TY - GEN
T1 - Capturing human cognition in cyber-security simulations with NETS
AU - Giacobe, Nicklaus A.
AU - McNeese, Michael D.
AU - Mancuso, Vincent F.
AU - Minotra, Dev
PY - 2013
Y1 - 2013
N2 - As new technologies are employed to improve cyber-security, designers often make claims that their interfaces improve usability, improve situation awareness, reduce cognitive load, or improve team cognition. However, the assessment of these claims is complex because these higher cognitive functions are often difficult to measure. This paper outlines a three human-subjects experiments, using the NETS simulation engine, to explore human cognition in simulated cyber-security environments. First, the salient features of the NETS simulator are described. Second, the three experiments are each outlined to include a description the individual cognitive measurements that were assessed. Next, a summarization of results from all three experiments will compare the important findings. This paper concludes with a discussion of key factors that should be considered when attempting to quantify differences in human cognition when presented with novel visualization approaches in a cyber-security context.
AB - As new technologies are employed to improve cyber-security, designers often make claims that their interfaces improve usability, improve situation awareness, reduce cognitive load, or improve team cognition. However, the assessment of these claims is complex because these higher cognitive functions are often difficult to measure. This paper outlines a three human-subjects experiments, using the NETS simulation engine, to explore human cognition in simulated cyber-security environments. First, the salient features of the NETS simulator are described. Second, the three experiments are each outlined to include a description the individual cognitive measurements that were assessed. Next, a summarization of results from all three experiments will compare the important findings. This paper concludes with a discussion of key factors that should be considered when attempting to quantify differences in human cognition when presented with novel visualization approaches in a cyber-security context.
UR - http://www.scopus.com/inward/record.url?scp=84883349464&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84883349464&partnerID=8YFLogxK
U2 - 10.1109/ISI.2013.6578844
DO - 10.1109/ISI.2013.6578844
M3 - Conference contribution
AN - SCOPUS:84883349464
SN - 9781467362115
T3 - IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics
SP - 284
EP - 288
BT - IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics
T2 - 11th IEEE International Conference on Intelligence and Security Informatics, IEEE ISI 2013
Y2 - 4 June 2013 through 7 June 2013
ER -