{"id":"https://openalex.org/W4414054729","doi":"https://doi.org/10.1109/tem.2025.3606637","title":"Augmenting Digital Ecosystem Resilience Through Human-Centric Cybersecurity Solutions","display_name":"Augmenting Digital Ecosystem Resilience Through Human-Centric Cybersecurity Solutions","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4414054729","doi":"https://doi.org/10.1109/tem.2025.3606637"},"language":"en","primary_location":{"id":"doi:10.1109/tem.2025.3606637","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tem.2025.3606637","pdf_url":null,"source":{"id":"https://openalex.org/S154533451","display_name":"IEEE Transactions on Engineering Management","issn_l":"0018-9391","issn":["0018-9391","1558-0040"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Engineering Management","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054836950","display_name":"Zahir Tari","orcid":"https://orcid.org/0000-0002-1235-9673"},"institutions":[{"id":"https://openalex.org/I82951845","display_name":"RMIT University","ror":"https://ror.org/04ttjf776","country_code":"AU","type":"education","lineage":["https://openalex.org/I82951845"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Zahir Tari","raw_affiliation_strings":["School of Computing Technologies, Centre of Cyber Security Research and Innovation, RMIT University, Melbourne, VIC, Australia","School of Computing Technologies, Centre of Cyber Security Research and Innovation (CCSRI), RMIT University, Melbourne, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing Technologies, Centre of Cyber Security Research and Innovation, RMIT University, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I82951845"]},{"raw_affiliation_string":"School of Computing Technologies, Centre of Cyber Security Research and Innovation (CCSRI), RMIT University, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I82951845"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5081504839","display_name":"Redowan Mahmud","orcid":"https://orcid.org/0000-0003-0785-0457"},"institutions":[{"id":"https://openalex.org/I205640436","display_name":"Curtin University","ror":"https://ror.org/02n415q13","country_code":"AU","type":"education","lineage":["https://openalex.org/I205640436"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Redowan Mahmud","raw_affiliation_strings":["School of Electrical Engineering, Computing and Mathematical Sciences, Curtin University, Bentley, WA, Australia"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering, Computing and Mathematical Sciences, Curtin University, Bentley, WA, Australia","institution_ids":["https://openalex.org/I205640436"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5054836950"],"corresponding_institution_ids":["https://openalex.org/I82951845"],"apc_list":null,"apc_paid":null,"fwci":1.3682,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.84719819,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"72","issue":null,"first_page":"3892","last_page":"3908"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.8052999973297119,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.8052999973297119,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.7332000136375427,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.7300999760627747,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.6639000177383423},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.4278999865055084},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.42320001125335693},{"id":"https://openalex.org/keywords/precision-and-recall","display_name":"Precision and recall","score":0.3912999927997589},{"id":"https://openalex.org/keywords/decision-support-system","display_name":"Decision support system","score":0.37630000710487366},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.375},{"id":"https://openalex.org/keywords/psychological-resilience","display_name":"Psychological resilience","score":0.323199987411499},{"id":"https://openalex.org/keywords/digital-data","display_name":"Digital data","score":0.3167000114917755}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7545999884605408},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.6639000177383423},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4964999854564667},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.4278999865055084},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.42320001125335693},{"id":"https://openalex.org/C81669768","wikidata":"https://www.wikidata.org/wiki/Q2359161","display_name":"Precision and recall","level":2,"score":0.3912999927997589},{"id":"https://openalex.org/C107327155","wikidata":"https://www.wikidata.org/wiki/Q330268","display_name":"Decision support system","level":2,"score":0.37630000710487366},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.375},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3702000081539154},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.33570000529289246},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.323199987411499},{"id":"https://openalex.org/C2778864079","wikidata":"https://www.wikidata.org/wiki/Q173285","display_name":"Digital data","level":3,"score":0.3167000114917755},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.29899999499320984},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.29589998722076416},{"id":"https://openalex.org/C196879817","wikidata":"https://www.wikidata.org/wiki/Q872685","display_name":"Data