Call for Papers - Ongoing round of submission, notification and publication.
    
  
Home    |    Login or Register    |    Contact CSC
By Title/Keywords/Abstract   By Author
Browse CSC-OpenAccess Library.
  • HOME
  • LIST OF JOURNALS
  • AUTHORS
  • EDITORS & REVIEWERS
  • LIBRARIANS & BOOK SELLERS
  • PARTNERSHIP & COLLABORATION
Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available
(no registration required)

(348.58KB)


-- CSC-OpenAccess Policy
-- Creative Commons Attribution NonCommercial 4.0 International License
>> COMPLETE LIST OF JOURNALS

EXPLORE PUBLICATIONS BY COUNTRIES

EUROPE
MIDDLE EAST
ASIA
AFRICA
.............................
United States of America
United Kingdom
Canada
Australia
Italy
France
Brazil
Germany
Malaysia
Turkey
China
Taiwan
Japan
Saudi Arabia
Jordan
Egypt
United Arab Emirates
India
Nigeria
Quantum Computing, Cyberpsychology, and AI: Reshaping Organizational Cybersecurity Mentality
Troy C. Troublefield
Pages - 26 - 46     |    Revised - 31-05-2025     |    Published - 30-06-2025
Published in International Journal of Security (IJS)
Volume - 16   Issue - 2    |    Publication Date - June 2025  Table of Contents
MORE INFORMATION
References   |   Abstracting & Indexing
KEYWORDS
Artificial Intelligence, Cyberpsychology, Cybersecurity, Quantum Computing.
ABSTRACT
The emergence of quantum computing poses unprecedented challenges to conventional cryptographic systems while simultaneously offering new defensive capabilities. This article examines how organizations must evolve their cybersecurity mentality to prepare for the quantum era, integrating insights from cyberpsychology and artificial intelligence. Through analysis of cognitive biases affecting quantum security readiness, psychological factors influencing organizational adoption of post-quantum cryptography, and the role of AI in managing quantum security complexity, a framework was developed for quantum-aware security policy. Case studies demonstrate varying psychological responses to quantum threats across different organizational cultures. The research reveals that effective quantum security requires not merely technological solutions but a fundamental shift in security psychology from deterministic to probabilistic thinking, from reactive to anticipatory postures, and from siloed to collaborative approaches. The article concludes with recommendations for developing organizational quantum resilience that addresses this paradigm shift's technical and psychological dimensions.
REFERENCES
Andrews, R. W., Lilly, J. M., Srivastava, D., & Feigh, K. M. (2022). The role of shared mental models in human-AI teams: a theoretical review. Theoretical Issues in Ergonomics Science, 24(2), 129-175. https://doi.org/10.1080/1463922X.2022.2061080.
Ayanbode, N., Abieba, O. A., Chukwurah, N., Ajayi, O. O., & Ifesinachi, A. (2024). Human factors in FinTech cybersecurity: Addressing insider threats and behavioral risks. Journal of Cybersecurity in FinTech, 14(2), 34-49. https://doi.org/10.54660/.IJMRGE.2024.5.1.1350-1356.
Aydeger, A., Zeydan, E., Yadav, A. K., Hemachandra, K. T., & Liyanage, M. (2024). Towards a quantum-resilient future: Strategies for transitioning to post-quantum cryptography. In 2024 15th International Conference on Network of the Future (NoF) (pp. 195-203). IEEE.https://doi.org/10.1109/NoF62948.2024.10741441.
Csenkey, K., & Bindel, N. (2023). Post-quantum cryptographic assemblages and the governance of the quantum threat. Journal of Cybersecurity, 9(1), tyad001. https://doi.org/10.1093/cybsec/tyad0.
Csépe, V. (2018). The psychological dimensions of subjective security. Security Challenges in 21st Century, 279-292.
Goswami, B., Dixit, M., Asha, V., Mohan, V. C. J., Aswath, S., & Dhanraj, J. A. (2025). AI-Augmented Decision-Making in Management Using Quantum Networks. In Multidisciplinary Applications of AI and Quantum Networking (pp. 253-270). IGI Global Scientific Publishing. https://doi.org/10.4018/979-8-3693-9336-9.ch017.
