Articles
| Open Access |
Operationalizing the Zero Trust Paradigm: A Multi-Criteria Decision-Making Framework for Secure Enterprise Browser Selection and Security Personnel Competency Evaluation
Dr. A. Sterling , Department of Information Engineering, University of Bologna, Italy Prof. Ivan Muntafa , Department of Computer Science and Engineering, Bauman Moscow State Technical University, Moscow, RussiaAbstract
Background: As organizations migrate to cloud-native environments, the traditional network perimeter has evaporated, replaced by the web browser as the primary business interface. This shift necessitates the adoption of Zero Trust Architectures (ZTA) and specialized Secure Enterprise Browsers (SEB). However, the efficacy of these technologies is contingent upon both the selection of appropriate software tools and the competency of the security personnel managing them.
Methods: This study proposes a dual-track decision-support framework. First, it integrates Multi-Criteria Decision-Making (MCDM) methods, specifically TOPSIS with Interval Neutrosophic Sets and Fuzzy ELECTRE, to evaluate SEB solutions based on security, usability, and cost. Second, it applies SWARA and ARAS methods to structure the selection process for cybersecurity personnel, ensuring alignment between human capability and technical requirements.
Results: The application of the proposed framework demonstrates that while technical specifications (e.g., granular DLP controls) are critical, the weighting of "usability" in SEBs significantly impacts long-term Zero Trust compliance. Furthermore, the personnel selection model reveals that adaptive behavioral analysis skills are now more predictive of success than static technical certifications in a Zero Trust environment.
Conclusion: The study establishes that operationalizing Zero Trust requires a synchronized approach to technology and talent acquisition. By utilizing mathematical decision models, organizations can reduce subjectivity and enhance the resilience of their digital ecosystems against modern threats.
Keywords
Zero Trust Architecture, Secure Enterprise Browser, Multi-Criteria Decision Making, Browser
References
Prassanna Rao Rajgopal. Secure Enterprise Browser - A Strategic Imperative for Modern Enterprises. International Journal of Computer Applications. 187, 33 ( Aug 2025), 53-66. DOI=10.5120/ijca2025925611
Şenel, B.; Şenel, M.; Aydemir, G. Use and Comparison of Topis and Electre Methods in Personnel Selection. In Proceedings of the ITM Web of Conferences; EDP Sciences: Les Ulis, France, 2018.
Jasemi, M.; Ahmadi, E. A New Fuzzy ELECTRE Based Multiple Criteria Method for Personnel Selection. Sci. Iran. 2018, 25, 943–953.
Karabasevic, D.; Zavadskas, E.K.; Turskis, Z.; Stanujkic, D. The framework for the selection of personnel based on the SWARA and ARAS methods under uncertainties. Informatica 2016, 27, 49–65.
Ji, P.; Zhang, H.-Y.; Wang, J.-Q. A projection-based TODIM method under multi-valued neutrosophic environments and its application in personnel selection. Neural Comput. Appl. 2018, 29, 221–234.
Dung, V.; Thuy, L.T.; Mai, P.Q.; Van Dan, N.; Lan, N.T.M. TOPSIS Approach Using Interval Neutrosophic Sets for Personnel Selection; Infinite Study: Coimbatore, India, 2018.
Pramanik, S.; Dalapati, S.; Roy, T.K. Neutrosophic multi-attribute group decision making strategy for logistics center location selection. Neutrosophic Oper. Res. 2018, 3, 13–32.
Karabasevic, D.; Zavadskas, E.K.; Stanujkic, D.; Popovic, G.; Brzakovic, M. An approach to personnel selection in the IT industry based on the edas method. Transform. Bus. Econ. 2018, 17, 44.
Saaty, T.L. Decision Making with Dependence and Feedback: The Analytic Network Process; RWS Publ.: Pittsburgh, PA, USA, 1996; Volume 4922.
Saaty, T.L. The Analytic Hierarchy Process; McGraw Hill: New York, NY, USA, 1980.
Meade, L.; Sarkis, J. Analyzing organizational project alternatives for agile manufacturing processes: An analytical network approach. Int. J. Prod. Res. 1999, 37, 241–261.
Verizon. "Data Breach Investigations Report." [Online]. Available: https://www.verizon.com/business/resources/reports/dbir.
H. Kang, G. Liu, Q. Wang, L. Meng, and J. Liu, "Theory and Application of Zero Trust Security: A Brief Survey," Entropy, vol. 25, no. 12, p. 1595, Nov. 2023.
Kaggle. "Discussion on Zero Trust." [Online]. Available: https://www.kaggle.com/discussions/general/335189.
Department of Homeland Security. "Cybersecurity Impact." [Online]. Available: https://www.dhs.gov/archive/science-and-technology/cybersecurity-impact.
H. Ameer and H. Refaey, "Dissecting zero trust: Research landscape and its implementation in IoT," Cybersecurity Journal, SpringerOpen, 2022.
F. Abreu and M. Ziegler, "Dynamic access control models for IoT security under zero trust," Sensors, vol. 20, no. 14, p. 4023, MDPI, 2020.
Mehraj and T. Banday, "Trust evaluation mechanisms in zero trust cloud environments," International Journal of Cloud Computing and Security, vol. 9, no. 11, p. 1287, MDPI, 2020.
Kerman and S. Rose, "Implementing Zero Trust Architecture: Challenges and Strategies," NIST Special Publication, 2020.
Sharma, H. (2021). "Behavioral Analytics and Zero Trust." International Journal of Information Technology and Management Information Systems (IJITMIS), 12(1), 63-84.
Article Statistics
Downloads
Copyright License
Copyright (c) 2025 Dr. A. Sterling, Prof. Ivan Muntafa

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Copyright and Ethics:
- Authors are responsible for obtaining permission to use any copyrighted materials included in their manuscript.
- Authors are also responsible for ensuring that their research was conducted in an ethical manner and in compliance with institutional and national guidelines for the care and use of animals or human subjects.
- By submitting a manuscript to International Journal of Computer Science & Information System (IJCSIS), authors agree to transfer copyright to the journal if the manuscript is accepted for publication.