<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article article-type="article-commentary" dtd-version="2.0" xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMIRxMed</journal-id>
      <journal-id journal-id-type="nlm-ta">JMIRx Med</journal-id>
      <journal-title>JMIRx Med</journal-title>
      <issn pub-type="epub">2563-6316</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v3i2e38587</article-id>
      <article-id pub-id-type="pmid"/>
      <article-id pub-id-type="doi">10.2196/38587</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Authors’ Response to Peer Reviews</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Authors’ Response to Peer Reviews</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Author's Responses to Peer Reviews of “Toward Human Digital Twins for Cybersecurity Simulations on the Metaverse: Ontological and Network Science Approach”</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Meinert</surname>
            <given-names>Edward</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author" corresp="yes">
          <name name-style="western">
            <surname>Nguyen</surname>
            <given-names>Tam N</given-names>
          </name>
          <degrees>MCS, MA, CISSP</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>Department of Management Information Systems</institution>
            <institution>University of Arizona</institution>
            <addr-line>1130 E Helen St</addr-line>
            <addr-line>PO Box 210108</addr-line>
            <addr-line>Tucson, AZ, 85721-0108</addr-line>
            <country>United States</country>
            <phone>1 970 404 1232</phone>
            <email>tamn@email.arizona.edu</email>
          </address>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-8577-8342</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>Department of Management Information Systems</institution>
        <institution>University of Arizona</institution>
        <addr-line>Tucson, AZ</addr-line>
        <country>United States</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Tam N Nguyen <email>tamn@email.arizona.edu</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <season>Apr-Jun</season>
        <year>2022</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>20</day>
        <month>4</month>
        <year>2022</year>
      </pub-date>
      <volume>3</volume>
      <issue>2</issue>
      <elocation-id>e38587</elocation-id>
      <history>
        <date date-type="received">
          <day>7</day>
          <month>4</month>
          <year>2022</year>
        </date>
        <date date-type="accepted">
          <day>7</day>
          <month>4</month>
          <year>2022</year>
        </date>
      </history>
      <copyright-statement>©Tam N Nguyen. Originally published in JMIRx Med (https://med.jmirx.org), 20.04.2022.</copyright-statement>
      <copyright-year>2022</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIRx Med, is properly cited. The complete bibliographic information, a link to the original publication on https://med.jmirx.org/, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="https://med.jmirx.org/2022/2/e38587" xlink:type="simple"/>
      <related-article related-article-type="companion" id="preprint2rbku" ext-link-type="doi" xlink:href="10.31234/osf.io/2rbku" vol="1" page="2rbku" xlink:title="Preprint (PsyArXiv):" xlink:type="simple">https://psyarxiv.com/2rbku/</related-article>
      <related-article related-article-type="companion" id="preprint33502" ext-link-type="doi" xlink:href="https://doi.org/10.2196/preprints.33502" vol="1" page="e33502" xlink:title="Preprint (JMIR Preprints):" xlink:type="simple">https://preprints.jmir.org/preprint/33502</related-article>
      <related-article related-article-type="companion" id="v3i2e38581" ext-link-type="doi" xlink:href="10.2196/38581" vol="3" page="e38581" xlink:title="Peer-Review Report by Daniel Oladele (Reviewer R):" xlink:type="simple">https://med.jmirx.org/2022/2/e38581/</related-article>
      <related-article related-article-type="companion" id="v3i2e38583" ext-link-type="doi" xlink:href="10.2196/38583" vol="3" page="e38583" xlink:title="Peer-Review Report by Jorge Ropero (Reviewer Z):" xlink:type="simple">https://med.jmirx.org/2022/2/e38583/</related-article>
      <related-article related-article-type="companion" id="v3i2e33502" ext-link-type="doi" xlink:href="10.2196/33502" vol="3" page="e33502" xlink:title="Published Article:" xlink:type="simple">https://med.jmirx.org/2022/2/e33502/</related-article>
      <kwd-group>
        <kwd>human behavior modeling</kwd>
        <kwd>cognitive twins</kwd>
        <kwd>human digital twins</kwd>
        <kwd>cybersecurity</kwd>
        <kwd>cognitive systems</kwd>
        <kwd>digital twins</kwd>
        <kwd>Metaverse</kwd>
        <kwd>artificial intelligence</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <p>
      <italic>This is the author’s response to peer-review reports for “Toward Human Digital Twins for Cybersecurity Simulations on the Metaverse: Ontological and Network Science Approach.”</italic>
    </p>
    <sec>
      <title>Round 1 Review</title>
      <p>I am very grateful to the reviewers for their constructive comments regarding my paper [<xref ref-type="bibr" rid="ref1">1</xref>]. I diligently considered the comments and made these key changes:</p>
      <sec>
        <title>Reviewer Z [<xref ref-type="bibr" rid="ref2">2</xref>]</title>
        <p>1. The author states that this paper proposes an application of Digital Twins (DT) and Human Digital Twins (HDT) for the first time. This is not exact, as, in the last 2 years, there have been some approaches to the use of DT in cybersecurity.</p>
        <p>The author should include some of these ideas in the literature review.[...]</p>
        <p>Response: I removed the claim that Reviewer Z had mentioned for added clarity. I did not discuss the recommended literature that does not involve Human Digital Twins (HDT) or any cognitive feature. Instead, I discuss 5 papers about autonomous agents (cognitive twins) for cybersecurity in the <italic>Prior Work</italic> subsection. I also emphasized the differences between those autonomous agents and HDTs in the <italic>Conclusions</italic> section to refocus the audience’s attention on HDTs for cybersecurity—the paper’s main research topic.</p>
