Optimizing AI and Human Expertise Integration in Cybersecurity: Enhancing Operational Efficiency and Collaborative Decision-Making
Mehdi Saadallah*, Abbas Shahim, and Svetlana Khapova
January 30, 2025
DOI : 10.56831/PSEN-06-177
Abstract
This systematic literature review draws into multiple theories, such as resource-based view, sociotechnical systems theory, technology acceptance model, dynamic capabilities theory, contingency theory, cybernetic, and human machine interaction Theory, to explore how artificial intelligence, automation, and human expertise can optimize cybersecurity operations through complementary roles and continuous feedback mechanisms. The outcomes of this study introduce two conceptual models that respond to this objective. The symbiotic integration framework, which promotes continuous interaction and ethical oversight between AI systems and human operators, and the symbiotic maturity integration model, which maps the progressive stages of AI-human integration from initial to optimized. This study addresses the literature gaps related to the symbiotic relationship between AI and human expertise in cybersecurity operations, providing a pathway for adaptive, resilient cybersecurity practices that align with organizational values and enhance defensive capabilities in a dynamic threat landscape.
Keywords: Systematic literature review; Automation in Cyber Defense; Artificial Intelligence Integration; AI-Human Interaction; Operational Effectiveness; AI in Threat Detection; Cybersecurity Decision-Making
References
- Admass WS, YY Munaye and A Diro. “Cyber security: State of the art, challenges and future directions”. Cyber Security and Applications (2023): 100031.
- Familoni BT. “Cybersecurity challenges in the age of AI: theoretical approaches and practical solutions”. Computer Science & IT Research Journal 5.3 (2024): 703-724.
- DeCusatis C., et al. “Design and implementation of a research and education cybersecurity operations center”. Cybersecurity and Secure Information Systems: Challenges and Solutions in Smart Environments (2019): 287-310.
- Nyre-Yu M, RS Gutzwiller and BS Caldwell. “Observing Cyber Security Incident Response: Qualitative Themes From Field Research”. Proceedings of the Human Factors and Ergonomics Society Annual Meeting 63 (2019): 437-441.
- Pollini A., et al. “Leveraging human factors in cybersecurity: an integrated methodological approach”. Cognition, Technology & Work 24.2 (2022): 371-390.
- Da Costa KA., et al. “Internet of Things: A survey on machine learning-based intrusion detection approaches”. Computer Networks 151 (2019): 147-157.
- Ahmadi Mehri V, P Arlos and E Casalicchio. “Automated Context-Aware Vulnerability Risk Management for Patch Prioritization”. Electronics 11.21 (2022): 3580.
- Sadiku MNO, O Fagbohungbe and SM Musa. “Artificial Intelligence in Cyber Security”. International Journal for Research in Applied Science and Engineering Technology (2020).
- Ali G., et al. “A Survey on Artificial Intelligence in Cybersecurity for Smart Agriculture: State-of-the-Art, Cyber Threats, Artificial Intelligence Applications, and Ethical Concerns”. Mesopotamian Journal of Computer Science (2024): 71-121.
- Taddeo M. “Three ethical challenges of applications of artificial intelligence in cybersecurity”. Minds and machines 29 (2019): 187-191.
- Sarker IH., et al. “Data-Driven Intelligence can Revolutionize Today's Cybersecurity World: A Position Paper”. ArXiv (2023): abs/2308.05126.
- Saadallah M, A Shahim and S Khapova. “Synergizing Human Expertise, Automation, and Artificial Intelligence for Vulnerability Management t”. PriMera Scientific Engineering 5.5 (2024): 02-14.
- Mehdi Saadallah D, A Shahim and S Khapova. “Multi-method Approach to Human Expertise, Automation, and Artificial Intelligence”. in ICT Systems Security and Privacy Protection: 39th IFIP International Conference, SEC 2024, Edinburgh, UK, June 12–14, 2024, Proceedings. Springer Nature (2024).
- Fernandez de Arroyabe JC., et al. “Cybersecurity Resilience in SMEs. A Machine Learning Approach”. Journal of Computer Information Systems (2023): 1-17.
- Malatji M, SV Solms and AL Marnewick. “Socio-technical systems cybersecurity framework”. Inf. Comput. Secur 27 (2019): 233-272.
- Fallatah W, J Kävrestad and S Furnell. “Establishing a Model for the User Acceptance of Cybersecurity Training”. Future Internet 16.8 (2024): 294.
- Bleady A, AH Ali and SB Ibrahim. “Dynamic capabilities theory: pinning down a shifting concept”. Academy of Accounting and Financial Studies Journal 22.2 (2018): 1-16.
- Freire FF and VS Padilla. “A Contingency Plan Framework for Cyber-Attacks”. Journal of Information Systems Engineering & Management (2019).
- Honeycutt DR, M Nourani and ED Ragan. “Soliciting Human-in-the-Loop User Feedback for Interactive Machine Learning Reduces User Trust and Impressions of Model Accuracy”. ArXiv (2020): abs/2008.12735.
