<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.3 20070202//EN" "journalpublishing.dtd">
<article xml:lang="EN" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="review-article">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Neuroergon.</journal-id>
<journal-title>Frontiers in Neuroergonomics</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Neuroergon.</abbrev-journal-title>
<issn pub-type="epub">2673-6195</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="doi">10.3389/fnrgo.2023.1104873</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Neuroergonomics</subject>
<subj-group>
<subject>Review</subject>
</subj-group>
</subj-group>
</article-categories>
<title-group>
<article-title>A review of cyber vigilance tasks for network defense</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author" corresp="yes">
<name><surname>Guidetti</surname> <given-names>Oliver Alfred</given-names></name>
<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
<xref ref-type="aff" rid="aff2"><sup>2</sup></xref>
<xref ref-type="aff" rid="aff3"><sup>3</sup></xref>
<xref ref-type="corresp" rid="c001"><sup>&#x0002A;</sup></xref>
<uri xlink:href="http://loop.frontiersin.org/people/1800814/overview"/>
</contrib>
<contrib contrib-type="author">
<name><surname>Speelman</surname> <given-names>Craig</given-names></name>
<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
<xref ref-type="aff" rid="aff3"><sup>3</sup></xref>
<uri xlink:href="http://loop.frontiersin.org/people/75558/overview"/>
</contrib>
<contrib contrib-type="author">
<name><surname>Bouhlas</surname> <given-names>Peter</given-names></name>
<xref ref-type="aff" rid="aff4"><sup>4</sup></xref>
</contrib>
</contrib-group>
<aff id="aff1"><sup>1</sup><institution>Edith Cowan University</institution>, <addr-line>Joondalup, WA</addr-line>, <country>Australia</country></aff>
<aff id="aff2"><sup>2</sup><institution>Cyber Security Cooperative Research Centre</institution>, <addr-line>Perth, WA</addr-line>, <country>Australia</country></aff>
<aff id="aff3"><sup>3</sup><institution>Experimental Psychology Unit</institution>, <addr-line>Perth, WA</addr-line>, <country>Australia</country></aff>
<aff id="aff4"><sup>4</sup><institution>Western Australian Department of the Premier and Cabinet</institution>, <addr-line>Perth, WA</addr-line>, <country>Australia</country></aff>
<author-notes>
<fn fn-type="edited-by"><p>Edited by: Sara Riggs, University of Virginia, United States</p></fn>
<fn fn-type="edited-by"><p>Reviewed by: Fernando Gabriel Luna, National University of Cordoba, Argentina; Hasan AL-Nashash, American University of Sharjah, United Arab Emirates</p></fn>
<corresp id="c001">&#x0002A;Correspondence: Oliver Alfred Guidetti <email>o.guidetti&#x00040;ecu.edu.au</email></corresp>
<fn fn-type="other" id="fn001"><p>This article was submitted to Cognitive Neuroergonomics, a section of the journal Frontiers in Neuroergonomics</p></fn></author-notes>
<pub-date pub-type="epub">
<day>18</day>
<month>04</month>
<year>2023</year>
</pub-date>
<pub-date pub-type="collection">
<year>2023</year>
</pub-date>
<volume>4</volume>
<elocation-id>1104873</elocation-id>
<history>
<date date-type="received">
<day>22</day>
<month>11</month>
<year>2022</year>
</date>
<date date-type="accepted">
<day>29</day>
<month>03</month>
<year>2023</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#x000A9; 2023 Guidetti, Speelman and Bouhlas.</copyright-statement>
<copyright-year>2023</copyright-year>
<copyright-holder>Guidetti, Speelman and Bouhlas</copyright-holder>
<license xlink:href="http://creativecommons.org/licenses/by/4.0/"><p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</p></license></permissions>
<abstract>
<p>The capacity to sustain attention to virtual threat landscapes has led cyber security to emerge as a new and novel domain for vigilance research. However, unlike classic domains, such as driving and air traffic control and baggage security, very few vigilance tasks exist for the cyber security domain. Four essential challenges that must be overcome in the development of a modern, validated cyber vigilance task are extracted from this review of existent platforms that can be found in the literature. Firstly, it can be difficult for researchers to access confidential cyber security systems and personnel. Secondly, network defense is vastly more complex and difficult to emulate than classic vigilance domains such as driving. Thirdly, there exists no single, common software console in cyber security that a cyber vigilance task could be based on. Finally, the rapid pace of technological evolution in network defense correspondingly means that cyber vigilance tasks can become obsolete just as quickly. Understanding these challenges is imperative in advancing human factors research in cyber security.</p>
<sec>
<title>CCS categories</title>
<p>Human-centered computing&#x0007E;Human computer interaction (HCI)&#x0007E;HCI design and evaluation methods.</p></sec></abstract>
<kwd-group>
<kwd>vigilance</kwd>
<kwd>tasks</kwd>
<kwd>cyber defense</kwd>
<kwd>Security Event Information Management</kwd>
<kwd>vigilance decrement</kwd>
<kwd>sustained attention response task</kwd>
</kwd-group>
<counts>
<fig-count count="1"/>
<table-count count="3"/>
<equation-count count="0"/>
<ref-count count="116"/>
<page-count count="11"/>
<word-count count="10919"/>
</counts>
</article-meta>
</front>
<body>
<sec sec-type="intro" id="s1">
<title>Introduction</title>
<p>The weakest link in modern network defense are the natural limitations of the human operators who work in security operations centers (Thomason, <xref ref-type="bibr" rid="B96">2013</xref>; Cavelty, <xref ref-type="bibr" rid="B14">2014</xref>). These limitations are neuropsychological in their origin, and mostly impact the human attentional system, which interacts with cognitive design elements of cyber security software. These elements of design include signal salience, event rate, cognitive load, and workload transitions (Parasuraman, <xref ref-type="bibr" rid="B65">1979</xref>, <xref ref-type="bibr" rid="B66">1985</xref>). The executive resources required to sustain vigilant attention to network defense systems are an order of magnitude greater than in classic vigilance domains, such as air traffic control, nuclear plant monitoring and baggage security (Wickens et al., <xref ref-type="bibr" rid="B111">1997</xref>; Hancock and Hart, <xref ref-type="bibr" rid="B38">2002</xref>; Chappelle et al., <xref ref-type="bibr" rid="B15">2013</xref>; Gartenberg et al., <xref ref-type="bibr" rid="B30">2015</xref>; Reinerman-Jones et al., <xref ref-type="bibr" rid="B75">2016</xref>). The volume, diversity, specificity, and evolution rate of threats in the cyber landscape make network defense an extremely cognitively demanding task (D&#x00027;Amico et al., <xref ref-type="bibr" rid="B18">2005</xref>).</p>
<p>Classic vigilance research first involved creating a laboratory simulation of the operational sustained attention problem (Cunningham and Freeman, <xref ref-type="bibr" rid="B16">1994</xref>; Smith, <xref ref-type="bibr" rid="B87">2016</xref>; Joly et al., <xref ref-type="bibr" rid="B49">2017</xref>; Valdez, <xref ref-type="bibr" rid="B101">2019</xref>). For example, Mackworth&#x00027;s (<xref ref-type="bibr" rid="B53">1948</xref>, <xref ref-type="bibr" rid="B54">1950</xref>) clock test was used to simulate the task demands associated with World War 2 radar operation. Because vigilance performance is task specific, the study of vigilance decrement in network defense analysts necessitates a test bed specifically designed to emulate the cognitive demands associated with real world cyber security (Satterfield et al., <xref ref-type="bibr" rid="B79">2019</xref>). In this regard however, a gap has been identified in the tools available to investigate cyber vigilance decrement. Specifically, a validated cyber vigilance task that probes each of Parasuraman&#x00027;s (<xref ref-type="bibr" rid="B65">1979</xref>, <xref ref-type="bibr" rid="B66">1985</xref>) parameters does not currently exist. This gap in the literature could hinder the application of wider human factors research, such as methods of tracking or intervening in vigilance decrement, from the lab into applied domains such as cyber security (Al-Shargie et al., <xref ref-type="bibr" rid="B6">2019</xref>; Yahya et al., <xref ref-type="bibr" rid="B113">2020</xref>). For example, Parasuraman&#x00027;s (<xref ref-type="bibr" rid="B65">1979</xref>, <xref ref-type="bibr" rid="B66">1985</xref>) parameters of a valid vigilance tasks were derived long before modern network defense, it hence remains a similarly unexplored question if these parameters alone constitute a vigilance task valid in cyber security. Similarly, Bodala et al. (<xref ref-type="bibr" rid="B11">2016</xref>) demonstrated that integrating challenging features into vigilance task stimuli was a useful method of enhancing sustained attention. However, the task Bodala utilized was not designed to emulate the cognitive demands associated with modern cyber defense. Hence, it remains a standing question if the vigilance performance enhanced by greater challenge integration on Bodala&#x00027;s task would extend to cyber security. However, this question cannot be probed without a modern, validated cyber vigilance task in which the challenging parameters of stimuli can be controlled. The main goal of this review is therefore to understand several factors that may explain this gap in the literature, including access and confidentiality, task complexity, non-standard operating environments, and rapid obsolescence.</p></sec>
<sec id="s2">
<title>Background</title>
<p>Situational awareness refers to the perception, comprehension, and projection of the threats within an environment across time and space (Endsley and Kiris, <xref ref-type="bibr" rid="B23">1995</xref>; Wickens, <xref ref-type="bibr" rid="B109">2008</xref>). The term cyber-cognitive situational awareness specifically refers to human operators&#x00027; awareness of threats distributed across virtual landscapes (Gutzwiller et al., <xref ref-type="bibr" rid="B35">2015</xref>). For the purposes of brevity, the term &#x0201C;cyber-cognitive situational awareness&#x0201D; is referred to here as &#x0201C;situational awareness.&#x0201D;</p>
<p>Network defense analysts must pay close consistent attention to Security Event Information Management Systems (SEIMs), which are used to establish and support situational awareness of cyber threat landscapes (Komlodi et al., <xref ref-type="bibr" rid="B50">2004</xref>; Spathoulas and Katsikas, <xref ref-type="bibr" rid="B90">2010</xref>, <xref ref-type="bibr" rid="B91">2013</xref>; Tyworth et al., <xref ref-type="bibr" rid="B100">2012</xref>; Albayati and Issac, <xref ref-type="bibr" rid="B2">2015</xref>; Newcomb and Hammell, <xref ref-type="bibr" rid="B62">2016</xref>). SEIMs summarize anomalous and potentially malicious patterns of network traffic as sets of alarms, or alerts, which analysts must individually investigate as potential cyber threats (Barford et al., <xref ref-type="bibr" rid="B9">2010</xref>; Spathoulas and Katsikas, <xref ref-type="bibr" rid="B90">2010</xref>, <xref ref-type="bibr" rid="B91">2013</xref>; Gaw, <xref ref-type="bibr" rid="B31">2014</xref>; Newcomb and Hammell, <xref ref-type="bibr" rid="B62">2016</xref>). Analysts&#x00027; capacity to sustain attention to their SEIM therefore constrains their situational awareness of the cyber threat landscape being protected (Endsley and Kiris, <xref ref-type="bibr" rid="B23">1995</xref>; Gutzwiller et al., <xref ref-type="bibr" rid="B35">2015</xref>; Wickens et al., <xref ref-type="bibr" rid="B110">2015</xref>).</p>
<p>Situational awareness hinges on the capacity to sustain attention to threats distributed across cyber threat landscapes (Endsley and Kiris, <xref ref-type="bibr" rid="B23">1995</xref>; Barford et al., <xref ref-type="bibr" rid="B9">2010</xref>). In the context of network security, analysts use SEIMs to perceive and act on threats to protected cyber infrastructures (Gutzwiller et al., <xref ref-type="bibr" rid="B35">2015</xref>). SEIM threat detection is a tedious, monotonous task that requires analysts to sustain high levels of attention for prolonged periods of time (Fathi et al., <xref ref-type="bibr" rid="B26">2017</xref>; Nanay, <xref ref-type="bibr" rid="B61">2018</xref>).</p>
<p>Distinguishing between malicious and benign SEIM alerts is not dissimilar to the search for a needle in a haystack (Erola et al., <xref ref-type="bibr" rid="B25">2017</xref>). Analysts sift through vast numbers of SEIM alerts, most of which are false positives, just to identify and act on a small number of malicious threats (Sawyer et al., <xref ref-type="bibr" rid="B80">2016</xref>). Although SEIM threat detection is initially easy to perform, analyst mistakes invariably accumulate with time spent distinguishing between malicious and benign element signals (Sawyer et al., <xref ref-type="bibr" rid="B80">2016</xref>). This gradual decline in sustained attention is known as <italic>vigilance decrement</italic>; it occurs when the brain is required to sustain a high level of workload processing activity for longer than its energy reserves can support (Sawyer et al., <xref ref-type="bibr" rid="B80">2016</xref>). Establishing and sustaining situational awareness in a cyber security operations center, requires that analysts sustain vigilant attention to their SEIM dashboards for prolonged periods of time (Wall and Williams, <xref ref-type="bibr" rid="B103">2013</xref>). However, vigilance decrement has become an increasingly disruptive influence in operational network defense analysts whose role requires the use of SEIM to hunt for threats in the cyber landscape (Chappelle et al., <xref ref-type="bibr" rid="B15">2013</xref>; Wall and Williams, <xref ref-type="bibr" rid="B103">2013</xref>).</p>
<p>Vigilance refers to the capacity an individual has to sustain conscious processing of repetitive, unpredictable stimuli without habituation or distraction (Pradhapan et al., <xref ref-type="bibr" rid="B71">2017</xref>). Vigilance is regarded as a state of alertness to rare and unpredictably frequent stimuli (Pradhapan et al., <xref ref-type="bibr" rid="B71">2017</xref>). When attention is sustained for a prolonged period, human processing limitations lead to compounding performance failures, the phenomenon known as vigilance decrement (Sawyer and Hancock, <xref ref-type="bibr" rid="B81">2018</xref>; Warm et al., <xref ref-type="bibr" rid="B105">2018</xref>). For example, drivers must sustain vigilance in attuning and responding to hazards on the road (Zheng et al., <xref ref-type="bibr" rid="B114">2019</xref>). A driver experiencing vigilance decrement, however, will be less capable of responding to road hazards (Gopalakrishnan, <xref ref-type="bibr" rid="B32">2012</xref>). Hence, failure to sustain attention to road hazards is the leading cause of thousands of road deaths each year (Gopalakrishnan, <xref ref-type="bibr" rid="B32">2012</xref>). Depending upon the context, vigilance decrement can manifest either as an increased reaction time to detect critical signals or as a reduction in their correct detection (Warm et al., <xref ref-type="bibr" rid="B105">2018</xref>). For example, during World War Two, British radar operators were required to monitor their terminals over prolonged periods of time for &#x0201C;blips&#x0201D; that indicated the presence of Axis U-boats. Despite their training and motivation to avoid Axis invasion, these operators began to miss critical U-boat signals after only half an hour of monitoring (Mackworth, <xref ref-type="bibr" rid="B53">1948</xref>, <xref ref-type="bibr" rid="B54">1950</xref>). Mackworth (<xref ref-type="bibr" rid="B53">1948</xref>, <xref ref-type="bibr" rid="B54">1950</xref>) was commissioned by the Royal Air Force to study the problem, in what would become seminal vigilance research.</p>
<p>Mackworth (<xref ref-type="bibr" rid="B53">1948</xref>, <xref ref-type="bibr" rid="B54">1950</xref>) devised a &#x0201C;Clock Test&#x0201D; that simulated the Royal Air Force&#x00027;s radar displays. This comprised of a black pointer that traced along the circumference of a blank, featureless clock-type face in 0.3-inch increments per second. At random points during the task, the radar pointer would increment twice in a row as a way of simulating the detection of a <italic>U</italic>-boat. Mackworth (<xref ref-type="bibr" rid="B53">1948</xref>, <xref ref-type="bibr" rid="B54">1950</xref>) tasked observers with detecting these double jumps by pressing a button when one was seen. Despite the clarity of Mackworth&#x00027;s (<xref ref-type="bibr" rid="B53">1948</xref>, <xref ref-type="bibr" rid="B54">1950</xref>) target signals, correct detections declined by 10% in the first 30 min of the 2-h-long task. This gradual drop in correct signal detection was the first laboratory demonstration of vigilance decrement. The phenomenon has since been demonstrated as one of the most ubiquitous and consistently replicated findings in the vigilance literature (Baker, <xref ref-type="bibr" rid="B8">1959</xref>; Mackworth, <xref ref-type="bibr" rid="B52">1968</xref>; Sostek, <xref ref-type="bibr" rid="B89">1978</xref>; Parasuraman and Mouloua, <xref ref-type="bibr" rid="B67">1987</xref>; Dember et al., <xref ref-type="bibr" rid="B19">1992</xref>; Warm and Dember, <xref ref-type="bibr" rid="B104">1998</xref>; Pattyn et al., <xref ref-type="bibr" rid="B68">2008</xref>; Epling et al., <xref ref-type="bibr" rid="B24">2016</xref>).</p>
