Date of Award
Master of Science
Department of Systems Engineering and Management
Jason M. Turner, PhD
Understanding the cognitive process of IT user suspicion may assist organizations in development of network protection plans, personnel training, and tools necessary to identify and mitigate nefarious intrusions of IT systems. Exploration of a conceptual common ground between psycho-social and technology-related concepts of suspicion are the heart of this investigation. The complexities involved in merging these perspectives led to the overall research question: What is the nature of user suspicion toward IT: The research problem/phenomenon was addressed via extensive literature review, and use of the Interactive Qualitative Analysis problem/phenomenon. Analysis of the system led to the development of a model of IT suspicion as a progenitor for future experimental constructs that measure or assess behavior as a result of cyber attacks.
DTIC Accession Number
Paguirigan, Henry G., "Suspicion Modeling in Support of Cyber-Influence Operations/Tactics" (2008). Theses and Dissertations. 2861.