Uploaded by licac49134

A Conceptual Model für Cybersecurity

advertisement
Journal of Applied Security Research
ISSN: (Print) (Online) Journal homepage: https://www.tandfonline.com/loi/wasr20
A Conceptual Model for Cybersecurity Governance
Salifu Yusif & Abdul Hafeez-Baig
To cite this article: Salifu Yusif & Abdul Hafeez-Baig (2021): A Conceptual
Model for Cybersecurity Governance, Journal of Applied Security Research, DOI:
10.1080/19361610.2021.1918995
To link to this article: https://doi.org/10.1080/19361610.2021.1918995
Published online: 10 May 2021.
Submit your article to this journal
Article views: 151
View related articles
View Crossmark data
Full Terms & Conditions of access and use can be found at
https://www.tandfonline.com/action/journalInformation?journalCode=wasr20
JOURNAL OF APPLIED SECURITY RESEARCH
https://doi.org/10.1080/19361610.2021.1918995
A Conceptual Model for Cybersecurity Governance
Salifu Yusifa and Abdul Hafeez-Baigb
a
BELA, School of Management and Enterprise University of Southern Queensland, Australia;
School of Management and Enterprise University of Southern Queensland Toowoomba
QLD, Australia
b
ABSTRACT
Cybersecurity is a growing problem associated with everything
an individual or an organization does that is facilitated by the
Internet. It is a multi-facetted program that can be addressed
by cybersecurity governance. However, research has shown
that many organizations face at least five basic challenges of
cybersecurity. In this study, we developed a model for an
effective cybersecurity governance that hopes to address
these challenges, conceptualized as factors that must continuously be measured and evaluated. They are: (1) Cybersecurity
strategy; (2) Standardized processes, (3) Compliance, (4) Senior
leadership oversight, and (5) Resources.
KEYWORDS
Cybersecurity; cybersecurity
governance; cybersecurity
strategy; cybersecurity risk;
cybersecurity compliance
Introduction
Cybersecurity is a growing problem associated with everything an individual or an organization does that is facilitated by Internet. It is high risk
problem and must be treated as such, given the highly unpredictability
nature of when, how, where and by whom threats may arise from. Digital
threats are constantly changing in their mode of operation, and likewise
the cybersecurity management strategies should be equally flexible in their
operation and chosen strategies (Ellis & Mohan, 2019). One key aspect of
cybersecurity is knowledge of risks, without evasive action. Cybersecurity is
the “collection of tools, policies, security concepts, security safeguards,
guidelines, risk management approaches, actions, training, best practices,
assurance and technologies that can be used to protect the cyber environment and organization and user’s assets” (ITU, 2008, p. 2). More broadly
speaking, “[cybersecurity] is the measures taken to protect network systems
and their data against attacks or intrusions” (Scala et al., 2019, p. 2119).
Cybersecurity encompasses all the reactive and proactive actions undertaken to ensure information systems assets are secured and available to
authorized persons only. Fundamentally, the phenomena of cybersecurity
CONTACT Salifu Yusif
salifusf5@gmail.com
BELA, School of Management and Enterprise University of
Southern Queensland, 37 Sinnathamby Blvd, Springfield Central QLD, Queensland 4300, Australia.
ß 2021 Taylor & Francis Group, LLC
2
S. YUSIF AND A. HAFEEZ-BAIG
in any organization can be divided into two factors—technical factors,
which are the first lines of defence and non-technical human factors, which
include behavioral human factors, and organizational culture, which is predominantly managerial (Pullin, 2018). Because “when employees are aware
of their company’s information security policies and procedures, they are
more competent to manage cybersecurity tasks than those who are not
aware of their companies’ cybersecurity policies” (Li et al., 2019). Cyber
risks associated with successful and unsuccessful incidents and corporate
enterprise value transcends immediate financial cost and tarnish to corporate reputation (Baror & Venter, 2019; Roskot et al., 2020; Sabillon et al.,
2016; Smith et al., 2019) are enough to warrant the attention of top management and governance. This awakes the interests of regulators in the participation of executive-level management in cyber risk management because
of its implications (Nolan et al., 2019). However, the exact definition of
cybersecurity is a contested question and is continually evolving. The
canonical understanding of cybersecurity is that it is perceived as the sole
responsibility of the chief information security officer/information and
communication technology (ICT) department given the far-reaching implications of any cyberattack. However, this view has shifted to include every
facet of an organization; cybersecurity now implies securing devices, data
and networks on all levels—making it the responsibility of the organization
as a whole.