<p>Laboratory vigilance tasks require correctly identifying rare target stimuli in an array for a prolonged period (Daly et al., <xref ref-type="bibr" rid="B17">2017</xref>). Vigilance decrement typically onsets within 15 min of sustained attention, however it has been reported in as little as 8 min under particularly demanding situations (Helton et al., <xref ref-type="bibr" rid="B43">1999</xref>; St John et al., <xref ref-type="bibr" rid="B92">2006</xref>).</p>
<p>Vigilance decrement has only recently received recognition in the human-factors literature, as a cyber incident risk factor (Chappelle et al., <xref ref-type="bibr" rid="B15">2013</xref>; Mancuso et al., <xref ref-type="bibr" rid="B56">2014</xref>). For example, network defense analysts who experience vigilance decrement will decline in their capacity to attune to, detect, and act against threats presented in a SEIM console (McIntire et al., <xref ref-type="bibr" rid="B59">2013</xref>). Vigilance decrement is therefore a human factor bottleneck to the protective benefit of SEIM software. That is, the cyber protection offered by SEIM software is bottlenecked by the capacity of its operators to sustain vigilant attention to the information it presents. Managing vigilance decrement first necessitates a nuanced understanding of the factors which contribute to declines in sustained attention to network defense consoles (McIntire et al., <xref ref-type="bibr" rid="B59">2013</xref>). This may explain why current attempts to manage vigilance decrement in the human factors literature have focused on developing unobtrusive psychophysiological monitoring methods for indicating when the capacity to sustain attention capacity begins to decline (McIntire et al., <xref ref-type="bibr" rid="B59">2013</xref>; Mancuso et al., <xref ref-type="bibr" rid="B56">2014</xref>; Sawyer et al., <xref ref-type="bibr" rid="B80">2016</xref>). However, the psychophysiological correlates of cyber vigilance decrement may not be adequately understood without an experimental test bed that accurately simulates the cognitive demands associated with modern network defense (McIntire et al., <xref ref-type="bibr" rid="B59">2013</xref>; Mancuso et al., <xref ref-type="bibr" rid="B57">2015</xref>; Sawyer et al., <xref ref-type="bibr" rid="B80">2016</xref>).</p>
<p>The review that follows identifies limitations in experimental platforms that could be used to conduct human-in-the-loop studies of cyber vigilance decrement, and challenges that need to be overcome to fill this gap. The only cyber vigilance tasks documented in the literature to date are owned by The United States Air Force and are outdated simulations of the demands associated with modern network defense (McIntire et al., <xref ref-type="bibr" rid="B59">2013</xref>; Mancuso et al., <xref ref-type="bibr" rid="B57">2015</xref>; Sawyer et al., <xref ref-type="bibr" rid="B80">2016</xref>). Beyond researchers, an accessible experimental test bed for human-in-the-loop studies of cyber vigilance decrement could also provide utility to business, government, and militaries, by informing training, selection, and software development standards (Alhawari et al., <xref ref-type="bibr" rid="B4">2012</xref>; Ormrod, <xref ref-type="bibr" rid="B64">2014</xref>).</p>
<sec>
<title>Review significance</title>
<p>As reliance on global cyber networks continues to grow, the extent of the impact of their compromise will also increase (Ben-Asher and Gonzalez, <xref ref-type="bibr" rid="B10">2015</xref>; Goutam, <xref ref-type="bibr" rid="B34">2015</xref>). Ensuring the security of these systems hinges on the optimized performance of human network defenders (Thomason, <xref ref-type="bibr" rid="B96">2013</xref>; Cavelty, <xref ref-type="bibr" rid="B14">2014</xref>). Lapses in network defender attention therefore have the potential to cripple the cyber infrastructure being guarded (Thomason, <xref ref-type="bibr" rid="B96">2013</xref>; Cavelty, <xref ref-type="bibr" rid="B14">2014</xref>). This includes virtual and physical military assets, governmental assets, central banking networks, stock market infrastructure as well as national power and telecommunications grids (Gordon et al., <xref ref-type="bibr" rid="B33">2011</xref>; Jolley, <xref ref-type="bibr" rid="B48">2012</xref>; Saltzman, <xref ref-type="bibr" rid="B78">2013</xref>; Ormrod, <xref ref-type="bibr" rid="B64">2014</xref>; Hicks, <xref ref-type="bibr" rid="B45">2015</xref>; Skopik et al., <xref ref-type="bibr" rid="B86">2016</xref>; Rajan et al., <xref ref-type="bibr" rid="B72">2017</xref>). The integrity of these assets hinges on measuring and mitigating neurocognitive inefficiencies in network defenders&#x00027; capacity to sustain vigilant attention to cyber security command and control consoles (Maybury, <xref ref-type="bibr" rid="B58">2012</xref>). Managing the risk associated with cyber vigilance decrement will enhance the defense of critical global cyber infrastructures (Maybury, <xref ref-type="bibr" rid="B58">2012</xref>; Wall and Williams, <xref ref-type="bibr" rid="B103">2013</xref>). However, cyber vigilance tasks that allow researchers to study the decrement in network defense are not currently accessible to researchers (Maybury, <xref ref-type="bibr" rid="B58">2012</xref>; McIntire et al., <xref ref-type="bibr" rid="B59">2013</xref>; Mancuso et al., <xref ref-type="bibr" rid="B57">2015</xref>; Sawyer et al., <xref ref-type="bibr" rid="B80">2016</xref>).</p></sec></sec>
<sec id="s3">
<title>Cyber vigilance decrement</title>
<p>In under 20 min, a fully trained, motivated, and experienced network defense analyst&#x00027;s capacity to identify threats in their SEIM can begin to decline (McIntire et al., <xref ref-type="bibr" rid="B59">2013</xref>). From a technological perspective, this phenomenon, known as vigilance decrement, has arisen in the cyber domain due to the gradual rise in the volume, diversity and specificity of data that network analysts must process to identify and act upon threats (D&#x00027;Amico et al., <xref ref-type="bibr" rid="B18">2005</xref>).</p>
<p>Cyber vigilance decrement has emerged as a defining human factor of network security (Tian et al., <xref ref-type="bibr" rid="B97">2004</xref>; Maybury, <xref ref-type="bibr" rid="B58">2012</xref>; Aleem and Ryan Sprott, <xref ref-type="bibr" rid="B3">2013</xref>; Wall and Williams, <xref ref-type="bibr" rid="B103">2013</xref>; Franke and Brynielsson, <xref ref-type="bibr" rid="B28">2014</xref>; Gutzwiller et al., <xref ref-type="bibr" rid="B35">2015</xref>; Vieane et al., <xref ref-type="bibr" rid="B102">2016</xref>). For example, prevalence denial attacks involve flooding the SEIM of a target network with huge volumes of innocuous, non-malicious signals designed to intentionally induce vigilance decrement in defense analysts (Vieane et al., <xref ref-type="bibr" rid="B102">2016</xref>). Once in this less attentive state, bad actors can improve their chance of implementing a successful attack on the target network (Vieane et al., <xref ref-type="bibr" rid="B102">2016</xref>). Vigilance decrement is therefore a cyber-cognitive security vulnerability which must be studied and managed like any other vulnerability in network defense (Tian et al., <xref ref-type="bibr" rid="B97">2004</xref>; Aleem and Ryan Sprott, <xref ref-type="bibr" rid="B3">2013</xref>; Wall and Williams, <xref ref-type="bibr" rid="B103">2013</xref>; Vieane et al., <xref ref-type="bibr" rid="B102">2016</xref>).</p>
<sec>
<title>Existing cyber vigilance tasks</title>
<p>Whilst Google Scholar is not a database, it was chosen as the driving methodology for this review for its capacity to broadly scan wide breadths of academic literature (Tong and Thomson, <xref ref-type="bibr" rid="B98">2015</xref>). Studies were only included in this review if they presented a sustained attention task specifically designed to emulate the cognitive demands associated with operating a cyber security console, like the SEIM software that network defense analysts use to sustain situational awareness of virtual threat landscapes. This process yielded only three examples in the literature of an experimental test bed that researchers could use to study vigilance decrement in network defense (McIntire et al., <xref ref-type="bibr" rid="B59">2013</xref>; Mancuso et al., <xref ref-type="bibr" rid="B57">2015</xref>; Sawyer et al., <xref ref-type="bibr" rid="B80">2016</xref>).</p>
<p>The Cyber Defense Task (CDT) that McIntire et al. (<xref ref-type="bibr" rid="B59">2013</xref>) presented was the formative example of a cyber vigilance task in the literature. Mancuso et al. (<xref ref-type="bibr" rid="B57">2015</xref>) and Sawyer et al. (<xref ref-type="bibr" rid="B80">2016</xref>) followed soon after with their presentation of the Mancuso Cyber Defense Task (MCDT and MCDT-II). The discussion that follows presents a critical review of the CDT and MCDT. For example, the validity of these tasks as simulations of the demands associated with network defense may have declined between now and when they were published due to evolving complexity in network defense (Gutzwiller et al., <xref ref-type="bibr" rid="B35">2015</xref>). Rapid obsolescence of cyber vigilance tasks may also reflect the need to consider cyber-cognitive parameters of SEIM consoles which, according to Parasuraman (<xref ref-type="bibr" rid="B65">1979</xref>, <xref ref-type="bibr" rid="B66">1985</xref>), influence the probability of vigilance decrement. Hence any research based on existent platforms may not generalize well beyond the lab, let alone beyond the context of military cyber defense for which they were designed.</p>
<sec>
<title>McIntire&#x00027;s Cyber Defense Task (CDT)</title>
<p>McIntire et al.&#x00027;s (<xref ref-type="bibr" rid="B59">2013</xref>) formative CDT aimed to psychophysiologically identify the onset of vigilance decrement in a laboratory cyber-defense task. Although successful in monitoring vigilance performance, several methodological issues make it difficult to generalize McIntire et al.&#x00027;s (<xref ref-type="bibr" rid="B59">2013</xref>) results to operational cyber defense. For instance, McIntire et al.&#x00027;s (<xref ref-type="bibr" rid="B59">2013</xref>) sample comprised 20 military and civilian cyber defenders who participated in four, 40-min trials of the CDT. It is possible that the civilian participants McIntire et al. (<xref ref-type="bibr" rid="B59">2013</xref>) sampled did not have the same motivations or stressors as the active duty subset of their sample (Finomore et al., <xref ref-type="bibr" rid="B27">2009</xref>). This compromise was however understandable, as cyber defense analysts are a difficult population to sample from, and the task did not require prior cyber defense training (Zhong et al., <xref ref-type="bibr" rid="B116">2003</xref>, <xref ref-type="bibr" rid="B115">2015</xref>; Rajivan et al., <xref ref-type="bibr" rid="B74">2013</xref>).</p>
<p>The CDT was designed to simulate the cognitive demands associated with modern network defense. It is not possible to completely appraise the CDT as a cyber vigilance task, as only a brief account of the software was documented in the literature (McIntire et al., <xref ref-type="bibr" rid="B59">2013</xref>; Sherwood et al., <xref ref-type="bibr" rid="B84">2016</xref>). In addition, McIntire et al. (<xref ref-type="bibr" rid="B59">2013</xref>) and Sherwood et al. (<xref ref-type="bibr" rid="B84">2016</xref>) are the only studies that have made use of the CDT, and both were sponsored by the United States Air Force Research Laboratory (AFRL). Though it cannot be confirmed, it is possible that the CDT has been retained for the AFRL&#x00027;s exclusive research use, which limits the degree of scientific enquiry that can be made into cyber vigilance decrement on this task.</p>
<p>As described in McIntire et al. (<xref ref-type="bibr" rid="B59">2013</xref>), the CDT involved two subtasks that participants concurrently completed during the cyber vigilance task. The CDT&#x00027;s textual component required the participant to monitor and report the presence of three suspicious IP addresses and port combinations (Figure 2 in McIntire et al., <xref ref-type="bibr" rid="B59">2013</xref>). Participants had to memorize these IP addresses beforehand and press a button to indicate when one was observed. The second component of McIntire et al.&#x00027;s (<xref ref-type="bibr" rid="B59">2013</xref>) CDT was graphical and presented concurrently with the first textual component. Participants were presented with a live graph of simulated network traffic, which they monitored in case a threshold value, indicated by a red horizontal line, was exceeded (Figure 2 in McIntire et al., <xref ref-type="bibr" rid="B59">2013</xref>). Participants indicated when traffic exceeded this limit by pressing a button.</p>
<p>McIntire et al. (<xref ref-type="bibr" rid="B59">2013</xref>) observed vigilance decrement in CDT performance, which also correlated with a series of ocular parameters that they recorded using an eye tracker. Participants&#x00027; blink frequency and duration, eye closure percentage, pupil diameter, eccentricity, and velocity were all recorded as they performed the CDT. These measurements all correlated with changes in CDT performance over time, a result which accorded with an abundance of studies on vigilance while driving (Thiffault and Bergeron, <xref ref-type="bibr" rid="B94">2003a</xref>,<xref ref-type="bibr" rid="B95">b</xref>; Tan and Zhang, <xref ref-type="bibr" rid="B93">2006</xref>; D&#x00027;Orazio et al., <xref ref-type="bibr" rid="B22">2007</xref>; Sommer and Golz, <xref ref-type="bibr" rid="B88">2010</xref>; Jo et al., <xref ref-type="bibr" rid="B47">2014</xref>; Aidman et al., <xref ref-type="bibr" rid="B1">2015</xref>; Cabrall et al., <xref ref-type="bibr" rid="B13">2016</xref>; Zheng et al., <xref ref-type="bibr" rid="B114">2019</xref>).</p></sec>
<sec>
<title>Validity concerns with the CDT</title>
<p>It was unclear if the ocular changes that McIntire et al. (<xref ref-type="bibr" rid="B59">2013</xref>) correlated with time spent on the CDT would extend beyond this laboratory analog, which is not as cognitively demanding as network defense in the real-world (Donald, <xref ref-type="bibr" rid="B21">2008</xref>; Reinerman-Jones et al., <xref ref-type="bibr" rid="B76">2010</xref>; Chappelle et al., <xref ref-type="bibr" rid="B15">2013</xref>; Hancock, <xref ref-type="bibr" rid="B37">2013</xref>). The complexity of network defense could explain why existing cyber vigilance tasks are considered oversimplified (Rajivan et al., <xref ref-type="bibr" rid="B74">2013</xref>; DoD, <xref ref-type="bibr" rid="B20">2014</xref>; Gutzwiller et al., <xref ref-type="bibr" rid="B36">2016</xref>; Rajivan and Cooke, <xref ref-type="bibr" rid="B73">2017</xref>). For instance, eleven key service skills are required by the United States Department of Defense network defense analysts (DoD, <xref ref-type="bibr" rid="B20">2014</xref>). These cores skills include cryptology, oversight and compliance, reporting, cyber security, computer science, network exploitation, and technology operations (DoD, <xref ref-type="bibr" rid="B20">2014</xref>). A case could be made that the CDT did require the use of reporting oversight and compliance, however eight of the 11 core skills were not built into McIntire et al.&#x00027;s (<xref ref-type="bibr" rid="B59">2013</xref>) task. In contrast, Mackworth&#x00027;s (<xref ref-type="bibr" rid="B53">1948</xref>, <xref ref-type="bibr" rid="B54">1950</xref>) clock test accurately simulated every feature of the radar operator&#x00027;s task except for the presence of actual <italic>U</italic>-boats. Therefore, even by the DoD&#x00027;s (<xref ref-type="bibr" rid="B20">2014</xref>) own standard, it would be generous to suggest the CDT is a passable simplification of real-life Cyber Defense Task demands.</p>
<p>The brevity of McIntire et al. (<xref ref-type="bibr" rid="B59">2013</xref>) 40-min-long trials also make the CDT&#x00027;s external validity unclear. In terms of laboratory vigilance investigations, 40 min is a typical period for performing a vigilance task (See et al., <xref ref-type="bibr" rid="B83">1995</xref>; Helton et al., <xref ref-type="bibr" rid="B43">1999</xref>; Warm et al., <xref ref-type="bibr" rid="B107">2008</xref>, <xref ref-type="bibr" rid="B106">2009</xref>; See, <xref ref-type="bibr" rid="B82">2014</xref>). However, Chappelle et al. (<xref ref-type="bibr" rid="B15">2013</xref>) reported that active-duty cyber-defenders work for 51 h per week, or 10.5 h per day, with extremely limited rest breaks. Thus, the demands associated with a 40-min vigilance task are not analogous to a 10.5 h work day that Chappelle et al. (<xref ref-type="bibr" rid="B15">2013</xref>) observed to induce clinically significant levels of stress and burnout (O&#x00027;Connell, <xref ref-type="bibr" rid="B63">2012</xref>; Mancuso et al., <xref ref-type="bibr" rid="B57">2015</xref>). By comparison to the rest of their day, the 40-min CDT could possibly have been a welcome respite for McIntire et al.&#x00027;s (<xref ref-type="bibr" rid="B59">2013</xref>) the active service participants. It is hence unclear how externally valid the ocular changes that McIntire et al. (<xref ref-type="bibr" rid="B59">2013</xref>) associated with vigilance performance are, and how well these might extend across the standard 8&#x02013;10-h shifts served by real-world cyber defenders.</p>
