{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T09:32:43Z","timestamp":1770975163998,"version":"3.50.1"},"reference-count":72,"publisher":"SAGE Publications","issue":"5","license":[{"start":{"date-parts":[[2018,5,9]],"date-time":"2018-05-09T00:00:00Z","timestamp":1525824000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Hum Factors"],"published-print":{"date-parts":[[2018,8]]},"abstract":"<jats:sec><jats:title>Objective:<\/jats:title><jats:p> A prototype ecological interface for computer network defense (CND) was developed. <\/jats:p><\/jats:sec><jats:sec><jats:title>Background:<\/jats:title><jats:p> Concerns about CND run high. Although there is a vast literature on CND, there is some indication that this research is not being translated into operational contexts. Part of the reason may be that CND has historically been treated as a strictly technical problem, rather than as a socio-technical problem. <\/jats:p><\/jats:sec><jats:sec><jats:title>Methods:<\/jats:title><jats:p> The cognitive systems engineering (CSE)\/ecological interface design (EID) framework was used in the analysis and design of the prototype interface. A brief overview of CSE\/EID is provided. EID principles of design (i.e., direct perception, direct manipulation and visual momentum) are described and illustrated through concrete examples from the ecological interface. <\/jats:p><\/jats:sec><jats:sec><jats:title>Results:<\/jats:title><jats:p> Key features of the ecological interface include (a) a wide variety of alternative visual displays, (b) controls that allow easy, dynamic reconfiguration of these displays, (c) visual highlighting of functionally related information across displays, (d) control mechanisms to selectively filter massive data sets, and (e) the capability for easy expansion. Cyber attacks from a well-known data set are illustrated through screen shots. <\/jats:p><\/jats:sec><jats:sec><jats:title>Conclusion:<\/jats:title><jats:p> CND support needs to be developed with a triadic focus (i.e., humans interacting with technology to accomplish work) if it is to be effective. Iterative design and formal evaluation is also required. The discipline of human factors has a long tradition of success on both counts; it is time that HF became fully involved in CND. <\/jats:p><\/jats:sec><jats:sec><jats:title>Application:<\/jats:title><jats:p> Direct application in supporting cyber analysts. <\/jats:p><\/jats:sec>","DOI":"10.1177\/0018720818769233","type":"journal-article","created":{"date-parts":[[2018,5,9]],"date-time":"2018-05-09T16:35:58Z","timestamp":1525883758000},"page":"610-625","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":14,"title":["Ecological Interface Design for Computer Network Defense"],"prefix":"10.1177","volume":"60","author":[{"given":"Kevin B.","family":"Bennett","sequence":"first","affiliation":[{"name":"Wright State University, Dayton, OH, USA"}]},{"given":"Adam","family":"Bryant","sequence":"additional","affiliation":[{"name":"Wright State University, Dayton, OH, USA"}]},{"given":"Christen","family":"Sushereba","sequence":"additional","affiliation":[{"name":"Wright State University, Dayton, OH, USA"}]}],"member":"179","published-online":{"date-parts":[[2018,5,9]]},"reference":[{"key":"bibr1-0018720818769233","volume-title":"Identification of command and control information requirements for the cyberspace domain","author":"Aschenbrenner B.","year":"2008"},{"key":"bibr2-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1080\/00401706.1987.10488204"},{"key":"bibr3-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1177\/1541931214581257"},{"key":"bibr4-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1177\/001872089203400502"},{"key":"bibr5-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1201\/b10774"},{"key":"bibr6-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2012.01.003"},{"key":"bibr7-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1037\/14528-026"},{"key":"bibr8-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1518\/155534308X377829"},{"key":"bibr9-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1145\/2671491.2671497"},{"key":"bibr10-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44966-0_37"},{"key":"bibr11-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1201\/9781315272665"},{"key":"bibr12-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1145\/1456650.1456652"},{"key":"bibr13-0018720818769233","volume-title":"Security data visualization: Graphical techniques for network analysis","author":"Conti G.","year":"2007"},{"key":"bibr14-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1109\/MCG.2007.137"},{"key":"bibr15-0018720818769233","volume-title":"Foundational cyberwarfare (Plan X)","author":"Defense Advanced Research Projects Agency (DARPA)","year":"2012"},{"key":"bibr16-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1109\/2945.841120"},{"key":"bibr17-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1145\/563788.604454"},{"key":"bibr18-0018720818769233","volume-title":"Global perspectives on the ecology of human-machine systems","author":"Flach J. M.","year":"1995"},{"key":"bibr19-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1109\/MCG.2006.49"},{"key":"bibr20-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.06.008"},{"key":"bibr21-0018720818769233","volume-title":"The senses considered as perceptual systems","author":"Gibson J. J.","year":"1966"},{"key":"bibr22-0018720818769233","volume-title":"The ecological approach to visual perception","author":"Gibson J. J.","year":"1979"},{"key":"bibr23-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2009.5375536"},{"key":"bibr24-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85933-8"},{"key":"bibr25-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2005.1532065"},{"key":"bibr26-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2009.5168026"},{"key":"bibr27-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1177\/1555343412440696"},{"key":"bibr28-0018720818769233","volume-title":"Local applications of the ecological approach to human-machine systems","author":"Hancock P. A.","year":"1995"},{"key":"bibr29-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2012.6375887"},{"key":"bibr30-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1080\/00140139.2015.1049217"},{"key":"bibr31-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1201\/b15703-5"},{"key":"bibr32-0018720818769233","volume-title":"IEEE VAST Challenge 2011, Mini-Challenge 2: Cybersecurity - situational awareness in computer networks","author":"IEEE","year":"2011"},{"key":"bibr33-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1145\/2379690.2379700"},{"key":"bibr34-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1109\/2945.981847"},{"key":"bibr35-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1109\/VAST.2006.261438"},{"key":"bibr36-0018720818769233","first-page":"75","volume-title":"Proceedings of the workshop on visualization for computer security (VizSEC 05)","author":"Lakkaraju K.","year":"2005"},{"key":"bibr37-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029219"},{"key":"bibr38-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1145\/990680.990699"},{"key":"bibr39-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1145\/1641587.1641590"},{"key":"bibr40-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1109\/THMS.2014.2369372"},{"key":"bibr41-0018720818769233","first-page":"265","volume-title":"Proceedings of the international workshop on recent advances in intrusion detection","author":"Muelder C.","year":"2005"},{"key":"bibr42-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1201\/b14774-4"},{"key":"bibr43-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1016\/j.apergo.2016.06.001"},{"key":"bibr44-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1201\/b15703"},{"key":"bibr45-0018720818769233","unstructured":"Obama B. (2009, May 29). Remarks by the President on securing our nation\u2019s cyber infrastructure. Retrieve June 19, 2017, from https:\/\/obamawhitehouse.archives.gov\/the-press-office\/remarks-president-securing-our-nations-cyber-infrastructure"},{"key":"bibr46-0018720818769233","first-page":"113","volume-title":"Proceedings of visualization for computer security (VizSEC 05)","author":"Oline A.","year":"2005"},{"key":"bibr47-0018720818769233","volume-title":"Supporting the visualization and forensic analysis of network events","author":"Phan D.","year":"2007"},{"key":"bibr48-0018720818769233","volume-title":"Information processing and human-machine interaction: An approach to cognitive engineering","author":"Rasmussen J.","year":"1986"},{"key":"bibr49-0018720818769233","volume-title":"Cognitive systems engineering","author":"Rasmussen J.","year":"1994"},{"key":"bibr50-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1016\/0020-7373(89)90014-X"},{"key":"bibr51-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1080\/10447319009525974"},{"key":"bibr52-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1177\/1071181312561084"},{"key":"bibr53-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1080\/1463922X.2014.930935"},{"key":"bibr54-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1983.1654471"},{"key":"bibr55-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1145\/102377.115768"},{"key":"bibr56-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1145\/2016904.2016907"},{"key":"bibr57-0018720818769233","unstructured":"Sushereba C. (n.d.). Comparison of cyber network defense visual displays. Masters thesis in preparation, Wright State University, Dayton, OH (available at OhioLINK, electronic thesis and dissertation center: https:\/\/etd.ohiolink.edu)."},{"key":"bibr58-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00219-9_2"},{"key":"bibr59-0018720818769233","volume-title":"Cyber security (CS) collaborative research alliance (CRA)","author":"U.S. Army","year":"2013"},{"key":"bibr60-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1099-1727(199624)12:4<251::AID-SDR108>3.0.CO;2-S"},{"key":"bibr61-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1201\/b12457"},{"key":"bibr62-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1016\/S1479-3601(01)01003-7"},{"key":"bibr63-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1518\/0018720024494829"},{"key":"bibr64-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1207\/s15326969eco0203_2"},{"key":"bibr65-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1109\/21.156574"},{"key":"bibr66-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1016\/j.apergo.2016.10.002"},{"key":"bibr67-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1207\/S15327590IJHC1104_1"},{"key":"bibr68-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(84)80043-7"},{"key":"bibr69-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-444-70536-5.50006-3"},{"key":"bibr70-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1016\/B978-044481862-1.50092-3"},{"key":"bibr71-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029214"},{"key":"bibr72-0018720818769233","doi-asserted-by":"publisher","DOI":"10.1109\/VAST.2012.6400516"}],"container-title":["Human Factors: The Journal of the Human Factors and Ergonomics Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/0018720818769233","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/0018720818769233","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/0018720818769233","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,28]],"date-time":"2025-02-28T22:04:08Z","timestamp":1740780248000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/0018720818769233"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,9]]},"references-count":72,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2018,8]]}},"alternative-id":["10.1177\/0018720818769233"],"URL":"https:\/\/doi.org\/10.1177\/0018720818769233","relation":{},"ISSN":["0018-7208","1547-8181"],"issn-type":[{"value":"0018-7208","type":"print"},{"value":"1547-8181","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,5,9]]}}}