The emerging active participation of governing bodies across all industry
levels, is a clear indication that an enterprise-wide digital transformation
has dominated the agenda for many organizations move to macro-level
business risk management (Siebel, 2017).
“Digital transformation is about sweeping change. It changes everything
about how products are designed, manufactured, sold, delivered, and serviced—and it forces CEOs to rethink how companies execute, with new
business processes, management practices, and information systems, as well
as everything about the nature of customer relationships” (Siebel, 2017,
p. 6). Digital transformations have compelled senior executives to rethink
their cybersecurity strategy as service failures increase and the risks to corporate reputation become salient. For example, healthcare, power generating as with transport industries have all began paying more attention to the
critical role of cybersecurity in their day to day operations, brand value and
overall service (College of Healthcare Information Management Executives,
2018). All too often, literature has emphasized the importance of the implementation of cybersecurity governance in securing cyberspace/information
systems. However, it is unclear what components make up an effective
cybersecurity governance and how these components support the overall
cybersecurity strategy in securing information systems assets. In this study,
JOURNAL OF APPLIED SECURITY RESEARCH
3
we fill this gap by laying bare how these components, such as cybersecurity
strategy and goals, resources need, etc. (the rest are discussed a little later)
and how they interconnect to achieve effective cybersecurity governance.
We believe the outcome of this research will contribute in addition to literature to practice in the context of effective implementation of cybersecurity governance. Theoretically, through the conceptual framework developed,
the paper provides foundation for further theory development and testing
for validation and adoption.
Cybersecurity policies and procedures
The increased proliferation of mobile and personal digital devices and the
need for increased access to digital services through the Internet have led
to increased online engagement by employees and customers at any workplace. This situation is estimated to cost billions of dollars in lost revenue
not only to loss of job productivity but also cost of cybersecurity incidents
(Young, 2010). For example, in initiatives such as bring your own device
(BYOD) employees are allowed to use their personal digital devices for
work purposes. Particularly during the Covid-19 pandemic, the recent
increase in remote working employees has lead to an unprecedent number
of cybersecurity attacks. Under this hybrid working environment the risk
of vulnerability to network security and cyberattacks are enormous. It will
require a change in working landscape and measures to guide how customers, employees, contractors, and other organizations’ affiliates access and
use corporate networks against policies and procedures. Due to a lack of
cybersecurity understanding, a noticeable portion of employees fail to
adhere to the information security policies of their organizations, while
underestimating the information security risks (Li et al., 2019). This stems
from a lack of cybersecurity policy awareness and education (Li et al.,
2019). The consequence of these is “human error,” responsible for more
than 95 per cent of incidents as found in IBM security services 2014 cyber
security intelligence index report (IBM, 2014). The report notes that “the
most commonly recorded form of human errors include system misconfiguration, poor patch management, use of default user names and passwords or
easy-to-guess passwords, lost laptops or mobile devices, and disclosure of
regulated information via use of an incorrect email address” (IBM, 2014, p.
3). These are clear examples of preventable incidents, caused by a lack of
awareness of the risks involved.
Policy “involves developing recommendations and guidelines to promote
the secure operation of systems and the protection of information” (Scala
et al., 2019). By the same token, policy is the broad goal statement, as
opposed to procedures, which are the objectives that support the
4
S. YUSIF AND A. HAFEEZ-BAIG
achievement of the goal statement. Procedures spell out the series of
repeatable practical steps undertaken to accomplish a set goal. As important
as these policies are, they are usually not fully adopted for reasons to do
with lack of awareness and training that include, but are not limited to,
limited resources for organizations to devote to cybersecurity and misunderstanding of the status of their cybersecurity (Madnick et al., 2016).
Policy in practice is known for its frustrations not only to non-IT professional employees but also to general cyber operation in IT professionals
(Scala et al., 2019). For policy authority to be exercised, there needs to be
understanding, support, and a framework that advocates behaviors that
protect and secure the confidentiality, integrity, and availability of data,
networks, and systems appropriate to legitimate users. This must be in
complicit with business strategies for security, policies, procedures, technology, and financial resources for security (Madnick et al., 2016).
Understanding how cybersecurity risk relates to your critical
business operations
The two most commonly cyber risks are risk of service/operation disruption and risk of data breach (Murphy & Murphy, 2013; SEC, 2018). Data
breaches and other known cyber-attacks have been on the rise amid
increasing sophistication of both system protection resources and cyberattacks. According to the latest data retrieved on May 11, 2018 from
Privacy Rights Clearinghouse (PRC) by Wang and Johnson (2018) there
have been 8,137 data breach incidents made public since 2005 with a total
of 10,326,390,393 records breached. By the end of 2019 the PRC had
records show that between 2006 and 2019, there was a total of 9,015 data
breach incidents in online retail, financial and insurance and other businesses (PRC, 2021). As a result, senior managers in finance, insurance, education and information/communication have begun to prioritize
cybersecurity as opposed to the food and hospital industries that do not
rely heavily on information as a product (Vaidya, 2019). Healthcare is also
set to lead the list of target industries as it embraces digital transformation.
Figure 1 illustrates the Equifax data breach.
Abraham et al. (2019) reported 125% increase in cyberattacks on healthcare organizations in the last six years, exposing vulnerabilities in and
weakness of existing cybersecurity security strategies. 50 hospitals in UK
National Health Service were shut down because of WannaCry cyberattacks
leading to the cancelation of 600 surgeries and 19,000 appointment (Martin
et al., 2017; Morse, 2018). In 2013, Target suffered a major data breach.
This breach of data exposed personal and sensitive financial information of
its customers. This was in spite of its successful compliance audit for the
JOURNAL OF APPLIED SECURITY RESEARCH
5
Figure 1. The equifax data breach.
Source: Wang and Johnson (2018)
Payment Card Industry Data Security Standard (PCI-DSS) and the successful implementation of a sophisticated malware detection tool developed by
FireEye (Riley et al., 2014) in (Plachkinova & Maurer, 2018). The
Chairman, President and CEO of Target, Greg Steinhafel apologized for the
massive data breach when cybercriminals gained access to the systems of
Target accessing the credit card data of some 40 million customers (Pigni
et al., 2018). Elsewhere, in 2015, the Interstate Technology and Regulatory
Council (TRC) identified 781 breaches that collectively exposed 169 million
records, 63.8 per cent increase in six years and a staggering 768 per cent
increase in a decade (ITRC, 2016). Healthcare organizations have witnessed
more than 125% increase in cyberattacks within a five-year period. For
example, a hospital in Los Angeles paid $17,000 Bitcoin ransom to a hacker
of its systems with an initial asking of $3.6 million (Kaminski et al., 2017).
Incidents such as these necessitate businesses and executives to devise
cybersecurity strategies that account for and accommodate the increased
cyberattacks. For example, the cloud and its global accessibility provides a
new frontier for cybersecurity as sensitive data is now available from anywhere in the world; giving rise to new security concerns in the context of
data leaks (Murphy & Murphy, 2013).
Cybersecurity compliance
Organizations have invested in sophisticated technical systems to battle
cybersecurity problems. However, the current industry response has not
been sufficient for the overall protection of systems and data (Li et al.,
2019), a challenge usually attributed to compliance with cybersecurity policies and procedures. There is sufficient evidence to this effect. See for
6
S. YUSIF AND A. HAFEEZ-BAIG
example, (Al-Sharidah et al., 2020; Dankwa, 2020; Gundu, 2019; Posey &
Canham, 2018). This behavior does not only lower employee overall
productivity, but it also risks cyberattacks on organizations’ information
systems assets. For example, the American Management Association
(AMA) estimated that a third of companies in the US monitor the website connections of their employees out of concern about inappropriate
use of Internet, that could jeopardize the cybersecurity interests of the
company (American Management Association, 2008). Unlike technical
solutions, human factor solutions to cyberattacks are psychological and
cognitive-based and draw on heterogeneous factors. Jackson (2017) identified four major noncompliance themes relevant to insiders, namely: pressure, rationalization, and opportunity drew on a fraud triangle (Cressey,
1973) that posits that cybersecurity policy compliance is largely influenced
by the type of leadership. For example, dark leadership (a general leadership behavior that causes harm to individuals on their teams) creates
pressure that leads to demoralized behaviors that invoke revenge/or damage as with psychopathic or harming leadership traits (Fehr et al., 2015;
Mathieu et al., 2014).
Farahmand and Spafford (2013) related insider pressure to financial
problems and what their discussion captures is a driven self-interest to violate ascribed obligations, regain personal failures, employer-employee relations, business reversals, and physical isolation. For example, the authors
posit that insiders must first notice opportunity to commit crime buttressed
by position of trust and technical skills. An insider in the context of cybersecurity is a threat to an organization’s cybersecurity from people within
the organization such as employees. Insiders motivated by opportunity
make decision based on the “wrongs” others do, for example, become dishonest when they see dishonest peers. In the context of rationalization,
insiders find self-coalesce to normalize and accept wrongs as “ok,” viewing
themselves as non-criminals and comprise immorality with justification
(Farahmand & Spafford, 2013). Some insiders are made within and by their
organizations. Others come as self-made insiders. More than making
insiders is the challenge of understanding the impact of organizational factors on employees and to take corrective actions. In addition to leadership
consequences on employee behavior and cybersecurity policy noncompliance is the garner of evidence that suggest the questioning the usefulness
of cybersecurity policies among organizational leaders (Mccollum, 2015).
For example, 33 per cent of businesses lack cybersecurity policy and limited
budget allocated by businesses toward cybersecurity (Underwood, 2015).
Other businesses in a similar context allocate limited budget toward cybersecurity. Again, the 2016 Global State of Information Security Survey report
found that 76 per cent of respondents did not increase cybersecurity
JOURNAL OF APPLIED SECURITY RESEARCH
7
budgets notwithstanding their knowledge of the cybersecurity threat posed
by insiders to business operations and revenues (Jackson, 2017). As with
employees, the value of compliance may not have been made clear or sold
well to management leadership/decision makers. The answer to this question could be that “many executives are rightly frustrated about paying
huge and growing compliance costs without seeing clear benefits” (Chen &
Soltes, 2018). It is clear that supervisor must be role models who exhibit a
positive attitude toward information/cybersecurity systems security policies
to motivate others.
Cybersecurity policy developers in organizations have proposed policy-compliance actions but have been criticized for lacking empirical validation in the
context of their ability to improving employees’ adherence to cybersecurity policies; a gap that need to be addressed for such measures to be adopted by practitioners (Siponen et al., 2010). In other words, organizations have not been
effective at designing policy compliance measurement tools, parly due to the
poor evidence of the role of attitude in cybersecurity. Chen and Soltes (2018)
also note that relevant compliance measurement tools have the potential to
prompt and drive the creation of more effective programs not only with the
goal of merely getting employees to understand policies and procedures, but
also reinforce noncompliance as an unacceptable behavior.
Whilst achieving 100% compliance of policies and procedures may
sound too ambitious, Page and Page (2000) contend that it is possible
under right circumstances. Namely, circumstances that not only enable
successful completion of policy compliance training programs, but also
provide post-training support. For example, several existing cybersecurity
training and awareness programs and interventions have been found lacking the necessary motivation to participate in security awareness programs (Gross, 2018; Kostadinov, 2018), as well as non-updated/repeated
programs (Adams, 2018). Other programs fall victim to a one-sized fit-all
philosophy not tailored to solving specifically identified/existing noncompliance challenges (Winkler, 2018). There is also the problem of uninteresting compliance training programs, which may include watching long,
out-dated videos and lacking interactivity (Adams, 2018). Page and Page
(2000) offered that organizations should strive to lay down standards for
acceptable compliance levels, the highest being “Six Sigma” or 99.99966%
compliance. Standards do not work in isolation. They must have been
integrated into existing systems and processes. These need to be seen in
the “organizations’ mission and vision statement as a commitment of
management to the policies and procedures infrastructure and the goals
and objectives of the policies procedures department” (p.v). In fact, there
needs to be a shift from compliance-based approach to that of strategic,
thus, governance.
