A fuzzy framework for assessing the level of cognitive and operational readiness of regional citizens to ensure their own digital security

##plugins.themes.bootstrap3.article.main##

Volodymyr Polishchuk
Vasyl Sehlianyk

Анотація

Citizens’ growing involvement in the digital environment increases exposure to cyber risks caused by the human factor. However, existing assessment approaches mainly focus on technical cybersecurity capacity or general digital literacy and do not comprehensively capture both cognitive awareness and the ability to make correct decisions in typical cyber situations. The purpose of the study is to develop and verify a fuzzy framework for assessing the level of cognitive and operational readiness of citizens of a region to ensure their own digital security. The information base was formed using a questionnaire survey of citizens and two information methods: self-assessment of cognitive cybersecurity awareness on a ten-point scale and assessment of applied cyberliteracy through single-answer test questions. An integral assessment was obtained using a fuzzy model with multidimensional membership functions and a fuzzy rule base. The proposed framework was tested on real data from 315 respondents in the Transcarpathian region collected during March–June 2025. The resulting integral indicator of cognitive and operational readiness was 0.67, which corresponds to a stable average level of population readiness to ensure personal digital security. The proposed framework provides a comprehensive, reproducible, and scalable assessment of citizens’ readiness for digital security and can be used to identify high-risk groups and support educational, preventive, and managerial decision-making at regional and national levels.

##plugins.themes.bootstrap3.article.details##

Розділ

Articles

Посилання

[1] U. Kiran, N.F. Khan, H. Murtaza, A. Farooq, H. Pirkkalainen, Explanatory and predictive modeling of cybersecurity behaviors using protection motivation theory, Computers & Security. 149 (2025) 104204. https://doi.org/10.1016/j.cose.2024.104204.

[2] D. Baltuttis, T. Teubner, M.T.P. Adam, A typology of cybersecurity behavior among knowledge workers, Computers & Security. 140 (2024) 103741. https://doi.org/10.1016/j.cose.2024.103741.

[3] R.C. Chanda, A. Vafaei-Zadeh, H. Hanifah, D. Nikbin, Assessing cybersecurity awareness among bank employees: A multi-stage analytical approach using PLS-SEM, ANN, and fsQCA in a developing country context, Computers & Security. 125 (2025) 104208. https://doi.org/10.1016/j.cose.2024.104208.

[4] H. Taherdoost, A critical review on cybersecurity awareness frameworks and training models, Procedia Computer Science. 235 (2024) 1649–1663. https://doi.org/10.1016/j.procs.2024.04.156.

[5] M. Güler, G. Büyüközkan, Cybersecurity maturity assessment using an incomplete hesitant fuzzy AHP method and Bonferroni means operator, Expert Systems with Applications. 282 (2025) 127268. https://doi.org/10.1016/j.eswa.2025.127268.

[6] O. Soner, Modeling and analyzing cybersecurity risk propagation in ports using fuzzy cognitive maps: System sensitivity to key threat factors, Ocean & Coastal Management. 270 (2025) 107857. https://doi.org/10.1016/j.ocecoaman.2025.107857.

[7] O. Korchenko, O. Korystin, V. Shulha, S. Kazmirchuk, S. Demediuk, S. Zybin, Sustainable development of smart regions via cybersecurity of national infrastructure: A fuzzy risk assessment approach, Sustainability. 17(19) (2025) 8757. https://doi.org/10.3390/su17198757.

[8] A. Brezavšček, A. Baggia, Recent trends in information and cyber security maturity assessment: A systematic literature review, Systems. 13(1) (2025) 52. https://doi.org/10.3390/systems13010052.

[9] Y. Hong, M.M. Shafiee, M. Warkentin, The role of life satisfaction in cybersecurity awareness: A broaden-and-build perspective, Technology in Society. 85 (2025) 103206. https://doi.org/10.1016/j.techsoc.2025.103206.

[10] A. Kavak, Impact of information security awareness on information security compliance of academic library staff in Türkiye, The Journal of Academic Librarianship. 50(5) (2024) 102937. https://doi.org/10.1016/j.acalib.2024.102937.

[11] J.K. Nwankpa, P.M. Datta, Remote vigilance: The roles of cyber awareness and cybersecurity policies among remote workers, Computers & Security. 130 (2023) 103266. https://doi.org/10.1016/j.cose.2023.103266.

[12] M. Domínguez-Dorado, F.J. Rodríguez-Pérez, J. Carmona-Murillo, D. Cortés-Polo, J. Calle-Cancho, Boosting holistic cybersecurity awareness with outsourced wide-scope CyberSOC: A generalization from a Spanish public organization study, Information. 14(11) (2023) 586. https://doi.org/10.3390/info14110586.

[13] S. Lyeonov, W. Strielkowski, V. Koibichuk, S. Drozd, Impact of internet and mobile communication on cyber resilience: A multivariate adaptive regression spline modeling approach, International Journal of Critical Infrastructure Protection. 47 (2024) 100722. https://doi.org/10.1016/j.ijcip.2024.100722.