<p>The external validity of McIntire et al.&#x00027;s (<xref ref-type="bibr" rid="B59">2013</xref>) study further suffered from insufficient control of confounding blue light exposure. A considerable proportion of the light emitted by many modern computer monitors is in the form of high-frequency blue light, and it is possible that the United States Air Force outfits their cyber defenders with these common tools (Lockley et al., <xref ref-type="bibr" rid="B51">2006</xref>; Hatori et al., <xref ref-type="bibr" rid="B40">2017</xref>). Blue light suppresses melatonin and actively increases the capacity to sustain attention on vigilance tasks in a dose-dependent fashion (Lockley et al., <xref ref-type="bibr" rid="B51">2006</xref>; Holzman, <xref ref-type="bibr" rid="B46">2010</xref>). Since this effect is dose-dependent, the longer cyber defenders are exposed to the blue light of their computer monitors, the greater vigilance performance could be expected to improve (Lockley et al., <xref ref-type="bibr" rid="B51">2006</xref>). In a real-world cyber defense setting, analysts are exposed to 1,200 times the blue light exposure than the participants in McIntire et al. (<xref ref-type="bibr" rid="B59">2013</xref>). The vigilance performance enhancement provided by so much more blue light exposure may have rendered measuring the phenomenon far more than McIntire et al. (<xref ref-type="bibr" rid="B59">2013</xref>) suggested. Thus, the results reported by McIntire et al. (<xref ref-type="bibr" rid="B59">2013</xref>) may not generalize beyond the laboratory to the real-world (Reinerman-Jones et al., <xref ref-type="bibr" rid="B76">2010</xref>; Hancock, <xref ref-type="bibr" rid="B37">2013</xref>).</p>
<p>These largely technological critiques of the CDT&#x00027;s validity were overshadowed by the fact that McIntire et al.&#x00027;s task was not validated according to Parasuraman&#x00027;s (<xref ref-type="bibr" rid="B65">1979</xref>, <xref ref-type="bibr" rid="B66">1985</xref>) parameters of valid vigilance tasks. The first component of the CDT required that participants retain and recall three &#x0201C;suspicious&#x0201D; IP addresses from memory as they attempt each critical signal discrimination. This set of textual critical signals increased their participants&#x00027; cognitive load while performing the CDT. However, because each critical CDT signal was considered in isolation, there was a gradual decline in cognitive load as time on the task increases. This is not the case in real world network defense. Operational analysts consider the alerts presented over their SEIM relative to one another within the wider virtual threat landscape (Heeger, <xref ref-type="bibr" rid="B41">1997</xref>, <xref ref-type="bibr" rid="B42">2007</xref>; Alserhani et al., <xref ref-type="bibr" rid="B5">2010</xref>; Bridges, <xref ref-type="bibr" rid="B12">2011</xref>; Majeed et al., <xref ref-type="bibr" rid="B55">2019</xref>). For example, if a SEIM becomes flooded with benign alerts in a brief window of time, this can represent the beginning of a prevalence denial attack, as such, analysts must consider each benign alert in the context of all others presented by their system (Sawyer et al., <xref ref-type="bibr" rid="B80">2016</xref>; Vieane et al., <xref ref-type="bibr" rid="B102">2016</xref>). Cognitive load hence does not decline with time on task in operational network defense, whereas it does so in McIntire et al.&#x00027;s (<xref ref-type="bibr" rid="B59">2013</xref>) CDT. It cannot therefore be claimed that vigilance decrement underlies the performance deficits observed by McIntire et al. (<xref ref-type="bibr" rid="B59">2013</xref>) on the CDT with any validity.</p>
<p>The frequency that alerts are presented to analysts by a SEIM is known as the event, or incident, rate (Simmons et al., <xref ref-type="bibr" rid="B85">2013</xref>). The SEIM event rate communicates important information surrounding threatening elements distributed through the virtual threat landscape to analysts. For example, consider the rate that SEIM alerts occur at 2 am on Christmas Day against that observed at 11 am on a regular weekday. SEIM alerts are generally more frequent during the working week than during the holiday season (Pompon et al., <xref ref-type="bibr" rid="B70">2018</xref>; Rodriguez and Okamura, <xref ref-type="bibr" rid="B77">2019</xref>). Therefore, if the event rate at 2 am on Christmas Day even closely approximates that which is usually seen at 11 am on a weekday, this will influence how an analyst contextualizes and subsequently actions each SEIM alert. Even if every Christmas day SEIM alert is benign, the atypical event rate would influence the level of imminent risk perceived by an analyst in the virtual threat landscape (Vieane et al., <xref ref-type="bibr" rid="B102">2016</xref>).</p>
<p>Event rate in real world network defense hence guides the way network defense analysts contextualize and then action SEIM alerts. This element of network defense was not captured by the CDT because McIntire et al. (<xref ref-type="bibr" rid="B59">2013</xref>) set the event rate to be a controlled variable. In an operational setting, analysts would also consider how quickly each &#x0201C;suspicious&#x0201D; IP address was presented in forming their threat level appraisal (Simmons et al., <xref ref-type="bibr" rid="B85">2013</xref>). This further decreases the CDT&#x00027;s validity as a cyber vigilance task, as a fixed event rate may have impacted analysts&#x00027; cognitive engagement with each potentially critical signal. That is, McIntire et al.&#x00027;s (<xref ref-type="bibr" rid="B59">2013</xref>) participants needed to recruit fewer executive resources at a slower rate than their operational peers. It is therefore unclear if the performance deficits observed by McIntire et al. (<xref ref-type="bibr" rid="B59">2013</xref>) on the CDT resembled those observed during operational network defense.</p>
<p>Two types of critical signal were presented in the CDT, each via a different modality. The first type of critical signal was textual, in the form of three &#x0201C;suspicious&#x0201D; IP addresses that participants had to remember (McIntire et al., <xref ref-type="bibr" rid="B59">2013</xref>). The second type of critical signal presented in the CDT was graphical and required no memory activation (McIntire et al., <xref ref-type="bibr" rid="B59">2013</xref>). Although McIntire et al. (<xref ref-type="bibr" rid="B59">2013</xref>) had the requisite data to compare vigilance performance between the two critical signal modalities they did not report this comparison. Had vigilance performance varied between the graphical and textual critical signals, an argument could be made that this would demonstrate CDT performance sensitivity to signal salience. However, this would have been a tenuous argument at best, as the two signals were presented in vastly different ways. The CDT&#x00027;s textual critical signals were presented in a simultaneous fashion, which used participants&#x00027; memory resources every time a discrimination was made. Simultaneous vigilance tasks require minimal executive resource activation because critical signal discriminations are based on sequential comparative judgements (Gartenberg et al., <xref ref-type="bibr" rid="B30">2015</xref>, <xref ref-type="bibr" rid="B29">2018</xref>). By comparison, the CDT&#x00027;s graphical critical signals were presented successively. Successive vigilance tasks are associated with a degree of cognitive workload above that of simultaneous tasks because operators must retain and recall critical signal information from memory before a discrimination can be made (Gartenberg et al., <xref ref-type="bibr" rid="B30">2015</xref>, <xref ref-type="bibr" rid="B29">2018</xref>). The primary deficiency of the CDT was fundamentally due to not being validated according to Parasuraman&#x00027;s (<xref ref-type="bibr" rid="B65">1979</xref>, <xref ref-type="bibr" rid="B66">1985</xref>) vigilance task validity parameters. Similar deficiencies have also been found in Mancuso et al.&#x00027;s (<xref ref-type="bibr" rid="B57">2015</xref>) Cyber Defense Task.</p></sec>
<sec>
<title>Mancuso et al.&#x00027;s Cyber Defense Task (MCDT)</title>
<p>The MCDT presented network traffic logs in a waterfall display which their participants needed to read and action. Traffic logs contained four pieces of information, including two possible methods used to transmit data across the network, as well as the size, source, and destination of the transmission. A &#x0201C;signature&#x0201D; referred to a specific configuration of these four traffic log details that suggests malicious network activity. Mancuso et al.&#x00027;s (<xref ref-type="bibr" rid="B57">2015</xref>) participants first needed to commit the details of a signature associated with a fictitious hacker to memory. They then had to identify any traffic log presented to them that matched at least three out of four items of the hacker&#x00027;s signature. The number of items within each log that matched the hacker&#x00027;s signature defined the color by which it was presented in the MCDT (Figure 1 in Mancuso et al., <xref ref-type="bibr" rid="B57">2015</xref>). Mancuso et al. (<xref ref-type="bibr" rid="B57">2015</xref>) justified color coding each target to better resemble the systems used by the United States Air Force (Figure 1 in Mancuso et al., <xref ref-type="bibr" rid="B57">2015</xref>). Logs that matched 0, 1, 2, 3, or all four elements of the hacker&#x00027;s signature were respectively colored, green, blue, violet, purple, and red in the MCDT. Of these, only purple and red logs were critical targets that the participant had to action.</p></sec>
<sec>
<title>Validity concerns with the MCDT</title>
<p>The MCDT was designed similarly to McIntire et al.&#x00027;s (<xref ref-type="bibr" rid="B59">2013</xref>) CDT. For instance, the task maintained a fixed critical signal probability of 20%. However, fixed task demands such as this are difficult to generalize to real world operations (Helton et al., <xref ref-type="bibr" rid="B44">2004</xref>). Primarily, this is because vigilance is sensitive to task demands, and in cyber defense, these fluctuate between great extremes (Helton et al., <xref ref-type="bibr" rid="B44">2004</xref>; Chappelle et al., <xref ref-type="bibr" rid="B15">2013</xref>).</p>
<p>Another questionable feature of the MCDT&#x00027;s validity is that the visual field of view is confined to a single computer monitor. In real world cyber security contexts, SEIMs require multiple monitors to portray the network&#x00027;s security status. Multiple monitors are pragmatically necessary due to the volume, diversity, and specificity of virtual threat data that analysts are required to handle (D&#x00027;Amico et al., <xref ref-type="bibr" rid="B18">2005</xref>). Hence, Mancuso et al.&#x00027;s (<xref ref-type="bibr" rid="B57">2015</xref>) limited field of view restricted the range of cyber threat stimuli that could be sampled from real world operations for use in their cyber vigilance task. This detracted from the MCDT&#x00027;s external validity as a cyber vigilance task.</p>
<p>In addition, the color coding system that Mancuso et al. (<xref ref-type="bibr" rid="B57">2015</xref>) incorporated into the MCDT obscured the cognitive load participants experienced when discriminating between critical and non-critical traffic logs. For example, the volume and type of information required to discriminate critical MCDT traffic logs, both with and without color coding, is compared in Figure 1 in Mancuso et al. (<xref ref-type="bibr" rid="B57">2015</xref>).</p>
<p>Under the color coded system, participants needed to remember only two graphical elements of information, namely that the color of critical logs was indicated by red or purple (<xref ref-type="table" rid="T1">Table 1</xref> and Figure 1 in Mancuso et al., <xref ref-type="bibr" rid="B57">2015</xref>). This is in contrast with a colorless MCDT, where critical signals could only be identified when the participant remembered four elements of salient threat information in the hacker&#x00027;s signature. Because Mancuso et al.&#x00027;s (<xref ref-type="bibr" rid="B57">2015</xref>) participants had two ways of interpreting the MCDT&#x00027;s signals, this made the cognitive load associated with the task unclear. There could be no way of knowing if Mancuso et al.&#x00027;s (<xref ref-type="bibr" rid="B57">2015</xref>) participants analyzed each traffic log based on its color alone, or if they analyzed all four threat salient elements of information. Color coding the MCDT&#x00027;s signals therefore detracted from its external validity. That is, rather than bolstering the MCDT&#x00027;s external validity, Mancuso et al.&#x00027;s (<xref ref-type="bibr" rid="B57">2015</xref>) color coding system instead served to confound the cognitive load associated with the task.</p>
<table-wrap position="float" id="T1">
<label>Table 1</label>
<caption><p>Comparison of the MCDT with and without color coded signals.</p></caption> 
<table frame="box" rules="all">
<thead>
<tr style="background-color:#919497">
<th valign="top" align="left"><bold>MCDT</bold></th>
<th valign="top" align="left"><bold>Comparisons required to reach a decision</bold></th>
<th valign="top" align="left"><bold>Critical signal decision rule</bold></th>
<th valign="top" align="left"><bold>Critical signal working memory load</bold></th>
</tr>
</thead>
<tbody> <tr>
<td valign="top" align="left">Without color coding</td>
<td valign="top" align="left">Does the hacker&#x00027;s transmission method match the traffic log? Does the hacker&#x00027;s transmission size match the traffic log? Does the hacker&#x00027;s transmission source match the traffic log? Does the hacker&#x00027;s transmission destination match the traffic log?</td>
<td valign="top" align="left">If three out of four traffic log elements match the hacker&#x00027;s signature, then indicate the presence of a critical signal.</td>
<td valign="top" align="left">The participant needed to keep track of between 3 and 4 traffic log elements that might match the hacker&#x00027;s signature.</td>
</tr>
<tr>
<td valign="top" align="left">With color coding</td>
<td valign="top" align="left">Only red and purple colored traffic logs are critical. White, green, and blue traffic logs can be ignored.</td>
<td valign="top" align="left">If a traffic log is color coded as red or purple, then indicate the presence of a critical signal.</td>
<td valign="top" align="left">The participant only needed to remember two colors, red and purple</td>
</tr>
</tbody>
</table>
</table-wrap></sec>
<sec>
<title>Sawyer et al.&#x00027;s MCDT-II</title>
<p>Sawyer et al. (<xref ref-type="bibr" rid="B80">2016</xref>) used a modified form of the MCDT to investigate the impact of event rate and signal salience on cyber vigilance performance. For the purposes of discussion Sawyer et al.&#x00027;s (<xref ref-type="bibr" rid="B80">2016</xref>) modified MCDT will be referred to as the MCDT-II. The MCDT-II presented network traffic logs to participants in a colorless waterfall display. In the original MCDT, these traffic logs detailed four threat salient pieces of information, namely, transmission method, size, source, and destination. Sawyer et al. (<xref ref-type="bibr" rid="B80">2016</xref>) adapted these traffic logs in the MCDT-II to include the source IP address, the source port, the destination IP address, and the destination port of each transmission (Figure 1 in Sawyer et al., <xref ref-type="bibr" rid="B80">2016</xref>). Each network traffic log in the MCDT-II contained the IP address and communication port numbers for both the source and destination of a data transmission across a hypothetical network. Two new traffic logs appeared periodically at the top of the MCDT-II&#x00027;s display. The critical signal that participants needed be vigilant of was any instance in which a top row IP address and port number-pairs matched an existing traffic log already present on the display (see Figure 1 in Sawyer et al., <xref ref-type="bibr" rid="B80">2016</xref>).</p>
<p>Unlike McIntire et al. (<xref ref-type="bibr" rid="B59">2013</xref>) and Mancuso et al. (<xref ref-type="bibr" rid="B57">2015</xref>), Sawyer et al. (<xref ref-type="bibr" rid="B80">2016</xref>) attempted to validate their cyber vigilance task according to two of Parasuraman&#x00027;s (<xref ref-type="bibr" rid="B65">1979</xref>, <xref ref-type="bibr" rid="B66">1985</xref>) parameters, namely, event rate and signal salience. Sawyer et al. (<xref ref-type="bibr" rid="B80">2016</xref>) formed four experimental conditions based on two levels of event rate and signal salience, respectively (<xref ref-type="table" rid="T2">Table 2</xref>). Sawyer et al. (<xref ref-type="bibr" rid="B80">2016</xref>) reported reductions in vigilance performance when critical MCDT-II signals were low in signal salience, slowly presented, or both. Sawyer et al. (<xref ref-type="bibr" rid="B80">2016</xref>) observed a gradual decline in the mean percentage of correctly identified MCDT-II signals. Moreover, in accordance with Parasuraman (<xref ref-type="bibr" rid="B65">1979</xref>, <xref ref-type="bibr" rid="B66">1985</xref>), Sawyer et al. (<xref ref-type="bibr" rid="B80">2016</xref>) found that these reductions in performance were mediated by the signal salience and event rate of the MCDT-II.</p>
<table-wrap position="float" id="T2">
<label>Table 2</label>
<caption><p>Levels of event rate and signal salience examined by Sawyer et al. (<xref ref-type="bibr" rid="B80">2016</xref>).</p></caption> 
<table frame="box" rules="all">
<thead>
