Operationalizing the Zero Trust Paradigm: A Multi-Criteria Decision-Making Framework for Secure Enterprise Browser Selection and Security Personnel Competency Evaluation
Keywords:
Zero Trust Architecture, Secure Enterprise Browser, Multi-Criteria Decision Making, BrowserAbstract
Background: As organizations migrate to cloud-native environments, the traditional network perimeter has evaporated, replaced by the web browser as the primary business interface. This shift necessitates the adoption of Zero Trust Architectures (ZTA) and specialized Secure Enterprise Browsers (SEB). However, the efficacy of these technologies is contingent upon both the selection of appropriate software tools and the competency of the security personnel managing them.
Methods: This study proposes a dual-track decision-support framework. First, it integrates Multi-Criteria Decision-Making (MCDM) methods, specifically TOPSIS with Interval Neutrosophic Sets and Fuzzy ELECTRE, to evaluate SEB solutions based on security, usability, and cost. Second, it applies SWARA and ARAS methods to structure the selection process for cybersecurity personnel, ensuring alignment between human capability and technical requirements.
Results: The application of the proposed framework demonstrates that while technical specifications (e.g., granular DLP controls) are critical, the weighting of "usability" in SEBs significantly impacts long-term Zero Trust compliance. Furthermore, the personnel selection model reveals that adaptive behavioral analysis skills are now more predictive of success than static technical certifications in a Zero Trust environment.
Conclusion: The study establishes that operationalizing Zero Trust requires a synchronized approach to technology and talent acquisition. By utilizing mathematical decision models, organizations can reduce subjectivity and enhance the resilience of their digital ecosystems against modern threats.
References
Prassanna Rao Rajgopal. Secure Enterprise Browser - A Strategic Imperative for Modern Enterprises. International Journal of Computer Applications. 187, 33 ( Aug 2025), 53-66. DOI=10.5120/ijca2025925611
Şenel, B.; Şenel, M.; Aydemir, G. Use and Comparison of Topis and Electre Methods in Personnel Selection. In Proceedings of the ITM Web of Conferences; EDP Sciences: Les Ulis, France, 2018.
Jasemi, M.; Ahmadi, E. A New Fuzzy ELECTRE Based Multiple Criteria Method for Personnel Selection. Sci. Iran. 2018, 25, 943–953.
Karabasevic, D.; Zavadskas, E.K.; Turskis, Z.; Stanujkic, D. The framework for the selection of personnel based on the SWARA and ARAS methods under uncertainties. Informatica 2016, 27, 49–65.
Ji, P.; Zhang, H.-Y.; Wang, J.-Q. A projection-based TODIM method under multi-valued neutrosophic environments and its application in personnel selection. Neural Comput. Appl. 2018, 29, 221–234.
Dung, V.; Thuy, L.T.; Mai, P.Q.; Van Dan, N.; Lan, N.T.M. TOPSIS Approach Using Interval Neutrosophic Sets for Personnel Selection; Infinite Study: Coimbatore, India, 2018.
Pramanik, S.; Dalapati, S.; Roy, T.K. Neutrosophic multi-attribute group decision making strategy for logistics center location selection. Neutrosophic Oper. Res. 2018, 3, 13–32.
Karabasevic, D.; Zavadskas, E.K.; Stanujkic, D.; Popovic, G.; Brzakovic, M. An approach to personnel selection in the IT industry based on the edas method. Transform. Bus. Econ. 2018, 17, 44.
Saaty, T.L. Decision Making with Dependence and Feedback: The Analytic Network Process; RWS Publ.: Pittsburgh, PA, USA, 1996; Volume 4922.
Saaty, T.L. The Analytic Hierarchy Process; McGraw Hill: New York, NY, USA, 1980.
Meade, L.; Sarkis, J. Analyzing organizational project alternatives for agile manufacturing processes: An analytical network approach. Int. J. Prod. Res. 1999, 37, 241–261.
Verizon. "Data Breach Investigations Report." [Online]. Available: https://www.verizon.com/business/resources/reports/dbir.
H. Kang, G. Liu, Q. Wang, L. Meng, and J. Liu, "Theory and Application of Zero Trust Security: A Brief Survey," Entropy, vol. 25, no. 12, p. 1595, Nov. 2023.
Kaggle. "Discussion on Zero Trust." [Online]. Available: https://www.kaggle.com/discussions/general/335189.
Department of Homeland Security. "Cybersecurity Impact." [Online]. Available: https://www.dhs.gov/archive/science-and-technology/cybersecurity-impact.
H. Ameer and H. Refaey, "Dissecting zero trust: Research landscape and its implementation in IoT," Cybersecurity Journal, SpringerOpen, 2022.
F. Abreu and M. Ziegler, "Dynamic access control models for IoT security under zero trust," Sensors, vol. 20, no. 14, p. 4023, MDPI, 2020.
Mehraj and T. Banday, "Trust evaluation mechanisms in zero trust cloud environments," International Journal of Cloud Computing and Security, vol. 9, no. 11, p. 1287, MDPI, 2020.
Kerman and S. Rose, "Implementing Zero Trust Architecture: Challenges and Strategies," NIST Special Publication, 2020.
Sharma, H. (2021). "Behavioral Analytics and Zero Trust." International Journal of Information Technology and Management Information Systems (IJITMIS), 12(1), 63-84.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Dr. A. Sterling, Prof. Ivan Muntafa

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.