Training organizational supervisors to detect and prevent cyber insider threats: two approaches

Cyber insider threat is intentional theft from, or sabotage of, a cyber system by someone within the organization. This article explores the use of advanced cognitive and instructional principles to accelerate learning in organizational supervisors to mitigate the cyber threat. It examines the poten...

Full description

Bibliographic Details
Main Authors: Dee H. Andrews, Jared Freeman, Terence S. Andre, John Feeney, Alan Carlin, Cali M. Fidopiastis, Patricia Fitzgerald
Format: Article
Language:English
Published: European Alliance for Innovation (EAI) 2013-05-01
Series:EAI Endorsed Transactions on Security and Safety
Subjects:
Online Access:http://eudl.eu/doi/10.4108/trans.sesa.01-06.2013.e4
_version_ 1828742814785077248
author Dee H. Andrews
Jared Freeman
Terence S. Andre
John Feeney
Alan Carlin
Cali M. Fidopiastis
Patricia Fitzgerald
author_facet Dee H. Andrews
Jared Freeman
Terence S. Andre
John Feeney
Alan Carlin
Cali M. Fidopiastis
Patricia Fitzgerald
author_sort Dee H. Andrews
collection DOAJ
description Cyber insider threat is intentional theft from, or sabotage of, a cyber system by someone within the organization. This article explores the use of advanced cognitive and instructional principles to accelerate learning in organizational supervisors to mitigate the cyber threat. It examines the potential advantage of using serious games to engage supervisors. It also posits two systematic instructional approaches for this training challenge – optimal path modelling and a competency-based approach. The paper concludes by discussing challenges of evaluating training for seldom occurring real world phenomena, like detecting a cyber-insider threat.
first_indexed 2024-04-13T01:25:25Z
format Article
id doaj.art-634b69854dbc4f3e838a3aedd5aa8993
institution Directory Open Access Journal
issn 2032-9393
language English
last_indexed 2024-04-13T01:25:25Z
publishDate 2013-05-01
publisher European Alliance for Innovation (EAI)
record_format Article
series EAI Endorsed Transactions on Security and Safety
spelling doaj.art-634b69854dbc4f3e838a3aedd5aa89932022-12-22T03:08:38ZengEuropean Alliance for Innovation (EAI)EAI Endorsed Transactions on Security and Safety2032-93932013-05-01121710.4108/trans.sesa.01-06.2013.e4Training organizational supervisors to detect and prevent cyber insider threats: two approachesDee H. Andrews0Jared Freeman1Terence S. Andre2John Feeney3Alan Carlin4Cali M. Fidopiastis5Patricia Fitzgerald6Army Research Institute, 425 E. Melody Lane, Gilbert, Arizona, USA, 85234; Formerly with the Air Force Research LaboratoryAptima, Inc.Tier1 Performance Solutions, Inc.Aptima, Inc.Aptima, Inc.Tier1 Performance Solutions, Inc.Aptima, Inc.Cyber insider threat is intentional theft from, or sabotage of, a cyber system by someone within the organization. This article explores the use of advanced cognitive and instructional principles to accelerate learning in organizational supervisors to mitigate the cyber threat. It examines the potential advantage of using serious games to engage supervisors. It also posits two systematic instructional approaches for this training challenge – optimal path modelling and a competency-based approach. The paper concludes by discussing challenges of evaluating training for seldom occurring real world phenomena, like detecting a cyber-insider threat.http://eudl.eu/doi/10.4108/trans.sesa.01-06.2013.e4accelerated learningcognitive principlescyber insider threatgame-based instruction.
spellingShingle Dee H. Andrews
Jared Freeman
Terence S. Andre
John Feeney
Alan Carlin
Cali M. Fidopiastis
Patricia Fitzgerald
Training organizational supervisors to detect and prevent cyber insider threats: two approaches
EAI Endorsed Transactions on Security and Safety
accelerated learning
cognitive principles
cyber insider threat
game-based instruction.
title Training organizational supervisors to detect and prevent cyber insider threats: two approaches
title_full Training organizational supervisors to detect and prevent cyber insider threats: two approaches
title_fullStr Training organizational supervisors to detect and prevent cyber insider threats: two approaches
title_full_unstemmed Training organizational supervisors to detect and prevent cyber insider threats: two approaches
title_short Training organizational supervisors to detect and prevent cyber insider threats: two approaches
title_sort training organizational supervisors to detect and prevent cyber insider threats two approaches
topic accelerated learning
cognitive principles
cyber insider threat
game-based instruction.
url http://eudl.eu/doi/10.4108/trans.sesa.01-06.2013.e4
work_keys_str_mv AT deehandrews trainingorganizationalsupervisorstodetectandpreventcyberinsiderthreatstwoapproaches
AT jaredfreeman trainingorganizationalsupervisorstodetectandpreventcyberinsiderthreatstwoapproaches
AT terencesandre trainingorganizationalsupervisorstodetectandpreventcyberinsiderthreatstwoapproaches
AT johnfeeney trainingorganizationalsupervisorstodetectandpreventcyberinsiderthreatstwoapproaches
AT alancarlin trainingorganizationalsupervisorstodetectandpreventcyberinsiderthreatstwoapproaches
AT calimfidopiastis trainingorganizationalsupervisorstodetectandpreventcyberinsiderthreatstwoapproaches
AT patriciafitzgerald trainingorganizationalsupervisorstodetectandpreventcyberinsiderthreatstwoapproaches