Kirsi Helkala, Benjamin Knox, Øyvind Jøsok, Silje Knox and Mass Lund
The purpose of this study is to investigate how motivation – gained by understanding the purpose of specific cyber-oriented tasks – coping strategies and level of physical…
Abstract
Purpose
The purpose of this study is to investigate how motivation – gained by understanding the purpose of specific cyber-oriented tasks – coping strategies and level of physical conditioning can affect cognitive abilities amongst cyber officer cadets.
Design/methodology/approach
Two cognitive tests (2014 and 2015) and coping strategy questionnaires (2015) were conducted during an annual military exercise involving increased levels of stress and hardship (physical and cognitive) over a sustained two-week period.
Findings
Motivation – gained by task explanations – and the conscious use of the “control” strategy can have a positive effect on individual performance in cyber tasks.
Research limitations/implications
The participants were all young adults with higher-than-average levels of physical fitness. From the outset, all participants were highly motivated and disciplined having entered cyber officer training after successfully completing a thorough selection process.
Practical implications
The results of this study are to be better implemented to the activities at the military academy.
Social implications
The closest civilian occupational equivalent is a computer network operations (CNO)-operator. The findings could be implemented into their daily work routines.
Originality/value
Cognitive tests used in this study are based on recognized general cognitive tests. However, modifications were made to suit the cyber task context, making the test original. The cyber officer is a contemporary concept currently lacking research.
Details
Keywords
Kirsi Helkala and Tone Hoddø Bakås
The purpose of this paper is to extend the results of a Norwegian password security survey. Research, especially in the early 21st century, has shown that education is needed to…
Abstract
Purpose
The purpose of this paper is to extend the results of a Norwegian password security survey. Research, especially in the early 21st century, has shown that education is needed to change people’s behaviour regarding password generation, management and storage. As our daily routines and duties have become more dependent on electronic services in the last decade, one could think that qualitative education is nowadays given to users. This survey is to verify that assumption.
Methodology
A nation-wide demographic survey among employees in Norway with a sample of 1,003 respondents at the ages of 18-64 years was conducted in October 2012.
Findings
The results show that the education or proper guidance seldom is given leading to the outdated users’ behaviour.
Research limitations
The results of the study are limited to the employed only and they do not explain behaviour of students, teenagers or children.
Social implications
During the current year, the results of the study have been discussed several times in national media and, hopefully, have an impact to employees’ behaviour. The results have also been used in the National Security Month campaign in October 2013.
Originality/value
The questionnaire itself is not unique. However, the large amount of respondents gives higher value to the results.
Details
Keywords
Kirsi Helkala and Einar Snekkenes
The purpose of this paper is to present a new method for ranking authentication products. Using this method, issues such as technical performance, application/system‐specific…
Abstract
Purpose
The purpose of this paper is to present a new method for ranking authentication products. Using this method, issues such as technical performance, application/system‐specific requirements, cost and usability are addressed. The method simplifies and makes the selection process more transparent by identifying issues that are important when selecting products.
Design/methodology/approach
The paper used quantitative cost and performance analysis.
Findings
The method can be widely applied, allowing the comparison and ranking of an extensive variety of authentication products (passwords, biometrics, tokens). The method can be used for both product selection and the process of product development as supported by the case studies.
Originality/value
This is a work that demonstrates how to compare authentication methods from different categories. A novel ranking method has been developed which allows the comparison of different authentication products in a defined usage scenario.