Decision Making

Enhancing Global Cybersecurity Resilience: Navigating the Subconscious Fallacies within Critical Infrastructure Protection

Abstract:

Amidst the digital revolution, cyber-enabled critical infrastructures are the foundation of societal operations. However, this interconnectivity introduces risks such as cascading failures where disruptions in the power grid affect multiple systems. Global collaboration becomes inescapable in forming holistic approaches that evolve alongside continuous technological advancements to enhance infrastructure resilience. Before these approaches can truly succeed, it is imperative to understand the decision-making processes within these environments and effectively mitigate biases that may alter priorities. This study investigates subconscious biases stemming from perceived solutions, intending to anticipate their potential impact on decision-making prioritization and enhance overall cybersecurity in critical infrastructure resilience.

Set Your Drones to Stun: Using Cyber-Secure Quadcopters to Disrupt Active Shooters

Abstract:

This paper will examine pairing the autonomous precision-flight capabilities of Micro- Unmanned Aerial Vehicles (UAVs) with the growing capability of Artificial Intelligence (specifically AI based on neuromorphic computing systems) to field cyber-secure, active-shooter response systems to counter the active-shooter threat to civilian ‘soft targets’, such as schools or train stations. This paper proposes a pilot to demonstrate the feasibility of disrupting terrorist attacks with a micro-UAV, armed with less than lethal weapons, for instance, a stun gun, where such a ‘stun-drone’ is part of an emergency-response system that is trustworthy and correctly engages only active shooters.

Is Social Media a Threat or Can It Be a Trusted Agent?

Abstract:

There is a prevailing belief within the United States Department of Defense (DOD) that social media is a threat to national security, leading to restrictions in workplace use of social-media applications. However, instead of dismissing social media as a threat, leaders should be asking whether or not the information received via social media can be trusted, thus leveraging the information-sharing capabilities of social media. This article presents a theoretical case for quantifying social media trustworthiness by exploring the factors that influence trust in social media and proposing a trust framework to be used to quantify trustworthiness.

The Potential of Collective Intelligence in Online Community Projects

ABSTRACT

This paper introduces the theoretical model of CI (Collective Intelligence) Potential Index for a scientific discussion. The index will allow users to identify and to analyse conditions that lead online communities to become more intelligent, inclusive, reflective, and safe. The subject of the research is online community projects, which include collective decision-making tools and innovation mechanisms fostering creativity, entrepreneurship, collaboration, new forms of self-regulation, and self-governance. The CI Potential Index (CIPI) will show the state and dynamics of the CI according to changes of various internal and external parameters. The data necessary for the identification of the CI Potential Index dimensions were collected using quantitative and qualitative research and will be revised during the scientific experiment. A longitudinal observation of a number of networked platforms will be undertaken to measure agreed-upon representative parameters. The value of the Index is that it defines capacity of the online community for aggregating and creating knowledge, for creativity and decision making, for self-organising, for adaptivity, and for the emergence of “swarm effect”.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

P

PDA

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com