Research Article
Training organizational supervisors to detect and prevent cyber insider threats: two approaches
@ARTICLE{10.4108/trans.sesa.01-06.2013.e4, author={Dee H. Andrews and Jared Freeman and Terence S. Andre and John Feeney and Alan Carlin and Cali M. Fidopiastis and Patricia Fitzgerald}, title={Training organizational supervisors to detect and prevent cyber insider threats: two approaches}, journal={EAI Endorsed Transactions on Security and Safety}, volume={1}, number={2}, publisher={ICST}, journal_a={SESA}, year={2013}, month={5}, keywords={accelerated learning, cognitive principles, cyber insider threat, game-based instruction.}, doi={10.4108/trans.sesa.01-06.2013.e4} }
- Dee H. Andrews
Jared Freeman
Terence S. Andre
John Feeney
Alan Carlin
Cali M. Fidopiastis
Patricia Fitzgerald
Year: 2013
Training organizational supervisors to detect and prevent cyber insider threats: two approaches
SESA
ICST
DOI: 10.4108/trans.sesa.01-06.2013.e4
Abstract
Cyber insider threat is intentional theft from, or sabotage of, a cyber system by someone within the organization. This article explores the use of advanced cognitive and instructional principles to accelerate learning in organizational supervisors to mitigate the cyber threat. It examines the potential advantage of using serious games to engage supervisors. It also posits two systematic instructional approaches for this training challenge – optimal path modelling and a competency-based approach. The paper concludes by discussing challenges of evaluating training for seldom occurring real world phenomena, like detecting a cyber-insider threat.
Copyright © 2013 Andrews et al., licensed to ICST. This is an open access article distributed under the terms of the Creative Commons Attribution licence (http://creativecommons.org/licenses/by/3.0/), which permits unlimited use, distribution and reproduction in any medium so long as the original work is properly cited.