226 research outputs found

    Gamification as a neuroergonomic approach to improving interpersonal situational awareness in cyber defense

    Get PDF
    In cyber threat situations, the establishment of a shared situational awareness as a basis for cyber defense decision-making results from adequate communication of a Recognized Cyber Picture (RCP). RCPs consist of actively selected information and have the goal of accurately presenting the severity and potential consequences of the situation. RCPs must be communicated between individuals, but also between organizations, and often from technical to non-/less technical personnel. The communication of RCPs is subject to many challenges that may affect the transfer of critical information between individuals. There are currently no common best practices for training communication for shared situational awareness among cyber defense personnel. The Orient, Locate, Bridge (OLB) model is a pedagogic tool to improve communication between individuals during a cyber threat situation. According to the model, an individual must apply meta-cognitive awareness (O), perspective taking (L), and communication skills (B) to successfully communicate the RCP. Gamification (applying game elements to non-game contexts) has shown promise as an approach to learning. We propose a novel OLB-based Gamification design to improve dyadic communication for shared situational awareness among (technical and non-technical) individuals during a cyber threat situation. The design includes the Gamification elements of narrative, scoring, feedback, and judgment of self. The proposed concept contributes to the educational development of cyber operators from both military and civilian organizations responsible for defending and securing digital infrastructure. This is achieved by combining the elements of a novel communication model with Gamification in a context in urgent need for educational input.publishedVersio

    Sensemaking training in preparation for effective mission command in the African battlespace

    Get PDF
    The South African National Defence Force (SANDF), as a member state of the United Nations, the African Union and the Southern African Development Community, has certain continental and regional responsibilities. It is foreseen that the main areas of influence and operations of the SANDF will be situated in Africa and are referred to as the African battlespace, which holds challenges for deploying military commanders. We argue that the elevated levels of complexity and uncertainty in this context make mission command, as a command approach, especially relevant. The conceptual study on which this article is based, found that mission command is highly suitable to promote a command culture that is flexible yet robust, fosters unity of command at all levels, and simultaneously provides subordinate commanders with the freedom to act decisively when new opportunities are identified. For mission command to be applied in the African battlespace, sensemaking is an important cognitive skill that should form an integral part of the psychological preparation and training of commanders. Recommendations are made for sensemaking development in the current training of commanders in the SANDF

    Gamification as a neuroergonomic approach to improving interpersonal situational awareness in cyber defense

    Get PDF
    In cyber threat situations, the establishment of a shared situational awareness as a basis for cyber defense decision-making results from adequate communication of a Recognized Cyber Picture (RCP). RCPs consist of actively selected information and have the goal of accurately presenting the severity and potential consequences of the situation. RCPs must be communicated between individuals, but also between organizations, and often from technical to non−/less technical personnel. The communication of RCPs is subject to many challenges that may affect the transfer of critical information between individuals. There are currently no common best practices for training communication for shared situational awareness among cyber defense personnel. The Orient, Locate, Bridge (OLB) model is a pedagogic tool to improve communication between individuals during a cyber threat situation. According to the model, an individual must apply meta-cognitive awareness (O), perspective taking (L), and communication skills (B) to successfully communicate the RCP. Gamification (applying game elements to non-game contexts) has shown promise as an approach to learning. We propose a novel OLB-based Gamification design to improve dyadic communication for shared situational awareness among (technical and non-technical) individuals during a cyber threat situation. The design includes the Gamification elements of narrative, scoring, feedback, and judgment of self. The proposed concept contributes to the educational development of cyber operators from both military and civilian organizations responsible for defending and securing digital infrastructure. This is achieved by combining the elements of a novel communication model with Gamification in a context in urgent need for educational input

    Improving Safety by Learning from Automation in Transport Systems with a Focus on Sensemaking and Meaningful Human Control

    Get PDF
    Automated transport systems are deployed in many areas and transport modes. The predominant engineering perspective has been to automate as much as possible and minimize human interaction. However, a balanced integration between human factors and technology is often missing, as well as the “hand-over” process between humans and machine. The risks of automated and autonomous systems are emerging, and there is a need to explore how risks can be mitigated through design, focusing on sensemaking, meaningful human control and resilience engineering. This chapter presents key issues from an ongoing research project exploring safety, security and human control of autonomous transport systems in road, sea, rail and air. The chapter aims to answer: (1) What are the major safety and security challenges of autonomous industrial transport systems? (2) What can the various transport modes learn from each other? (3) What are suggested key measures related to organizational, technical and human issues? We have performed literature reviews, interviews and reviewed on-going automation projects. We see the importance of involving humans in the loop during design and operations, support sensemaking, focus on learning from projects through data gathering and risk-based regulation. Unanticipated deviations are key challenges in automated systems, together with how to design for human–automation interaction and meaningful user involvement. Limiting the operational envelope seems to be a key issue for successful implementation and operation of autonomous systems.publishedVersio