<tr style="background-color:#919497">
<th valign="top" align="left"><bold>Signal salience</bold></th>
<th valign="top" align="left"><bold>Event rate</bold></th>
<th valign="top" align="center"><bold>Condition</bold></th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left" rowspan="2">Low (5% chance).</td>
<td valign="top" align="left">Slow (eight events per minute).</td>
<td valign="top" align="center">Low.Slow.</td>
</tr>
 <tr>
<td valign="top" align="left">Fast (16 events per minute).</td>
<td valign="top" align="center">Low.Fast.</td>
</tr> <tr>
<td valign="top" align="left" rowspan="2">High (20% chance).</td>
<td valign="top" align="left">Slow (eight events per minute).</td>
<td valign="top" align="center">High.Slow.</td>
</tr>
<tr>
<td valign="top" align="left">Fast (16 events per minute).</td>
<td valign="top" align="center">High.Fast.</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>With the possible exception of the High.Fast condition, Sawyer observed changes in vigilance performance that align with vigilance decrement (<xref ref-type="fig" rid="F1">Figure 1</xref>). Each condition Sawyer et al. (<xref ref-type="bibr" rid="B80">2016</xref>) tested was composed of variations in event rate and signal salience. Sawyer et al. (<xref ref-type="bibr" rid="B80">2016</xref>) observed that event rate had a greater influence over vigilance performance at baseline than signal salience. For example, vigilance performance under both slow conditions was higher than in the fast conditions after 10 min. However, signal salience appeared to have the greater influence by the end of the trial. For example vigilance performance in both slow and fast high signal salience condition outperformed what Sawyer et al. (<xref ref-type="bibr" rid="B80">2016</xref>) observed in the low signal salience condition. Sawyer et al. (<xref ref-type="bibr" rid="B80">2016</xref>) also reported variations in signal salience and event rate influenced trajectory of vigilance performance across all four conditions. For example, after &#x0007E;30 min, Sawyer et al. (<xref ref-type="bibr" rid="B80">2016</xref>) reported sharp declines in the trajectory of vigilance performance observed under both low signal salience conditions (<xref ref-type="fig" rid="F1">Figure 1</xref>). In contrast, Sawyer et al. (<xref ref-type="bibr" rid="B80">2016</xref>) reported more linear declines in vigilance performance under the high signal salienc econditions. However, this linear decline varied drastically between the High.Slow and High.Fast conditions. For example, vigilance performance under the High.Fast condition only changed by 0.52% from baseline. In contrast, vigilance performance under the High.Slow condition dropped by 15.62%, which more closely approximates the average decline across all conditions, which came to &#x0007E;14.85%.</p>
<fig id="F1" position="float">
<label>Figure 1</label>
<caption><p>MCDT-II performance Sawyer et al. (<xref ref-type="bibr" rid="B80">2016</xref>) reported.</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="fnrgo-04-1104873-g0001.tif"/>
</fig>
<p>Differing compositions of signal salience and event rate also resulted in clear level differences in vigilance performance. For example, vigilance performance in the Low.Fast condition was the lowest acros the entire duration of the task, and also had the lowest final final value. By the end of the task, the level of the High.Slow, Low.Slow and High.Fast vigilance performance curves all appear approximately similar at around 77.5%. The only exception to this was the value of the Low. Fast condition, which ended at almost half of all other conditions, at 43.75%. Sawyer et al. (<xref ref-type="bibr" rid="B80">2016</xref>) therefore demonstrated that variations in event rate and signal salience influenced the way vigilance decrement presented throughout the entire MCDT-II. Sensitivity to signal salience and event rate are just two of Parasuraman&#x00027;s (<xref ref-type="bibr" rid="B65">1979</xref>, <xref ref-type="bibr" rid="B66">1985</xref>) three parameters that characterize a valid vigilance task. Sensitivity to cognitive load was Parasuraman&#x00027;s (<xref ref-type="bibr" rid="B65">1979</xref>, <xref ref-type="bibr" rid="B66">1985</xref>) third parameter of a valid vigilance, which was a controlled variable in Sawyer et al. (<xref ref-type="bibr" rid="B80">2016</xref>). The MCDT-II was therefore only partially validated as a cyber vigilance task.</p></sec></sec></sec>
<sec id="s4">
<title>Challenges of developing cyber vigilance tasks</title>
<sec>
<title>Access and confidentiality</title>
<p>Like many security sub domains, network defense analysts and their workplaces can be difficult to access for the purposes of research (Paul, <xref ref-type="bibr" rid="B69">2014</xref>; Gutzwiller et al., <xref ref-type="bibr" rid="B35">2015</xref>). It can therefore be difficult to obtain details about Cyber Security Operations Centers&#x00027; operational procedures or SEIM software console, as these are extremely sensitive corporate information that many enterprises would be hesitant about sharing with outsiders (Paul, <xref ref-type="bibr" rid="B69">2014</xref>). This information is, however, crucial to the development of a cyber vigilance task. Access and confidentiality can therefore hinder the process of designing a vigilance task that accurately parallels the operational cognitive demands of network defense (Paul, <xref ref-type="bibr" rid="B69">2014</xref>). In contrast, Mackworth (<xref ref-type="bibr" rid="B53">1948</xref>, <xref ref-type="bibr" rid="B54">1950</xref>) was able to rely on support from the Royal Air Force to create his formative clock vigilance task. For example, the Royal Air Force granted Mackworth direct access to their radar equipment and operators, at a time in history where this critical strategic information would have been closely guarded in Europe after World War Two.</p></sec>
<sec>
<title>Task complexity</title>
<p>The sheer complexity of cyber security may also explain why there are so few vigilance tasks for network defense in the literature. That is, simulating the complex demands of operational network defense is central to the development of a generalizable cyber vigilance task (Reinerman-Jones et al., <xref ref-type="bibr" rid="B76">2010</xref>; Hancock, <xref ref-type="bibr" rid="B37">2013</xref>). This is because the behavioral presentation of vigilance decrement functions according to the domain specific demands of the task being performed (Donald, <xref ref-type="bibr" rid="B21">2008</xref>; Reinerman-Jones et al., <xref ref-type="bibr" rid="B76">2010</xref>; Hancock, <xref ref-type="bibr" rid="B37">2013</xref>). That is, if the demands of an operational vigilance task are not accurately captured by its laboratory analog, then the behavioral presentation of any performance decrement that occurs may not generalize to the operational setting (Donald, <xref ref-type="bibr" rid="B21">2008</xref>; Reinerman-Jones et al., <xref ref-type="bibr" rid="B76">2010</xref>; Hancock, <xref ref-type="bibr" rid="B37">2013</xref>). The predictive validity of laboratory-based vigilance research hence hinges on the degree to which task demands match what is observed operationally (Donald, <xref ref-type="bibr" rid="B21">2008</xref>; Reinerman-Jones et al., <xref ref-type="bibr" rid="B76">2010</xref>; Hancock, <xref ref-type="bibr" rid="B37">2013</xref>; Gutzwiller et al., <xref ref-type="bibr" rid="B35">2015</xref>).</p></sec>
<sec>
<title>Non-standard operating environments</title>
<p>The absence of a validated cyber vigilance task in the literature may also be explained by the fact that network defense analysts are known to customize their work terminals. SEIMs integrate cyber threat intelligence, derived from inbound and outbound network traffic, and present this to analysts, who then action appropriate defensive responses to virtual threats (Tresh and Kovalsky, <xref ref-type="bibr" rid="B99">2018</xref>).</p>
<p>SEIMS are built according to the diverse cyber security needs of specific organizations, and are not engineered according to a common, standardized design. In contrast, Mackworth (<xref ref-type="bibr" rid="B53">1948</xref>, <xref ref-type="bibr" rid="B54">1950</xref>) was able to derived the clock task from real world radar display that was characterized by a standardized design. However, SEIM&#x00027;s are not designed according to a standardized design, and as such, it was not possible to derive a modern cyber vigilance task from a given SEIM in industry in the same way Mackworth&#x00027;s (<xref ref-type="bibr" rid="B53">1948</xref>, <xref ref-type="bibr" rid="B54">1950</xref>) clocks were based on real world radars (Work, <xref ref-type="bibr" rid="B112">2020</xref>).</p>
<p>Further complicating the challenge of designing a modern cyber vigilance task, in addition to non-standard SEIM designs, is the fact that many analysts also customize their personal workstations, a practice that produces radical differences in task performance even within the same cyber security team (Hao et al., <xref ref-type="bibr" rid="B39">2013</xref>). These customisations alter the cognitive load required to use a SEIM, which in turn can alter the behavioral presentation of vigilance decrement.</p></sec>
<sec>
<title>Rapid obsolescence</title>
<p>Like many technology subfields, cyber security is evolving quickly (Gutzwiller et al., <xref ref-type="bibr" rid="B35">2015</xref>). Moreover, the rate of evolution in cyber security is unlike the rate in any other domain in which vigilance decrement has been observed. Rapid evolution in the technological complexity of cyber security may also explain why the literature lacks a modern vigilance task for network defense. Cyber vigilance tasks can become obsolete experimental tools as quickly as the systems they have been designed to emulate (Gutzwiller et al., <xref ref-type="bibr" rid="B35">2015</xref>). For example, although cars vary in the design and layout of their control surfaces, driving has remained a fundamentally unchanged task for decades. In turn, driver vigilance tasks have likewise remained fundamentally the same for decades (Milakis et al., <xref ref-type="bibr" rid="B60">2015</xref>). Hence, unlike cyber security, the validity of driver vigilance tasks is unlikely to degrade over time, as the fundamental elements of the task are also unlikely to change significantly (Gutzwiller et al., <xref ref-type="bibr" rid="B35">2015</xref>).</p>
<p>Cyber security&#x00027;s rapid evolution therefore limits the long-term validity of any vigilance task designed for the space. For example, the single computer monitor used to run McIntire et al.&#x00027;s (<xref ref-type="bibr" rid="B59">2013</xref>) cyber vigilance task shows its age. In comparison to 2013, modern network defense is too complex a task to complete on a single computer monitor, which forces analysts to divide their attention across multiple screens of information (D&#x00027;Amico et al., <xref ref-type="bibr" rid="B18">2005</xref>; Axon et al., <xref ref-type="bibr" rid="B7">2018</xref>). This difference in required screen real estate reflects an evolution in the volume of information that human operators are required to handle in the defense of a network. This in turn reflects growth in the level of cognitive load that analysts must sustain as they hunt for threats distributed across the virtual threat landscape. McIntire et al.&#x00027;s (<xref ref-type="bibr" rid="B59">2013</xref>) single-screen cyber vigilance task therefore inaccurately simulated the demands associated with modern network defense. Furthermore, this suggests that the validity of cyber vigilance tasks may be sensitive to the rapid rate at which the technological tools develop in this space.</p>
<p>Tasks that require routine updates to remain valid are not uncommon in the psychological space. For example, the Wechsler Adult Intelligence Scale is an established psychometric instrument that requires routine updates to minimize reduced validity (Wechsler, <xref ref-type="bibr" rid="B108">2002</xref>). Cyber vigilance tasks might likewise require periodic updates to maintain valid simulators of network defense. Hence McIntire et al.&#x00027;s (<xref ref-type="bibr" rid="B59">2013</xref>) CDT may have reasonably approximated the demands of network security at the time it was published. However, by the standards of modern network defense, McIntire et al.&#x00027;s (<xref ref-type="bibr" rid="B59">2013</xref>) task is outdated. Had the CDT been updated periodically to keep up with developments in network security, this would have preserved some degree of its validity as a vigilance task.</p>
<p><xref ref-type="table" rid="T3">Table 3</xref> summarizes the various challenges McIntire et al. (<xref ref-type="bibr" rid="B59">2013</xref>), Mancuso et al. (<xref ref-type="bibr" rid="B57">2015</xref>), and Sawyer et al. (<xref ref-type="bibr" rid="B80">2016</xref>) encountered in creating a cyber vigilance task. These are challenges future researchers will need to navigate if the gap in the literature left by a modern, validated cyber vigilance task is to ever be addressed.</p>
<table-wrap position="float" id="T3">
<label>Table 3</label>
<caption><p>Cyber vigilance task creation challenges.</p></caption> 
<table frame="box" rules="all">
<thead>
<tr style="background-color:#919497">
<th valign="top" align="left"><bold>Challenge</bold></th>
<th valign="top" align="left"><bold>Challenge mitigation</bold></th>
</tr>
</thead>
<tbody> <tr>
<td valign="top" align="left">Access and confidentiality</td>
<td valign="top" align="left">Gaining access to cyber security organizations and personnel can limit the process of designing and subsequently testing cyber vigilance tasks. However, McIntire et al. (<xref ref-type="bibr" rid="B59">2013</xref>), Mancuso et al. (<xref ref-type="bibr" rid="B57">2015</xref>), and Sawyer et al. (<xref ref-type="bibr" rid="B80">2016</xref>) demonstrated this challenge can be navigated by performing research with cyber industry partners.</td>
</tr> <tr>
<td valign="top" align="left">Task complexity</td>
<td valign="top" align="left">The CDT, MCDT, and MCDT-II that McIntire et al. (<xref ref-type="bibr" rid="B59">2013</xref>), Mancuso et al. (<xref ref-type="bibr" rid="B57">2015</xref>), and Sawyer et al. (<xref ref-type="bibr" rid="B80">2016</xref>) were all oversimplified emulations of network defense consoles, which did not accurately simulate the cognitive demands associated with real world cyber security.</td>
</tr> <tr>
<td valign="top" align="left">Non-standard operating environments</td>
<td valign="top" align="left">It is not possible to base the design of any cyber vigilance task on an operational SEIM, because no single console is standardized across industry.</td>
</tr>
<tr>
<td valign="top" align="left">Rapid obsolescence</td>
<td valign="top" align="left">The pace of technological evolution in cyber security means that the validity of cyber vigilance tasks has a shelf life. As network defense technologies grow increasingly complex, this require consistently updating and revalidating cyber vigilance tasks.</td>
</tr>
</tbody>
</table>
</table-wrap></sec></sec>
<sec sec-type="conclusions" id="s5">
<title>Conclusion</title>
<p>In closing, vigilance decrement is a cyber-cognitive vulnerability which must be better understood to manage it as a human factor security risk. However, advancing our understanding of vigilance decrement in the network defense space necessitates developing experimental testbeds that accommodate access and confidentiality, task complexity, non-standard operating environments, and rapid obsolescence. Moving forward, improving the interaction between SEIM consoles and human network defense analysts, necessitates developing an updated cyber vigilance task that is also valid according to Parasuraman&#x00027;s (<xref ref-type="bibr" rid="B65">1979</xref>, <xref ref-type="bibr" rid="B66">1985</xref>) parameters.</p></sec>
<sec sec-type="author-contributions" id="s6">
<title>Author contributions</title>
<p>All authors listed have made a substantial, direct, and intellectual contribution to the work and approved it for publication.</p></sec>
</body>
<back>
<sec sec-type="funding-information" id="s7">
<title>Funding</title>
<p>This work has been supported by the Cyber Security Research Centre Limited whose activities are partially funded by the Australian Government&#x00027;s Cooperative Research Centres Programme.</p>
</sec>
<sec sec-type="COI-statement" id="conf1">
<title>Conflict of interest</title>
<p>The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
</sec>
<sec sec-type="disclaimer" id="s8">
<title>Publisher&#x00027;s note</title>
<p>All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.</p>
</sec>
<ref-list>
<title>References</title>
<ref id="B1">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Aidman</surname> <given-names>E.</given-names></name> <name><surname>Chadunow</surname> <given-names>C.</given-names></name> <name><surname>Johnson</surname> <given-names>K.</given-names></name> <name><surname>Reece</surname> <given-names>J.</given-names></name></person-group> (<year>2015</year>). <article-title>Real-time driver drowsiness feedback improves driver alertness and self-reported driving performance</article-title>. <source>Accid. Anal. Prev</source>. <volume>81</volume>, <fpage>8</fpage>&#x02013;<lpage>13</lpage>. <pub-id pub-id-type="doi">10.1016/j.aap.2015.03.041</pub-id><pub-id pub-id-type="pmid">25932964</pub-id></citation></ref>
