The article I decided to review is “The use of simulation in economic cybersecurity decision making.” Relating to simulation and how this topic relates to social sciences, -the study of human society and social connections. In this case, this article examines ideas of simulating procedures within organizations, in hopes these users gain knew knowledge. Some statistical evidence may contradict these factors, and some might argue that traditional implementations are best. Researchers used inductive and deductive interpretation to highlight the importance of simulation decision making. Optics shown in the article differ based on the simulations that teach consequence, advancing in probability, and incorporating both consequence and probability.
The idea that booking and abstractions roles are critical and should enforce policies and strategies for people to follow. These ideas are interchangeable, and users should learn of frequent adjustments when needed, and users should be aware of these updates. By impending bookkeeping features, one can focus data details and implementations of abstractions gives a clear depiction for a more balanced approach.
Some challenges and concerns about simulation decision making is the uncertainty on how effective the infrastructure will be. Much like human errors, people can be uncertain of potential mistakes we make. Researchers consider ideas of tasks for users as materials advance, adaptability and effectiveness. Some tasks can be overwhelming for an individual, so it is important clarify regulations in simulation assignments. As we have discussed cyber victimization previously, this could be an addition in simulation decision making, the ideas of simulation are to help prepare users for potential features that cybersecurity will present.
Concluding the information in this article, the data states would be a useful too for users in society. Benefits included in the simulation idea is new information processing, forming an analysis, and understanding legitimate cyber laws and crimes.
https://academic.oup.com/cybersecurity/article/11/1/tyaf003/8011238?searchresult=1