governance","level":4,"score":0.29350000619888306},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.2922999858856201},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.28540000319480896},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.2831000089645386},{"id":"https://openalex.org/C126082660","wikidata":"https://www.wikidata.org/wiki/Q4252370","display_name":"Digital transformation","level":2,"score":0.2809999883174896},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.2660999894142151},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.25429999828338623},{"id":"https://openalex.org/C2780264999","wikidata":"https://www.wikidata.org/wiki/Q7445032","display_name":"Security domain","level":2,"score":0.2531000077724457},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.25189998745918274},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2513999938964844}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tem.2025.3606637","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tem.2025.3606637","pdf_url":null,"source":{"id":"https://openalex.org/S154533451","display_name":"IEEE Transactions on Engineering Management","issn_l":"0018-9391","issn":["0018-9391","1558-0040"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Engineering Management","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2284759612","https://openalex.org/W4402320089","https://openalex.org/W4407154879","https://openalex.org/W4410074107","https://openalex.org/W4378555281","https://openalex.org/W2953081822","https://openalex.org/W4414050861","https://openalex.org/W2752145644","https://openalex.org/W2387040017"],"abstract_inverted_index":{"As":[0],"more":[1],"of":[2,57,90,93,151,218,227,285,287,310],"our":[3,152],"personal,":[4],"social,":[5],"and":[6,24,50,100,103,111,173,192,208,233,239,268,282,336],"economic":[7],"activities":[8],"move":[9],"online,":[10],"the":[11,39,55,149,201,248,256,283,288,293],"systems":[12],"that":[13,78,122,141,188,221,230,314,328],"support":[14,164,325],"them,":[15],"known":[16],"as":[17,96,163,214],"digital":[18],"ecosystems,":[19],"are":[20,222,231],"becoming":[21],"increasingly":[22],"complex":[23],"vulnerable":[25],"to":[26,108,113,143,180,264,296],"cyberattacks.":[27],"While":[28],"many":[29],"cybersecurity":[30,81,338],"solutions":[31],"focus":[32],"on":[33],"technical":[34,251],"threats,":[35],"they":[36],"often":[37],"overlook":[38],"human":[40],"element,":[41],"which":[42],"remains":[43],"a":[44,76,88,104,119,137,184,259],"critical":[45],"weakness.":[46],"People's":[47],"perceptions,":[48],"behaviours,":[49],"decisions":[51],"can":[52],"significantly":[53],"impact":[54],"security":[56,125,318],"these":[58,65,308],"systems,":[59],"but":[60],"current":[61],"approaches":[62,327],"rarely":[63],"take":[64],"factors":[66],"into":[67,279],"account.":[68],"This":[69],"paper":[70],"addresses":[71],"this":[72],"gap":[73],"by":[74,134,321],"proposing":[75],"system":[77,86,202,257],"interprets":[79],"human-related":[80],"data":[82,94,171,206],"in":[83],"context.":[84],"The":[85,271],"uses":[87],"combination":[89],"multiple":[91],"types":[92,309],"(such":[95],"user":[97,129,145,260,280],"activity":[98],"logs":[99],"behavioural":[101],"indicators)":[102],"structured":[105],"classification":[106],"method":[107],"better":[109,329],"understand":[110,297],"respond":[112],"user-related":[114],"risks.":[115],"We":[116,196,290],"also":[117,197,291],"introduce":[118],"reference":[120],"model":[121],"blends":[123],"zero-trust":[124],"(which":[126,167,176],"assumes":[127],"no":[128],"or":[130,303],"device":[131],"is":[132],"trusted":[133],"default)":[135],"with":[136,276,316,331],"flexible":[138],"trust":[139],"framework":[140],"adapts":[142],"individual":[144],"needs.":[146],"To":[147],"evaluate":[148],"effectiveness":[150],"approach,":[153],"we":[154,253,312],"compare":[155],"it":[156],"against":[157],"established":[158],"machine":[159],"learning":[160],"techniques,":[161],"such":[162,213],"vector":[165],"machines":[166],"identify":[168],"boundaries":[169],"between":[170,237],"groups)":[172],"random":[174],"forests":[175],"utilise":[177],"decision":[178],"rules":[179],"classify":[181],"data),":[182],"using":[183],"publicly":[185],"available":[186],"dataset":[187],"simulates":[189],"both":[190,265],"normal":[191],"malicious":[193],"computer":[194],"activity.":[195],"assess":[198],"how":[199,332],"well":[200],"performs":[203],"when":[204],"reducing":[205],"complexity":[207],"report":[209],"standard":[210],"performance":[211],"metrics,":[212],"precision":[215,238],"(the":[216,225],"percentage":[217,226],"flagged":[219],"risks":[220,229],"correct),":[223],"recall":[224],"real":[228],"detected),":[232],"F1-score":[234],"(a":[235],"balance":[236],"recall).":[240],"Our":[241],"results":[242],"show":[243],"an":[244],"11%":[245],"improvement":[246],"over":[247],"benchmarks.":[249],"Beyond":[250],"performance,":[252],"further":[254],"evaluated":[255],"through":[258],"study.":[261],"Participants":[262],"responded":[263],"rating-scale":[266],"questions":[267],"open-ended":[269],"questions.":[270],"numerical":[272],"responses":[273],"provided":[274],"us":[275],"measurable":[277],"insights":[278],"satisfaction":[281],"ease":[284],"use":[286,335],"system.":[289],"analysed":[292],"written":[294],"comments":[295],"whether":[298],"users":[299],"had":[300],"positive,":[301],"neutral,":[302],"adverse":[304],"reactions.":[305],"By":[306],"combining":[307],"feedback,":[311],"found":[313],"agreement":[315],"user-friendly":[317],"practices":[319],"increased":[320],"15%,":[322],"indicating":[323],"growing":[324],"for":[326],"align":[330],"people":[333],"actually":[334],"experience":[337],"tools.":[339]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
