Open Access. Powered by Scholars. Published by Universities.®

Training and Development Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Training and Development

Recognizing Potential Cyberspace Warriors Through The Use Of Suspicion Propensity Index, Meghan G. Strang Mar 2020

Recognizing Potential Cyberspace Warriors Through The Use Of Suspicion Propensity Index, Meghan G. Strang

Theses and Dissertations

The Air Force currently suffers from excessively high attrition rates in the cyberspace career. The field is currently aiming to develop an entrance examination for the career, striving to improve personnel selection and decrease these high attrition rates. The attribute of suspicion is a key focus of the preliminary examination development, theorizing that it is a potential indicator present among competent cyber operators. This research makes use of the Suspicion Propensity Index (SPI), a reliable measure of one’s tendency to be suspicious, along with the highly cited Mayer’s trust questionnaire in order to compare the attributes that appear in successful …


Trust And Suspicion As A Function Of Cyber Security In Human Machine Team (Hmt) Of Unmanned Systems, Dhaher M. Alshammari Sep 2019

Trust And Suspicion As A Function Of Cyber Security In Human Machine Team (Hmt) Of Unmanned Systems, Dhaher M. Alshammari

Theses and Dissertations

The research focuses on cyber-attacks on cyber-physical systems of the unmanned vehicles that are characteristically used in the military, particularly the Air Force. Unmanned systems are exposed to various risks as the capacity of cyber attackers continue to expand, raising the need for speedy and immediate responses. The advances in military technologies form the basis of the research that explores the challenges faced in the timely detection and response to cyber-attacks. The purpose of the research is to study the connections between operator suspicion and the detection and response to cyber-attacks alongside the identification of theory of suspicion as the …