Evolving OWA operators for cyber security decision making problems

Author(s):  
Simon Miller ◽  
Jonathan M. Garibaldi ◽  
Susan Appleby
Symmetry ◽  
2020 ◽  
Vol 12 (4) ◽  
pp. 664 ◽  
Author(s):  
Rajeev Kumar ◽  
Abhishek Kumar Pandey ◽  
Abdullah Baz ◽  
Hosam Alhakami ◽  
Wajdi Alhakami ◽  
...  

Growing concern about healthcare information security in the wake of alarmingly rising cyber-attacks is being given symmetrical priority by current researchers and cyber security experts. Intruders are penetrating symmetrical mechanisms of healthcare information security continuously. In the same league, the paper presents an overview on the current situation of healthcare information and presents a layered model of healthcare information management in organizations. The paper also evaluates the various factors that have a key contribution in healthcare information security breaches through a hybrid fuzzy-based symmetrical methodology of AHP-TOPSIS. Furthermore, for assessing the effect of the calculated results, the authors have tested the results on local hospital software of Varanasi. Tested results of the factors are validated through the comparison and sensitivity analysis in this study. Tabulated results of the proposed study propose a symmetrical mechanism as the most conversant technique which can be employed by the experts and researchers for preparing security guidelines and strategies.


2020 ◽  
pp. 446-464
Author(s):  
Suhaila Ismail ◽  
Elena Sitnikova ◽  
Jill Slay

Past cyber-attacks on Supervisory Control and Data Acquisition (SCADA) Systems for Critical infrastructures have left these systems compromised and caused financial and economic problems. Deliberate attacks have resulted in denial of services and physical injury to the public in certain cases. This study explores the past attacks on SCADA Systems by examining nine case studies across multiple utility sectors including transport, energy and water and sewage sector. These case studies will be further analysed according to the cyber-terrorist decision-making theories including strategic, organisational and psychological theories based on McCormick (2000). Next, this study will look into cyber-terrorist capabilities in conducting attacks according to Nelson's (1999) approach that includes simple-unstructured, advance-structured and complex-coordinated capabilities. The results of this study will form the basis of a guideline that organisations can use so that they are better prepared in identifying potential future cybersecurity attacks on their SCADA systems.


Author(s):  
Luisa dall'Acqua

Because of the huge amount of data and information in the decision-making and strategic choices processes, basing decisions on information directly collected from the sources is not conceivable. A decision-making analyst becomes a fundamental pillar in both the corporate field and the institutional world. This role is becoming increasingly complex and specialized, critical within the cycle of the intelligence analysis, for the relationships that bind it to the other stakeholders, and for the methodological and technological tools that support it. The purpose of this chapter is to explore the milestones of the intelligence analysis deriving from a close collaboration between social sciences, cognitive science, computer engineering, and ICT in order to respond to the different needs in the field of risk management, safety, investigations, and applied intelligence.


Author(s):  
Nimisha Bhargava ◽  
Mani Kumari Madala ◽  
Darrell Norman Burrell

Emotional acumen is relatively a new concept compared to the other decision-making variables in the existing literature. Comprehending the procedure in which the individuals captivate themselves in ethical decision-making and the factors stimulating this procedure may be imperative for burgeoning more efficient education for ethics. The U.S. Securities and Exchange Commission issued new guidance calling on public companies to be more forthcoming when disclosing nature and scope of cybersecurity breaches. The statement also warns that corporate insiders must not trade shares when they have information about cybersecurity issues that is not public yet. Understanding the emotional underpinnings is critical to guiding how individuals deal with the complex nature of morally infused predicaments, their awareness of the moral dilemma, judgments about the potential consequences and their intention to act or propensity to whistle-blow related to cybersecurity breaches are significantly affected by the emotional acumen.


Author(s):  
Timothy P. Hanratty ◽  
E. Allison Newcomb ◽  
Robert J. Hammell II ◽  
John T. Richardson ◽  
Mark R. Mittrick

Data for military intelligence operations are increasing at astronomical rates. As a result, significant cognitive and temporal resources are required to determine which information is relevant to a particular situation. Soft computing techniques, such as fuzzy logic, have recently been applied toward decision support systems to support military intelligence analysts in selecting relevant and reliable data within the military decision making process. This article examines the development of one such system and its evaluation using a constructive simulation and human performance model to provided critical understanding of how this conceptual information system might interact with personnel, organizational, and system architectures. In addition, similarities between military intelligence analysts and cyber intelligence analysts are detailed along with a plan for transitioning the current fuzzy-based system to the cyber security domain.


Sign in / Sign up

Export Citation Format

Share Document