Abstract
The proliferation of network-centric warfare capabilities has led to a greater need to define and understand cyber networks. Critical systems and information sources maintained on such networks are lucrative targets for terrorists, foreign governments, criminal organizations, and competitive businesses. The very same technology that enables efficient communications and conduct within military, government and business communities enables hostile individuals and organizations to identify and exploit vulnerabilities within secure computer networks. Protecting and maintaining these networks is inherently more challenging when compared to traditional information and communication networks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bain, B (2010, June 3) New DOD cyber commander seeks better situational awareness, FCW
Connors, E, Jones, RET, Endsley, MR (2010) A comprehensive study of requirements and metrics for cyber defense situation awareness. SA Technologies, Inc., Marietta, GA
Endsley, MR (1988) Design and evaluation for situation awareness enhancement. In: Proceedings of the Human Factors Society 32nd Annual Meeting, Santa Monica, CA. p 97–101
Endsley, MR (1993) A survey of situation awareness requirements in air-to-air combat fighters. International Journal of Aviation Psychology 3(2): 157–168
Endsley, MR (1995) Toward a theory of situation awareness in dynamic systems. Human Factors 37(1): 32–64
Endsley, MR, & Garland, DJ (Eds) (2000) Situation awareness analysis and measurement. Lawrence Erlbaum, Mahwah, NJ
Endsley, MR, Jones, DG (2001) Disruptions, Interruptions, and Information Attack: Impact on Situation Awareness and Decision Making. In: Proceedings of the Human Factors and Ergonomics Society 45th Annual Meeting, Santa Monica, CA. p 63–68
Endsley, MR, Jones, DG (2012) Designing for situation awareness: An approach to human-centered design (2nd ed) Taylor & Francis, London
Endsley, MR, Kiris, EO (1995) The out-of-the-loop performance problem and level of control in automation. Human Factors 37(2): 381–394
Lee, JD, See, KA (2004) Trust in automation: Designing for appropriate reliance. Human Factors 46(1): 50–80
Rouse, WB, Morris, NM (1985) On looking into the black box: Prospects and limits in the search for mental models (DTIC #AD-A159080). Center for Man–machine Systems Research, Georgia Institute of Technology, Atlanta, GA
Sarter, NB, Woods, DD (1995) “How in the world did I ever get into that mode”: Mode error and awareness in supervisory control. Human Factors 37(1): 5–19
United States Air Force (2012) Cyber Vision 2025. United States Air Force, Washington, DC
United States Air Force (2013) Global Horizons. United States Air Force, Washington, DC
United States Army (2013) Army Cyber Command Industry Day http://www.afea.org/events/cyber/13/documents/afceaIndustryOutreachBriefjun13ARCYBER.pdf
Wickens, CD (1992) Engineering psychology and human performance, 2nd edn. Harper Collins, New York
Wiener, EL.(1988) Cockpit automation. In: Wiener, EL & Nagel, DC (Eds), Human Factors in Aviation, Academic Press, San Diego, p 433–461
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Endsley, M.R., Connors, E.S. (2014). Foundation and Challenges. In: Kott, A., Wang, C., Erbacher, R. (eds) Cyber Defense and Situational Awareness. Advances in Information Security, vol 62. Springer, Cham. https://doi.org/10.1007/978-3-319-11391-3_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-11391-3_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-11390-6
Online ISBN: 978-3-319-11391-3
eBook Packages: Computer ScienceComputer Science (R0)