語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Information Behaviors and Cognitive ...
~
Drexel University., Computer Science (College of Computing and Informatics).
FindBook
Google Book
Amazon
博客來
Information Behaviors and Cognitive Modes Used for Cyber Situation Assessment.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Information Behaviors and Cognitive Modes Used for Cyber Situation Assessment./
作者:
Heverin, Thomas.
出版者:
Ann Arbor : ProQuest Dissertations & Theses, : 2014,
面頁冊數:
225 p.
附註:
Source: Dissertation Abstracts International, Volume: 75-11(E), Section: A.
Contained By:
Dissertation Abstracts International75-11A(E).
標題:
Information science. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3629473
ISBN:
9781321064827
Information Behaviors and Cognitive Modes Used for Cyber Situation Assessment.
Heverin, Thomas.
Information Behaviors and Cognitive Modes Used for Cyber Situation Assessment.
- Ann Arbor : ProQuest Dissertations & Theses, 2014 - 225 p.
Source: Dissertation Abstracts International, Volume: 75-11(E), Section: A.
Thesis (Ph.D.)--Drexel University, 2014.
This item is not available from ProQuest Dissertations & Theses.
The purpose of this dissertation research was to examine the information behaviors and cognitive modes used by expert cyber defenders when completing cyber situation assessment tasks (SA-tasks) of different complexities. Theoretical propositions from Library and Information Science (LIS) task-complexity research and the Cognitive Continuum Theory (CCT) informed the theoretical framework. LIS task-complexity research predicts that increased task complexity results in numerous changes in information-source and information-type use. The CCT predicts that increased task complexity results in a shift from analytical to intuitive cognition.
ISBN: 9781321064827Subjects--Topical Terms:
554358
Information science.
Information Behaviors and Cognitive Modes Used for Cyber Situation Assessment.
LDR
:03119nmm a2200337 4500
001
2123733
005
20171002081659.5
008
180830s2014 ||||||||||||||||| ||eng d
020
$a
9781321064827
035
$a
(MiAaPQ)AAI3629473
035
$a
AAI3629473
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Heverin, Thomas.
$3
3285671
245
1 0
$a
Information Behaviors and Cognitive Modes Used for Cyber Situation Assessment.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2014
300
$a
225 p.
500
$a
Source: Dissertation Abstracts International, Volume: 75-11(E), Section: A.
500
$a
Advisers: Lisl Zach; Kristine Unswroth.
502
$a
Thesis (Ph.D.)--Drexel University, 2014.
506
$a
This item is not available from ProQuest Dissertations & Theses.
520
$a
The purpose of this dissertation research was to examine the information behaviors and cognitive modes used by expert cyber defenders when completing cyber situation assessment tasks (SA-tasks) of different complexities. Theoretical propositions from Library and Information Science (LIS) task-complexity research and the Cognitive Continuum Theory (CCT) informed the theoretical framework. LIS task-complexity research predicts that increased task complexity results in numerous changes in information-source and information-type use. The CCT predicts that increased task complexity results in a shift from analytical to intuitive cognition.
520
$a
A multiple-case studies design was selected as the research approach. The Critical Decision Method served as the basis for semi-structured, retrospective interviews conducted with 21 expert cyber defenders from small defense companies. The data analysis techniques included directed content analysis, pattern matching, and statistical analysis (the Freeman-Halton extension of Fisher's Exact test).
520
$a
The main findings of this study are as cyber SA-task complexity increased, the expert cyber defenders sought more technical information, used more external sources, including external experts, and based their information behaviors on intuitive cognition. These findings support several of the theoretical predictions from LIS task-complexity research and the CCT.
520
$a
The findings are important because they show that the expert cyber defenders base their information behaviors on years of experience in the cyber defense domain and on years of experience in designing their own companies' security postures. Each company has its own security posture as well as its own level of acceptance of risk. Therefore, cyber situation assessment tools need a design that can be tailored for each company. Additionally, methods are needed to elicit the intuitive processes used by expert cyber defenders in order to train novice cyber defenders as well as other expert cyber professionals taking over the experts' localized cyber defense roles.
590
$a
School code: 0065.
650
4
$a
Information science.
$3
554358
650
4
$a
Library science.
$3
539284
690
$a
0723
690
$a
0399
710
2
$a
Drexel University.
$b
Computer Science (College of Computing and Informatics).
$3
3177627
773
0
$t
Dissertation Abstracts International
$g
75-11A(E).
790
$a
0065
791
$a
Ph.D.
792
$a
2014
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3629473
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9334345
電子資源
01.外借(書)_YB
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入