A panel of past or current sponsors of human-centered research in cybersecurity. Attendees from industry, government and academia alike who are interested in cybersecurity research will benefit from hearing these panelists describe their experience and their views on the state of the field, current knowledge gaps and future directions for winning proposals.
Get full access to this article
View all access options for this article.
References
1.
Ben-AsherN.MeyerJ. (2018). The Triad of Risk-Related Behaviors (TriRB): a three-dimensional model of cyber risk taking. Human Factors, 60(8), 1163–1178.
2.
BorghettiB.FunkeG.PastelR.GutzwillerR. S. (2017). Cyber Human research from the cyber operator’s view. Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 61(1), 350–350.
3.
BoyceM.DumaK.HettingerL.MaloneT.WilsonD.Lockett-ReynoldsJ. (2011). Human performance in cybersecurity: a research agenda. Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 55, 1115–1119.
4.
ChampionM.JariwalaS.WardP.CookeN. J. (2014). Using cognitive task analysis to investigate the contribution of informal education to developing cyber security expertise. Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 58, 310–314.
5.
ChampionM.RajivanP.CookeN. J.JariwalaS. (2012). Team-based cyber defense analysis. Cognitive Methods in Situation Awareness and Decision Support (CogSIMA), 218–221.
D’AmicoA.WhitleyK.TesoneD.O’BrienB.RothE. (2005). Achieving cyber defense situational awareness: a cognitive task analysis of information assurance analysts. Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 49, 229–233.
10.
DuttV.AhnY.-S.GonzalezC. (2013). Cyber situation awareness: Modeling detection of cyber attacks with instance-based learning theory. Human Factors, 55(3), 605–618.
11.
GutzwillerR. S.Ferguson-walterK. J.FugateS. J.RogersA. (2018). “Oh, look, a butterfly!" A framework for distracting attackers to improve cyber defense. Proceedings of the Human Factors and Ergonomics Society, 272–276.
12.
GutzwillerR. S.Ferguson-walterK. J.FugateS. J. (2019). Are cyber attackers thinking fast and slow? Exploratory analysis reveals evidence of decision-making biases in red teamers. Proceedings of the Human Factors and Ergonomics Society Annual Meeting.
13.
GutzwillerR. S.FugateS.SawyerB. D.HancockP. A. (2015). The human factors of cyber network defense. Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 59(1), 322–326.
14.
GutzwillerR. S.HuntS. M.LangeD. S. (2016). A task analysis toward characterizing cyber-cognitive situation awareness (CCSA) in cyber defense analysts. CogSIMA 2016.
JuangK.GreensteinJ. (2018). integrating visual mnemonics and input feedback with passphrases to improve the usability and security of digital authentication. Human Factors, 60(5), 658–668.
17.
KnottB. A.MancusoV. F.BennettK. B.FinomoreV.McNeeseM.McKneelyJ. A.BeecherM. (2013). Human factors in cyber warfare: Alternative perspectives. Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 57, 399–403.
18.
MahoneyS.RothE.SteinkeK.PfautzJ.WuC.FarryM. (2010). A Cognitive Task Analysis for Cyber Situational Awareness. Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 54(4), 279–283.
19.
MancusoV. F.FunkeG. J.Stranga. J.EckoldM. B. (2015). Capturing performance in cyber human supervisory control. Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 59(1), 317–321.
PaulC. L.BlahaL. M.BosN.FallonC. K.GonzalezC.GutzwillerR. S. (2019). Opportunities and challenges for human-machine teaming in cybersecurity operations. Proceedings of the Human Factors and Ergonomics Society Annual Meeting.
22.
ProctorR. W.ChenJ. (2015). The role of human factors/ergonomics in the science of security: decision making and action selection in cyberspace. Human Factors, 57(5), 721–727.
23.
RajivanP.JanssenM. A.CookeN. J. (2013). Agent-based model of a cyber security defense analyst team. Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 57(1), 314–318.
24.
RajivanP.CookeN. J. (2018). information-pooling bias in collaborative security incident correlation analysis. Human Factors, 60(5), 626–639.
25.
SawyerB. D.FinomoreV. S.FunkeG. J.MancusoV. F.FunkeM. E.MatthewsG.WarmJ. S. (2014). Cyber vigilance: effects of signal probability and event rate. Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 58(1), 1771–1775.
26.
SawyerB. D.HancockP. A. (2018). Hacking the human: the prevalence paradox in cybersecurity. Human Factors, 60(5), 597–609.
27.
TrentS.HoffmanR.LeotaT.FrostR.GonzalezD. (2016). Cyberspace operations and the people who perform them. Proceedings of the Human Factors and Ergonomics Society, 216–217.
28.
VekslerV. D.BuchlerN.HoffmanB. E.CassentiD. N.SampleC.SugrimS. (2018). Simulations in cyber-security: A review of cognitive modeling of network attackers, defenders, and users. Frontiers in Psychology, 9(MAY), 1–12.
29.
VieaneA.FunkeG.GreenleeE.MancusoV.BorghettiB.MillerB.… Boehm-DavisD. (2017). Task interruptions undermine cyber defense. Proceedings of the Human Factors and Ergonomics Society, 375–379.
30.
VieaneA.FunkeG.MancusoV.GreenleeE.DyeG.BorghettiB.… BrownR. (2016). Coordinated displays to assist cyber defenders. Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 60, 344–348.