TY - GEN
T1 - Framework for developing a brief interview to understand cyber defense work
T2 - Human Factors and Ergonomics Society 2017 International Annual Meeting, HFES 2017
AU - Armstrong, Miriam E.
AU - Jones, Keith S.
AU - Namin, Akbar Siami
N1 - Publisher Copyright:
Copyright 2017 by Human Factors and Ergonomics Society.
PY - 2017
Y1 - 2017
N2 - Cyber defense is increasingly important for the wellbeing of our economy and our national defense. Universities can help meet our growing cybersecurity needs by training the next generation of cyber defenders, and it is crucial that the curricula for such programs are designed to prepare students for the type of work that is performed in the field. Unfortunately, collecting data about cyber work is hindered in situations where cybersecurity professionals are uncomfortable with traditional human factors work analysis methods. Four potential constraints are 1) no naturalistic observations, 2) anonymity and safety, 3) short data collection time, and 4) no deep process questions. We developed a brief interview technique that allowed us to measure the importance of knowledge, skills, and abilities related to offensive and defensive cyber work. Based on our experience using this technique, it fits within the four potential constraints to cyber research and produces information that is directly applicable to the development of cybersecurity curricula. Our technique could potentially be used for other research purposes and personnel selection and by researchers interested in other high-security populations.
AB - Cyber defense is increasingly important for the wellbeing of our economy and our national defense. Universities can help meet our growing cybersecurity needs by training the next generation of cyber defenders, and it is crucial that the curricula for such programs are designed to prepare students for the type of work that is performed in the field. Unfortunately, collecting data about cyber work is hindered in situations where cybersecurity professionals are uncomfortable with traditional human factors work analysis methods. Four potential constraints are 1) no naturalistic observations, 2) anonymity and safety, 3) short data collection time, and 4) no deep process questions. We developed a brief interview technique that allowed us to measure the importance of knowledge, skills, and abilities related to offensive and defensive cyber work. Based on our experience using this technique, it fits within the four potential constraints to cyber research and produces information that is directly applicable to the development of cybersecurity curricula. Our technique could potentially be used for other research purposes and personnel selection and by researchers interested in other high-security populations.
UR - http://www.scopus.com/inward/record.url?scp=85042485821&partnerID=8YFLogxK
U2 - 10.1177/1541931213601812
DO - 10.1177/1541931213601812
M3 - Conference contribution
AN - SCOPUS:85042485821
T3 - Proceedings of the Human Factors and Ergonomics Society
SP - 1318
EP - 1322
BT - Proceedings of the Human Factors and Ergonomics Society 2017 International Annual Meeting, HFES 2017
PB - Human Factors an Ergonomics Society Inc.
Y2 - 9 October 2017 through 13 October 2017
ER -