        <p>2. In the literature review, the author should add a definition of DT and HDT, how HDT surges from the concept of DT, a comparison between both techniques, and finally a list of the main uses of DT and HDT.</p>
        <p>Response: I made clearer the definitions of DT and HDT and added a brief definition of Metaverse in the <italic>Introduction</italic> section and the <italic>Backgrounds on HDTs</italic> subsection. I also point the audience to the <italic>Prior Work</italic> subsection for a list of most relevant use cases for cognitive twins (autonomous agents).</p>
        <p>3 and 4. In the literature review, the author claims that there is no grounded vision of the power of DT and HDT. In addition to the fact that, as I mentioned before, there are already applications of DT to cybersecurity, nothing is mentioned about proactive cyber defense existing techniques. What can DT and HDT add to the existing techniques?</p>
        <p>The author states that the framework targets the cognitive process of a malicious actor as an HDT within a DT system. What is the purpose of this? The author must explain why these decisions were made.</p>
        <p>Response: I added two paragraphs (the second and fourth paragraphs) in the <italic>The General Landscape</italic> subsection and discuss use cases of cognitive twins in the <italic>Prior Work</italic> section. Those details, the <italic>Backgrounds on HDTs</italic> and the Cybonto Conceptual Framework for a total of 15 related references should give the audience a good sense of the needs, benefits, and basic mechanisms of HDTs for cybersecurity vision.</p>
        <p>5 and 6. Regarding Table 1, how was the total score calculated? There should be a description of every item. How was the score of every item calculated? An explanation is necessary.</p>
        <p>Related to the above, it is good to have all the information in GitHub, but, at least a brief and clear description of the obtention of cybersecurity-related behavioral theories, and another description of the ontology should be provided in the manuscript or in a Multimedia Appendix.</p>
        <p>Response: A paragraph was added for a brief explanation of table metrics calculations. I also added the Cybonto main hierarchies figure (Figure 1). Figure 1 and figure 2 should be able to convey the Cybonto core details. I emphasized the need of visiting the GitHub repository for the most up-to-date of all the artifacts at least two times in the paper. I believe it is the best way for the JMIR readership. For example, it is best to download the latest Cybonto and browse it interactively via Protégé.</p>
        <p>7. An explanation of Figure 1 is needed.</p>
        <p>Response: The original Figure 1 (Cybonto Conceptual Framework figure) was explained in the entire “Expanding the Vision With The Cybonto Conceptual Framework” subsection.</p>
        <p>8. Without a clear description, the rest of the paper, although interesting, is difficult to follow.</p>
        <p>Response: I added new sections and reformatted the entire paper per JMIR author guidelines. I hope that makes the paper easier to follow.</p>
        <p>9. In broad terms, I understand the goal of the ontology, but it is so abstract that it is difficult for me how to apply it to proactive cyber defense. Some examples would be welcome. </p>
        <p>Response: I added the “Prior Work” subsection and discuss interesting use cases of applying human-like agents (cognitive twins and autonomous agents) in the physical-cyber security domain.</p>
        <p>10. Last, a general comment: this is the Journal of Medical Internet Research. Though other topics are welcome, and it is clear that security is capital in the medical field, some particular comments about cybersecurity in the medical field would be desirable.</p>
        <p>Response: I reworked the “Conclusions” section with an emphasis on the potential use of Cybonto in virtual patients for applied psychology training, automatic behavioral annotations, and analysis of Electronic Health Records, and virtual agents for community psychology experiments.</p>
        <p>11. In the introduction, the author states that “incredibly,” HDT offers the capability of running large-scale simulations. Why “incredibly”?</p>
        <p>Response: I removed “incredibly.”</p>
        <p>12. In the introduction, the author claims that “Analyzing the Cybonto ontology informed the Cybonto conceptual framework.” I do not understand this sentence.</p>
        <p>Response: I reworked the “Introduction” section and removed the confusing sentence.</p>
        <p>13. The author defines the in-group environment acronym as IGE, but it appears as IEG in the rest of the paper.</p>
        <p>Response: I corrected the typographical errors.</p>
      </sec>
    </sec>
    <sec>
      <title>Round 2 Review</title>
      <sec>
        <title>Reviewer Z</title>
        <p>1. In Table 2, what are PR, EC, BC, and DC?</p>
        <p>Response: PR stands for “Page Rank,” EC stands for “Eigenvector centrality,” BC stands for “betweenness centrality,” and DC stands for “degree centrality.” I added table footnotes to clarify this information.</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group/>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Nguyen</surname>
              <given-names>TN</given-names>
            </name>
          </person-group>
          <article-title>Toward Human Digital Twins for Cybersecurity Simulations on the Metaverse: Ontological and Network Science Approach</article-title>
          <source>JMIRx Med</source>
          <year>2022</year>
          <volume>3</volume>
          <issue>2</issue>
          <fpage>e33502</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://med.jmirx.org/2022/2/e33502/"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ropero</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Peer review of “Toward Human Digital Twins for Cybersecurity Simulations on the Metaverse: Ontological and Network Science Approach.”</article-title>
          <source>JMIRx Med</source>
          <year>2022</year>
          <volume>3</volume>
          <issue>2</issue>
          <fpage>e38583</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://med.jmirx.org/2022/2/e38583/"/>
          </comment>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
