Application of Algorithmic Cognitive Decision Trust Modeling for Cyber Security Within Organisations

نویسندگان

چکیده

Cybercrime continues to cause increasing threat business processes, eroding stakeholders’ trust in Internet technologies. In this article, we explore how six dominant algorithmic positions facilitate cognitive processing, which, turn, can influence an organization's productivity and align its values support structures for combating cybercrimes. This conceptual paper uses a perspective described as throughput model. modeling captures several organizations, providing new, powerful approach which seeks enhance our understanding of the representation decision-making processes. These are rational-based trust, rule-based category-based third-party based role-based knowledge-based trust. Finally, provide conclusion implications future research.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Introduction: trust within organisations

Introduces six empirical studies on trust within organisations which were originally presented at a workshop on “Trust within and between organisations”, organised by the European Institute for Advanced Studies in Management at the Free University Amsterdam, in November 2001. Areas covered include: the legitimacy of the field of study; common understandings and disagreements in theoretical idea...

متن کامل

Business trust within virtual organisations

The development of Grid computing technologies has stimulated additional interest in the concept of the virtual organization, with the promise of ‘always available’ processing power seeming to offer sufficient processing power to overcome any technical obstacles to transparent global interorganizational working. However, whilst the academic literature has given much attention to the theory of v...

متن کامل

Cyber Security for Cyber Physcial Systems: a Trust-based Approach

CyberPhysical Systems (CPS) consist of a combination of different embedded subsystems, which work independently of each other and also interact with the external environment. Such embedded systems operate in the presence of inherent uncertainty, context dependencies and adversarial certainty arising from both the cyber and physical worlds. Security is one of the key concepts to shield the CPS e...

متن کامل

Modeling and Integrating Cognitive Agents Within the Emerging Cyber Domain

One of the elements missing from virtual environments in the emerging cyber domain is an element of active opposition. For example, in a training simulation the instructor assigns the student a task or objective, and the student then practices within the environment (the “cyber range”) until they feel comfortable with the task or are able to demonstrate the requisite level of mastery. The envir...

متن کامل

Decision support approaches for cyber security investment

When investing in cyber security resources, information security managers have to follow effective decision-making strategies. We refer to this as the cyber security investment challenge. In this paper, we consider three possible decision support methodologies for security managers to tackle this challenge. We consider methods based on game theory, combinatorial optimisation, and a hybrid of th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Engineering Management

سال: 2022

ISSN: ['0018-9391', '1558-0040']

DOI: https://doi.org/10.1109/tem.2020.3019218