[14] J. Prümmer, T. van Steen, B. van den Berg, A systematic review of current cybersecurity training methods, Computers & Security. 136 (2024) 103585. https://doi.org/10.1016/j.cose.2023.103585.

[15] A. Mulahuwaish, B. Qolomany, K. Gyorick, J.B. Abdo, M. Aledhari, J. Qadir, K. Carley, A survey of social cybersecurity: Techniques for attack detection, evaluations, challenges, and prospects, Computers in Human Behavior Reports. (2025) 100668. https://doi.org/10.1016/j.chbr.2025.100668.

[16] M. Houichi, F. Jaidi, A. Bouhoula, Enhancing smart city security: An intrusion detection system using machine learning methods with the UNB CIC IoT 2023 dataset, IET Smart Cities. (2025) e70014. https://doi.org/10.1049/smc2.70014.

[17] W.J. Obidallah et al., A unified computational model for assessing security risks in Internet of Transportation Things-based healthcare applications, Electronics. 14(24) (2025) 4894. https://doi.org/10.3390/electronics14244894.

[18] F. Merola, C. Bernardeschi, G. Lami, A risk assessment framework based on fuzzy logic for automotive systems, Safety. 10(2) (2024) 41. https://doi.org/10.3390/safety10020041.

[19] R. Acheampong, D.-M. Popovici, T.C. Balan, A. Rekeraho, I.-A. Oprea, A cybersecurity risk assessment for enhanced security in virtual reality, Information. 16(6) (2025) 430. https://doi.org/10.3390/info16060430.

[20] N.A. Chandra, A.A.P. Ratna, K. Ramli, Development and simulation of cyberdisaster situation awareness models, Sustainability. 14(3) (2022) 1133. https://doi.org/10.3390/su14031133.

[21] A. Aktayeva, Y. Makatov, A.K. Tulegenovna, A. Dautov, R. Niyazova, M. Zhamankarin, S. Khan, Cybersecurity risk assessments within critical infrastructure social networks, Data. 8(10) (2023) 156. https://doi.org/10.3390/data8100156.

[22] M.Z. Hanif, N. Yaqoob, Prioritized decision support system for cybersecurity selection based on extended symmetrical linear Diophantine fuzzy Hamacher aggregation operators, Symmetry. 17(1) (2025) 70. https://doi.org/10.3390/sym17010070.

[23] Z. Ali, M.-S. Yang, Improving risk assessment model for cyber security using robust aggregation operators for bipolar complex fuzzy soft inference systems, Mathematics. 12(4) (2024) 582. https://doi.org/10.3390/math12040582.

[24] E. Krzysztoń, D. Mikołajewski, P. Prokopowicz, Review of fuzzy methods application in IIoT security—Challenges and perspectives, Electronics. 14(17) (2025) 3475. https://doi.org/10.3390/electronics14173475.

[25] F.J. Gallardo-Amores, C. Del-Real, A.M. Díaz-Fernández, Assessing urban security and safety smartness: A systematic review of key performance indicators, IET Smart Cities. (2025) e70000. https://doi.org/10.1049/smc2.70000.

[26] J. Lund-Tønnesen, K. Fossheim, Excessive digital surveillance and data privacy invasion as a creeping crisis, Risk, Hazards & Crisis in Public Policy. 16 (2025) e70005. https://doi.org/10.1002/rhc3.70005.

[27] V. Grechaninov, Method of strategic planning of cybersecurity measures based on the SWOT concept, Cybersecurity: Education, Science, Technique. 2(30) (2025) 66–88. https://doi.org/10.28925/2663-4023.2025.30.953.

[28] D. Palko, L. Myrutenko, Method of comprehensive cybersecurity risks assessment in distributed information systems, Cybersecurity: Education, Science, Technique. 2(26) (2024) 487–502. https://doi.org/10.28925/2663-4023.2024.26.731.

[29] X. Wang, Z. Zhou, Security situation awareness algorithm of network information transmission based on big data, Scientific Reports. 15 (2025) 39058. https://doi.org/10.1038/s41598-025-24204-3.

[30] H.D. Mohammadian, O. Alijani, M.R. Moghadam et al., Navigating the future by fuzzy AHP method: Enhancing global tech-sustainable governance, digital resilience, and cybersecurity via the SME 5.0, 7PS framework and the X.0 wave/age theory in the digital age, AIMS Geosciences. 10(2) (2024) 371–398. https://doi.org/10.3934/geosci.2024020.

[31] Polishchuk V., Sehlianyk V. Data from 315 respondents to assess the level of cognitive and operational readiness of citizens of the region to ensure their own digital security (Ukraine) [Data set]. Zenodo, 2026. Available at: https://doi.org/10.5281/zenodo.19692560.