A normative decision-making model for cyber security

Authors: M'MANGA, A., Faily, S., McAlaney, J., Williams, C., Kadobayashi, Y. and Miyamoto, D.

http://eprints.bournemouth.ac.uk/32131/

Journal: Information and Computer Security

Publisher: Emerald

ISSN: 2056-4961

This data was imported from DBLP:

Authors: M'manga, A., Faily, S., McAlaney, J., Williams, C., Kadobayashi, Y. and Miyamoto, D.

http://eprints.bournemouth.ac.uk/32131/

Journal: Inf. & Comput. Security

Volume: 27

This data was imported from Scopus:

Authors: M’manga, A., Faily, S., McAlaney, J., Williams, C., Kadobayashi, Y. and Miyamoto, D.

http://eprints.bournemouth.ac.uk/32131/

Journal: Information and Computer Security

Volume: 26

Issue: 5

Pages: 636-646

eISSN: 2056-497X

ISSN: 2056-4961

DOI: 10.1108/ICS-01-2019-0021

© 2019, Emerald Publishing Limited. Purpose: The purpose of this paper is to investigate security decision-making during risk and uncertain conditions and to propose a normative model capable of tracing the decision rationale. Design/methodology/approach: The proposed risk rationalisation model is grounded in literature and studies on security analysts’ activities. The model design was inspired by established awareness models including the situation awareness and observe–orient–decide–act (OODA). Model validation was conducted using cognitive walkthroughs with security analysts. Findings: The results indicate that the model may adequately be used to elicit the rationale or provide traceability for security decision-making. The results also illustrate how the model may be applied to facilitate design for security decision makers. Research limitations/implications: The proof of concept is based on a hypothetical risk scenario. Further studies could investigate the model’s application in actual scenarios. Originality/value: The paper proposes a novel approach to tracing the rationale behind security decision-making during risk and uncertain conditions. The research also illustrates techniques for adapting decision-making models to inform system design.

This data was imported from Web of Science (Lite):

Authors: M'manga, A., Faily, S., McAlaney, J., Williams, C., Kadobayashi, Y. and Miyamoto, D.

http://eprints.bournemouth.ac.uk/32131/

Journal: INFORMATION AND COMPUTER SECURITY

Volume: 26

Issue: 5

Pages: 636-646

ISSN: 2056-4961

DOI: 10.1108/ICS-01-2019-0021

The data on this page was last updated at 05:12 on February 21, 2020.