<ref id="B2">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Albayati</surname> <given-names>M.</given-names></name> <name><surname>Issac</surname> <given-names>B.</given-names></name></person-group> (<year>2015</year>). <article-title>Analysis of intelligent classifiers and enhancing the detection accuracy for intrusion detection system</article-title>. <source>Int. J. Comput. Intell. Syst</source>. <volume>8</volume>, <fpage>841</fpage>&#x02013;<lpage>853</lpage>. <pub-id pub-id-type="doi">10.1080/18756891.2015.1084705</pub-id><pub-id pub-id-type="pmid">35746198</pub-id></citation></ref>
<ref id="B3">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Aleem</surname> <given-names>A.</given-names></name> <name><surname>Ryan Sprott</surname> <given-names>C.</given-names></name></person-group> (<year>2013</year>). <article-title>Let me in the cloud: Analysis of the benefit and risk assessment of cloud platform</article-title>. <source>J. Fin. Crime</source> <volume>20</volume>, <fpage>6</fpage>&#x02013;<lpage>24</lpage>. <pub-id pub-id-type="doi">10.1108/13590791311287337</pub-id></citation>
</ref>
<ref id="B4">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Alhawari</surname> <given-names>S.</given-names></name> <name><surname>Karadsheh</surname> <given-names>L.</given-names></name> <name><surname>Talet</surname> <given-names>A. N.</given-names></name> <name><surname>Mansour</surname> <given-names>E.</given-names></name></person-group> (<year>2012</year>). <article-title>Knowledge-based risk management framework for information technology project</article-title>. <source>Int. J. Informat. Manag</source>. <volume>32</volume>, <fpage>50</fpage>&#x02013;<lpage>65</lpage>. <pub-id pub-id-type="doi">10.1016/j.ijinfomgt.2011.07.002</pub-id><pub-id pub-id-type="pmid">19745243</pub-id></citation></ref>
<ref id="B5">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Alserhani</surname> <given-names>F.</given-names></name> <name><surname>Akhlaq</surname> <given-names>M.</given-names></name> <name><surname>Awan</surname> <given-names>I. U.</given-names></name> <name><surname>Cullen</surname> <given-names>A. J.</given-names></name> <name><surname>Mirchandani</surname> <given-names>P.</given-names></name></person-group> (<year>2010</year>). <article-title>&#x0201C;MARS: Multi-stage attack recognition system 2010,&#x0201D;</article-title> in <source>24th IEEE International Conference on Advanced Information Networking and Applications</source> (<publisher-loc>Perth</publisher-loc>). <pub-id pub-id-type="doi">10.1109/AINA.2010.57</pub-id></citation>
</ref>
<ref id="B6">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Al-Shargie</surname> <given-names>F.</given-names></name> <name><surname>Tariq</surname> <given-names>U.</given-names></name> <name><surname>Mir</surname> <given-names>H.</given-names></name> <name><surname>Alawar</surname> <given-names>H.</given-names></name> <name><surname>Babiloni</surname> <given-names>F.</given-names></name> <name><surname>Al-Nashash</surname> <given-names>H.</given-names></name></person-group> (<year>2019</year>). <article-title>Vigilance decrement and enhancement techniques: A review</article-title>. <source>Brain Sci</source>. 9, 178. <pub-id pub-id-type="doi">10.3390/brainsci9080178</pub-id><pub-id pub-id-type="pmid">31357524</pub-id></citation></ref>
<ref id="B7">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Axon</surname> <given-names>L.</given-names></name> <name><surname>Alahmadi</surname> <given-names>B.</given-names></name> <name><surname>Nurse</surname> <given-names>J.</given-names></name> <name><surname>Goldsmith</surname> <given-names>M.</given-names></name> <name><surname>Creese</surname> <given-names>S.</given-names></name></person-group> (<year>2018</year>). <article-title>&#x0201C;Sonification in security operations centres: What do security practitioners think?,&#x0201D;</article-title> <source>The Network and Distributed System Security (NDSS) Symposium 2018</source>. <publisher-loc>San Diego, CA</publisher-loc>. <pub-id pub-id-type="doi">10.14722/usec.2018.23024</pub-id></citation>
</ref>
<ref id="B8">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Baker</surname> <given-names>C.</given-names></name></person-group> (<year>1959</year>). <article-title>Attention to visual displays during a vigilance task: II. Maintaining the level of vigilance</article-title>. <source>Br. J. Psychol</source>. <volume>50</volume>, <fpage>30</fpage>&#x02013;<lpage>36</lpage>. <pub-id pub-id-type="doi">10.1111/j.2044-8295.1959.tb00678.x</pub-id><pub-id pub-id-type="pmid">13628967</pub-id></citation></ref>
<ref id="B9">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Barford</surname> <given-names>P.</given-names></name> <name><surname>Dacier</surname> <given-names>M.</given-names></name> <name><surname>Dietterich</surname> <given-names>T. G.</given-names></name> <name><surname>Fredrikson</surname> <given-names>M.</given-names></name> <name><surname>Giffin</surname> <given-names>J.</given-names></name> <name><surname>Jajodia</surname> <given-names>S.</given-names></name> <etal/></person-group>. (<year>2010</year>). <article-title>&#x0201C;Cyber SA: Situational awareness for cyber defense,&#x0201D;</article-title> in <source>Cyber Situational Awareness</source> (<publisher-loc>Berlin</publisher-loc>: <publisher-name>Springer</publisher-name>), <fpage>3</fpage>&#x02013;<lpage>13</lpage>. <pub-id pub-id-type="doi">10.1007/978-1-4419-0140-8_1</pub-id><pub-id pub-id-type="pmid">35808159</pub-id></citation></ref>
<ref id="B10">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ben-Asher</surname> <given-names>N.</given-names></name> <name><surname>Gonzalez</surname> <given-names>C.</given-names></name></person-group> (<year>2015</year>). <article-title>Effects of cyber security knowledge on attack detection</article-title>. <source>Comput. Hum. Behav</source>. <volume>48</volume>, <fpage>51</fpage>&#x02013;<lpage>61</lpage>. <pub-id pub-id-type="doi">10.1016/j.chb.2015.01.039</pub-id></citation>
</ref>
<ref id="B11">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Bodala</surname> <given-names>I. P.</given-names></name> <name><surname>Li</surname> <given-names>J.</given-names></name> <name><surname>Thakor</surname> <given-names>N. V.</given-names></name> <name><surname>Al-Nashash</surname> <given-names>H.</given-names></name></person-group> (<year>2016</year>). <article-title>EEG and eye tracking demonstrate vigilance enhancement with challenge integration</article-title>. <source>Front. Hum. Neurosci</source>. 10, 273. <pub-id pub-id-type="doi">10.3389/fnhum.2016.00273</pub-id><pub-id pub-id-type="pmid">27375464</pub-id></citation></ref>
<ref id="B12">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Bridges</surname> <given-names>N. R.</given-names></name></person-group> (<year>2011</year>). <source>Predicting Vigilance Performance Under Transcranial Direct Current Stimulation (Publication Number 1047). (Masters Thesis), Wright State University, Dayton, OH</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://corescholar.libraries.wright.edu/etd_all/1047/">https://corescholar.libraries.wright.edu/etd_all/1047/</ext-link> (accessed March 6, 2020).</citation>
</ref>
<ref id="B13">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Cabrall</surname> <given-names>C.</given-names></name> <name><surname>Happee</surname> <given-names>R.</given-names></name> <name><surname>De Winter</surname> <given-names>J.</given-names></name></person-group> (<year>2016</year>). <article-title>From Mackworth&#x00027;s clock to the open road: A literature review on driver vigilance task operationalization</article-title>. <source>Transport. Res. F</source> <volume>40</volume>, <fpage>169</fpage>&#x02013;<lpage>189</lpage>. <pub-id pub-id-type="doi">10.1016/j.trf.2016.04.001</pub-id></citation>
</ref>
<ref id="B14">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Cavelty</surname> <given-names>M. D.</given-names></name></person-group> (<year>2014</year>). <article-title>Breaking the cyber-security dilemma: Aligning security needs and removing vulnerabilities</article-title>. <source>Sci. Eng. Ethics</source> <volume>20</volume>, <fpage>701</fpage>&#x02013;<lpage>715</lpage>. <pub-id pub-id-type="doi">10.1007/s11948-014-9551-y</pub-id><pub-id pub-id-type="pmid">24781874</pub-id></citation></ref>
<ref id="B15">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Chappelle</surname> <given-names>W.</given-names></name> <name><surname>McDonald</surname> <given-names>K.</given-names></name> <name><surname>Christensen</surname> <given-names>J.</given-names></name> <name><surname>Prince</surname> <given-names>L.</given-names></name> <name><surname>Goodman</surname> <given-names>T.</given-names></name> <name><surname>Thompson</surname> <given-names>W.</given-names></name> <etal/></person-group> (<year>2013</year>). <source>Sources of Occupational Stress and Prevalence of Burnout and Clinical Distress Among US Air Force Cyber Warfare Operators [Final Technical Report] (88ABW-2013-2089)</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://apps.dtic.mil/dtic/tr/fulltext/u2/a584653.pdf">https://apps.dtic.mil/dtic/tr/fulltext/u2/a584653.pdf</ext-link> (accessed March 6, 2020).</citation>
</ref>
<ref id="B16">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Cunningham</surname> <given-names>S. G.</given-names></name> <name><surname>Freeman</surname> <given-names>F.</given-names></name></person-group> (<year>1994</year>). <source>The Electrocortical Correlates of Fluctuating States of Attention During Vigilance Tasks [Contractor Report (CR)](19950008450). (NASA Contractor Report &#x02013; NASA-CR-197051., NASA Contractor Report &#x02013; NASA CR-197051, Issue</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://ntrs.nasa.gov/api/citations/19950008450/downloads/19950008450.pdf">https://ntrs.nasa.gov/api/citations/19950008450/downloads/19950008450.pdf</ext-link> (accessed March 7, 2020).</citation>
</ref>
<ref id="B17">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Daly</surname> <given-names>T.</given-names></name> <name><surname>Murphy</surname> <given-names>J.</given-names></name> <name><surname>Anglin</surname> <given-names>K.</given-names></name> <name><surname>Szalma</surname> <given-names>J.</given-names></name> <name><surname>Acree</surname> <given-names>M.</given-names></name> <name><surname>Landsberg</surname> <given-names>C.</given-names></name> <etal/></person-group>. (<year>2017</year>). <article-title>&#x0201C;Moving vigilance out of the laboratory: Dynamic scenarios for UAS operator vigilance training,&#x0201D;</article-title> in <source>Augmented Cognition. Enhancing Cognition and Behavior in Complex Human Environments</source> (<publisher-loc>Berlin</publisher-loc>: <publisher-name>Springer International Publishing</publisher-name>), <fpage>20</fpage>&#x02013;<lpage>35</lpage>. <pub-id pub-id-type="doi">10.1007/978-3-319-58625-0_2</pub-id></citation>
</ref>
<ref id="B18">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>D&#x00027;Amico</surname> <given-names>A.</given-names></name> <name><surname>Whitley</surname> <given-names>K.</given-names></name> <name><surname>Tesone</surname> <given-names>D.</given-names></name> <name><surname>O&#x00027;Brien</surname> <given-names>B.</given-names></name> <name><surname>Roth</surname> <given-names>E.</given-names></name></person-group> (<year>2005</year>). <article-title>Achieving cyber defense situational awareness: A cognitive task analysis of information assurance analysts</article-title>. <source>Proc. Hum. Fact. Ergon. Soc. Ann. Meet</source>. <volume>49</volume>, <fpage>229</fpage>&#x02013;<lpage>233</lpage>. <pub-id pub-id-type="doi">10.1177/154193120504900304</pub-id></citation>
</ref>
<ref id="B19">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Dember</surname> <given-names>W. N.</given-names></name> <name><surname>Galinsky</surname> <given-names>T. L.</given-names></name> <name><surname>Warm</surname> <given-names>J. S.</given-names></name></person-group> (<year>1992</year>). <article-title>The role of choice in vigilance performance</article-title>. <source>Bullet. Psychon. Soc</source>. <volume>30</volume>, <fpage>201</fpage>&#x02013;<lpage>204</lpage>. <pub-id pub-id-type="doi">10.3758/BF03330441</pub-id></citation>
</ref>
<ref id="B20">
<citation citation-type="web"><person-group person-group-type="author"><collab>DoD</collab></person-group> (<year>2014</year>). <source>Mission Analysis for Cyber Operations of Department of Defense (E-0CD45F6)</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://info.publicintelligence.net/DoD-CyberMissionAnalysis.pdf">https://info.publicintelligence.net/DoD-CyberMissionAnalysis.pdf</ext-link> (accessed April 4, 2020).</citation>
</ref>
<ref id="B21">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Donald</surname> <given-names>F. M.</given-names></name></person-group> (<year>2008</year>). <article-title>The classification of vigilance tasks in the real world</article-title>. <source>Ergonomics</source> <volume>51</volume>, <fpage>1643</fpage>&#x02013;<lpage>1655</lpage>. <pub-id pub-id-type="doi">10.1080/00140130802327219</pub-id><pub-id pub-id-type="pmid">18941972</pub-id></citation></ref>
<ref id="B22">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>D&#x00027;Orazio</surname> <given-names>T.</given-names></name> <name><surname>Leo</surname> <given-names>M.</given-names></name> <name><surname>Guaragnella</surname> <given-names>C.</given-names></name> <name><surname>Distante</surname> <given-names>A.</given-names></name></person-group> (<year>2007</year>). <article-title>A visual approach for driver inattention detection</article-title>. <source>Patt. Recogn</source>. <volume>40</volume>, <fpage>2341</fpage>&#x02013;<lpage>2355</lpage>. <pub-id pub-id-type="doi">10.1016/j.patcog.2007.01.018</pub-id></citation>
</ref>
<ref id="B23">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Endsley</surname> <given-names>M.</given-names></name> <name><surname>Kiris</surname> <given-names>E.</given-names></name></person-group> (<year>1995</year>). <article-title>The out-of-the-loop performance problem and level of control in automation</article-title>. <source>Hum. Fact</source>. <volume>37</volume>, <fpage>32</fpage>&#x02013;<lpage>64</lpage>. <pub-id pub-id-type="doi">10.1518/001872095779049543</pub-id><pub-id pub-id-type="pmid">29683404</pub-id></citation></ref>
<ref id="B24">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Epling</surname> <given-names>S. L.</given-names></name> <name><surname>Russell</surname> <given-names>P. N.</given-names></name> <name><surname>Helton</surname> <given-names>W. S.</given-names></name></person-group> (<year>2016</year>). <article-title>A new semantic vigilance task: Vigilance decrement, workload, and sensitivity to dual-task costs</article-title>. <source>Exp. Brain Res</source>. <volume>234</volume>, <fpage>133</fpage>&#x02013;<lpage>139</lpage>. <pub-id pub-id-type="doi">10.1007/s00221-015-4444-0</pub-id><pub-id pub-id-type="pmid">26403293</pub-id></citation></ref>
<ref id="B25">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Erola</surname> <given-names>A.</given-names></name> <name><surname>Agrafiotis</surname> <given-names>I.</given-names></name> <name><surname>Happa</surname> <given-names>J.</given-names></name> <name><surname>Goldsmith</surname> <given-names>M.</given-names></name> <name><surname>Creese</surname> <given-names>S.</given-names></name> <name><surname>Legg</surname> <given-names>P. A.</given-names></name></person-group> (<year>2017</year>). <article-title>&#x0201C;RicherPicture: Semi-automated cyber defence using context-aware data analytics,&#x0201D;</article-title> in <source>The 2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)</source> (<publisher-loc>London</publisher-loc>) <pub-id pub-id-type="doi">10.1109/CyberSA.2017.8073399</pub-id></citation>
</ref>
<ref id="B26">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Fathi</surname> <given-names>N.</given-names></name> <name><surname>Mehraban</surname> <given-names>A. H.</given-names></name> <name><surname>Akbarfahimi</surname> <given-names>M.</given-names></name> <name><surname>Mirzaie</surname> <given-names>H.</given-names></name></person-group> (<year>2017</year>). <article-title>Validity and reliability of the test of everyday attention for children (teach) in Iranian 8-11 year old normal students</article-title>. <source>Iran. J. Psychiatr. Behav. Sci</source>. <volume>11</volume>, <fpage>1</fpage>&#x02013;<lpage>7</lpage>. <pub-id pub-id-type="doi">10.5812/ijpbs.2854</pub-id></citation>
</ref>
<ref id="B27">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Finomore</surname> <given-names>V.</given-names></name> <name><surname>Matthews</surname> <given-names>G.</given-names></name> <name><surname>Shaw</surname> <given-names>T.</given-names></name> <name><surname>Warm</surname> <given-names>J.</given-names></name></person-group> (<year>2009</year>). <article-title>Predicting vigilance: A fresh look at an old problem</article-title>. <source>Ergonomics</source> <volume>52</volume>, <fpage>791</fpage>&#x02013;<lpage>808</lpage>. <pub-id pub-id-type="doi">10.1080/00140130802641627</pub-id><pub-id pub-id-type="pmid">19562590</pub-id></citation></ref>
<ref id="B28">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Franke</surname> <given-names>U.</given-names></name> <name><surname>Brynielsson</surname> <given-names>J.</given-names></name></person-group> (<year>2014</year>). <article-title>Cyber situational awareness &#x02013; A systematic review of the literature</article-title>. <source>Comput. Secur</source>. <volume>46</volume>, <fpage>18</fpage>&#x02013;<lpage>31</lpage>. <pub-id pub-id-type="doi">10.1016/j.cose.2014.06.008</pub-id></citation>
</ref>
<ref id="B29">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Gartenberg</surname> <given-names>D.</given-names></name> <name><surname>Gunzelmann</surname> <given-names>G.</given-names></name> <name><surname>Hassanzadeh-Behbaha</surname> <given-names>S.</given-names></name> <name><surname>Trafton</surname> <given-names>J. G.</given-names></name></person-group> (<year>2018</year>). <article-title>Examining the role of task requirements in the magnitude of the vigilance decrement</article-title>. <source>Front. Psychol.</source> <volume>9</volume>, <fpage>1504</fpage>. <pub-id pub-id-type="doi">10.3389/fpsyg.2018.01504</pub-id><pub-id pub-id-type="pmid">30177902</pub-id></citation></ref>
<ref id="B30">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Gartenberg</surname> <given-names>D.</given-names></name> <name><surname>Gunzelmann</surname> <given-names>G.</given-names></name> <name><surname>Veksler</surname> <given-names>B. Z.</given-names></name> <name><surname>Trafton</surname> <given-names>J. G.</given-names></name></person-group> (<year>2015</year>). <article-title>&#x0201C;Improving vigilance analysis methodology: questioning the successive versus simultaneous distinction,&#x0201D;</article-title> in <source>Proceedings of the Human Factors and Ergonomics Society Annual Meeting</source> (<publisher-loc>Los Angeles, CA</publisher-loc>) <pub-id pub-id-type="doi">10.1177/1541931215591059</pub-id></citation>
</ref>
<ref id="B31">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Gaw</surname> <given-names>T. J.</given-names></name></person-group> (<year>2014</year>). <source>ARL-VIDS Visualization Techniques: 3D Information Visualization of Network Security Events (Publication Number 882577849). (Masters Thesis), Ball State University, Muncie, IN</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="http://liblink.bsu.edu/catkey/1745749">http://liblink.bsu.edu/catkey/1745749</ext-link> (accessed April 1, 2020).</citation>
</ref>
<ref id="B32">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Gopalakrishnan</surname> <given-names>S.</given-names></name></person-group> (<year>2012</year>). <article-title>A public health perspective of road traffic accidents</article-title>. <source>J. Fam. Med. Primary Care</source> <volume>1</volume>, <fpage>144</fpage>&#x02013;<lpage>150</lpage>. <pub-id pub-id-type="doi">10.4103/2249-4863.104987</pub-id><pub-id pub-id-type="pmid">24479025</pub-id></citation></ref>
<ref id="B33">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Gordon</surname> <given-names>L. A.</given-names></name> <name><surname>Loeb</surname> <given-names>M. P.</given-names></name> <name><surname>Zhou</surname> <given-names>L.</given-names></name></person-group> (<year>2011</year>). <article-title>The impact of information security breaches: Has there been a downward shift in costs?</article-title> <source>J. Comput. Secur</source>. <volume>19</volume>, <fpage>33</fpage>&#x02013;<lpage>56</lpage>. <pub-id pub-id-type="doi">10.3233/JCS-2009-0398</pub-id></citation>
</ref>
<ref id="B34">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Goutam</surname> <given-names>R. K.</given-names></name></person-group> (<year>2015</year>). <article-title>Importance of cyber security</article-title>. <source>Int. J. Comput. Appl.</source> <volume>111</volume>, <fpage>1250</fpage>. <pub-id pub-id-type="doi">10.5120/19550-1250</pub-id></citation>
</ref>
<ref id="B35">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Gutzwiller</surname> <given-names>R. S.</given-names></name> <name><surname>Fugate</surname> <given-names>S.</given-names></name> <name><surname>Sawyer</surname> <given-names>B. D.</given-names></name> <name><surname>Hancock</surname> <given-names>P.</given-names></name></person-group> (<year>2015</year>). <article-title>&#x0201C;The human factors of cyber network defense,&#x0201D;</article-title> in <source>Proceedings of the Human Factors and Ergonomics Society Annual Meeting.</source> (<publisher-loc>Los Angeles, CA</publisher-loc>). <pub-id pub-id-type="doi">10.1177/1541931215591067</pub-id></citation>
</ref>
<ref id="B36">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Gutzwiller</surname> <given-names>R. S.</given-names></name> <name><surname>Hunt</surname> <given-names>S. M.</given-names></name> <name><surname>Lange</surname> <given-names>D. S.</given-names></name></person-group> (<year>2016</year>). <article-title>&#x0201C;A task analysis toward characterizing cyber-cognitive situation awareness (CCSA) in cyber defense analysts,&#x0201D;</article-title> in <source>The 2016 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA)</source>. (<publisher-loc>San Diego, CA</publisher-loc>). <pub-id pub-id-type="doi">10.1109/COGSIMA.2016.7497780</pub-id></citation>
</ref>
<ref id="B37">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Hancock</surname> <given-names>P. A.</given-names></name></person-group> (<year>2013</year>). <article-title>In search of vigilance: The problem of iatrogenically created psychological phenomena</article-title>. <source>Am. Psycholog</source>. <volume>68</volume>, <fpage>97</fpage>&#x02013;<lpage>109</lpage>. <pub-id pub-id-type="doi">10.1037/a0030214</pub-id><pub-id pub-id-type="pmid">23088439</pub-id></citation></ref>
<ref id="B38">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Hancock</surname> <given-names>P. A.</given-names></name> <name><surname>Hart</surname> <given-names>S.</given-names></name></person-group> (<year>2002</year>). <article-title>Defeating terrorism: What can human factors/ergonomics offer?</article-title> <source>Ergon. Design</source> <volume>10</volume>, <fpage>6</fpage>&#x02013;<lpage>16</lpage>. <pub-id pub-id-type="doi">10.1177/106480460201000103</pub-id></citation>
</ref>
<ref id="B39">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Hao</surname> <given-names>L.</given-names></name> <name><surname>Healey</surname> <given-names>C. G.</given-names></name> <name><surname>Hutchinson</surname> <given-names>S. E.</given-names></name></person-group> (<year>2013</year>). <article-title>Flexible web visualization for alert-based network security analytics</article-title>. <source>Assoc. Comput. Machinery</source>. <pub-id pub-id-type="doi">10.1145/2517957.2517962</pub-id></citation>
</ref>
<ref id="B40">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Hatori</surname> <given-names>M.</given-names></name> <name><surname>Gronfier</surname> <given-names>C.</given-names></name> <name><surname>Van Gelder</surname> <given-names>R. N.</given-names></name> <name><surname>Bernstein</surname> <given-names>P. S.</given-names></name> <name><surname>Carreras</surname> <given-names>J.</given-names></name> <name><surname>Panda</surname> <given-names>S.</given-names></name> <etal/></person-group>. (<year>2017</year>). <article-title>Global rise of potential health hazards caused by blue light-induced circadian disruption in modern aging societies</article-title>. <source>NPJ Aging Mechanisms Dis</source>. <volume>3</volume>, <fpage>1</fpage>&#x02013;<lpage>3</lpage>. <pub-id pub-id-type="doi">10.1038/s41514-017-0010-2</pub-id><pub-id pub-id-type="pmid">28649427</pub-id></citation></ref>
<ref id="B41">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Heeger</surname> <given-names>D.</given-names></name></person-group> (<year>1997</year>). <source>Signal Detection Theory. New York University</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.cns.nyu.edu/&#x0007E;david/handouts/sdt/sdt.html">https://www.cns.nyu.edu/&#x0007E;david/handouts/sdt/sdt.html</ext-link> (accessed May 31, 2020).</citation>
</ref>
<ref id="B42">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Heeger</surname> <given-names>D.</given-names></name></person-group> (<year>2007</year>). <source>Signal Detection Theory. New York University</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.cns.nyu.edu/david/handouts/sdt/sdt.html">https://www.cns.nyu.edu/david/handouts/sdt/sdt.html</ext-link> (accessed May 31, 2020).</citation>
</ref>
<ref id="B43">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Helton</surname> <given-names>W. S.</given-names></name> <name><surname>Dember</surname> <given-names>W. N.</given-names></name> <name><surname>Warm</surname> <given-names>J. S.</given-names></name> <name><surname>Matthews</surname> <given-names>G.</given-names></name></person-group> (<year>1999</year>). <article-title>Optimism, pessimism, and false failure feedback: Effects on vigilance performance</article-title>. <source>Curr. Psychol</source>. <volume>18</volume>, <fpage>311</fpage>&#x02013;<lpage>325</lpage>. <pub-id pub-id-type="doi">10.1007/s12144-999-1006-2</pub-id></citation>
</ref>
<ref id="B44">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Helton</surname> <given-names>W. S.</given-names></name> <name><surname>Shaw</surname> <given-names>T. H.</given-names></name> <name><surname>Warm</surname> <given-names>J. S.</given-names></name> <name><surname>Dember</surname> <given-names>G. M. W. N.</given-names></name> <name><surname>Hancock</surname> <given-names>P. A.</given-names></name></person-group> (<year>2004</year>). <article-title>&#x0201C;Demand transitions in vigilance: Effects on performance efficiency and stress,&#x0201D;</article-title> in <source>Human Performance, Situation Awareness, and Automation: Current Research and Trends HPSAA II, Volumes I and II</source>, eds V. M. Mouloua and P. A. Hancock (<publisher-loc>Mahwah, NJ</publisher-loc>: <publisher-name>Lawrence Erlbaum Associates, Inc., Publishers</publisher-name>), <fpage>258</fpage>&#x02013;<lpage>263</lpage>.<pub-id pub-id-type="pmid">18350395</pub-id></citation></ref>
<ref id="B45">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Hicks</surname> <given-names>J. M.</given-names></name></person-group> (<year>2015</year>). <source>A Theater-Level Perspective on Cyber (0704-0188). N. D. U. Press</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://apps.dtic.mil/dtic/tr/fulltext/u2/a618537.pdf">https://apps.dtic.mil/dtic/tr/fulltext/u2/a618537.pdf</ext-link> (accessed April 3, 2020).</citation>
</ref>
<ref id="B46">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Holzman</surname> <given-names>D. C.</given-names></name></person-group> (<year>2010</year>). <article-title>What&#x00027;s in a color? The unique human health effects of blue light</article-title>. <source>Environ. Health Perspect</source>. <volume>118</volume>, <fpage>22</fpage>&#x02013;<lpage>27</lpage>. <pub-id pub-id-type="doi">10.1289/ehp.118-a22</pub-id><pub-id pub-id-type="pmid">20061218</pub-id></citation></ref>
<ref id="B47">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Jo</surname> <given-names>J.</given-names></name> <name><surname>Lee</surname> <given-names>S. J.</given-names></name> <name><surname>Park</surname> <given-names>K. R.</given-names></name> <name><surname>Kim</surname> <given-names>I.-J.</given-names></name> <name><surname>Kim</surname> <given-names>J.</given-names></name></person-group> (<year>2014</year>). <article-title>Detecting driver drowsiness using feature-level fusion and user-specific classification</article-title>. <source>Expert Syst. Appl</source>. <volume>41</volume>, <fpage>1139</fpage>&#x02013;<lpage>1152</lpage>. <pub-id pub-id-type="doi">10.1016/j.eswa.2013.07.108</pub-id></citation>
</ref>
<ref id="B48">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Jolley</surname> <given-names>J. D.</given-names></name></person-group> (<year>2012</year>). <source>Article 2 and Cyber Warfare: How Do Old Rules Control the Brave New World? Available at SSRN 2128301. 2</source>. World Wide Organisation; Institution of Engineering and Technology. 1&#x02013;16. <pub-id pub-id-type="doi">10.5539/ilr.v2n1p1</pub-id></citation>
</ref>
<ref id="B49">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Joly</surname> <given-names>A.</given-names></name> <name><surname>Zheng</surname> <given-names>R.</given-names></name> <name><surname>Kaizuka</surname> <given-names>T.</given-names></name> <name><surname>Nakano</surname> <given-names>K.</given-names></name></person-group> (<year>2017</year>). <article-title>Effect of drowsiness on mechanical arm admittance and driving performances</article-title>. <source>Inst. Eng. Technol. Intell. Transport Syst</source>. <volume>12</volume>, <fpage>220</fpage>&#x02013;<lpage>226</lpage>. <pub-id pub-id-type="doi">10.1049/iet-its.2016.0249</pub-id></citation>
</ref>
<ref id="B50">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Komlodi</surname> <given-names>A.</given-names></name> <name><surname>Goodall</surname> <given-names>J. R.</given-names></name> <name><surname>Lutters</surname> <given-names>W. G.</given-names></name></person-group> (<year>2004</year>). <article-title>&#x0201C;An information visualization framework for intrusion detection,&#x0201D;</article-title> in <source>Association for Computing Machinery 2004 Conference on Human Factors in Computing Systems.</source> (<publisher-loc>Vienna</publisher-loc>). <pub-id pub-id-type="doi">10.1145/985921.1062935</pub-id><pub-id pub-id-type="pmid">19102620</pub-id></citation></ref>
<ref id="B51">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Lockley</surname> <given-names>S. W.</given-names></name> <name><surname>Evans</surname> <given-names>E. E.</given-names></name> <name><surname>Scheer</surname> <given-names>F. A.</given-names></name> <name><surname>Brainard</surname> <given-names>G. C.</given-names></name> <name><surname>Czeisler</surname> <given-names>C. A.</given-names></name> <name><surname>Aeschbach</surname> <given-names>D.</given-names></name></person-group> (<year>2006</year>). <article-title>Short-wavelength sensitivity for the direct effects of light on alertness, vigilance, and the waking electroencephalogram in humans</article-title>. <source>Sleep</source> <volume>29</volume>, <fpage>161</fpage>&#x02013;<lpage>168</lpage>. <pub-id pub-id-type="doi">10.1093/sleep/29.2.161</pub-id><pub-id pub-id-type="pmid">16494083</pub-id></citation></ref>
<ref id="B52">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Mackworth</surname> <given-names>J. F.</given-names></name></person-group> (<year>1968</year>). <article-title>Vigilance, arousal, and habituation</article-title>. <source>Psychol. Rev</source>. <volume>4</volume>, <fpage>308</fpage>&#x02013;<lpage>322</lpage>. <pub-id pub-id-type="doi">10.1037/h0025896</pub-id><pub-id pub-id-type="pmid">4875885</pub-id></citation></ref>
<ref id="B53">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Mackworth</surname> <given-names>N. H.</given-names></name></person-group> (<year>1948</year>). <article-title>The breakdown of vigilance during prolonged visual search</article-title>. <source>Quart. J. Exp. Psychol</source>. <volume>1</volume>, <fpage>6</fpage>&#x02013;<lpage>21</lpage>. <pub-id pub-id-type="doi">10.1080/17470214808416738</pub-id></citation>
</ref>
<ref id="B54">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Mackworth</surname> <given-names>N. H.</given-names></name></person-group> (<year>1950</year>). <article-title>Researches on the measurement of human performance</article-title>. <source>J. Royal Stat. Soc. Ser. A</source>. <volume>113</volume>, <fpage>588</fpage>&#x02013;<lpage>589</lpage>. <pub-id pub-id-type="doi">10.2307/2980885</pub-id></citation>
</ref>
<ref id="B55">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Majeed</surname> <given-names>A.</given-names></name> <name><surname>ur Rasool</surname> <given-names>R.</given-names></name> <name><surname>Ahmad</surname> <given-names>F.</given-names></name> <name><surname>Alam</surname> <given-names>M.</given-names></name> <name><surname>Javaid</surname> <given-names>N.</given-names></name></person-group> (<year>2019</year>). <article-title>Near-miss situation based visual analysis of SIEM rules for real time network security monitoring</article-title>. <source>J. Ambient Intell. Human. Comput</source>. <volume>10</volume>, <fpage>1509</fpage>&#x02013;<lpage>1526</lpage>. <pub-id pub-id-type="doi">10.1007/s12652-018-0936-7</pub-id></citation>
</ref>
<ref id="B56">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Mancuso</surname> <given-names>V. F.</given-names></name> <name><surname>Christensen</surname> <given-names>J. C.</given-names></name> <name><surname>Cowley</surname> <given-names>J.</given-names></name> <name><surname>Finomore</surname> <given-names>V.</given-names></name> <name><surname>Gonzalez</surname> <given-names>C.</given-names></name> <name><surname>Knott</surname> <given-names>B.</given-names></name></person-group> (<year>2014</year>). <article-title>&#x0201C;Human factors in cyber warfare II: Emerging perspectives,&#x0201D;</article-title> in <source>Proceedings of the Human Factors and Ergonomics Society Annual Meeting.</source> (<publisher-loc>Chicago, IL</publisher-loc>). <pub-id pub-id-type="doi">10.1177/1541931214581085</pub-id></citation>
</ref>
<ref id="B57">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Mancuso</surname> <given-names>V. F.</given-names></name> <name><surname>Greenlee</surname> <given-names>E. T.</given-names></name> <name><surname>Funke</surname> <given-names>G.</given-names></name> <name><surname>Dukes</surname> <given-names>A.</given-names></name> <name><surname>Menke</surname> <given-names>L.</given-names></name> <name><surname>Brown</surname> <given-names>R.</given-names></name> <etal/></person-group>. (<year>2015</year>). <article-title>Augmenting cyber defender performance and workload through sonified displays</article-title>. <source>Proc. Manufact</source>. <volume>3</volume>, <fpage>5214</fpage>&#x02013;<lpage>5221</lpage>. <pub-id pub-id-type="doi">10.1016/j.promfg.2015.07.589</pub-id></citation>
</ref>
<ref id="B58">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Maybury</surname> <given-names>M. T.</given-names></name></person-group> (<year>2012</year>). <article-title>&#x0201C;Air force cyber vision 2025,&#x0201D;</article-title> in <source>5th International Symposium on Resilient Control Systems</source>. Salt Lake City, UT.</citation>
</ref>
<ref id="B59">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>McIntire</surname> <given-names>L.</given-names></name> <name><surname>McKinley</surname> <given-names>R. A.</given-names></name> <name><surname>McIntire</surname> <given-names>J.</given-names></name> <name><surname>Goodyear</surname> <given-names>C.</given-names></name> <name><surname>Nelson</surname> <given-names>J.</given-names></name></person-group> (<year>2013</year>). <article-title>Eye metrics: An alternative vigilance detector for military operators</article-title>. <source>Milit. Psychol</source>. <volume>25</volume>, <fpage>502</fpage>&#x02013;<lpage>513</lpage>. <pub-id pub-id-type="doi">10.1037/mil0000011</pub-id></citation>
</ref>
<ref id="B60">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Milakis</surname> <given-names>D.</given-names></name> <name><surname>Van Arem</surname> <given-names>B.</given-names></name> <name><surname>Van Wee</surname> <given-names>B.</given-names></name></person-group> (<year>2015</year>). <source>The Ripple Effect of Automated Driving BIVEC-GIBET Transport Research Day, May 28&#x02013;29. 2015, Eindhoven, The Netherlands</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="http://resolver.tudelft.nl/uuid:e6ecff79-4334-4baa-a60b-3ed897587157">http://resolver.tudelft.nl/uuid:e6ecff79-4334-4baa-a60b-3ed897587157</ext-link> (accessed April 3, 2020).</citation>
</ref>
<ref id="B61">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Nanay</surname> <given-names>B.</given-names></name></person-group> (<year>2018</year>). <article-title>Perception is not all-purpose</article-title>. <source>Synthese</source> <volume>1</volume>, <fpage>1</fpage>&#x02013;<lpage>12</lpage>. <pub-id pub-id-type="doi">10.1007/s11229-018-01937-5</pub-id><pub-id pub-id-type="pmid">34720226</pub-id></citation></ref>
<ref id="B62">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Newcomb</surname> <given-names>E. A.</given-names></name> <name><surname>Hammell</surname> <given-names>R. J.</given-names></name></person-group> (<year>2016</year>). <article-title>&#x0201C;A fuzzy logic utility framework (FLUF) to support information assurance,&#x0201D;</article-title> in <source>Software Engineering Research, Management and Applications</source>, ed R. Lee (<publisher-loc>Berlin</publisher-loc>: <publisher-name>Springer</publisher-name>), <fpage>33</fpage>&#x02013;<lpage>48</lpage>. <pub-id pub-id-type="doi">10.1007/978-3-319-33903-0_3</pub-id></citation>
</ref>
<ref id="B63">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>O&#x00027;Connell</surname> <given-names>M. E.</given-names></name></person-group> (<year>2012</year>). <article-title>Cyber security without cyber war</article-title>. <source>J. Conflict Secur. Law</source> <volume>17</volume>, <fpage>187</fpage>&#x02013;<lpage>209</lpage>. <pub-id pub-id-type="doi">10.1093/jcsl/krs017</pub-id></citation>
</ref>
<ref id="B64">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ormrod</surname> <given-names>D.</given-names></name></person-group> (<year>2014</year>). <article-title>&#x0201C;The coordination of cyber and kinetic deception for operational effect: Attacking the C4ISR interface,&#x0201D;</article-title> in <source>The 2014 IEEE Military Communications Conference</source>. Baltimore, MD.</citation>
</ref>
<ref id="B65">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Parasuraman</surname> <given-names>R.</given-names></name></person-group> (<year>1979</year>). <article-title>Memory load and event rate control sensitivity decrements in sustained attention</article-title>. <source>Science</source> <volume>205</volume>, <fpage>924</fpage>&#x02013;<lpage>927</lpage>. <pub-id pub-id-type="doi">10.1126/science.472714</pub-id><pub-id pub-id-type="pmid">472714</pub-id></citation></ref>
<ref id="B66">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Parasuraman</surname> <given-names>R.</given-names></name></person-group> (<year>1985</year>). <article-title>&#x0201C;Sustained attention: A multifactorial approach,&#x0201D;</article-title> in <source>Attention and Performance XI, Vol. 1482</source>, ed M. I. Posner and M. S. Oscar (<publisher-loc>Mahwah, NJ</publisher-loc>: <publisher-name>Lawrence Erlbaum Associates, Inc., Publishers</publisher-name>), <fpage>493</fpage>&#x02013;<lpage>511</lpage>.</citation>
</ref>
<ref id="B67">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Parasuraman</surname> <given-names>R.</given-names></name> <name><surname>Mouloua</surname> <given-names>M.</given-names></name></person-group> (<year>1987</year>). <article-title>Interaction of signal discriminability and task type in vigilance decrement</article-title>. <source>Percept. Psychophys</source>. <volume>41</volume>, <fpage>17</fpage>&#x02013;<lpage>22</lpage>. <pub-id pub-id-type="doi">10.3758/BF03208208</pub-id><pub-id pub-id-type="pmid">3822739</pub-id></citation></ref>
<ref id="B68">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Pattyn</surname> <given-names>N.</given-names></name> <name><surname>Neyt</surname> <given-names>X.</given-names></name> <name><surname>Henderickx</surname> <given-names>D.</given-names></name> <name><surname>Soetens</surname> <given-names>E.</given-names></name></person-group> (<year>2008</year>). <article-title>Psychophysiological investigation of vigilance decrement: Boredom or cognitive fatigue?</article-title> <source>Physiol. Behav.</source> <volume>93</volume>, <fpage>369</fpage>&#x02013;<lpage>378</lpage>. <pub-id pub-id-type="doi">10.1016/j.physbeh.2007.09.016</pub-id><pub-id pub-id-type="pmid">17999934</pub-id></citation></ref>
<ref id="B69">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Paul</surname> <given-names>C. L.</given-names></name></person-group> (<year>2014</year>). <article-title>&#x0201C;Human-centered study of a network operations center: Experience report and lessons learned,&#x0201D;</article-title> in <source>Proceedings of the 2014 ACM Workshop on Security Information Workers</source> (<publisher-loc>New York, NY</publisher-loc>). <pub-id pub-id-type="doi">10.1145/2663887.2663899</pub-id></citation>
</ref>
<ref id="B70">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Pompon</surname> <given-names>R.</given-names></name> <name><surname>Walkowski</surname> <given-names>D.</given-names></name> <name><surname>Boddy</surname> <given-names>S.</given-names></name> <name><surname>Levin</surname> <given-names>M.</given-names></name></person-group> (<year>2018</year>). 2018 Phishing and Fraud Report - Attacks Peak During The Holidays (Phishing and Fraud Report, Issue. F. Labs). Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.f5.com/labs/articles/threat-intelligence/2018-phishing-and-fraud-report&#x02013;attacks-peak-during-the-holidays">https://www.f5.com/labs/articles/threat-intelligence/2018-phishing-and-fraud-report&#x02013;attacks-peak-during-the-holidays</ext-link> (accessed April 3, 2020).</citation>
</ref>
<ref id="B71">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Pradhapan</surname> <given-names>P.</given-names></name> <name><surname>Griffioen</surname> <given-names>R.</given-names></name> <name><surname>Clerx</surname> <given-names>M.</given-names></name> <name><surname>Mihajlovi&#x00107;</surname> <given-names>V.</given-names></name></person-group> (<year>2017</year>). <article-title>&#x0201C;Personalized characterization of sustained attention/vigilance in healthy children,&#x0201D;</article-title> in <source>Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Vol. 181</source>, eds K. Giokas, L. Bokor, and F. Hopfgartner (Cham: Springer International Publishing), <fpage>271</fpage>&#x02013;<lpage>281</lpage>. <pub-id pub-id-type="doi">10.1007/978-3-319-49655-9_35</pub-id></citation>
</ref>
<ref id="B72">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Rajan</surname> <given-names>A. V.</given-names></name> <name><surname>Ravikumar</surname> <given-names>R.</given-names></name> <name><surname>Al Shaer</surname> <given-names>M.</given-names></name></person-group> (<year>2017</year>). <article-title>&#x0201C;UAE cybercrime law and cybercrimes&#x02014;An analysis,&#x0201D;</article-title> in <source>The 2017 International Conference on Cyber Security And Protection Of Digital Services (Cyber Security)</source>. <pub-id pub-id-type="doi">10.1109/CyberSecPODS.2017.8074858</pub-id></citation>
</ref>
<ref id="B73">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Rajivan</surname> <given-names>P.</given-names></name> <name><surname>Cooke</surname> <given-names>N.</given-names></name></person-group> (<year>2017</year>). <article-title>&#x0201C;Impact of team collaboration on cybersecurity situational awareness,&#x0201D;</article-title> in <source>Theory and Models for Cyber Situation Awareness</source>, eds P. Liu, S. Jajodia, and C. Wang (Cham: Springer International Publishing), <fpage>203</fpage>&#x02013;<lpage>226</lpage>. <pub-id pub-id-type="doi">10.1007/978-3-319-61152-5_8</pub-id></citation>
</ref>
<ref id="B74">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Rajivan</surname> <given-names>P.</given-names></name> <name><surname>Janssen</surname> <given-names>M. A.</given-names></name> <name><surname>Cooke</surname> <given-names>N. J.</given-names></name></person-group> (<year>2013</year>). <article-title>&#x0201C;Agent-based model of a cyber security defense analyst team,&#x0201D;</article-title> in <source>Proceedings of the Human Factors and Ergonomics Society Annual Meeting</source> (<publisher-loc>San Diego, CA</publisher-loc>), <pub-id pub-id-type="doi">10.1177/1541931213571069</pub-id></citation>
</ref>
<ref id="B75">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Reinerman-Jones</surname> <given-names>L.</given-names></name> <name><surname>Matthews</surname> <given-names>G.</given-names></name> <name><surname>Mercado</surname> <given-names>J. E.</given-names></name></person-group> (<year>2016</year>). <article-title>Detection tasks in nuclear power plant operation: Vigilance decrement and physiological workload monitoring</article-title>. <source>Saf. Sci</source>. <volume>88</volume>, <fpage>97</fpage>&#x02013;<lpage>107</lpage>. <pub-id pub-id-type="doi">10.1016/j.ssci.2016.05.002</pub-id></citation>
</ref>
<ref id="B76">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Reinerman-Jones</surname> <given-names>L. E.</given-names></name> <name><surname>Matthews</surname> <given-names>G.</given-names></name> <name><surname>Langheim</surname> <given-names>L. K.</given-names></name> <name><surname>Warm</surname> <given-names>J. S.</given-names></name></person-group> (<year>2010</year>). <article-title>Selection for vigilance assignments: A review and proposed new direction</article-title>. <source>Theoret. Iss. Ergon. Sci</source>. <volume>12</volume>, <fpage>273</fpage>&#x02013;<lpage>296</lpage>. <pub-id pub-id-type="doi">10.1080/14639221003622620</pub-id></citation>
</ref>
<ref id="B77">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Rodriguez</surname> <given-names>A.</given-names></name> <name><surname>Okamura</surname> <given-names>K.</given-names></name></person-group> (<year>2019</year>). <article-title>&#x0201C;Generating real time cyber situational awareness information through social media data mining,&#x0201D;</article-title> in <source>2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC).</source> (<publisher-loc>Milwaukee, WI</publisher-loc>). <pub-id pub-id-type="doi">10.1109/COMPSAC.2019.10256</pub-id></citation>
</ref>
<ref id="B78">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Saltzman</surname> <given-names>I.</given-names></name></person-group> (<year>2013</year>). <article-title>Cyber posturing and the offense-defense balance</article-title>. <source>Contemp. Secur. Pol</source>. <volume>34</volume>, <fpage>40</fpage>&#x02013;<lpage>63</lpage>. <pub-id pub-id-type="doi">10.1080/13523260.2013.771031</pub-id></citation>
</ref>
<ref id="B79">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Satterfield</surname> <given-names>K.</given-names></name> <name><surname>Harwood</surname> <given-names>A. E.</given-names></name> <name><surname>Helton</surname> <given-names>W. S.</given-names></name> <name><surname>Shaw</surname> <given-names>T. H.</given-names></name></person-group> (<year>2019</year>). <article-title>Does depleting self-control result in poorer vigilance performance?</article-title> <source>Hum. Fact</source>. <volume>61</volume>, <fpage>415</fpage>&#x02013;<lpage>425</lpage>. <pub-id pub-id-type="doi">10.1177/0018720818806151</pub-id><pub-id pub-id-type="pmid">30372632</pub-id></citation></ref>
<ref id="B80">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Sawyer</surname> <given-names>B. D.</given-names></name> <name><surname>Finomore</surname> <given-names>V. S.</given-names></name> <name><surname>Funke</surname> <given-names>G. J.</given-names></name> <name><surname>Matthews</surname> <given-names>G.</given-names></name> <name><surname>Mancuso</surname> <given-names>V.</given-names></name> <name><surname>Funke</surname> <given-names>M.</given-names></name> <etal/></person-group> (<year>2016</year>). <source>Cyber Vigilance: The Human Factor (0704-0188)</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://apps.dtic.mil/sti/pdfs/AD1021913.pdf">https://apps.dtic.mil/sti/pdfs/AD1021913.pdf</ext-link> (accessed April 4, 2020).</citation>
</ref>
<ref id="B81">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Sawyer</surname> <given-names>B. D.</given-names></name> <name><surname>Hancock</surname> <given-names>P. A.</given-names></name></person-group> (<year>2018</year>). <article-title>Hacking the human: The prevalence paradox in cybersecurity</article-title>. <source>Hum. Fact</source>. <volume>60</volume>, <fpage>597</fpage>&#x02013;<lpage>609</lpage>. <pub-id pub-id-type="doi">10.1177/0018720818780472</pub-id><pub-id pub-id-type="pmid">29986155</pub-id></citation></ref>
<ref id="B82">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>See</surname> <given-names>J. E.</given-names></name></person-group> (<year>2014</year>). <source>Vigilance: A Review of the Literature and Applications to Sentry Duty (SAND2014-17929)</source>. United States: Office of Scientific and Technical Information (OSTI). <pub-id pub-id-type="doi">10.2172/1322275</pub-id></citation>
</ref>
<ref id="B83">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>See</surname> <given-names>J. E.</given-names></name> <name><surname>Howe</surname> <given-names>S. R.</given-names></name> <name><surname>Warm</surname> <given-names>J. S.</given-names></name> <name><surname>Dember</surname> <given-names>W. N.</given-names></name></person-group> (<year>1995</year>). <article-title>Meta-analysis of the sensitivity decrement in vigilance</article-title>. <source>Psychol. Bullet</source>. <volume>117</volume>, <fpage>230</fpage>&#x02013;<lpage>249</lpage>. <pub-id pub-id-type="doi">10.1037/0033-2909.117.2.230</pub-id></citation>
</ref>
<ref id="B84">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Sherwood</surname> <given-names>M. S.</given-names></name> <name><surname>Kane</surname> <given-names>J. H.</given-names></name> <name><surname>Weisend</surname> <given-names>M. P.</given-names></name> <name><surname>Parker</surname> <given-names>J. G.</given-names></name></person-group> (<year>2016</year>). <article-title>Enhanced control of dorsolateral prefrontal cortex neurophysiology with real-time functional magnetic resonance imaging (rt-fMRI) neurofeedback training and working memory practice</article-title>. <source>Neuroimage</source> <volume>124</volume>, <fpage>214</fpage>&#x02013;<lpage>223</lpage>. <pub-id pub-id-type="doi">10.1016/j.neuroimage.2015.08.074</pub-id><pub-id pub-id-type="pmid">26348555</pub-id></citation></ref>
<ref id="B85">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Simmons</surname> <given-names>C. B.</given-names></name> <name><surname>Shiva</surname> <given-names>S. G.</given-names></name> <name><surname>Bedi</surname> <given-names>H. S.</given-names></name> <name><surname>Shandilya</surname> <given-names>V.</given-names></name></person-group> (<year>2013</year>). <article-title>&#x0201C;ADAPT: A game inspired attack-defense and performance metric taxonomy,&#x0201D;</article-title> in <source>IFIP International Information Security Conference</source> (<publisher-loc>Memphis, MS</publisher-loc>). <pub-id pub-id-type="doi">10.1007/978-3-642-39218-4_26</pub-id></citation>
</ref>
<ref id="B86">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Skopik</surname> <given-names>F.</given-names></name> <name><surname>Settanni</surname> <given-names>G.</given-names></name> <name><surname>Fiedler</surname> <given-names>R.</given-names></name></person-group> (<year>2016</year>). <article-title>A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing</article-title>. <source>Comput. Secur</source>. <volume>60</volume>, <fpage>154</fpage>&#x02013;<lpage>176</lpage>. <pub-id pub-id-type="doi">10.1016/j.cose.2016.04.003</pub-id></citation>
</ref>
