IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

The Role of Human Operators' Suspicion in the Detection of Cyber Attacks

The Role of Human Operators' Suspicion in the Detection of Cyber Attacks
View Sample PDF
Author(s): Leanne Hirshfield (Syracuse University, USA), Philip Bobko (Gettysburg College, USA), Alex J. Barelka (Illinois State University, USA), Mark R. Costa (Syracuse University, USA), Gregory J. Funke (Air Force Research Laboratory, USA), Vincent F. Mancuso (MIT Lincoln Laboratory, USA), Victor Finomore (Wright-Patterson Air Force Base, USA)and Benjamin A. Knott (Air Force Office of Scientific Research, USA)
Copyright: 2019
Pages: 18
Source title: Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-5225-8897-9.ch074

Purchase

View The Role of Human Operators' Suspicion in the Detection of Cyber Attacks on the publisher's website for pricing and purchasing information.

Abstract

Despite the importance that human error in the cyber domain has had in recent reports, cyber warfare research to date has largely focused on the effects of cyber attacks on the target computer system. In contrast, there is little empirical work on the role of human operators during cyber breaches. More specifically, there is a need to understand the human-level factors at play when attacks occur. This paper views cyber attacks through the lens of suspicion, a construct that has been used in other contexts, but inadequately defined, in prior research. After defining the construct of suspicion, the authors demonstrate the role that suspicion plays as the conduit between computer operators' normal working behaviors and their ability to alter that behavior to detect and react to cyber attacks. With a focus on the user, rather than the target computer, the authors empirically develop a latent structure for a variety of types of cyber attacks, link that structure to levels of operator suspicion, link suspicion to users' cognitive and emotional states, and develop initial implications for cyber training.

Related Content

Amdy Diene. © 2024. 12 pages.
B. Sam Paul, A. Anuradha. © 2024. 21 pages.
Muhsina, Zidan Kachhi. © 2024. 15 pages.
Burak Tomak, Ayşe Yılmaz Virlan. © 2024. 14 pages.
Allen Farina, Carolyn N. Stevenson. © 2024. 25 pages.
Sadhana Mishra. © 2024. 16 pages.
Catherine Hayes. © 2024. 17 pages.
Body Bottom