AI with humans in mind: The importance of human behavioural considerations in AI design and adoption
Hanah-Marie Darley
Additional contact information
Hanah-Marie Darley: Darktrace, UK
Cyber Security: A Peer-Reviewed Journal, 2025, vol. 9, issue 2, 130-138
Abstract:
It is essential to design technology not just with security in mind but with a recognition of the essential tenets of human behaviour. Humans are the core of every societal system and designing technology without understanding the biological and psychological realities of implementing that technology is a critical error. Artificial intelligence (AI) technology is designed to mimic human thinking and decision-making so designing it with the practicalities of human cognition and trust at the forefront is essential. Applying AI to cyber security can have massive benefits. However, solutions that do not consider the human element but rather just implement new AI for the art of it tend to have troublesome consequences and clash with user behaviour. In order to affect lasting change in security operations, especially via the implementation of AI to problem-solve and increase efficiency, it is critical that the AI techniques leveraged are designed around the realities of human behaviour and psychological realities. This paper explores psychological realities such as cognitive biases, reactions to stress and crisis and implicit trust in technology, how they can be made worse if technology, especially AI technology, is not designed with those realities at the forefront and how AI can instead be built to complement human behaviour. This article is also included in The Business & Management Collection which can be accessed at https://hstalks.com/business/.
Keywords: artificial intelligence; cognitive biases; psychology; human behaviour; AI; cyber security; security operations; risk; AI adoption (search for similar items in EconPapers)
JEL-codes: M15 (search for similar items in EconPapers)
Date: 2025
References: Add references at CitEc
Citations:
Downloads: (external link)
https://hstalks.com/article/10269/download/ (application/pdf)
https://hstalks.com/article/10269/ (text/html)
Requires a paid subscription for full access.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:aza:csj000:y:2025:v:9:i:2:p:130-138
Access Statistics for this article
More articles in Cyber Security: A Peer-Reviewed Journal from Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().