Skip to main content

Human-Human Communication in Cyber Threat Situations: A Systematic Review

  • Conference paper
  • First Online:
HCI International 2021 - Late Breaking Papers: Cognition, Inclusion, Learning, and Culture (HCII 2021)

Abstract

In cyber threat situations, decision-making processes within organizations and between the affected organization and external entities are high-stake. They require human communication entailing technical complexity, time pressure, interdisciplinary factors, and often an insufficient information basis. Communication in cyber threat situations can thus be challenging and has a variety of implications for decision-making. The cyber-physical system is a rapidly changing socio-technical system that is understudied in terms of how cyber events are communicated and acted upon to secure and maintain cyber resilience. The present study is the first to review human-to-human communication in cyber threat situations. Our aims are to outline how human-human communication performance in cybersecurity settings have been studied, to uncover areas where there is potential for developing common standards for information exchange in collaborative settings, and to provide guidance for future research efforts. The review was carried out according to the PRISMA guidelines and articles were searched for on scientific databases. Articles focusing on human-human communication in cyber threat situations published in peer reviewed journals or as conference papers were included. A total of 17 studies were included in the final review. Most of the studies were correlational and exploratory in nature. Very few studies characterize communication in useful goal-related terms. There is a need for more collaboration between cyber defense exercise-organizers and cognitive scientists. Future studies should assess how team mental model-development affects team communication and performance in cyber defense exercises.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  • Agyepong, E., et al.: Challenges and performance metrics for security operations center analysts: a systematic review. J. Cyber Secur. Technol. 4(3), 1–28 (2020). https://doi.org/10.1080/23742917.2019.1698178

    Article  Google Scholar 

  • Ahrend, J.M., et al.: On the collaborative practices of cyber threat intelligence analysts to develop and utilize tacit threat and defence knowledge. In: 2016 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA) (2016). https://doi.org/10.1109/cybersa.2016.7503279

  • Barford, P., et al.: Cyber SA: situational awareness for cyber defense. In: Cyber Situational Awareness, pp. 3–13. Springer, Cham (2009). https://doi.org/10.1007/978-1-4419-0140-8_1

  • Buchler, N., et al.: Mission command in the age of network-enabled operations: social network analysis of information sharing and situation awareness. Front. Psychol. 7, 937 (2016)

    Article  Google Scholar 

  • Champion, M.A., et al.: Team-based cyber defense analysis. In: 2012 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (2012). https://doi.org/10.1109/cogsima.2012.6188386

  • ENISA: Proactive detection of network security incidents (2011). https://www.enisa.europa.eu/activities/cert/support/proactive-detection/survey-analysis. Accessed 20 Mar 2021

  • Finomore, V., et al.: Effects of cyber disruption in a distributed team decision making task. In: Proceedings of the Human Factors and Ergonomics Society Annual Meeting, vol. 57, no. 1, pp. 394–398 (2013)

    Google Scholar 

  • Forsythe, C., Silva, A., Stevens-Adams, S., Bradshaw, J.: Human dimension in cyber operations research and development priorities. In: Schmorrow, D.D., Fidopiastis, C.M. (eds.) AC 2013. LNCS (LNAI), vol. 8027, pp. 418–422. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-39454-6_44

    Chapter  Google Scholar 

  • Franke, U., Brynielsson, J.: Cyber situational awareness – a systematic review of the literature. Comput. Secur. 46, 18–31 (2014). https://doi.org/10.1016/j.cose.2014.06.008

    Article  Google Scholar 

  • Garcia-Granados, F. Bahsi, H.: Cybersecurity knowledge requirements for strategic level decision makers. In: International Conference on Cyber Warfare and Security 2020 (2020). https://doi.org/10.34190/ICCWS.20.102

  • Hámornik, B.P., Krasznay, C.: A team-level perspective of human factors in cyber security: security operations centers. In: Nicholson, D. (ed.) AHFE 2017. AISC, vol. 593, pp. 224–236. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-60585-2_21

    Chapter  Google Scholar 

  • Henshel, D., et al.: Trust as a human factor in holistic cyber security risk assessment. Procedia Manuf. 3, 1117–1124 (2015)

    Article  Google Scholar 

  • Henshel, D.S., et al.: Predicting proficiency in cyber defense team exercises. In: MILCOM 2016 - 2016 IEEE Military Communications Conference (2016). https://doi.org/10.1109/milcom.2016.7795423

  • ISO: ISO/IEC27010: Information technology – security techniques –information security management for inter-sector and interorganizational communications (2012)

    Google Scholar 

  • ITU-T: Recommendation ITU-T x.1500 cybersecurity information exchange techniques (2012)

    Google Scholar 

  • Jariwala, S., et al.: Influence of team communication and coordination on the performance of teams at the iCTF Competition. In: Proceedings of the Human Factors and Ergonomics Society Annual Meeting, vol. 56, no. 1, pp. 458–462 (2012)

    Google Scholar 

  • Jøsok, Ø., Knox, B.J., Helkala, K., Lugo, R.G., Sütterlin, S., Ward, P.: Exploring the hybrid space. In: Schmorrow, D.D.D., Fidopiastis, C.M.M. (eds.) AC 2016. LNCS (LNAI), vol. 9744, pp. 178–188. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-39952-2_18

    Chapter  Google Scholar 

  • Jøsok, Ø., Knox, B.J., Helkala, K., Wilson, K., Sütterlin, S., Lugo, R.G., Ødegaard, T.: Macrocognition applied to the hybrid space: team environment, functions and processes in cyber operations. In: Schmorrow, D.D., Fidopiastis, C.M. (eds.) AC 2017. LNCS (LNAI), vol. 10285, pp. 486–500. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-58625-0_35

    Chapter  Google Scholar 

  • Jøsok, Ø., et al.: Self-regulation and cognitive agility in cyber operations. Front. Psychol. 10, 875 (2019)

    Article  Google Scholar 

  • Kácha, P.: Idea: security event taxonomy mapping. In: 18th International Conference on Circuits, Systems, Communications and Computers, 2014 (2014)

    Google Scholar 

  • Knox, B.J., et al.: Socio-technical communication: the hybrid space and the OLB model for science-based cyber education. Mil. Psychol. 30(4), 350–359 (2018)

    Article  Google Scholar 

  • Knox, B.J., Lugo, R.G., Jøsok, Ø., Helkala, K., Sütterlin, S.: Towards a cognitive agility index: the role of metacognition in human computer interaction. In: Stephanidis, C. (ed.) HCI 2017. CCIS, vol. 713, pp. 330–338. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-58750-9_46

    Chapter  Google Scholar 

  • Knox, B.J., et al.: Cognisance as a human factor in military cyber defence education. IFAC-PapersOnLine 52(19), 163–168 (2019)

    Article  Google Scholar 

  • Knox, B.J., et al.: Slow education and cognitive agility: improving military cyber cadet cognitive performance for better governance of cyberpower. Int. J. Cyber Warfare Terrorism (IJCWT) 9(1), 48–66 (2019)

    Article  Google Scholar 

  • Lugo, R., et al.: Team workload demands influence on cyber detection performance. In: 13th International Conference on Naturalistic Decision Making 2017, pp. 223–225 (2017)

    Google Scholar 

  • Mermoud, A., et al.: Incentives for human agents to share security information: a model and an empirical test. In: 2018 Workshop on the Economics of Information Security (WEIS), Innsbruck (2018)

    Google Scholar 

  • Moher, D., et al.: Preferred reporting items for systematic reviews and meta-analyses: the PRISMA statement. J. Clin. Epidemiol. 62(10), 1006–1012 (2009). https://doi.org/10.1016/j.jclinepi.2009.06.005

    Article  Google Scholar 

  • Muniz, J., et al.: Security Operations Center: Building, Operating, and Maintaining Your SOC. Cisco Press, Indianapolis (2015)

    Google Scholar 

  • Pala, A., Zhuang, J.: Information sharing in cybersecurity: a review. Decis. Anal. (2019). https://doi.org/10.1287/deca.2018.0387

    Article  MathSciNet  Google Scholar 

  • Percia David, D., et al.: Knowledge absorption for cyber-security: the role of human beliefs. Comput. Hum. Behav. 106, 106255 (2020). https://doi.org/10.1016/j.chb.2020.106255

  • Skopik, F., et al.: A problem shared is a problem halved: a survey on the dimensions of collective cyber defense through security information sharing. Comput. Secur. 60, 154–176 (2016). https://doi.org/10.1016/j.cose.2016.04.003

    Article  Google Scholar 

  • Staheli, D., et al.: Collaborative data analysis and discovery for cyber security. In: SOUPS 2016: Twelfth Symposium on Usable Privacy and Security (2016)

    Google Scholar 

  • Steinke, J., et al.: Improving cybersecurity incident response team effectiveness using teams-based research. IEEE Secur. Priv. 13(4), 20–29 (2015). https://doi.org/10.1109/msp.2015.71

    Article  Google Scholar 

  • Tikk-Ringas, E., et al.: Cyber security as a field of military education and study. Joint Forces Q. 75(4), 57–60 (2014)

    Google Scholar 

  • Tounsi, W., Rais, H.: A survey on technical threat intelligence in the age of sophisticated cyber attacks. Comput. Secur. 72, 212–233 (2018)

    Article  Google Scholar 

  • Varga, S., et al.: Information requirements for national level cyber situational awareness. In: 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) (2018)

    Google Scholar 

  • Whitman, M.E., Mattord, H.J.: Principles of Information Security, 4th edn. Course Technology, Boston (2012)

    Google Scholar 

  • Zachary, W., et al.: Context as a cognitive process: an integrative framework for supporting decision making. In: The 8th International Conference on Semantic Technologies for Intelligence, Defense, and Security (STIDS 2013) (2013)

    Google Scholar 

  • Zanenga, P.: Knowledge eyes: Nature and emergence in society, culture, and economy. In: 2014 International Conference on Engineering, Technology and Innovation (ICE) (2014)

    Google Scholar 

Download references

Funding

This study was conducted as part of the Advancing Cyber Defense by Improved Communication of Recognized Cyber Threat Situations (ACDICOM; project number 302941) project. ACDICOM is funded by the Norwegian Research Council.

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ask, T.F., Lugo, R.G., Knox, B.J., Sütterlin, S. (2021). Human-Human Communication in Cyber Threat Situations: A Systematic Review. In: Stephanidis, C., et al. HCI International 2021 - Late Breaking Papers: Cognition, Inclusion, Learning, and Culture. HCII 2021. Lecture Notes in Computer Science(), vol 13096. Springer, Cham. https://doi.org/10.1007/978-3-030-90328-2_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-90328-2_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-90327-5

  • Online ISBN: 978-3-030-90328-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics