| Literature DB >> 34149309 |
Alessandro Pollini1,2, Tiziana C Callari3, Alessandra Tedeschi2, Daniele Ruscio2, Luca Save2, Franco Chiarugi4, Davide Guerri4.
Abstract
Computer and Information Security (CIS) is usually approached adopting a technology-centric viewpoint, where the human components of sociotechnical systems are generally considered as their weakest part, with little consideration for the end users' cognitive characteristics, needs and motivations. This paper presents a holistic/Human Factors (HF) approach, where the individual, organisational and technological factors are investigated in pilot healthcare organisations to show how HF vulnerabilities may impact on cybersecurity risks. An overview of current challenges in relation to cybersecurity is first provided, followed by the presentation of an integrated top-down and bottom-up methodology using qualitative and quantitative research methods to assess the level of maturity of the pilot organisations with respect to their capability to face and tackle cyber threats and attacks. This approach adopts a user-centred perspective, involving both the organisations' management and employees, The results show that a better cyber-security culture does not always correspond with more rule compliant behaviour. In addition, conflicts among cybersecurity rules and procedures may trigger human vulnerabilities. In conclusion, the integration of traditional technical solutions with guidelines to enhance CIS systems by leveraging HF in cybersecurity may lead to the adoption of non-technical countermeasures (such as user awareness) for a comprehensive and holistic way to manage cyber security in organisations.Entities:
Keywords: Cyber attacks; Human error; Human-centric perspective; Non-technical countermeasures; Socio-technical system
Year: 2021 PMID: 34149309 PMCID: PMC8195225 DOI: 10.1007/s10111-021-00683-y
Source DB: PubMed Journal: Cogn Technol Work ISSN: 1435-5558 Impact factor: 2.818
Taxonomy of human errors and violations
| Incorrect security actions | Error/violation type | Description |
|---|---|---|
| Accidental and non-deliberate actions determining a violation of a security rule | Slips skill-based | Incorrect actions in tasks that are routine and require only occasional conscious checks; these errors are related to the attention of the individual performing actions relevant for security |
| Lapses skill-based | Memory failures in actions relevant for security, such as omitting a planned action, losing one’s place, or forgetting security-relevant intentions | |
| Deliberate actions determining an unwanted violation of a security rule | Rule based mistakes | Application of a bad rule relevant for security Inappropriate application of a good rule relevant for security |
| Knowledge based mistakes | Intentional act involving faulty conceptual knowledge, incomplete knowledge, or incorrect action specification, leading to the unwanted violation of a security policy or procedure | |
| Deliberate violations of a security procedure with no malicious intent | Violations | Intentional deviation from security policies or procedures due to underestimation of security consequences (can be either routine or exceptional) |
| Deliberate violations of a security procedure with malicious intent | Malicious violations | Intentional deviation from security policies or procedures for the purpose of sabotaging the system |
Overview of the proposed integrated method to evaluate CIS in organisations
| Analysis | Objectives | Tools—Methods |
|---|---|---|
| Individual level | ||
| Individual reasoning about security | Investigate the common and widespread decision-making way of thinking (heuristics and bias) | Individual interview HAIS-Q questionnaire |
| Accidental and non-deliberate actions determining a violation of a security rule | Investigate the causes of inadvertent human errors | Scenario- based analysis HAIS-Q questionnaire |
| Deliberate actions determining an unwanted violation of a security rule | Investigate the relationship between knowledge and awareness of possible source of risk | Individual interview HAIS-Q questionnaire |
| Deliberate violation of a security rule with no malicious intent | Investigate when and why rules are broken? Analyse the possible adaptive value of rule breaking Identify when rule breaking is required by the organisation | Individual interview HAIS-Q questionnaire |
| Organisational Level | ||
| Organisation—contextual and Situational Knowledge | Organisational context: investigate human and organisational aspects as relevant areas of the enterprise dataspace Situational issues: investigate how situational variables affect the organisational performance and values | Scenario- based analysis Field observation—Contextual inquiry |
| Implicit rules—Modus Operandi | Investigate cultural aspects towards cybersecurity: such as salience, awareness, overconfidence | Focus group Individual interview |
| Explicit and formal rules | Investigate maturity towards cyber-security, describe how decisions about countermeasure are taken | Cybersecurity maturity semi-structured Interview |
Overview of participants and methods used for data collection
| Profiles | # Participants | Method |
|---|---|---|
| Managers | 4 | HAIS-Q questionnaire |
| 7 | Cybersecurity Maturity Semi-structured Interview | |
| IT Experts | 32 | HAIS-Q questionnaire |
| 7 | Focus Group | |
| 5 | Cybersecurity Maturity Semi-structured Interview | |
| Operative Roles | 58 | HAIS-Q questionnaire |
| 9 | Focus Group | |
| 2 | Cybersecurity Maturity Semi-structured Interview |
Fig. 1Focus areas of the HAIS-Q questionnaire
Example of the items concerning the topic password management
| FA1—Password management |
| Knowledge |
1. “It is possible for someone to misuse my computer if I leave it unlocked while unattended.” 2. “Personal passwords are meant for individual use only.” 3. “A strong password can be less than 10 characters long.” |
| Attitude |
1. “I should not worry too much if I have left my computer unlocked while unattended.” 2. “It is okay to share my passwords with trustworthy people.” 3. “I believe that it is necessary for all my passwords to be at least 10 characters long” |
| Behaviour |
1. “I lock my computer if I leave it unattended.” 2. “I share my personal password with others.” 3. “I use passwords that are at least 10 characters long.” |
Descriptive results (Overall Sample)
| HAIS-Q | Mean | SD | Median | Percentiles | |||
|---|---|---|---|---|---|---|---|
| 25% | 50% | 75% | |||||
| Knowledge | 98 | 3.9 | 0.7 | 3.9 | 3.6 | 3.9 | 4.3 |
| Attitude | 94 | 3.7 | 0.7 | 3.7 | 3.4 | 3.7 | 4.1 |
| Behaviour | 95 | 3.9 | 0.8 | 4.0 | 3.7 | 4.0 | 4.4 |
| FA1 – password management | 94 | 3.7 | 0.7 | 3.9 | 3.2 | 3.9 | 4.2 |
| FA2 – e-mail use | 94 | 3.9 | 0.8 | 4.1 | 3.6 | 4.1 | 4.6 |
| FA3 – internet use | 94 | 3.7 | 0.7 | 3.8 | 3.5 | 3.8 | 4.2 |
| FA4 – mobile Computing | 94 | 3.9 | 0.8 | 4.0 | 3.5 | 4.0 | 4.4 |
| FA5 – social network | 94 | 3.7 | 0.6 | 3.9 | 3.6 | 3.9 | 4.1 |
| FA6 – incident Reporting | 94 | 3.6 | 0.8 | 3.8 | 3.2 | 3.8 | 4.1 |
| FA7 – information handling | 94 | 4.2 | 0.9 | 4.3 | 3.8 | 4.3 | 4.8 |
Fig. 2Direct, proportional and positive correlation for “Knowledge”, “Attitude” and “Behaviour” distribution across Focus Areas, for IT (blue dots) vs. Non-IT (yellow dots). The dot size represents the type of organisation: Hospitals (wider dots) vs. HC Software Provider (smaller dots)
Fig. 3Mean Overall Scores for Knowledge (K), Attitude (A) and Behaviours (B) for the FAs where IT personnel reported total mean scores higher than Non-IT personnel
Fig. 4Mean Overall Scores for Knowledge (K), Attitude (A) and Behaviours (B) for the Focus Areas where IT reported total mean scores equal or lower than Non-IT personnel
Fig. 5Mean Scores for the FAs for IT (blue lines, chart on the left) vs. Non-IT (yellow lines, chart on the right) personnel in different type of organisations: HC Software Provider organisations (lighter lines in both charts) vs. non-software-related organisations i.e., hospital organisations (darker lines in both charts)