TY - JOUR
T1 - Application of Algorithmic Cognitive Decision Trust Modeling for Cyber Security Within Organisations
AU - Rodgers, Waymond
AU - Attah-Boakye, Rexford
AU - Adams, Kweku
PY - 2020/9/16
Y1 - 2020/9/16
N2 - Cybercrime continues to cause increasing threat to business processes, eroding stakeholders’ trust in internet technologies. In this research paper, we explore how six dominant algorithmic trust positions facilitate cognitive processing, which, in turn, can influence an organisation’s productivity and align its values and support structures for combating cybercrimes. This conceptual paper uses a cognitive perspective described as a Throughput Model. This modeling perspective captures several dominant algorithmic trust positions for organisations, providing a new and powerful approach which seeks to enhance our understanding of the cognitive representation of decision-making processes. These trust positions are (1) rational-based trust, (2) rule-based trust, (3) category-based trust, (4) third-party based trust, (5) role-based trust, and (6) knowledge-based trust. Finally, we provide conclusions and implications for future research.
AB - Cybercrime continues to cause increasing threat to business processes, eroding stakeholders’ trust in internet technologies. In this research paper, we explore how six dominant algorithmic trust positions facilitate cognitive processing, which, in turn, can influence an organisation’s productivity and align its values and support structures for combating cybercrimes. This conceptual paper uses a cognitive perspective described as a Throughput Model. This modeling perspective captures several dominant algorithmic trust positions for organisations, providing a new and powerful approach which seeks to enhance our understanding of the cognitive representation of decision-making processes. These trust positions are (1) rational-based trust, (2) rule-based trust, (3) category-based trust, (4) third-party based trust, (5) role-based trust, and (6) knowledge-based trust. Finally, we provide conclusions and implications for future research.
KW - Cybercrime
KW - Cognitive processing
KW - Decision-making model
KW - Fraud triangle
KW - Throughput model
KW - Trust pathways
KW - cognitive processing
KW - fraud triangle
KW - throughput model
KW - decision-making model
KW - trust pathways
UR - http://www.scopus.com/inward/record.url?scp=85091295840&partnerID=8YFLogxK
U2 - 10.1109/TEM.2020.3019218
DO - 10.1109/TEM.2020.3019218
M3 - Article
JO - IEEE Transactions on Engineering Management
JF - IEEE Transactions on Engineering Management
SN - 0018-9391
ER -