    Using a Public Safety Radio Network for Information Negotiation between the Three-Tiered Command and Control Structure

    Get PDF
    publishedVersionPaid open acces

    Using a Public Safety Radio Network for Information Negotiation between the Three-Tiered Command and Control Structure

    Get PDF
    Multi-organizational emergency operations require effective information sharing. Existing information management tools supporting a common operational picture mainly convey factual information. However, a growing body of literature recognizes the importance of sharing interpretations and implications among the involved stakeholders for building a common situational understanding. This study aims to identify information that must be negotiated across the strategic, tactical, and operational command and control structures (C2S) for developing common situational understanding. Based on 33 interviews and a survey of emergency management stakeholders, information elements on the semantic and pragmatic levels are identified. Further, the results suggest how to use a secure radio network for facilitating information sharing so that the involved organizations can monitor and negotiate important information. These insights provide important lessons for improving information sharing in the emergency management domain

    Sensemaking training in preparation for efective mission command in the African battlespace

    Get PDF
    The South African National Defence Force (SANDF), as a member state of the United Nations, the African Union and the Southern African Development Community, has certain continental and regional responsibilities. It is foreseen that the main areas of influence and operations of the SANDF will be situated in Africa and are referred to as the African battlespace, which holds challenges for deploying military commanders. We argue that the elevated levels of complexity and uncertainty in this context make mission command, as a command approach, especially relevant. The conceptual study on which this article is based, found that mission command is highly suitable to promote a command culture that is flexible yet robust, fosters unity of command at all levels, and simultaneously provides subordinate commanders with the freedom to act decisively when new opportunities are identified. For mission command to be applied in the African battlespace, sensemaking is an important cognitive skill that should form an integral part of the psychological preparation and training of commanders. Recommendations are made for sensemaking development in the current training of commanders in the SANDF.https://scientiamilitaria.journals.ac.zaam2023Human Resource Managemen

    Understanding How Reverse Engineers Make Sense of Programs from Assembly Language Representations

    Get PDF
    This dissertation develops a theory of the conceptual and procedural aspects involved with how reverse engineers make sense of executable programs. Software reverse engineering is a complex set of tasks which require a person to understand the structure and functionality of a program from its assembly language representation, typically without having access to the program\u27s source code. This dissertation describes the reverse engineering process as a type of sensemaking, in which a person combines reasoning and information foraging behaviors to develop a mental model of the program. The structure of knowledge elements used in making sense of executable programs are elicited from a case study, interviews with subject matter experts, and observational studies with software reverse engineers. The results from this research can be used to improve reverse engineering tools, to develop training requirements for reverse engineers, and to develop robust computational models of human comprehension in complex tasks where sensemaking is required

    Human/Technology Co-Adaptation in the context of Cybersecurity

    Get PDF
    Understanding human-technology co-adaptation processes is becoming of utmost importance. Co-adaptation required among various actors is critical for their survival especially in turbulent environments such as the cyberspace. Indeed, cyberspace is marked by imminent cyber threats forcing IT stakeholders to act promptly, re-enforcing cybersecurity with complex and increasingly intrusive technologies with significant social impact. Based on a field study where a governmental organization (GO) acquired cybersecurity systems; and leveraging a constructive grounded theory extended with and abductive research, this study showcases that cybersecurity being as strong as its weakest actor, a requirement for a collective successful co-adaptation amongst various actors is of utmost importance. A technology-human co-adaptation model is proposed. It is processual in nature, with a holistic reach driven inspired by various adaptation dynamics such as power, identity, ethics and technology; that are driving the overall co-adaptation. Knowing what it takes for a better co-adaptation will allow cybersecurity stakeholders, managers and practitioners to bring more focus on pre-adaptation efforts facilitating the co-adaptation processes therefore allowing the acceleration of the much needed success of cybersecurity systems deployments or any other controversial but required technology
    corecore