Cognitive Capacities for Designing, Operating, Supervising, and Securing Complex Systems

  • Chapter
  • First Online:
Cognitive Security

Part of the book series: SpringerBriefs in Computer Science ((BRIEFSCOMPUTER))

  • 178 Accesses

Abstract

Despite the integration of a variety of “Industry 4.0” technologies, the active presence of human actors is required to bring their cognitive capabilities to Designing, Operating, Supervising, and Securing (DOSS) complex systems. Figure 3.1 illustrates the structure of Chap. 3. In particular, we discuss situation awareness in Sect. 3.1, problem solving in Sect. 3.2, and collaboration in Sect. 3.3 as the three essential cognitive capabilities that distinguish a human actor from a traditional cyber-physical component in the above DOSS procedures. Examples of human roles in four DOSS procedures are introduced to illustrate these three classes of cognitive capabilities and are mapped onto the four quadrants in Fig. 3.2 based on their time-sensitivity and interactivity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (Canada)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Baker CL, Jara-Ettinger J, Saxe R, Tenenbaum JB (2017) Rational quantitative attribution of beliefs, desires and percepts in human mentalizing. Nat Hum Behav 1(4):1–10

    Article  Google Scholar 

  2. Bennett PG (1980) Hypergames: develo** a model of conflict. Futures 12(6):489–507

    Article  Google Scholar 

  3. Dubey R, Agrawal P, Pathak D, Griffiths TL, Efros AA (2018) Investigating human priors for playing video games. ar**v preprint ar**v:180210217

    Google Scholar 

  4. Emmanouilidis C, Pistofidis P, Bertoncelj L, Katsouros V, Fournaris A, Koulamas C, Ruiz-Carcel C (2019) Enabling the human in the loop: linked data and knowledge in industrial cyber-physical systems. Annu Rev Control 47:249–265

    Article  Google Scholar 

  5. Endsley MR (2017) Toward a theory of situation awareness in dynamic systems. In: Situational awareness. Routledge, Abingdon, pp 9–42

    Chapter  Google Scholar 

  6. Eykholt K, Evtimov I, Fernandes E, Li B, Rahmati A, **ao C, Prakash A, Kohno T, Song D (2018) Robust physical-world attacks on deep learning visual classification. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 1625–1634

    Google Scholar 

  7. Fantini P, Pinzone M, Taisch M (2020) Placing the operator at the centre of industry 4.0 design: modelling and assessing human activities within cyber-physical systems. Comput Ind Eng 139:105058

    Google Scholar 

  8. Perea A (2012) Epistemic game theory: reasoning and choice. Cambridge University Press, Cambridge

    Book  Google Scholar 

  9. Rabinowitz N, Perbet F, Song F, Zhang C, Eslami SA, Botvinick M (2018) Machine theory of mind. In: International conference on machine learning, PMLR, pp 4218–4227

    Google Scholar 

  10. Roscoe T, Hand S, Isaacs R, Mortier R, Jardetzky P (2003) Predicate routing: enabling controlled networking. ACM SIGCOMM Comput Commun Rev 33(1):65–70

    Article  Google Scholar 

  11. Solso RL, MacLin MK, MacLin OH (2005) Cognitive psychology. Pearson Education New Zealand, North Shore City

    Google Scholar 

  12. Sternberg RJ, Davidson JE, et al (2005) Conceptions of giftedness, vol 2. Cambridge University Press, New York, NY

    Book  Google Scholar 

  13. Thagard P (2005) Mind: introduction to cognitive science. MIT Press, Cambridge

    Google Scholar 

  14. Wool A (2004) The use and usability of direction-based filtering in firewalls. Comput Secur 23(6):459–468

    Article  Google Scholar 

  15. Yoshida W, Dolan RJ, Friston KJ (2008) Game theory of mind. PLoS Comput Biol 4(12):e1000254

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Huang, L., Zhu, Q. (2023). Cognitive Capacities for Designing, Operating, Supervising, and Securing Complex Systems. In: Cognitive Security. SpringerBriefs in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-031-30709-6_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-30709-6_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-30708-9

  • Online ISBN: 978-3-031-30709-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation