{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T12:12:55Z","timestamp":1756901575976,"version":"3.44.0"},"reference-count":27,"publisher":"Oxford University Press (OUP)","issue":"1","license":[{"start":{"date-parts":[[2025,9,2]],"date-time":"2025-09-02T00:00:00Z","timestamp":1756771200000},"content-version":"vor","delay-in-days":244,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"UK's Accelerated Capability Environment","award":["ACE-C391"],"award-info":[{"award-number":["ACE-C391"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,1,17]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>We propose an abstract conceptual framework for analysing complex security systems using a new notion of modes and mode transitions. A mode is an independent component of a system with its own objectives, monitoring data, algorithms, and scope and limits. The behaviour of a mode, including its transitions to other modes, is determined by interpretations of the mode\u2019s monitoring data in the light of its objectives and capabilities\u2014these interpretations we call beliefs. We formalise the conceptual framework mathematically and show how to quantify and visualise beliefs in higher-dimensional geometric spaces. The mathematical models are based on simplicial complexes. Our theoretical models are intended to help design, analyse, evaluate and explain systems that provide human-centred services facilitated by software, when confronted by critical security situations, both human and digital.<\/jats:p>","DOI":"10.1093\/cybsec\/tyaf023","type":"journal-article","created":{"date-parts":[[2025,9,2]],"date-time":"2025-09-02T14:41:53Z","timestamp":1756824113000},"source":"Crossref","is-referenced-by-count":0,"title":["On human-centred security: a new systems model based on modes and mode transitions"],"prefix":"10.1093","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3139-0983","authenticated-orcid":false,"given":"Edwin J","family":"Beggs","sequence":"first","affiliation":[{"name":"School of Mathematics and Computer Science, Computational Foundry, Swansea University, Bay Campus , Fabian Way, Swansea SA1 8EN ,","place":["United Kingdom"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4689-8760","authenticated-orcid":false,"given":"John V","family":"Tucker","sequence":"additional","affiliation":[{"name":"School of Mathematics and Computer Science, Computational Foundry, Swansea University, Bay Campus , Fabian Way, Swansea SA1 8EN ,","place":["United Kingdom"]}]},{"given":"Victoria","family":"Wang","sequence":"additional","affiliation":[{"name":"Zhejiang University Department of Sociology, . Room 1138, Block A, Creative Building, Zijingang Campus 310058 ,","place":["P.R. China"]}]}],"member":"286","published-online":{"date-parts":[[2025,9,2]]},"reference":[{"key":"2025090210414629100_bib1","doi-asserted-by":"crossref","DOI":"10.1353\/book.40889","volume-title":"Age of system: understanding the development of modern social science","author":"Heyck","year":"2015"},{"issue":"2","key":"2025090210414629100_bib2","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1109\/MAHC.2023.3266359","article-title":"Content Is meaningless, and structure Is all-important\u2019: defining the nature of computer science in the age of high modernism, c.1950\u2013c.1965","volume":"45","author":"Nofre","year":"2023","journal-title":"IEEE Ann Hist Comput"},{"volume-title":"Fact Sheet 2: national security risk assessment","year":"2022","author":"UK Government","key":"2025090210414629100_bib3"},{"key":"2025090210414629100_bib4","first-page":"100774","article-title":"A model of systems with modes and mode transitions","volume":"127","author":"Beggs","year":"2022","journal-title":"J Log Algebr Methods Prog"},{"key":"2025090210414629100_bib5","doi-asserted-by":"publisher","first-page":"101636","DOI":"10.1016\/j.cose.2019.101636","article-title":"Cyber ranges and security testbeds: scenarios, functions, tools and architecture","volume":"88","author":"Yamin","year":"2020","journal-title":"Comput Secur"},{"volume-title":"A strong Britain in an age of uncertainty: the national security strategy","year":"2010","author":"Cabinet Office","key":"2025090210414629100_bib6"},{"volume-title":"Critical incident management, Border force, immigration enforcement and UK visas and immigration","year":"2021","author":"UK Home Office","key":"2025090210414629100_bib7"},{"volume-title":"Broadwater Farm riots: PC Keith Blakelock\u2019s 1985 murder recalled","author":"BBC News","key":"2025090210414629100_bib8"},{"year":"\u00a02023","author":"Risk management","key":"2025090210414629100_bib9"},{"article-title":"A coordination model for attack graphs","year":"2023","author":"Rowe","key":"2025090210414629100_bib10"},{"key":"2025090210414629100_bib11","first-page":"21","article-title":"Attack