A cyber-risk framework for coordination of the prevention and preservation of behaviours

Journal Article (2022)
Author(s)

Simon Parkin (TU Delft - Organisation & Governance)

Yi Ting Chua (University of South Alabama)

Research Group
Organisation & Governance
Copyright
© 2022 S.E. Parkin, Yi Ting Chua
DOI related publication
https://doi.org/10.3233/JCS-210047
More Info
expand_more
Publication Year
2022
Language
English
Copyright
© 2022 S.E. Parkin, Yi Ting Chua
Research Group
Organisation & Governance
Issue number
3
Volume number
30
Pages (from-to)
327-356
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

Cybersecurity controls are deployed to manage risks posed by malicious behaviours or systems. What is not often considered or articulated is how cybersecurity controls may impact legitimate users (often those whose use of a managed system needs to be protected, and preserved). This oversight characterises the blunt' nature of many cybersecurity controls. Here we present a framework produced from consideration of concerns across methods from cybercrime opportunity reduction and behaviour change, and existing risk management guidelines. We illustrate the framework and its principles with a range of examples and potential applications, including management of suspicious emails in organizations, and social media controls. The framework describes a capacity to improve the precision of cybersecurity controls by examining shared determinants of negative and positive behaviours in a system. This identifies opportunities for risk owners to better protect legitimate users while simultaneously acting to prevent malicious activity in a managed system. We describe capabilities for a novel approach to managing sociotechnical cyber risk which can be integrated alongside elements of typical risk management processes. This includes consideration of user activities as a system asset to protect, and a consideration of how to engage with other stakeholders in the identification of behaviours to preserve in a system.