Cyber Vulnerability: An Attentional Dilemma

  • Joseph B. Lyons
  • Mark A. Roebke
  • Philip BobkoEmail author
  • Craig A. Cox
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10910)


Cyber security remains an ominous task for the military. Generating awareness of some cyber challenges is daunting, yet aspects of cyber vulnerabilities are often ambiguous to everyday operators. Many of these challenges have been documented in prior papers. The current effort focused on two studies which describe levels of general awareness of cyber challenges among students (a typical age range for entry-level military operators). The studies asked participants to evaluate aerial images and to determine if the images had been degraded. Following a positive degradation identification, participants were asked to list the reason for the perceived degradation by drawing from a set of four options. The option related to cyber attack was proportionally used much less than the others, even in the context of an explicit experimental prime to motivate cyber awareness and vulnerabilities. The implications for these results for interactions with autonomous systems are discussed.


Cyber security Trust in automation Suspicion Military 


  1. 1.
    Bobko, P., Barelka, A.J., Hirshfield, L.: The construct of state-level suspicion: a model and research agenda for automated and information technology contexts. Hum. Factors 56, 489–508 (2014)CrossRefGoogle Scholar
  2. 2.
    Defense Science Board (DSB) Task Force on the Role of Autonomy in Department of Defense (DoD) Systems. Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics, Washington, DC (2012)Google Scholar
  3. 3.
    Defense Science Board (DSB) Summer Study on Autonomy. Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics, Washington, DC (2016)Google Scholar
  4. 4.
    Hirshfield, L., Bobko, P., Barelka, A.J., Costa, M.R., Funke, G.J., Mancuso, V.F., Finomore, V., Knott, B.A.: The role of human operators’ suspicion in the detection of cyber attacks (2015)CrossRefGoogle Scholar
  5. 5.
    IBM. The 2013 IBM Cyber Security Intelligence Index (2013)Google Scholar
  6. 6.
    Lyons, J.B.: Being transparent about transparency: a model for human-robot interaction. In: Sofge, D., Kruijff, G.J., Lawless, W.F. (eds.) Trust and Autonomous Systems: Papers from the AAAI Spring Symposium (Technical Report SS-13-07). AAAI Press, Menlo Park (2013)Google Scholar
  7. 7.
    Lyons, J.B., Clark, M.A., Wagner, A., Schuelke, M.J.: Certifiable trust in autonomous systems: making the intractable tangible. AI Mag. 38, 37–49 (2017)CrossRefGoogle Scholar
  8. 8.
    Lyons, J.B., Ho, N.T., Van Abel, A.L., Hoffmann, L.C., Eric Fergueson, W., Sadler, G.G., Grigsby, M.A., Burns, A.C.: Exploring trust barriers to future autonomy: a qualitative look. In: Cassenti, Daniel N. (ed.) AHFE 2017. AISC, vol. 591, pp. 3–11. Springer, Cham (2018). Scholar
  9. 9.
    Ponemon Institute. 2013 Cost of Data Breach Study: Global Analysis (2013)Google Scholar
  10. 10.
    Rice, S.: Examining single and multiple-process theories of trust in automation. J. Gen. Psychol. 136, 303–319 (2009)CrossRefGoogle Scholar
  11. 11.
    Veinot, B., Anders, S., Dominguez, C.: Identifying dimensions of trustworthiness in analyst’s operational environments. Technical report delivered to the Air Force Research Laboratory (2013)Google Scholar
  12. 12.
    Vieane, A., Funke, G., Gutzwiller, R., Mancuso, V., Sawyer, B., Wickens, C.: Addressing human factors gaps in cyber defense. In: Proceedings of the Human Factors and Ergonomics 2016 Annual Meeting, pp. 769–772 (2016)CrossRefGoogle Scholar
  13. 13.
    Vieane, A., Funke, G., Mancuso, V., Greenlee, E., Dye, G., Borghetti, B., Miller, B., Menke, L., Brown, R.: Coordinated displays to assist cyber defenders. In: Proceedings of the Human Factors and Ergonomics 2016 Annual Meeting, pp. 344–348 (2016)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  • Joseph B. Lyons
    • 1
  • Mark A. Roebke
    • 2
  • Philip Bobko
    • 3
    Email author
  • Craig A. Cox
    • 4
  1. 1.Air Force Research Laboratory, WPAFBDaytonUSA
  2. 2.Air Force Institute of TechnologyDaytonUSA
  3. 3.Gettysburg CollegeGettysburgUSA
  4. 4.Air Force Life Cycle Management CenterDaytonUSA

Personalised recommendations