a team of employees at an online retailing company are being trained on cyber surveillance and user security. as part of their training, they are working to identify a solution to the problem of cyber-phishing and data breaches. which group-building method is being employed by this team?