TY - GEN N2 - In response to the increasingly ubiquitous, asynchronous, and pervasive use of cyber technology in everyday life, unique threats to cybersecurity (CS) have emerged requiring innovative and systemic solutions. Of the potential threats, Ubiquitous Technical Surveillance (UTS) presents one of the most acute generalized vulnerabilities facing the broader Intelligence Community (IC), Department of Defense (DoD), and United States Government. While security systems and networks have attempted to adapt to meet these evolving threats, internal organizational structures, culture, and human behavior often lag behind due to the inherent challenges in changing these dynamic variables. It is crucial that scientific disciplines identify systemic and innovative behavioral countermeasures that are informed by sub-disciplines of the psychology and CS literature. Innovative strategies involve collaboration amongst experts from the domains of social psychology, game theory, Bayesian statistics, and the IC, which will be discussed in-depth. DO - 10.1007/978-3-031-29807-3 DO - doi AB - In response to the increasingly ubiquitous, asynchronous, and pervasive use of cyber technology in everyday life, unique threats to cybersecurity (CS) have emerged requiring innovative and systemic solutions. Of the potential threats, Ubiquitous Technical Surveillance (UTS) presents one of the most acute generalized vulnerabilities facing the broader Intelligence Community (IC), Department of Defense (DoD), and United States Government. While security systems and networks have attempted to adapt to meet these evolving threats, internal organizational structures, culture, and human behavior often lag behind due to the inherent challenges in changing these dynamic variables. It is crucial that scientific disciplines identify systemic and innovative behavioral countermeasures that are informed by sub-disciplines of the psychology and CS literature. Innovative strategies involve collaboration amongst experts from the domains of social psychology, game theory, Bayesian statistics, and the IC, which will be discussed in-depth. T1 - Fostering innovation in the Intelligence Community :scientifically-informed solutions to combat a dynamic threat environment / AU - Gruber, Craig W., AU - Trachik, Benjamin, VL - volume 19 CN - QA76.9.A25 N1 - Includes index. ID - 1476115 KW - Social psychology. KW - Computer security KW - Ubiquitous computing KW - Psychologie sociale. KW - Sécurité informatique KW - Informatique omniprésente SN - 9783031298073 SN - 3031298071 TI - Fostering innovation in the Intelligence Community :scientifically-informed solutions to combat a dynamic threat environment / LK - https://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-031-29807-3 UR - https://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-031-29807-3 ER -