"Cybersecurity Computer-Based Training and Technical Communication Design"
Lysandwr McNaryLysandwr McNary graduated from New Mexico Tech in spring of 2013 with a Bachelor of Science degree in Technical Communication, after years spent in varied pursuits, from book publisher to United States Army Psychological Operations Specialist. Her time with the US Army, including two years in Iraq, provided many opportunities for studying cybersecurity, communication, and human behavior. Contents |
REFERENCES Abawajy, Jemal, and Tai-hoon Kim (2010)."Performance Analysis of Cyber Security Awareness Delivery Methods” Security Technology, Disaster Recovery and Business Continuity. Eds. Kim, Tai-hoon, et al. Vol. 122. Communications in Computer and Information Science: Springer Berlin Heidelberg. 142-48. Print. Anderson, Paul V (2003). Technical Communication: A Reader-Centered Approach. Canada: Thomson Wadsworth. Print. Araki, Marci, and Saul Carliner (2008). "What the Literature Says About Using Game Worlds and Social Worlds in Cyberspace for Communicating Technical and Educational Content." Technical Communication 55.3 . 251-60. Print. Army Doctrine and Training Bulletin, Vol. 2, No. 4, Winter 1999 http://www.army.forces.gc.ca/caj/documents/vol_02/iss_4/CAJ_vol2.4_04_e.pdf Accessed March 2013. Bronack, Stephen C., et al. (2008) "Designing Virtual Worlds to Facilitate Meaningful Communication." Technical Communication 55.3. 261-69. Print. Chaparro, Barbara, A. Dawn Shaikh, and J. Ryan Baker. ” Reading Online Text with a Poor Layout: Is Performance Worse?” Software Usability Research Laboratory, Wichita State University. http://usabilitynews.org/reading-online-text-with-a-poor-layout-is-performance-worse. Accessed March 2013. Clark, Ruth C, and Richard E. Mayer (2008). E-learning and the Science of Instruction: Proven Guidelines for Consumers and Designers of Multimedia Learning. San Francisco, CA: Pfeiffer. Print. Crystal, Abe (2007). "Facets Are Fundamental: Rethinking Information Architecture Frameworks." Technical Communication 54.1. 16-26. Print. Defense Information Systems Agency (DISA) “Defense Information Assurance Training and Awareness Products”. http://iase.disa.mil/eta/product_description.pdf. Accessed March 2013. Defense Information Systems Agency (DISA) “Information Assurance Support Environment Privacy and Security Notice”. http://iase.disa.mil/privacy_notice.html. Accessed March 2013. Department of Homeland Security Information Systems Security Line of Business Security and Awareness Training (DHS ISS LoB SAT) http://www.dhs.gov/information-systems-security-line-business-security-and-awareness-training . Accessed March 2013. Department of Homeland Security (DHS) Reporting Metrics http://www.dhs.gov/xlibrary/assets/nppd/ciofismametricsfinal.pdf . Accessed March 2013. Eyman, Douglas. "Computer Gaming and Technical Communication." Technical Communication 55.3 (2008): 242-50. Print. Fisher, Lori (2000). “How Technical Communicators Can Apply User-Centered Design to Their Work” Usability Interface 7:2. Accessed via http://www.stcsig.org/usability/newsletter/0010-applyingucd.html March 2013. Ford, Julie Dyke, and Richard K. Mott (2007). "The Convergence of Technical Communication and Information Architecture: Creating Single-Source Objects for Contemporary Media." Technical Communication 54.3 . 333-42. Print. Furman, S. M., et al. (2012) "Basing Cybersecurity Training on User Perceptions." Security & Privacy, IEEE 10.2 . 40-49. Print. Greitzer, Frank L., Olga Anna Kuchar, and Kristy Huston (2007). "Cognitive Science Implications for Enhancing Training Effectiveness in a Serious Gaming Context." J. Educ. Resour. Comput. 7.3. 2. Print Greitzer, F. L., et al. (2008) "Combating the Insider Cyber Threat." Security & Privacy, IEEE 6.1 . Accessed November 2012. IASE DISA. “ Cyber Security Awareness Challenge.” http://iase.disa.mil/eta/cyberchallenge/launchPage.htm . Accessed March 2013. The Internet Explorer 8 Countdown. http://theie8countdown.com/ . Accessed March 2013. Lentz, Leo, and Menno De Jong. "How Do Experts Assess Usability Problems? An Empirical Analysis of Cognitive Shortcuts." Technical Communication 56.2 (2008): 111-21. Print. NIST, Computer Security Division. http://csrc.nist.gov/groups/SMA/fisma/compliance.html Accessed March 2013. Office of Management and Budget Memo 12.20.2012 ( http://www.whitehouse.gov/sites/default/files/omb/memoranda/2012/m-12-20.pdf ) Accessed March 2013. Padmanabhan, Poornima.(2008) "Exploring Human Factors in Virtual Worlds." Technical Communication 55.3. 270-76. Print. Padmanabhan, Poornima. (2009) "Goal-Based Scenarios." Technical Communication 56.2 (2009): 132-36. Print. Paretti, M.C. (2006) “Audience awareness: leveraging problem-based learning to teach workplace communication practices”. IEEE Transactions on Professional Communication 49:2. 189-198. Print. Russell, Mark “Using Eye-Tracking Data to Understand First Impressions of a Website”. Software Usability Research Laboratory, Wichita State University. http://usabilitynews.org/using-eye-tracking-data-to-understand-first-impressions-of-a-website . Accessed March 2013. Willems, C. and C. Meinel. Online Assessment for Hands-on Cyber Security Training in a Virtual Lab. Global Engineering Education Conference (EDUCON), 2012 IEEE. 17-20 April 2012 Print. Williams, Sean D. ed. (2008) "3d Virtual Worlds and Technical Communication." Technical Communication 55.3. 239-41. Print. Williams, Thomas R. (2000) “Guidelines for Designing and Evaluating the Display of Information on the Web.” Technical Communication Third Quarter. 383–396. Wilson, Mark, and Joan Hash. (2003) “Building an Information Technology Security Awareness Training Program”. National Institute of Standards and Technology. Special Publication 800-50. Print. Wilson, Mark, Kevin Stine and Pauline Bowen. (2009) “Information Security Training Requirements: A Role- and Performance-Based Model (Draft)”. National Institute of Standards and Technology, Special Publication 800-16. Print. Yoon, S.W. J.D. Velasquez, and S. Y. Nof. (2010) "Computer-Based Collaborative Training for Transportation Security and Emergency Response." Computers in Industry 61.4. 380-89. Print. Yoon, S.W., J.D. Velasquez, B.K. Partridge, S.Y. Nof. (2008) “Transportation security decision support system for emergency response: a training prototype.” Decision Support Systems 46 (1). 139–148. Print. |