IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Cyber Security Model of Artificial Social System Man-Machine

Cyber Security Model of Artificial Social System Man-Machine
View Sample PDF
Author(s): Calin Ciufudean (Stefan cel Mare University, Romania)
Copyright: 2015
Pages: 15
Source title: Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance
Source Author(s)/Editor(s): Maria Manuela Cruz-Cunha (Polytechnic Institute of Cavado and Ave, Portugal)and Irene Maria Portela (Polytechnic Institute of Cávado and Ave, Portugal)
DOI: 10.4018/978-1-4666-6324-4.ch031

Purchase

View Cyber Security Model of Artificial Social System Man-Machine on the publisher's website for pricing and purchasing information.

Abstract

Cyber Security Model of Artificial Social System Man-Machine takes advantage of an important chapter of artificial intelligence, discrete event systems applied for modelling and simulation of control, logistic supply, chart positioning, and optimum trajectory planning of artificial social systems. “An artificial social system is a set of restrictions on agents` behaviours in a multi-agent environment. Its role is to allow agents to coexist in a shared environment and pursue their respective goals in the presence of other agents” (Moses & Tennenholtz, n.d.). Despite conventional approaches, Cyber Security Model of Artificial Social System Man-Machine is not guided by rigid control algorithms but by flexible, event-adaptable ones that makes them more lively and available. All these allow a new design of artificial social systems dotted with intelligence, autonomous decision-making capabilities, and self-diagnosing properties. Heuristics techniques, data mining planning activities, scheduling algorithms, automatic data identification, processing, and control represent as many trumps for these new systems analyzing formalism. The authors challenge these frameworks to model and simulate the interaction of man-machine in order to have a better look at the human, social, and organizational privacy and information protection.

Related Content

Hossam Nabil Elshenraki. © 2024. 23 pages.
Ibtesam Mohammed Alawadhi. © 2024. 9 pages.
Akashdeep Bhardwaj. © 2024. 33 pages.
John Blake. © 2024. 12 pages.
Wasswa Shafik. © 2024. 36 pages.
Amar Yasser El-Bably. © 2024. 12 pages.
Sameer Saharan, Shailja Singh, Ajay Kumar Bhandari, Bhuvnesh Yadav. © 2024. 23 pages.
Body Bottom