Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Defense and Security Studies (7)
- Public Affairs, Public Policy and Public Administration (7)
- Education (3)
- Higher Education (3)
- Psychology (3)
-
- Computer Sciences (2)
- Engineering (2)
- Human Factors Psychology (2)
- Information Security (2)
- Law (2)
- National Security Law (2)
- Physical Sciences and Mathematics (2)
- Business (1)
- Civil and Environmental Engineering (1)
- Computer Engineering (1)
- Educational Methods (1)
- International Relations (1)
- Military and Veterans Studies (1)
- Operations and Supply Chain Management (1)
- Other Computer Engineering (1)
- Other Political Science (1)
- Other Psychology (1)
- Peace and Conflict Studies (1)
- Political Science (1)
- Terrorism Studies (1)
- Transportation (1)
- Transportation Engineering (1)
- Publication
- Publication Type
Articles 1 - 9 of 9
Full-Text Articles in Social and Behavioral Sciences
Teamwork In Cybersecurity: Evaluating The Cooperative Board Game [D0x3d!] As An Experimental Testbed, Crystal Fausett, Joseph Keebler
Teamwork In Cybersecurity: Evaluating The Cooperative Board Game [D0x3d!] As An Experimental Testbed, Crystal Fausett, Joseph Keebler
Publications
It is crucial to identify the knowledge, skills, and attitudes (KSAs) that contribute to success in cybersecurity teams. We introduce a board game, [d0x3d!], as an experimental testbed designed to create a controlled environment and set of manageable tasks aimed at exploring teamwork competencies that may be relevant to the cybersecurity workforce. [d0x3d!] requires players to work together and share information to retrieve stolen digital assets. The authors aim to improve the efficacy of cybersecurity team training by incorporating modern teamwork theory and measurement. This testbed provides a low-cost and user-friendly platform for training, evaluation, and research.
Cross Domain Iw Threats To Sof Maritime Missions: Implications For U.S. Sof, Gary C. Kessler, Diane M. Zorri
Cross Domain Iw Threats To Sof Maritime Missions: Implications For U.S. Sof, Gary C. Kessler, Diane M. Zorri
Publications
As cyber vulnerabilities proliferate with the expansion of connected devices, wherein security is often forsaken for ease of use, Special Operations Forces (SOF) cannot escape the obvious, massive risk that they are assuming by incorporating emerging technologies into their toolkits. This is especially true in the maritime sector where SOF operates nearshore in littoral zones. As SOF—in support to the U.S. Navy— increasingly operate in these contested maritime environments, they will gradually encounter more hostile actors looking to exploit digital vulnerabilities. As such, this monograph comes at a perfect time as the world becomes more interconnected but also more vulnerable.
Cyber Supply Chain Risk Management: Implications For The Sof Future Operating Environment, J. Philip Craiger, Laurie Lindamood-Craiger, Diane M. Zorri
Cyber Supply Chain Risk Management: Implications For The Sof Future Operating Environment, J. Philip Craiger, Laurie Lindamood-Craiger, Diane M. Zorri
Publications
The emerging Cyber Supply Chain Risk Management (C-SCRM) concept assists at all levels of the supply chain in managing and mitigating risks, and the authors define C-SCRM as the process of identifying, assessing, and mitigating the risks associated with the distributed and interconnected nature of information and operational technology products and service supply chains. As Special Operations Forces increasingly rely on sophisticated hardware and software products, this quick, well-researched monograph provides a detailed accounting of C-SCRM associated laws, regulations, instructions, tools, and strategies meant to mitigate vulnerabilities and risks—and how we might best manage the evolving and ever-changing array of …
Examining Pilot Response To Cybersecurity Events On The Flight Deck, Meredith Carroll Ph.D., Summer Rebensky, Paige Sanchez
Examining Pilot Response To Cybersecurity Events On The Flight Deck, Meredith Carroll Ph.D., Summer Rebensky, Paige Sanchez
National Training Aircraft Symposium (NTAS)
