Reference Hub7
The Role of Human Operators' Suspicion in the Detection of Cyber Attacks

The Role of Human Operators' Suspicion in the Detection of Cyber Attacks

Leanne Hirshfield, Philip Bobko, Alex J. Barelka, Mark R. Costa, Gregory J. Funke, Vincent F. Mancuso, Victor Finomore, Benjamin A. Knott
Copyright: © 2015 |Volume: 5 |Issue: 3 |Pages: 17
ISSN: 1947-3435|EISSN: 1947-3443|EISBN13: 9781466678934|DOI: 10.4018/IJCWT.2015070103
Cite Article Cite Article

MLA

Hirshfield, Leanne, et al. "The Role of Human Operators' Suspicion in the Detection of Cyber Attacks." IJCWT vol.5, no.3 2015: pp.28-44. http://doi.org/10.4018/IJCWT.2015070103

APA

Hirshfield, L., Bobko, P., Barelka, A. J., Costa, M. R., Funke, G. J., Mancuso, V. F., Finomore, V., & Knott, B. A. (2015). The Role of Human Operators' Suspicion in the Detection of Cyber Attacks. International Journal of Cyber Warfare and Terrorism (IJCWT), 5(3), 28-44. http://doi.org/10.4018/IJCWT.2015070103

Chicago

Hirshfield, Leanne, et al. "The Role of Human Operators' Suspicion in the Detection of Cyber Attacks," International Journal of Cyber Warfare and Terrorism (IJCWT) 5, no.3: 28-44. http://doi.org/10.4018/IJCWT.2015070103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Despite the importance that human error in the cyber domain has had in recent reports, cyber warfare research to date has largely focused on the effects of cyber attacks on the target computer system. In contrast, there is little empirical work on the role of human operators during cyber breaches. More specifically, there is a need to understand the human-level factors at play when attacks occur. This paper views cyber attacks through the lens of suspicion, a construct that has been used in other contexts, but inadequately defined, in prior research. After defining the construct of suspicion, the authors demonstrate the role that suspicion plays as the conduit between computer operators' normal working behaviors and their ability to alter that behavior to detect and react to cyber attacks. With a focus on the user, rather than the target computer, the authors empirically develop a latent structure for a variety of types of cyber attacks, link that structure to levels of operator suspicion, link suspicion to users' cognitive and emotional states, and develop initial implications for cyber training.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.