TY - JOUR
T1 - Application of Algorithmic Cognitive Decision Trust Modeling for Cyber Security Within Organisations
AU - Rodgers, Waymond
AU - Attah-Boakye, Rexford
AU - Adams, Kweku
N1 - Publisher Copyright:
© 1988-2012 IEEE.
PY - 2022/12/1
Y1 - 2022/12/1
N2 - Cybercrime continues to cause increasing threat to business processes, eroding stakeholders' trust in Internet technologies. In this article, we explore how six dominant algorithmic trust positions facilitate cognitive processing, which, in turn, can influence an organization's productivity and align its values and support structures for combating cybercrimes. This conceptual paper uses a cognitive perspective described as a throughput model. This modeling perspective captures several dominant algorithmic trust positions for organizations, providing a new, and powerful approach which seeks to enhance our understanding of the cognitive representation of decision-making processes. These trust positions are rational-based trust, rule-based trust, category-based trust, third-party based trust, role-based trust, and knowledge-based trust. Finally, we provide conclusion and implications for future research.
AB - Cybercrime continues to cause increasing threat to business processes, eroding stakeholders' trust in Internet technologies. In this article, we explore how six dominant algorithmic trust positions facilitate cognitive processing, which, in turn, can influence an organization's productivity and align its values and support structures for combating cybercrimes. This conceptual paper uses a cognitive perspective described as a throughput model. This modeling perspective captures several dominant algorithmic trust positions for organizations, providing a new, and powerful approach which seeks to enhance our understanding of the cognitive representation of decision-making processes. These trust positions are rational-based trust, rule-based trust, category-based trust, third-party based trust, role-based trust, and knowledge-based trust. Finally, we provide conclusion and implications for future research.
KW - Cybercrime
KW - Cognitive processing
KW - Decision-making model
KW - Fraud triangle
KW - Throughput model
KW - Trust pathways
KW - cognitive processing
KW - fraud triangle
KW - throughput model
KW - decision-making model
KW - trust pathways
UR - http://www.scopus.com/inward/record.url?scp=85091295840&partnerID=8YFLogxK
U2 - 10.1109/TEM.2020.3019218
DO - 10.1109/TEM.2020.3019218
M3 - Article
VL - 69
SP - 3792
EP - 3801
JO - IEEE Transactions on Engineering Management
JF - IEEE Transactions on Engineering Management
SN - 0018-9391
IS - 6
ER -