Skip to main content

Training Cyber Security Exercise Facilitator: Behavior Modeling Based on Human Error

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 782))

Abstract

Exercise facilitators are essential in the field of cybersecurity training. They provide useful insights to the exercise participants while guiding the group discussion. During the exercise conducted at the Nagoya Institute of Technology, the variation of exercise deliverables was observed due to the un-even facilitation. In this paper, facilitation error was studied by modeling the error behavior as the error of omission and commission. The quality of the facilitation was evaluated based on the error occurrence.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. LaPiedra, J.: The Information Security Process Prevention. Detection and Response, Global Information Assurance Certification Paper, GIAC directory of certified professionals (2011)

    Google Scholar 

  2. Critical Infrastructure Cybersecurity.: Framework for Improving Critical Infrastructure Cybersecurity. Framework 1, 11 (2014)

    Google Scholar 

  3. Ota, Y., Aoyama, T., Koshijima, I.: Cyber incident exercise for safety protection in critical infrastructure. In: 13th Global Congress on Process Safety, San Antonio, USA (2017)

    Google Scholar 

  4. Aoyama, T., Watanabe, K., Koshijima, I., Hashimoto, Y.: Developing a cyber incident communication management exercise for CI stakeholders. In: 11th International Conference on Critical Information Infrastructures Security, Paris, France, pp. 13–24 (2016)

    Chapter  Google Scholar 

  5. Ota, Y., Aoyama, T., Davaadorj, N., Koshijima, I.: Cyber incident exercise for safety protection in critical infrastructure. Int. J. Saf. Secur. Eng. 8(2), 246–257 (2018)

    Article  Google Scholar 

  6. Hirai, H., Aoyama, T., Davaadorj, N., Koshijima, I.: Framework for Cyber Incident Response Training, Safety and Security Engineering VII, Rome, Italy, pp. 273–283 (2017)

    Google Scholar 

  7. “Facilitation.” Cambridge business English dictionary. https://dictionary.cambridge.org/dictionary/english/facilitation

  8. Hmelo-Silver, C.E., Howard, S.B.: Goals and strategies of a problem-based learning facilitator. Interdisc. J. Prob. Based Learn. 1(1), 4 (2006)

    Google Scholar 

  9. Miranda, S.M., Robert, P.: Bostrom.: Meeting facilitation: process versus content interventions. J. Manag. Inf. Syst. 15(4), 89–114 (1999)

    Article  Google Scholar 

  10. Shirai, Y., Washio, A., Shimomura, T.: Role of Facilitators in Group Learning in Higher Education, pp. 109–118 (2012). (in Japanese)

    Google Scholar 

  11. Roger, S.: The Skilled Facilitator: A Comprehensive Resource for Consultants, Facilitators, Managers, Trainers, and Coaches (2002)

    Google Scholar 

  12. Hori, K.: Organizational change facilitator (2006). (Japanese) Toyo, Keizai

    Google Scholar 

  13. Donald, V.M., Deborah, D.T.: Basics of Learning facilitation (2015). (Japanese) Kazuaki, K. translation

    Google Scholar 

  14. Boyd, J.R.: The essence of winning and losing. Unpublished Lecture Notes 12(23), 123–125 (1996)

    Google Scholar 

  15. Osinga, F.B.: Science, Strategy and War: The Strategic Theory of John Boyd. Routledge, Abingdon (2007)

    Google Scholar 

  16. James, R.: Human Error. Cambridge University Press, Cambridge (1990)

    Google Scholar 

  17. Swain, A.D.: Accident sequence evaluation program: human reliability analysis procedure. No. NUREG/CR-4772; SAND-86-1996. Sandia National Labs., Albuquerque, NM (USA); Nuclear Regulatory Commission, Washington, DC (USA). Office of Nuclear Regulatory Research (1987)

    Google Scholar 

  18. Nakamura, T.: Human error from psychological perspective, pp. 29–32 (2009). (in Japanese)

    Google Scholar 

  19. Isc2.org. Global Cybersecurity Workforce Shortage to Reach 1.8 Million as Threats Loom Larger and Stakes Rise Higher (2017). https://www.isc2.org/News-and-Events/Press-Room/Posts/2017/06/07/2017-06-07-Workforce-Shortage. Accessed 2 Mar 2018

Download references

Acknowledgments

This research is partially supported by the Ministry of Education, Science, Sports and Culture, Grant-in-Aid for Scientific Research (A), No. 16H01837 (2016) and Council for Science, Technology and Innovation (CSTI), Cross-ministerial Strategic Innovation Promotion Program (SIP), “Cyber-Security for Critical Infrastructure” (Funding Agency: NEDO), however, all remaining errors are attributable to the authors.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shiho Taniuchi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Taniuchi, S., Aoyama, T., Asai, H., Koshijima, I. (2019). Training Cyber Security Exercise Facilitator: Behavior Modeling Based on Human Error. In: Ahram, T., Nicholson, D. (eds) Advances in Human Factors in Cybersecurity. AHFE 2018. Advances in Intelligent Systems and Computing, vol 782. Springer, Cham. https://doi.org/10.1007/978-3-319-94782-2_14

Download citation

Publish with us

Policies and ethics