8
S. YUSIF AND A. HAFEEZ-BAIG
Cyber risk and governance
Cyber risk and cyber risk management remain high on the agenda of company executives to ensure that they understand the risks, have the right
resources to respond and manage cybersecurity risks as they unfold
(Camillo, 2017). Cyber risk is the likelihood of exposure to or loss from
cyberattack on the information systems of an enterprise. Better still, RSA
defined cyber risk as the “potential of loss or harm related to technical
infrastructure or the use of technology within an organization” (RSA,
2016). According to PwC, “Cyber risk is any risk associated with financial
loss, disruption or damage to the reputation of an organization from failure, unauthorized or erroneous use of its information systems” (PWC,
2017). Common to all three definitions is the loss in finance, reputation,
and post-attack opportunities. On the one hand, the RSA expound that
cyber risk revolves around intent—to act in the context of a hacker/attacker
aiming to deliberately comprise sensitive information. On the other hand,
potential unintentional exposure, and attack from human factors such as
user error, pose a security risk. These sources of risk could be internal,
external or both. In fact, everyone is a source of cyber risk. With the
understanding or knowledge of sources of cyber risks, the begging question
is: how is cyber risk managed?
Conventionally, technical and IT department deals with end-to-end
information systems and security problems management. However, more
recently, the composition of those now responsible for cybersecurity and
cyber risk has widened to include the non-technical and the C-suite ranks.
Thus the responsibility of cybersecurity falls not just with the day-to-day
desk worker, but also the influencers and decision-makers in an organization (Donaire, 2018; RSA, 2016). Cybersecurity must be ingrained in
the culture of organization, implicitly making cybersecurity a top and
organization-wide agenda.
RSA (2016) quoted Deloitte Advisory Cyber Risk Services adding that:
for many organizations, becoming truly resilient to cyberattacks requires more than
incremental improvements. It requires organizational transformation that broadens
the scope of involvement at the top of the organization and instils focus on business
risk, rather than technology controls. It requires the ability to focus investments on
mitigating likely outcomes, based on a broad understanding of attacker motives and
the ability to anticipate high-impact scenarios.
It requires good risk governance and an understanding of how individuals make decisions as a motivation for better superior decision-making
(Scala et al., 2019).
Governance is a set of responsibility exercised by those responsible for
an enterprise (Bodeau, 2012). Cybersecurity governance then refers to the
aspect of enterprise governance that addresses risks associated with
JOURNAL OF APPLIED SECURITY RESEARCH
9
cybersecurity with strategic focus. This implies that organizations must
ensure that data security is part of their strategic plan (Pullin, 2018). It is
the fundamental goal of corporate/cybersecurity governance that is achieved
through set objectives in the form of cyber policies and procedures defined
by cybersecurity governance. The implication for top management is the
need to understanding cybersecurity (motives of attackers) to move from
modes of fear and risk to gaining insight into business operations and how
the later relates to the former. The truth, however, is when it comes to
security, risk can never totally be eliminated. The closest might only be
minimization and mitigation. Many board members/top managers who
make decisions on cybersecurity risk simply lack the relevant knowledge
occasioned by limited fund to manage cybersecurity. They need to abreast
themselves with cybersecurity risk and management, be cybersecurity-ready
and keep it on their agenda.
“Good cybersecurity readiness encompasses an understanding of risks and
threats to assets and information relevant to the organization and its people,
monitoring and detecting cybersecurity threats regularly, protecting critical
systems and information, ensuring the organization meets all relevant standards compliance, has incident response plans in place in the event”
(Australian Computing Society, 2016, p. 51). To keep cybersecurity on top
management’s agenda, on-going cybersecurity workshops and presentations
by relevant functional managers as with presenters from independent contractors will go a long way to keeping cybersecurity alive with top management (Donaire, 2018). Governance is characterized by discipline,
transparency, independence, accountability, responsibility, and fairness
(Oliver & Foscarini, 2014). As with several studies, the findings of a study
conducted by Swinton and Hedges (2019) suggest that several organizations
struggle with five fundamental challenges to cybersecurity governance,
namely: (1) cybersecurity strategy; (2) Standardized processes, (3)
Enforcement and accountability, (4) Senior leadership oversight, and (5)
Resources. We expound on these challenges to develop a conceptual framework.