<ref id="B87">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Smith</surname> <given-names>M.</given-names></name></person-group> (<year>2016</year>). <source>&#x0201C;The Effect of Perceived Humanness in Non-Human Robot Agents on Social Facilitation in a Vigilance Task (Publication Number 10132069)</source>. (Doctoral dissertation), George Mason University, Fairfax, VA. Available online at: <ext-link ext-link-type="uri" xlink:href="https://search.proquest.com/openview/49fba8a8ccd3001dd6465ccb7bddbd70/1?pq-origsite=gscholar&#x00026;cbl=18750&#x00026;diss=y">https://search.proquest.com/openview/49fba8a8ccd3001dd6465ccb7bddbd70/1?pq-origsite=gscholar&#x00026;cbl=18750&#x00026;diss=y</ext-link> (accessed April 5, 2020).</citation>
</ref>
<ref id="B88">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Sommer</surname> <given-names>D.</given-names></name> <name><surname>Golz</surname> <given-names>M.</given-names></name></person-group> (<year>2010</year>). &#x0201C;Evaluation of PERCLOS based current fatigue monitoring technologies,&#x0201D; <italic>The 2010 Annual International Conference of the IEEE Engineering in Medicine and Biology</italic> (Buenos Aires). <pub-id pub-id-type="doi">10.1109/IEMBS.2010.5625960</pub-id><pub-id pub-id-type="pmid">21095770</pub-id></citation></ref>
<ref id="B89">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Sostek</surname> <given-names>A. J.</given-names></name></person-group> (<year>1978</year>). <article-title>Effects of electrodermal lability and payoff instructions on vigilance performance</article-title>. <source>Psychophysiology</source> <volume>15</volume>, <fpage>561</fpage>&#x02013;<lpage>568</lpage>. <pub-id pub-id-type="doi">10.1111/j.1469-8986.1978.tb03110.x</pub-id><pub-id pub-id-type="pmid">715124</pub-id></citation></ref>
<ref id="B90">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Spathoulas</surname> <given-names>G. P.</given-names></name> <name><surname>Katsikas</surname> <given-names>S. K.</given-names></name></person-group> (<year>2010</year>). <article-title>Reducing false positives in intrusion detection systems</article-title>. <source>Comput. Secur</source>. <volume>29</volume>, <fpage>35</fpage>&#x02013;<lpage>44</lpage>. <pub-id pub-id-type="doi">10.1016/j.cose.2009.07.008</pub-id></citation>
</ref>
<ref id="B91">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Spathoulas</surname> <given-names>G. P.</given-names></name> <name><surname>Katsikas</surname> <given-names>S. K.</given-names></name></person-group> (<year>2013</year>). <article-title>Enhancing IDS performance through comprehensive alert post-processing</article-title>. <source>Comput. Secur</source>. <volume>37</volume>, <fpage>176</fpage>&#x02013;<lpage>196</lpage>. <pub-id pub-id-type="doi">10.1016/j.cose.2013.03.005</pub-id></citation>
</ref>
<ref id="B92">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>St John</surname> <given-names>M.</given-names></name> <name><surname>Risser</surname> <given-names>M. R.</given-names></name> <name><surname>Kobus</surname> <given-names>D. A.</given-names></name></person-group> (<year>2006</year>). <article-title>&#x0201C;Toward a usable closed-loop attention management system: Predicting vigilance from minimal contact head, eye, and EEG measures,&#x0201D;</article-title> in <source>Proceedings of the 2nd Annual Augmented Cognition, San Franciso, CA</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.135.1229&#x00026;rep=rep1&#x00026;type=pdf">http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.135.1229&#x00026;rep=rep1&#x00026;type=pdf</ext-link> (accessed April 5, 2020).</citation>
</ref>
<ref id="B93">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Tan</surname> <given-names>H.</given-names></name> <name><surname>Zhang</surname> <given-names>Y.-J.</given-names></name></person-group> (<year>2006</year>). <article-title>Detecting eye blink states by tracking iris and eyelids</article-title>. <source>Pat. Recogn. Lett</source>. <volume>27</volume>, <fpage>667</fpage>&#x02013;<lpage>675</lpage>. <pub-id pub-id-type="doi">10.1016/j.patrec.2005.10.005</pub-id></citation>
</ref>
<ref id="B94">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Thiffault</surname> <given-names>P.</given-names></name> <name><surname>Bergeron</surname> <given-names>J.</given-names></name></person-group> (<year>2003a</year>). <article-title>Fatigue and individual differences in monotonous simulated driving</article-title>. <source>Personal. Individ. Diff</source>. <volume>34</volume>, <fpage>159</fpage>&#x02013;<lpage>176</lpage>. <pub-id pub-id-type="doi">10.1016/S0191-8869(02)00119-8</pub-id></citation>
</ref>
<ref id="B95">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Thiffault</surname> <given-names>P.</given-names></name> <name><surname>Bergeron</surname> <given-names>J.</given-names></name></person-group> (<year>2003b</year>). <article-title>Monotony of road environment and driver fatigue: A simulator study</article-title>. <source>Accid. Anal. Prev</source>. <volume>35</volume>, <fpage>381</fpage>&#x02013;<lpage>391</lpage>. <pub-id pub-id-type="doi">10.1016/S0001-4575(02)00014-3</pub-id><pub-id pub-id-type="pmid">12643955</pub-id></citation></ref>
<ref id="B96">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Thomason</surname> <given-names>S.</given-names></name></person-group> (<year>2013</year>). <article-title>People&#x02013;The weak link in security</article-title>. <source>Glob. J. Comput. Sci. Technol</source>.</citation>
</ref>
<ref id="B97">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Tian</surname> <given-names>H. T.</given-names></name> <name><surname>Huang</surname> <given-names>L. S.</given-names></name> <name><surname>Zhou</surname> <given-names>Z.</given-names></name> <name><surname>Luo</surname> <given-names>Y. L.</given-names></name></person-group> (<year>2004</year>). <article-title>&#x0201C;Arm up administrators: Automated vulnerability management,&#x0201D;</article-title> in <source>7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings</source> (<publisher-loc>Hong Kong</publisher-loc>). <pub-id pub-id-type="doi">10.1109/ISPAN.2004.1300542</pub-id></citation>
</ref>
<ref id="B98">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Tong</surname> <given-names>M.</given-names></name> <name><surname>Thomson</surname> <given-names>C.</given-names></name></person-group> (<year>2015</year>). <article-title>&#x0201C;Developing a critical literature review for project management research,&#x0201D;</article-title> in <source>Designs, Methods and Practices for Research of Project Management</source>. (<publisher-loc>London</publisher-loc>: <publisher-name>Gower Publishing Limited; Routledge</publisher-name>), <fpage>153</fpage>&#x02013;<lpage>171</lpage>).</citation>
</ref>
<ref id="B99">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Tresh</surname> <given-names>K.</given-names></name> <name><surname>Kovalsky</surname> <given-names>M.</given-names></name></person-group> (<year>2018</year>). <article-title>Toward Automated Information Sharing California: Cybersecurity Integration Center&#x00027;s approach to improve on the traditional information sharing models</article-title>. <source>Cyber Defense Rev</source>. 3, 23&#x02013;32. Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.jstor.org/stable/26491220">https://www.jstor.org/stable/26491220</ext-link></citation>
</ref>
<ref id="B100">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Tyworth</surname> <given-names>M.</given-names></name> <name><surname>Giacobe</surname> <given-names>N. A.</given-names></name> <name><surname>Mancuso</surname> <given-names>V.</given-names></name></person-group> (<year>2012</year>). <article-title>Cyber situation awareness as distributed socio-cognitive work</article-title>. <source>Cyber Sens.</source> <volume>2012</volume>, <fpage>919338</fpage>. <pub-id pub-id-type="doi">10.1117/12.919338</pub-id></citation>
</ref>
<ref id="B101">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Valdez</surname> <given-names>P.</given-names></name></person-group> (<year>2019</year>). <article-title>Homeostatic and circadian regulation of cognitive performance</article-title>. <source>Biolog. Rhythm Res</source>. <volume>50</volume>, <fpage>85</fpage>&#x02013;<lpage>93</lpage>. <pub-id pub-id-type="doi">10.1080/09291016.2018.1491271</pub-id><pub-id pub-id-type="pmid">33162871</pub-id></citation></ref>
<ref id="B102">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Vieane</surname> <given-names>A.</given-names></name> <name><surname>Funke</surname> <given-names>G.</given-names></name> <name><surname>Gutzwiller</surname> <given-names>R.</given-names></name> <name><surname>Mancuso</surname> <given-names>V.</given-names></name> <name><surname>Sawyer</surname> <given-names>B.</given-names></name> <name><surname>Wickens</surname> <given-names>C.</given-names></name></person-group> (<year>2016</year>). <article-title>&#x0201C;Addressing human factors gaps in cyber defense,&#x0201D;</article-title> in <source>Proceedings of the Human Factors and Ergonomics Society Annual Meeting</source> (<publisher-loc>Washington, DC</publisher-loc>). <pub-id pub-id-type="doi">10.1177/1541931213601176</pub-id><pub-id pub-id-type="pmid">34372354</pub-id></citation></ref>
<ref id="B103">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Wall</surname> <given-names>D. S.</given-names></name> <name><surname>Williams</surname> <given-names>M. L.</given-names></name></person-group> (<year>2013</year>). <article-title>Policing cybercrime: Networked and social media technologies and the challenges for policing</article-title>. <source>Policing Soc</source>. <volume>23</volume>, <fpage>409</fpage>&#x02013;<lpage>412</lpage>. <pub-id pub-id-type="doi">10.1080/10439463.2013.780222</pub-id></citation>
</ref>
<ref id="B104">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Warm</surname> <given-names>J. S.</given-names></name> <name><surname>Dember</surname> <given-names>W.</given-names></name></person-group> (<year>1998</year>). <article-title>&#x0201C;Tests of vigilance taxonomy,&#x0201D;</article-title> in <source>Viewing Psychology as a Whole: The Integrative Science of William N. Dember</source>, eds R. R. Hoffman and M. F. Sherrick (Washington, DC: American Psychological Association). <pub-id pub-id-type="doi">10.1037/10290-004</pub-id></citation>
</ref>
<ref id="B105">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Warm</surname> <given-names>J. S.</given-names></name> <name><surname>Matthews</surname> <given-names>G.</given-names></name> <name><surname>Finomore</surname> <given-names>V. S.</given-names></name></person-group> (<year>2018</year>). <article-title>&#x0201C;Vigilance, workload, and stress,&#x0201D;</article-title> in <source>Performance Under Stress</source>, eds P. A. Hancock and J. L. Szalma (<publisher-loc>Boca Raton, FL</publisher-loc>: <publisher-name>CRC Press</publisher-name>), <fpage>131</fpage>&#x02013;<lpage>158</lpage>.</citation>
</ref>
<ref id="B106">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Warm</surname> <given-names>J. S.</given-names></name> <name><surname>Matthews</surname> <given-names>G.</given-names></name> <name><surname>Parasuraman</surname> <given-names>R.</given-names></name></person-group> (<year>2009</year>). <article-title>Cerebral hemodynamics and vigilance performance</article-title>. <source>Milit. Psychol.</source> <volume>21</volume>, <fpage>75</fpage>&#x02013;<lpage>100</lpage>. <pub-id pub-id-type="doi">10.1080/08995600802554706</pub-id></citation>
</ref>
<ref id="B107">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Warm</surname> <given-names>J. S.</given-names></name> <name><surname>Parasuraman</surname> <given-names>R.</given-names></name> <name><surname>Matthews</surname> <given-names>G.</given-names></name></person-group> (<year>2008</year>). <article-title>Vigilance requires hard mental work and is stressful</article-title>. <source>Hum. Fact</source>. <volume>50</volume>, <fpage>433</fpage>&#x02013;<lpage>441</lpage>. <pub-id pub-id-type="doi">10.1518/001872008X312152</pub-id><pub-id pub-id-type="pmid">18689050</pub-id></citation></ref>
<ref id="B108">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Wechsler</surname> <given-names>D.</given-names></name></person-group> (<year>2002</year>). <source>Technical Manual (Updated) for the Wechsler Adult Intelligence Scale, 3rd ed. and Wechsler Memory Scale, 3rd ed. San Antonio: Psychological Corporation (3rd ed.)</source>. <publisher-loc>San Antonio, TX</publisher-loc>: <publisher-name>The Psychological Corporation</publisher-name>.</citation>
</ref>
<ref id="B109">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Wickens</surname> <given-names>C. D.</given-names></name></person-group> (<year>2008</year>). <article-title>Situation awareness: Review of Mica Endsley&#x00027;s 1995 articles on situation awareness theory and measurement</article-title>. <source>Hum. Fact</source>. <volume>50</volume>, <fpage>397</fpage>&#x02013;<lpage>403</lpage>. <pub-id pub-id-type="doi">10.1518/001872008X288420</pub-id><pub-id pub-id-type="pmid">18689045</pub-id></citation></ref>
<ref id="B110">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Wickens</surname> <given-names>C. D.</given-names></name> <name><surname>Gutzwiller</surname> <given-names>R.</given-names></name> <name><surname>Santamaria</surname> <given-names>A.</given-names></name></person-group> (<year>2015</year>). <article-title>Discrete task switching in overload: A meta-analyses and a model</article-title>. <source>Int. J. Hum. Comput. Stud</source>. <volume>79</volume>, <fpage>79</fpage>&#x02013;<lpage>84</lpage>. <pub-id pub-id-type="doi">10.1016/j.ijhcs.2015.01.002</pub-id></citation>
</ref>
<ref id="B111">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Wickens</surname> <given-names>C. D.</given-names></name> <name><surname>Mavor</surname> <given-names>A. S.</given-names></name> <name><surname>McGee</surname> <given-names>J.</given-names></name></person-group> (<year>1997</year>). <source>Panel on Human Factors in Air Traffic Control Automation (N. A. Press, Ed.)</source>. <publisher-loc>Washington, DC</publisher-loc>: <publisher-name>National Research Council</publisher-name>.</citation>
</ref>
<ref id="B112">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Work</surname> <given-names>J.</given-names></name></person-group> (<year>2020</year>). <article-title>Evaluating commercial cyber intelligence activity</article-title>. <source>Int. J. Intell. Counter Intelligence</source> <volume>33</volume>, <fpage>278</fpage>&#x02013;<lpage>308</lpage>. <pub-id pub-id-type="doi">10.1080/08850607.2019.1690877</pub-id><pub-id pub-id-type="pmid">36969684</pub-id></citation></ref>
<ref id="B113">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Yahya</surname> <given-names>F.</given-names></name> <name><surname>Hassanin</surname> <given-names>O.</given-names></name> <name><surname>Tariq</surname> <given-names>U.</given-names></name> <name><surname>Al-Nashash</surname> <given-names>H.</given-names></name></person-group> (<year>2020</year>). <source>EEG-Based Semantic Vigilance Level Classification Using Directed Connectivity Patterns and Graph Theory Analysis</source>. World Wide Organisation; IEEE Access.</citation>
</ref>
<ref id="B114">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Zheng</surname> <given-names>W. L.</given-names></name> <name><surname>Gao</surname> <given-names>K.</given-names></name> <name><surname>Li</surname> <given-names>G.</given-names></name> <name><surname>Liu</surname> <given-names>W.</given-names></name> <name><surname>Liu</surname> <given-names>C.</given-names></name> <name><surname>Liu</surname> <given-names>J. Q.</given-names></name> <etal/></person-group>. (<year>2019</year>). <article-title>Vigilance estimation using a wearable EOG device in real driving environment</article-title>. <source>IEEE Trans. Intell. Transport. Syst</source>. <volume>1</volume>, <fpage>1</fpage>&#x02013;<lpage>15</lpage>. <pub-id pub-id-type="doi">10.1109/TITS.2018.2889962</pub-id></citation>
</ref>
<ref id="B115">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Zhong</surname> <given-names>C.</given-names></name> <name><surname>Yen</surname> <given-names>J.</given-names></name> <name><surname>Liu</surname> <given-names>P.</given-names></name> <name><surname>Erbacher</surname> <given-names>R.</given-names></name> <name><surname>Etoty</surname> <given-names>R.</given-names></name> <name><surname>Garneau</surname> <given-names>C.</given-names></name></person-group> (<year>2015</year>). <article-title>&#x0201C;ARSCA: A computer tool for tracing the cognitive processes of cyber-attack analysis,&#x0201D;</article-title> in <source>The 2015 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision</source> (<publisher-loc>Xi&#x00027;an</publisher-loc>) <pub-id pub-id-type="doi">10.1109/COGSIMA.2015.7108193</pub-id></citation>
</ref>
<ref id="B116">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Zhong</surname> <given-names>S. C.</given-names></name> <name><surname>Song</surname> <given-names>Q. F.</given-names></name> <name><surname>Cheng</surname> <given-names>X. C.</given-names></name> <name><surname>Zhang</surname> <given-names>Y.</given-names></name></person-group> (<year>2003</year>). <article-title>&#x0201C;A safe mobile agent system for distributed intrusion detection,&#x0201D;</article-title> in <source>Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No. 03EX693)</source> (<publisher-loc>San Diego, CA</publisher-loc>).</citation>
</ref>
</ref-list>
</back>
</article>