Iqbal, M. S., Sajid, A., & Malik, R. (2025). Cyber Security in the Post Quantum Computer Era: Threats and Perspectives. In Emerging Trends in Information System Security Using AI & Data Science for Next-Generation Cyber Analytics (pp. 15-29). Cham: Springer Nature Switzerland. https://doi.org/10.1007/978-3-031-81481-5_2.
Joseph, D., Misoczki, R., Manzano, M., Tricot, J., Pinuaga, F. D., Lacombe, O., & Hansen, R. (2022). Transitioning organizations to post-quantum cryptography. Nature, 605(7909), 237-243. https://doi.org/10.1038/s41586-022-04623-2.
Kong, I., Janssen, M., & Bharosa, N. (2024, August). Navigating Through the Unknowns-Organizational Readiness Assessment Model for Quantum-Safe Transition. In International Conference on Electronic Government (pp. 438-453). Cham: Springer Nature Switzerland. https://doi.org/10.1007/978-3-031-70274-7_27.
Mandras, L. P. (2020). Security's Multidimensionality. Societal Security in the Age of Information Technology. In Romanian Military Thinking International Scientific Conference Proceedings. Military Strategy Coordinates under the Circumstances of a Synergistic Approach to Resilience in the Security Field (pp. 78-95). Centrul Tehnic-editorial al Armatei.
Orlikowski, W. J., & Gash, D. C. (1994). Technological frames: Making sense of information technology in organizations. ACM Transactions on Information Systems, 12(2), 174-207. https://doi.org/10.1145/196734.196745.
Possati, L. M. (2024). Quantum Technologies: a Hermeneutic Technology Assessment Approach. NanoEthics, 18(1), 2.https://doi.org/10.1007/s11569-023-00449-y.
Roeder, L., Hoyte, P., van der Meer, J., Fell, L., Johnston, P., Kerr, G., & Bruza, P. (2023). A quantum model of trust calibration in human-AI interactions. Entropy, 25(9), 1362. https://doi.org/10.3390/e25091362.
Shor, P. W. (1999). Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Review, 41(2), 303-332. https://doi.org/10.1137/S0036144598347011.
Slovic, P. (1987). Perception of risk. Science, 236(4799), 280-285. https://doi.org/10.1126/science.3563507.
Smith III, F. L. (2020). Quantum technology hype and national security. Security Dialogue, 51(5), 499-516. https://doi.org/10.1177/0967010620904922.
Sozzo, S. (2021). Quantum structures in human decision-making: Towards quantum expected utility. International Journal of Theoretical Physics, 60(2), 468-482. https://doi.org/10.1007/s10773-019-04022-w.
Teitsma, M., Ahmed, I., & van Velzen, J. (2025). Quantum Organisational Readiness Levels. arXiv preprint arXiv:2502.16489. https://doi.org/10.48550/arXiv.2502.16489.
Thandayuthapani, S., & Thirumoorthi, P. (2025). Decoding the Digital Mind: Exploring the Psychological Drivers of Consumer Behavior in the Age of AI and Personalization. In Decoding Consumer Behavior Using the Insight Equation and AI Marketing (pp. 131-158). IGI Global Scientific Publishing. https://doi.org/10.4018/979-8-3693-8588-3.ch007.
Trope, Y., & Liberman, N. (2010). Construal-level theory of psychological distance. Psychological Review, 117(2), 440-463. https://doi.org/10.1037/a0018963.
Weick, K. E., & Sutcliffe, K. M. (2011). Managing the unexpected: Resilient performance in an age of uncertainty (Vol. 8). John Wiley & Sons.
MANUSCRIPT AUTHORS
Dr. Troy C. Troublefield
Cyberpsychology, Capitol Technology University, Laurel, MD, 20708 - United States of America
ttroublefield@captechu.edu


CREATE AUTHOR ACCOUNT
 
LAUNCH YOUR SPECIAL ISSUE
View all special issues >>
 
PUBLICATION VIDEOS
 
You can contact us anytime since we have 24 x 7 support.
Join Us|List of Journals|
    
Copyrights © 2025 Computer Science Journals (CSC Journals). All rights reserved. Privacy Policy | Terms of Conditions