Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
![]() |
![]() |
EUROPE |
![]() |
MIDDLE EAST |
![]() |
ASIA |
![]() |
AFRICA |
............................. | |
![]() |
United States of America |
![]() |
United Kingdom |
![]() |
Canada |
![]() |
Australia |
![]() |
Italy |
![]() |
France |
![]() |
Brazil |
![]() |
Germany |
![]() |
Malaysia |
![]() |
Turkey |
![]() |
China |
![]() |
Taiwan |
![]() |
Japan |
![]() |
Saudi Arabia |
![]() |
Jordan |
![]() |
Egypt |
![]() |
United Arab Emirates |
![]() |
India |
![]() |
Nigeria |
Quantum Computing, Cyberpsychology, and AI: Reshaping
Organizational Cybersecurity Mentality
Troy C. Troublefield
Pages - 26 - 46 | Revised - 31-05-2025 | Published - 30-06-2025
Published in International Journal of Security (IJS)
MORE INFORMATION
KEYWORDS
Artificial Intelligence, Cyberpsychology, Cybersecurity, Quantum Computing.
ABSTRACT
The emergence of quantum computing poses unprecedented challenges to conventional
cryptographic systems while simultaneously offering new defensive capabilities. This article
examines how organizations must evolve their cybersecurity mentality to prepare for the quantum
era, integrating insights from cyberpsychology and artificial intelligence. Through analysis of
cognitive biases affecting quantum security readiness, psychological factors influencing
organizational adoption of post-quantum cryptography, and the role of AI in managing quantum
security complexity, a framework was developed for quantum-aware security policy. Case studies
demonstrate varying psychological responses to quantum threats across different organizational
cultures. The research reveals that effective quantum security requires not merely technological
solutions but a fundamental shift in security psychology from deterministic to probabilistic
thinking, from reactive to anticipatory postures, and from siloed to collaborative approaches. The
article concludes with recommendations for developing organizational quantum resilience that
addresses this paradigm shift's technical and psychological dimensions.
Andrews, R. W., Lilly, J. M., Srivastava, D., & Feigh, K. M. (2022). The role of shared mental models in human-AI teams: a theoretical review. Theoretical Issues in Ergonomics Science, 24(2), 129-175. https://doi.org/10.1080/1463922X.2022.2061080. | |
Ayanbode, N., Abieba, O. A., Chukwurah, N., Ajayi, O. O., & Ifesinachi, A. (2024). Human factors in FinTech cybersecurity: Addressing insider threats and behavioral risks. Journal of Cybersecurity in FinTech, 14(2), 34-49. https://doi.org/10.54660/.IJMRGE.2024.5.1.1350-1356. | |
Aydeger, A., Zeydan, E., Yadav, A. K., Hemachandra, K. T., & Liyanage, M. (2024). Towards a quantum-resilient future: Strategies for transitioning to post-quantum cryptography. In 2024 15th International Conference on Network of the Future (NoF) (pp. 195-203). IEEE.https://doi.org/10.1109/NoF62948.2024.10741441. | |
Csenkey, K., & Bindel, N. (2023). Post-quantum cryptographic assemblages and the governance of the quantum threat. Journal of Cybersecurity, 9(1), tyad001. https://doi.org/10.1093/cybsec/tyad0. | |
Csépe, V. (2018). The psychological dimensions of subjective security. Security Challenges in 21st Century, 279-292. | |
Goswami, B., Dixit, M., Asha, V., Mohan, V. C. J., Aswath, S., & Dhanraj, J. A. (2025). AI-Augmented Decision-Making in Management Using Quantum Networks. In Multidisciplinary Applications of AI and Quantum Networking (pp. 253-270). IGI Global Scientific Publishing. https://doi.org/10.4018/979-8-3693-9336-9.ch017. | |
Iqbal, M. S., Sajid, A., & Malik, R. (2025). Cyber Security in the Post Quantum Computer Era: Threats and Perspectives. In Emerging Trends in Information System Security Using AI & Data Science for Next-Generation Cyber Analytics (pp. 15-29). Cham: Springer Nature Switzerland. https://doi.org/10.1007/978-3-031-81481-5_2. | |
Joseph, D., Misoczki, R., Manzano, M., Tricot, J., Pinuaga, F. D., Lacombe, O., & Hansen, R. (2022). Transitioning organizations to post-quantum cryptography. Nature, 605(7909), 237-243. https://doi.org/10.1038/s41586-022-04623-2. | |
Kong, I., Janssen, M., & Bharosa, N. (2024, August). Navigating Through the Unknowns-Organizational Readiness Assessment Model for Quantum-Safe Transition. In International Conference on Electronic Government (pp. 438-453). Cham: Springer Nature Switzerland. https://doi.org/10.1007/978-3-031-70274-7_27. | |
Mandras, L. P. (2020). Security's Multidimensionality. Societal Security in the Age of Information Technology. In Romanian Military Thinking International Scientific Conference Proceedings. Military Strategy Coordinates under the Circumstances of a Synergistic Approach to Resilience in the Security Field (pp. 78-95). Centrul Tehnic-editorial al Armatei. | |
Orlikowski, W. J., & Gash, D. C. (1994). Technological frames: Making sense of information technology in organizations. ACM Transactions on Information Systems, 12(2), 174-207. https://doi.org/10.1145/196734.196745. | |
Possati, L. M. (2024). Quantum Technologies: a Hermeneutic Technology Assessment Approach. NanoEthics, 18(1), 2.https://doi.org/10.1007/s11569-023-00449-y. | |
Roeder, L., Hoyte, P., van der Meer, J., Fell, L., Johnston, P., Kerr, G., & Bruza, P. (2023). A quantum model of trust calibration in human-AI interactions. Entropy, 25(9), 1362. https://doi.org/10.3390/e25091362. | |
Shor, P. W. (1999). Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Review, 41(2), 303-332. https://doi.org/10.1137/S0036144598347011. | |
Slovic, P. (1987). Perception of risk. Science, 236(4799), 280-285. https://doi.org/10.1126/science.3563507. | |
Smith III, F. L. (2020). Quantum technology hype and national security. Security Dialogue, 51(5), 499-516. https://doi.org/10.1177/0967010620904922. | |
Sozzo, S. (2021). Quantum structures in human decision-making: Towards quantum expected utility. International Journal of Theoretical Physics, 60(2), 468-482. https://doi.org/10.1007/s10773-019-04022-w. | |
Teitsma, M., Ahmed, I., & van Velzen, J. (2025). Quantum Organisational Readiness Levels. arXiv preprint arXiv:2502.16489. https://doi.org/10.48550/arXiv.2502.16489. | |
Thandayuthapani, S., & Thirumoorthi, P. (2025). Decoding the Digital Mind: Exploring the Psychological Drivers of Consumer Behavior in the Age of AI and Personalization. In Decoding Consumer Behavior Using the Insight Equation and AI Marketing (pp. 131-158). IGI Global Scientific Publishing. https://doi.org/10.4018/979-8-3693-8588-3.ch007. | |
Trope, Y., & Liberman, N. (2010). Construal-level theory of psychological distance. Psychological Review, 117(2), 440-463. https://doi.org/10.1037/a0018963. | |
Weick, K. E., & Sutcliffe, K. M. (2011). Managing the unexpected: Resilient performance in an age of uncertainty (Vol. 8). John Wiley & Sons. | |
Dr. Troy C. Troublefield
Cyberpsychology, Capitol Technology University, Laurel, MD, 20708 - United States of America
ttroublefield@captechu.edu
|
|
|
|
View all special issues >> | |
|
|