Suspicion Modeling in Support of Cyber-Influence Operations/Tactics
Master's thesis, Aug 2007-Mar 2008
AIR FORCE INST OF TECH WRIGHT-PATTERSON AFB OH SCHOOL OF ENGINEERING AND MANAGEMENT
Pagination or Media Count:
Understanding the cognitive process of IT user suspicion may assist organizations in development of network protection plans, personnel training, and tools necessary to identify and mitigate nefarious intrusions of IT systems. Exploration of a conceptual common ground between pycho-social and technology-related concepts of suspicion are the heart of this investigation. The complexities involved in merging these perspectives led to the overall research question What is the nature of user suspicion toward IT The research problemphenomenon was addressed via extensive literature review, and use of the Interactive Qualitative Analysis problemphenomenon. Analysis of the system led to the development of a model of IT suspicion as a progenitor for future experimental constructs that measure or assess behavior as a result of cyber attacks.
- Computer Systems