The Intersection of Artificial Intelligence and Human Decision-Making in Cybersecurity Resilience: Business Analysis Perspective

Authors

DOI:

https://doi.org/10.63084/cognexus.v1i02.58

Keywords:

Artificial Intelligence, Human, Decision Making, Cybersecurity Resilience, Business Analysis

Abstract

This review investigated the complex interplay of Artificial Intelligence (AI) with human decision in building cybersecurity resilience from a business analysis viewpoint. It investigated how AI can optimize human decision-making, escalate security measures, and guarantee swift action in response to any form of cyber-attack while factoring in the contribution of human judgment, intuition, and oversight into consideration for intense decisions. This review further investigated the impact of automation AI on information technology security risks in conjunction with human strategic management, focusing on their collective role in enhancing and sustaining cybersecurity resilience in organizations and across sectors. Existing credible journals and materials formed the datasets utilised for this review. Findings from examined journals and materials were presented thematically. Key findings revealed that the role of human decision-making in building AI cybersecurity resilience is critical. Stakeholders in AI cybersecurity need to properly integrate human factors to build concrete resilience against various cyber-attacks.

References

Aldahdooh, A., Hamidouche, W., Fezza, S. A., & Déforges, O. (2022). Adversarial example detection for DNN models: A review and experimental comparison. Artificial Intelligence Review, 55(6), 4403–4462.

Alevizos, L., & Dekker, M. (2024). Towards an AI-enhanced cyber threat intelligence processing pipeline. arXiv preprint, arXiv:2403.03265.

Anthony, H. M., Braimoh, J. J., & Ehigie, D. E. (2021). Challenges and adaptations in implementing e-learning for second language acquisition in Nigerian schools during the COVID-19 pandemic: A methodological analysis. Journal of Emerging Technologies and Innovative Research, 8(9), 407–419.

Arakpogun, E. O., Elsahn, Z., Olan, F., & Elsahn, F. (2021). Artificial intelligence in Africa: Challenges and opportunities. In The Fourth Industrial Revolution: Implementation of Artificial Intelligence for Growing Business Success (pp. 375–388).

Banik, S., & Dandyala, S. S. M. (2023). The role of artificial intelligence in cybersecurity opportunities and threats. International Journal of Advanced Engineering Technologies and Innovations, 1(04), 420–440.

Bécue, A., Praça, I., & Gama, J. (2021). Artificial intelligence, cyber-threats and Industry 4.0: Challenges and opportunities. Artificial Intelligence Review, 54(5), 3849–3886.

Bernadette, B.-A., Latifat, O. A., & Ogedengbe, D. E. (2022). Integrative HR approaches in mergers and acquisitions ensuring seamless organizational synergies. Magna Scientia Advanced Research and Reviews, 6(1), 078–085.

Bonfanti, M. E. (2022). Artificial intelligence and the offence-defence balance in cyber security. In Cyber Security: Socio-Technological Uncertainty and Political Fragmentation (pp. 64–79). London: Routledge.

Bossaerts, P., & Murawski, C. (2017). Computational complexity and human decision-making. Trends in Cognitive Sciences, 21(12), 917–929.

Braimoh, J. J. (2024). Texting language as a digital symbolic current: Implications for pragmatics and intercultural communication in the digital age. Journal of Studies in Language, Culture, and Society, 7(2), 199–208.

Char, D. S., Abràmoff, M. D., & Feudtner, C. (2020). Identifying ethical considerations for machine learning healthcare applications. The American Journal of Bioethics, 20(11), 7–17.

Chowdhry, D. G., Verma, R., & Mathur, M. (2020). The Evolution of Business in the Cyber Age: Digital Transformation, Threats, and Security. CRC Press.

Darktrace. (2022). Darktrace AI: Combining Supervised and Unsupervised Machine Learning. https://darktrace.com/resources/darktrace-ai-combining-supervised-and-unsupervised-machine

Dash, B., Sharma, P., & Ali, A. (2022). Federated learning for privacy-preserving: A review of PII data analysis in Fintech. International Journal of Software Engineering & Applications (IJSEA), 13(4).

Dhabliya, D., Gujar, S. N., Dhabliya, R., Chavan, G. T., Kalnawat, A., & Bendale, S. P. (2023). Temporal intelligence in AI-enhanced cyber forensics using time-based analysis for proactive threat detection. Journal of Electrical Systems, 19(3), 126–146.

Egbuna, O. P. (2021). The impact of AI on cybersecurity: Emerging threats and solutions. Journal of Science & Technology, 2(2), 43–67.

Esezoobo, S. O., & Braimoh, J. J. (2023). Integrating legal, ethical, and technological strategies to mitigate AI deepfake risks through strategic communication. International Journal of Scientific Research and Management, 11(08), 914–928. https://doi.org/10.18535/ijsrm/v11i08.ec02

Fontes, C., Hohma, E., Corrigan, C. C., & Lütge, C. (2022). AI-powered public surveillance systems: Why we (might) need them and how we want them. Technology in Society, 71, 102137.

Ganesh, A. D., & Kalpana, P. (2022). Future of artificial intelligence and its influence on supply chain risk management–A systematic review. Computers & Industrial Engineering, 169, 108206.

Golbin, I., Rao, A. S., Hadjarian, A., & Krittman, D. (2020). Responsible AI: A primer for the legal community. In 2020 IEEE International Conference on Big Data (Big Data) (pp. 2121–2126). IEEE.

Google. (2023). Project Shield. https://projectshield.withgoogle.com/

Hamon, R., Junklewitz, H., Sanchez, I., Malgieri, G., & De Hert, P. (2022). Bridging the gap between AI and explainability in the GDPR: Towards trustworthiness-by-design in automated decision-making. IEEE Computational Intelligence Magazine, 17(1), 72–85.

Hoffman, W. (2021). AI and the future of cyber competition. CSET Issue Brief, 1–35.

Hummelholm, A. (2023). AI-based quantum-safe cybersecurity automation and orchestration for edge intelligence in future networks. European Conference on Cyber Warfare and Security.

IBM. (2023). Watson for Cyber Security. https://www.ibm.com/security/artificial-intelligence

Jarrahi, M. H. (2018). Artificial intelligence and the future of work: Human–AI symbiosis in organizational decision making. Business Horizons.

Jimmy, F. (2021). Emerging threats: The latest cybersecurity risks and the role of artificial intelligence in enhancing cybersecurity defenses. Valley International Journal Digital Library, 564–574.

Johnson, J. (2019). The AI–cyber nexus: Implications for military escalation, deterrence, and strategic stability. Journal of Cyber Policy, 4(3), 442–460.

Kapoor, R., & Ghosal, I. (2022). Will artificial intelligence compliment or supplement the human workforce in organizations? A shift to a collaborative human–machine environment. International Journal on Recent Trends in Business and Tourism.

Kinyua, J., & Awuah, L. (2021). AI/ML in security orchestration, automation and response: Future research directions. Intelligent Automation & Soft Computing, 28(2).

Langer, M., Oster, D., Speith, T., Hermanns, H., Kästner, L., Schmidt, E., Sesing, A., & Baum, K. (2021). What do we want from explainable artificial intelligence (XAI)? – A stakeholder perspective on XAI and a conceptual model guiding interdisciplinary XAI research. Artificial Intelligence, 296, 103473.

Laux, J. (2023). Institutionalised distrust and human oversight of artificial intelligence: Toward a democratic design of AI governance under the European Union AI Act. SSRN Electronic Journal.

Lee, H. W., Han, T. H., & Lee, T. (2023). Reference-based AI decision support for cybersecurity. IEEE Access, 11, 143324–143339.

Lescrauwaet, L., Wagner, H., Yoon, C., & Shukla, S. (2022). Adaptive legal frameworks and economic dynamics in emerging technologies: Navigating the intersection for responsible innovation. Law and Economics, 16(3), 202–220.

Maddireddy, B. R., & Maddireddy, B. R. (2021). Cybersecurity threat landscape: Predictive modelling using advanced AI algorithms. Revista Española de Documentación Científica, 15(4), 126–153.

Marda, V. (2018). Artificial intelligence policy in India: A framework for engaging the limits of data-driven decision-making. Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, 376(2133), 20180087.

Omoregie, I., Anthony, H. M., & Braimoh, J. J. (2025). Comparative analysis of instructional models for designing effective online courses: ADDIE, SAM, and Dick & Carey approaches. Journal of Languages & Translation, 5(1), 33–45.

Onomejoh, P., Ehigie, D. E., Igbinovia, O., & Braimoh, J. J. (2024). Navigating cultural sensitivity in translation: The role of interpersonal communication in translating sensitive narratives. Journal of Science and Knowledge Horizons, 4(2), 204–229. https://doi.org/10.34118/jskp.v4i02.4020

Ronchi, A. M. (2022). Human factor, resilience, and cyber/hybrid influence. Information & Security, 53(2), 221–239.

Shah, V. (2021). Machine learning algorithms for cybersecurity: Detecting and preventing threats. Revista Española de Documentación Científica, 15(4), 42–66.

Sitton, M., & Reich, Y. (2018). EPIC framework for enterprise processes integrative collaboration. Systems Engineering, 21, 30–46.

Sontan, A. D., & Samuel, S. V. (2024). The intersection of artificial intelligence and cybersecurity: Challenges and opportunities. World Journal of Advanced Research and Reviews, 21(2), 1720–1736.

Stevens, T. (2020). Knowledge in the grey zone: AI and cybersecurity. Digital War, 1(1), 164–170.

Thapa, C., & Camtepe, S. (2021). Precision health data: Requirements, challenges and existing techniques for data security and privacy. Computers in Biology and Medicine, 129, 104130.

Tschider, C. A. (2020). Beyond the "black box". Denver Law Review, 98, 683.

Umoh, B., Bello, A. A., Okika, N., Ukatu, C. E., & Kabiru, A. O. (2025). The intersection of artificial intelligence and human decision-making in cybersecurity resilience: Business analysis perspective. CogNexus, 1(2), 1–21.

Vaseashta, A. (2022). Nexus of advanced technology platforms for strengthening cyber-defense capabilities. In Practical Applications of Advanced Technologies for Enhancing Security and Defense Capabilities: Perspectives and Challenges for the Western Balkans (pp. 14–31). IOS Press.

Verma, R., Koul, S., & Ajaygopal, K. V. (2023). Evaluation and selection of a cybersecurity platform ─ Case of the power sector in India. Decision Making: Applications in Management and Engineering.

Whyte, C. (2020). Problems of poison: New paradigms and "agreed" competition in the era of AI-enabled cyber operations. In 2020 12th International Conference on Cyber Conflict (CyCon) (Vol. 1300, pp. 215–232).

Downloads

Published

2025-04-06

How to Cite

Umoh, B. U., Bello, A., Okika, N., Ukatu, C. E., & Kabiru, A. O. (2025). The Intersection of Artificial Intelligence and Human Decision-Making in Cybersecurity Resilience: Business Analysis Perspective. CogNexus, 1(02), 26–36. https://doi.org/10.63084/cognexus.v1i02.58

Issue

Section

Articles

Similar Articles

1 2 > >> 

You may also start an advanced similarity search for this article.