Application of Algorithmic Cognitive Decision Trust Modeling for Cyber Security Within Organisations
نویسندگان
چکیده
Cybercrime continues to cause increasing threat business processes, eroding stakeholders’ trust in Internet technologies. In this article, we explore how six dominant algorithmic positions facilitate cognitive processing, which, turn, can influence an organization's productivity and align its values support structures for combating cybercrimes. This conceptual paper uses a perspective described as throughput model. modeling captures several organizations, providing new, powerful approach which seeks enhance our understanding of the representation decision-making processes. These are rational-based trust, rule-based category-based third-party based role-based knowledge-based trust. Finally, provide conclusion implications future research.
منابع مشابه
Introduction: trust within organisations
Introduces six empirical studies on trust within organisations which were originally presented at a workshop on “Trust within and between organisations”, organised by the European Institute for Advanced Studies in Management at the Free University Amsterdam, in November 2001. Areas covered include: the legitimacy of the field of study; common understandings and disagreements in theoretical idea...
متن کاملBusiness trust within virtual organisations
The development of Grid computing technologies has stimulated additional interest in the concept of the virtual organization, with the promise of ‘always available’ processing power seeming to offer sufficient processing power to overcome any technical obstacles to transparent global interorganizational working. However, whilst the academic literature has given much attention to the theory of v...
متن کاملCyber Security for Cyber Physcial Systems: a Trust-based Approach
CyberPhysical Systems (CPS) consist of a combination of different embedded subsystems, which work independently of each other and also interact with the external environment. Such embedded systems operate in the presence of inherent uncertainty, context dependencies and adversarial certainty arising from both the cyber and physical worlds. Security is one of the key concepts to shield the CPS e...
متن کاملModeling and Integrating Cognitive Agents Within the Emerging Cyber Domain
One of the elements missing from virtual environments in the emerging cyber domain is an element of active opposition. For example, in a training simulation the instructor assigns the student a task or objective, and the student then practices within the environment (the “cyber range”) until they feel comfortable with the task or are able to demonstrate the requisite level of mastery. The envir...
متن کاملDecision support approaches for cyber security investment
When investing in cyber security resources, information security managers have to follow effective decision-making strategies. We refer to this as the cyber security investment challenge. In this paper, we consider three possible decision support methodologies for security managers to tackle this challenge. We consider methods based on game theory, combinatorial optimisation, and a hybrid of th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Engineering Management
سال: 2022
ISSN: ['0018-9391', '1558-0040']
DOI: https://doi.org/10.1109/tem.2020.3019218