- Cernauskas D and A Kumiega. “Back to the future: Cybernetics for safety, quality and cybersecurity”. Quality Management Journal 29.3 (2022): 183-192.
- Jarrahi MH. “Artificial intelligence and the future of work: Human-AI symbiosis in organizational decision making”. Business Horizons (2018).
- Page MJ., et al. “PRISMA 2020 explanation and elaboration: updated guidance and exemplars for reporting systematic reviews”. BMJ (2021): 372.
- Bolbot V., et al. “Developments and research directions in maritime cybersecurity: A systematic literature review and bibliometric analysis”. International Journal of Critical Infrastructure Protection 39 (2022): 100571.
- Javaheri D., et al. “Cybersecurity threats in FinTech: A systematic review”. Expert Systems with Applications (2023): 122697.
- Abdullahi M., et al. “Detecting cybersecurity attacks in internet of things using artificial intelligence methods: A systematic literature review”. Electronics 11.2 (2022): 198.
- Akhtar M and T Feng. “An overview of the applications of Artificial Intelligence in Cybersecurity”. EAI endorsed transactions on creative technologies 8.29 (2021).
- Albahri O and A AlAmoodi. “Cybersecurity and Artificial Intelligence Applications: A Bibliometric Analysis Based on Scopus Database”. Mesopotamian Journal of CyberSecurity (2023): 158-169.
- Le NT and DB Hoang. “Can maturity models support cyber security?”. in 2016 IEEE 35th international performance computing and communications conference (IPCCC). IEEE (2016).
- Schinagl S, A Shahim and S Khapova. “Paradoxical tensions in the implementation of digital security governance: Toward an ambidextrous approach to governing digital security”. Computers & Security 122 (2022): 102903.
- Stevens T. “Knowledge in the grey zone: AI and cybersecurity”. Digital War 1.1 (2020): 164-170.
- Hummelholm A. “AI-based quantum-safe cybersecurity automation and orchestration for edge intelligence in future networks”. European Conference on Cyber Warfare and Security (2023).
- Braun V and V Clarke. “Conceptual and design thinking for thematic analysis”. Qualitative psychology 9.1 (2022): 3.
- Naeem M., et al. “A step-by-step process of thematic analysis to develop a conceptual model in qualitative research”. International Journal of Qualitative Methods 22 (2023): 16094069231205789.
- Gioia DA, KG Corley and AL Hamilton. “Seeking qualitative rigor in inductive research: Notes on the Gioia methodology”. Organizational research methods 16.1 (2013): 15-31.
- Direction S. “Investing in cybersecurity: Gaining a competitive advantage through cybersecurity”. J. Bus. Strat 37 (2021): 19-21.
- Addae JH., et al. “Exploring user behavioral data for adaptive cybersecurity”. User Modeling and User-Adapted Interaction 29 (2019): 701-750.
- Naseer H., et al. “Enabling cybersecurity incident response agility through dynamic capabilities: the role of real-time analytics”. European Journal of Information Systems 33.2 (2024): 200-220.
- Capuano N., et al. “Explainable artificial intelligence in cybersecurity: A survey”. IEEE Access 10 (2022): 93575-93600.
- Naseer A., et al. “Moving towards agile cybersecurity incident response: A case study exploring the enabling role of big data analytics-embedded dynamic capabilities”. Computers & Security 135 (2023): 103525.
- Chatterjee S, SK Ghosh and R Chaudhuri. “Knowledge management in improving business process: an interpretative framework for successful implementation of AI-CRM-KM system in organizations”. Bus. Process. Manag. J 26 (2020): 1261-1281.
- Das R and R Sandhane. “Artificial Intelligence in Cyber Security”. Journal of Physics: Conference Series (2021): 1964.
- Ahmadi A. “Implementing Artificial Intelligence in IT Management: Opportunities and Challenges”. Asian Journal of Computer Science and Technology (2023).
- Sadok M, C Welch and P Bednar. “A socio-technical perspective to counter cyber-enabled industrial espionage”. Security Journal 33.1 (2020): 27-42.
- Yalcin ME and B Kutlu. “Examination of students' acceptance of and intention to use learning management systems using extended TAM”. Br. J. Educ. Technol 50 (2019): 2414-2432.
- Pigola A and PRD Costa. “Dynamic Capabilities in Cybersecurity Intelligence: A Meta-Synthesis to Enhance Protection Against Cyber Threats”. Commun. Assoc. Inf. Syst 53 (2023): 46.
- Nyre-Yu. Determining System Requirements for Human-Machine Integration in Cyber Security Incident Response (2019).
- Lee J., et al. “Cyber Threat Detection Based on Artificial Neural Networks Using Event Profiles”. IEEE Access 7 (2019): 165607-165626.
- Chahal S. “AI-Enhanced Cyber Incident Response and Recovery”. International Journal of Science and Research (IJSR) (2023).
- Lomonaco V. Continual Learning with Deep Architectures (2019).
- Hadsell R., et al. “Embracing Change: Continual Learning in Deep Neural Networks”. Trends in Cognitive Sciences 24 (2020): 1028-1040.
- Suryadevara M, S Rangineni and SRCC Venkata. “Optimizing Efficiency and Performance: Investigating Data Pipelines for Artificial Intelligence Model Development and Practical Applications”. International Journal of Science and Research (IJSR) (2023).
- Gerostathopoulos I., et al. “Strengthening Adaptation in Cyber-Physical Systems via Meta-Adaptation Strategies”. ACM Transactions on Cyber-Physical Systems 1 (2017): 1-25.
- Moreno GA. Adaptation Timing in Self-Adaptive Systems (2017).
- Verma R, S Koul and Ajaygopal KV. “Evaluation and Selection of a Cybersecurity Platform ─ Case of the Power Sector in India”. Decision Making: Applications in Management and Engineering (2023).
- Lee H-W, T-H Han and T Lee. “Reference-Based AI Decision Support for Cybersecurity”. IEEE Access 11 (2023): 143324-143339.
- Bossaerts P and C Murawski. “Computational complexity and human decision-making”. Trends in cognitive sciences 21.12 (2017): 917-929.
- Kapoor R and I Ghosal. “Will Artificial Intelligence Compliment or Supplement Human Workforce in Organizations? A Shift to a Collaborative Human – Machine Environment”. International Journal on Recent Trends in Business and Tourism (2022).
- Laux J. “Institutionalised Distrust and Human Oversight of Artificial Intelligence: Toward a Democratic Design of AI Governance under the European Union AI Act”. SSRN Electronic Journal (2023).
- Sitton M and Y Reich. “EPIC framework for enterprise processes integrative collaboration”. Systems Engineering 21 (2018): 30-46.
- GCS., et al. “Human-AI Collaboration: Exploring interfaces for interactive Machine Learning”. Tuijin Jishu/Journal of Propulsion Technology (2023).
- Dhondse A and S Singh. “Redefining Cybersecurity with AI and Machine Learning”. International Research Journal of Modernization in Engineering Technology and Science (2023).
- Soldati P., et al. “Design Principles for Model Generalization and Scalable AI Integration in Radio Access Networks”. IEEE Communications Magazine (2023).
- Hertzum M., et al. “Pilot Implementation: Testing Human-Work Interaction Designs”. in IFIP TC13 International Conference on Human-Computer Interaction (2021).
- Martin T. “On the Need for Collaborative Intelligence in Cybersecurity”. in AI-Cybersec@SGAI (2022).
- Tomsett RJ., et al. “Rapid Trust Calibration through Interpretable and Uncertainty-Aware AI”. Patterns (2020): 1.
- Ndichu S., et al. “AI-Assisted Security Alert Data Analysis with Imbalanced Learning Methods”. Applied Sciences (2023).
- Poon AI and JJ Sung. “Opening the black box of AI‐Medicine”. Journal of gastroenterology and hepatology 36.3 (2021): 581-584.
- Pollini A., et al. “Leveraging human factors in cybersecurity: an integrated methodological approach”. Cognition, Technology & Work 24.2 (2022): 371-390.
- Canal G., et al. “Building Trust in Human-Machine Partnerships”. Comput. Law Secur. Rev 39 (2020): 105489.
- Haber MJ and B Hibbert. “The Vulnerability Management Program, in Haber 2018 emphasizes the role of vulnerability and compliance management initiatives in securing critical information and demonstrating regulatory compliance”. Apress (2018): 111-118.
- Haber MJ and B Hibbert. The Vulnerability Management Program (2018).
- Blanco L., et al. “AI-Driven Framework for Scalable Management of Network Slices”. IEEE Communications Magazine 61 (2023): 216-222.
- Bhima B, A Rahmania Az Zahra and T Nurtino. “Enhancing Organizational Efficiency through the Integration of Artificial Intelligence in Management Information Systems”. APTISI Transactions on Management (ATM) (2023).
- Schneider J. “Humans learn too: Better Human-AI Interaction using Optimized Human Inputs”. ArXiv (2020): abs/2009.09266.
- Veale M, M Van Kleek and R Binns. “Fairness and accountability design needs for algorithmic support in high-stakes public sector decision-making”. in Proceedings of the 2018 chi conference on human factors in computing systems (2018).
- Zolanvari M., et al. “TRUST XAI: Model-Agnostic Explanations for AI With a Case Study on IIoT Security”. IEEE Internet of Things Journal 10 (2022): 2967-2978.
- Mahbooba B., et al. “Trust in Intrusion Detection Systems: An Investigation of Performance Analysis for Machine Learning and Deep Learning Models”. Complex (2021): 5538896.
- Jöhnk J, M Weißert, and K Wyrtki. “Ready or not, AI comes—an interview study of organizational AI readiness factors”. Business & Information Systems Engineering 63.1 (2021): 5-20.