Visible to the public Human Subtlety Proofs: Using Computer Games to Model Cognitive Processes for CybersecurityConflict Detection Enabled

TitleHuman Subtlety Proofs: Using Computer Games to Model Cognitive Processes for Cybersecurity
Publication TypeJournal Article
Year of Publication2016
AuthorsIgnacio X. Dominguez, Prairie Rose Goodwin, David L. Roberts, Robert St. Amant
JournalInternational Journal of Human–Computer Interaction
Date Published10/2016
KeywordsLeveraging the Effects of Cognitive Function on Input Device Analytics to Improve Security
Abstract

This article describes an emerging direction in the intersection between human-computer interaction and cognitive science: the use of cognitive models to give insight into the challenges of cybersecurity. The article gives a brief overview of work in different areas of cybersecurity where cognitive modeling research plays a role, with regard to direct interaction between end users and computer systems and with regard to the needs of security analysts working behind the scenes. The problem of distinguishing between human users and automated agents (bots) interacting with computer systems is introduced, as well as ongoing efforts toward building Human Subtlety Proofs, persistent and unobtrusive windows into human cognition with direct application to cybersecurity. Two computer games are described, proxies to illustrate different ways in which cognitive modeling can potentially contribute to the development of HSPs and similar cybersecurity applications.

URLhttp://dx.doi.org/10.1080/10447318.2016.1232229
DOI10.1080/10447318.2016.1232229
Citation Keynode-29048
Refereed DesignationRefereed