trees","volume":"24","author":"Schneier","year":"1999","journal-title":"Dr. Dobb\u2019s J Software Tools"},{"volume-title":"Developing cyber resilient systems: a systems security engineering approach","year":"2021","author":"National Institute of Standards and Technology","key":"2025090210414629100_bib12"},{"key":"2025090210414629100_bib13","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/s10669-023-09895-1","article-title":"A cyber resilience analysis case study of an industrial operational technology environment","volume":"43","author":"Perrett","year":"2023","journal-title":"Environ Syst Decis"},{"issue":"4","key":"2025090210414629100_bib14","first-page":"323","article-title":"Critical infrastructures: a comparison of definitions","volume":"19","author":"Smith","year":"2023","journal-title":"Int J Crit Infra"},{"author":"National cyber security centre","key":"2025090210414629100_bib15"},{"issue":"2","key":"2025090210414629100_bib16","doi-asserted-by":"publisher","first-page":"203","DOI":"10.32890\/ijms2023.30.2.2","article-title":"Economic, Socio-cultural and existential engagement strategies during COVID-19 Pandemic: a scenario-based experiment","volume":"30","author":"Ozoran","year":"2023","journal-title":"Int J Manag Stud"},{"issue":"3","key":"2025090210414629100_bib17","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1080\/13523260.2020.1730055","article-title":"Theory-infused and policy-relevant: On the usefulness of scenario analysis for international relations","volume":"41","author":"Sus","year":"2020","journal-title":"Contemp Secur Policy"},{"key":"2025090210414629100_bib18","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.envsci.2017.10.012","article-title":"Participatory scenario planning and climate change impacts, adaptation and vulnerability research in the Arctic","volume":"79","author":"Flynn","year":"2018","journal-title":"Environ Sci Pol"},{"issue":"5","key":"2025090210414629100_bib19","doi-asserted-by":"publisher","first-page":"866","DOI":"10.1093\/aje\/kwz034","article-title":"The future of climate epidemiology: Opportunities for advancing health research in the context of climate change","volume":"188","author":"Anderson","year":"2019","journal-title":"Am J Epidemiol"},{"issue":"4","key":"2025090210414629100_bib20","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1016\/j.foar.2018.07.003","article-title":"Scenario-based design: New applications in metamorphic architecture","volume":"7","author":"Eilouti","year":"2018","journal-title":"Front Archit Res"},{"issue":"3","key":"2025090210414629100_bib21","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1016\/j.ssresearch.2009.08.008","article-title":"Who gives what and when? A scenario study of intentions to give time and money","volume":"39","author":"Bekkers","year":"2010","journal-title":"Soc Sci Res"},{"issue":"4","key":"2025090210414629100_bib22","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1016\/j.lrp.2017.12.005","article-title":"Stieglitz. Organizational persistence in the use of war gaming and scenario planning","volume":"51","author":"Augier","year":"2018","journal-title":"Long Range Plann"},{"volume-title":"Ecosystems and human well-being: Scenarios","year":"2005","author":"Carpenter","key":"2025090210414629100_bib24"},{"volume-title":"Our emerging future","year":"2016","author":"Diana","key":"2025090210414629100_bib25"},{"key":"2025090210414629100_bib26","doi-asserted-by":"crossref","DOI":"10.1090\/gsm\/107","volume-title":"Manifolds and differential geometry","author":"Lee","year":"2009"},{"issue":"5-6","key":"2025090210414629100_bib27","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1016\/0888-613X(90)90012-Q","article-title":"Perspectives on the theory and practice of belief functions","volume":"4","author":"Shafer","year":"1990","journal-title":"Int J Approx Reas"},{"key":"2025090210414629100_bib28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-44792-4","volume-title":"Classic works of the Dempster-Shafer theory of belief functions","author":"Yager","year":"2008"}],"container-title":["Journal of Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/11\/1\/tyaf023\/64192698\/tyaf023.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/11\/1\/tyaf023\/64192698\/tyaf023.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,2]],"date-time":"2025-09-02T14:41:56Z","timestamp":1756824116000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article\/doi\/10.1093\/cybsec\/tyaf023\/8246083"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1,17]]}},"URL":"https:\/\/doi.org\/10.1093\/cybsec\/tyaf023","relation":{},"ISSN":["2057-2085","2057-2093"],"issn-type":[{"type":"print","value":"2057-2085"},{"type":"electronic","value":"2057-2093"}],"subject":[],"published-other":{"date-parts":[[2025]]},"published":{"date-parts":[[2025]]},"article-number":"tyaf023"}}