Cybersecurity is a growing concern in the aviation industry. In general, cybersecurity research has typically focused on providing technical solutions such as hardening networks and improving computer systems, with little focus on the human operator. Human operators, such as pilots, are often the last line of defense; however, it is currently unclear whether pilots can recognize cybersecurity vulnerabilities, detect when a system is being compromised, and respond appropriately to a cybersecurity event. A review of literature revealed three key stages in cybersecurity response decision process (susceptibility, detection, and response) that are influenced by eight separate factors (perceived susceptibility, perceived safeguard …
A Taxonomy Framework For Maritime Cybersecurity: A Demonstration Using The Automatic Identification System, G. C. Kessler, J. P. Craiger, J. C. Haass
A Taxonomy Framework For Maritime Cybersecurity: A Demonstration Using The Automatic Identification System, G. C. Kessler, J. P. Craiger, J. C. Haass
Publications
The maritime transportation system is increasingly a target of cyber attacks. This paper describes a taxonomy that supports the creation of adversarial cyber models, risk mitigation, and resiliency plans as applied to the maritime industry, using the Automatic Identification System as a specific illustration of the approach. This method has already been applied to the aviation sector; retooling it for a maritime example demonstrates its broad applicability to the transportation sector, in general.
Paradigms For Cybersecurity Education In A Homeland Security Program, Gary C. Kessler, James D. Ramsay
Paradigms For Cybersecurity Education In A Homeland Security Program, Gary C. Kessler, James D. Ramsay
Applied Aviation Sciences - Daytona Beach
Cybersecurity threats to the nation are growing in intensity, frequency, and severity and are a very real threat to the security of the country. Academia has responded to a wide variety of homeland security (HS) threats to the nation by creating formal curricula in the field, although these programs almost exclusively focus on physical threats (e.g., terrorist attacks, and natural and man-made disasters), law and policy and transportation . Although cybersecurity programs are commonly available in U.S. colleges and universities, they are invariably offered as a technical course of study nested within engineering (or other STEM) programs. We observe that …
Paradigms For Cybersecurity Education In A Homeland Security Program, Gary C. Kessler, James Ramsay
Paradigms For Cybersecurity Education In A Homeland Security Program, Gary C. Kessler, James Ramsay
Applied Aviation Sciences - Daytona Beach
Cybersecurity threats to the nation are growing in intensity, frequency, and severity and are a very real threat to the security of the country. Academia has responded to a wide variety of homeland security (HS) threats to the nation by creating formal curricula in the field, although these programs almost exclusively focus on physical threats (e.g., terrorist attacks, and natural and man-made disasters), law and policy and transportation . Although cybersecurity programs are commonly available in U.S. colleges and universities, they are invariably offered as a technical course of study nested within engineering (or other STEM) programs. We observe that …
Paradigms For Cybersecurity Education In A Homeland Security Program, Gary C. Kessler, James Ramsay
Paradigms For Cybersecurity Education In A Homeland Security Program, Gary C. Kessler, James Ramsay
Security Studies & International Affairs - Daytona Beach
Cybersecurity threats to the nation are growing in intensity, frequency, and severity and are a very real threat to the security of the country. Academia has responded to a wide variety of homeland security (HS) threats to the nation by creating formal curricula in the field, although these programs almost exclusively focus on physical threats (e.g., terrorist attacks, and natural and man-made disasters), law and policy and transportation . Although cybersecurity programs are commonly available in U.S. colleges and universities, they are invariably offered as a technical course of study nested within engineering (or other STEM) programs. We observe that …
Cybersecurity: Growing Like Topsy!, Ibpp Editor
Cybersecurity: Growing Like Topsy!, Ibpp Editor
International Bulletin of Political Psychology
This article discusses cybersecurity in an intelligence context – what it is, what it does to us, and the sudden (and somewhat unplanned) increase in financial support for the area.