee H. Andrews |
collection | DOAJ |
description | Cyber insider threat is intentional theft from, or sabotage of, a cyber system by someone within the organization. This article explores the use of advanced cognitive and instructional principles to accelerate learning in organizational supervisors to mitigate the cyber threat. It examines the potential advantage of using serious games to engage supervisors. It also posits two systematic instructional approaches for this training challenge – optimal path modelling and a competency-based approach. The paper concludes by discussing challenges of evaluating training for seldom occurring real world phenomena, like detecting a cyber-insider threat. |
first_indexed | 2024-04-13T01:25:25Z |
format | Article |
id | doaj.art-634b69854dbc4f3e838a3aedd5aa8993 |
institution | Directory Open Access Journal |
issn | 2032-9393 |
language | English |
last_indexed | 2024-04-13T01:25:25Z |
publishDate | 2013-05-01 |
publisher | European Alliance for Innovation (EAI) |
record_format | Article |
series | EAI Endorsed Transactions on Security and Safety |
spelling | doaj.art-634b69854dbc4f3e838a3aedd5aa89932022-12-22T03:08:38ZengEuropean Alliance for Innovation (EAI)EAI Endorsed Transactions on Security and Safety2032-93932013-05-01121710.4108/trans.sesa.01-06.2013.e4Training organizational supervisors to detect and prevent cyber insider threats: two approachesDee H. Andrews0Jared Freeman1Terence S. Andre2John Feeney3Alan Carlin4Cali M. Fidopiastis5Patricia Fitzgerald6Army Research Institute, 425 E. Melody Lane, Gilbert, Arizona, USA, 85234; Formerly with the Air Force Research LaboratoryAptima, Inc.Tier1 Performance Solutions, Inc.Aptima, Inc.Aptima, Inc.Tier1 Performance Solutions, Inc.Aptima, Inc.Cyber insider threat is intentional theft from, or sabotage of, a cyber system by someone within the organization. This article explores the use of advanced cognitive and instructional principles to accelerate learning in organizational supervisors to mitigate the cyber threat. It examines the potential advantage of using serious games to engage supervisors. It also posits two systematic instructional approaches for this training challenge – optimal path modelling and a competency-based approach. The paper concludes by discussing challenges of evaluating training for seldom occurring real world phenomena, like detecting a cyber-insider threat.http://eudl.eu/doi/10.4108/trans.sesa.01-06.2013.e4accelerated learningcognitive principlescyber insider threatgame-based instruction. |
spellingShingle | Dee H. Andrews Jared Freeman Terence S. Andre John Feeney Alan Carlin Cali M. Fidopiastis Patricia Fitzgerald Training organizational supervisors to detect and prevent cyber insider threats: two approaches EAI Endorsed Transactions on Security and Safety accelerated learning cognitive principles cyber insider threat game-based instruction. |
title | Training organizational supervisors to detect and prevent cyber insider threats: two approaches |
title_full | Training organizational supervisors to detect and prevent cyber insider threats: two approaches |
title_fullStr | Training organizational supervisors to detect and prevent cyber insider threats: two approaches |
title_full_unstemmed | Training organizational supervisors to detect and prevent cyber insider threats: two approaches |
title_short | Training organizational supervisors to detect and prevent cyber insider threats: two approaches |
title_sort | training organizational supervisors to detect and prevent cyber insider threats two approaches |
topic | accelerated learning cognitive principles cyber insider threat game-based instruction. |
url | http://eudl.eu/doi/10.4108/trans.sesa.01-06.2013.e4 |
work_keys_str_mv | AT deehandrews trainingorganizationalsupervisorstodetectandpreventcyberinsiderthreatstwoapproaches AT jaredfreeman trainingorganizationalsupervisorstodetectandpreventcyberinsiderthreatstwoapproaches AT terencesandre trainingorganizationalsupervisorstodetectandpreventcyberinsiderthreatstwoapproaches AT johnfeeney trainingorganizationalsupervisorstodetectandpreventcyberinsiderthreatstwoapproaches AT alancarlin trainingorganizationalsupervisorstodetectandpreventcyberinsiderthreatstwoapproaches AT calimfidopiastis trainingorganizationalsupervisorstodetectandpreventcyberinsiderthreatstwoapproaches AT patriciafitzgerald trainingorganizationalsupervisorstodetectandpreventcyberinsiderthreatstwoapproaches |