Cybersecurity Strategy and goals
The evolution of cybersecurity strategy continues to depend upon the continuous progress of supporting IT programs that include compliance and
training (Adams & Makramalla, 2015; Boutwell, 2019; Pham et al., 2017).
Cybersecurity strategy encompasses system technologies also referred to as
technical and human behavior or human factor (Cook et al., 2017; Gyunka
& Christiana, 2017; Han et al., 2017; Pham et al., 2017). The understanding
of existing and foreseeable vulnerabilities that threaten the networks of an
10
S. YUSIF AND A. HAFEEZ-BAIG
organization during communication about potential threats and mitigation
strategies is crucial when developing a cybersecurity strategy. Information
sharing is an important cybersecurity strategy and must be carried out
safely to protect proprietary information, through secure and private information exchange (Romero-Mariona et al., 2015). A cybersecurity governance can facilitate these requirements. Cybersecurity governance in
organizations must address and clearly define its risk management guidelines/policies, goals, and relevant objectives to support the achievement of
those goals. It is worth noting, though, that it is difficult to develop not
only a comprehensive but also an effective cybersecurity strategy. A first
step is the recognition of the full extent of threat vectors to pave way for
the introduction of the concept of risk and threats (Chabinsky, 2010).
Cybersecurity strategy must be built from the perspectives of resiliency and
active cyber defence. In other words, cybersecurity strategy should not only
be viewed from vulnerability perspective. A dynamic cybersecurity strategy
is one that depends largely upon the organization securing its information
and architectures using a deep awareness and understanding of existing
information, operations, and communication technologies that form the
basis of enterprise environment (Lee & Lim, 2016) in (Boutwell, 2019).
The continuous evolution and revolution of industry technologies and
IoT devices, and their adoption usually led to increased opportunities for
potential system compromises and evolving threats and risks. As such,
cybersecurity strategies must be flexible to enable them to continue to
adapt to future changes, whilst being holistically reviewed to ensure relevance with workflows and organizational knowledge gaps (Ahlmeyer &
Chircu, 2016; Boutwell, 2019). As a high-level document, the cybersecurity
strategy establishes the roadmap for the overall maintenance and risk management plan (Swinton & Hedges, 2019). The roadmap encompasses definition of cybersecurity scope, identification of cybersecurity needs and
objectives, determination of key performance indicators, resource needs,
risk appetite, monitoring and evaluation, organizational culture, and human
factor. These concepts/themes are discussed below:
Defining cybersecurity scope
The early focus of cybersecurity has “switched,” metamorphosed and
expanded over time into a form of a risk control function and governance
(Althonayan & Andronache, 2018). As businesses continue to depend on
evolving and advancing technologies and internet of things (IoTs), it
becomes more imperative for individuals and groups at the helm of businesses to have an understanding of the potential extent of and impacts of
threats and any successful cyberattack incidents may have business operations and processes (Tam & Jones, 2018). It is more of acquiring the
JOURNAL OF APPLIED SECURITY RESEARCH
11
knowledge and staying put to the trends in cyber technologies, cyber actors,
threats, vulnerabilities and to understand the nature of cyber-attack processes for better scoping of risk and threat and effectively mitigate them
(Hoffmann et al., 2020). This can be done by assessing the current and
future technologies, “the scenarios of the following section analyze what
policy changes can increase cyber-safety against a range of possible attacks
and outcomes facing the evolving shipping industry” (Tam & Jones, 2018).
True capture the scope of cybersecurity for assessment, strategy development and implementation are important as deviating from true meaning
affects the type of control in place and directly impacts on cybersecurity
scope, derivations, meanings and respectively, implementation (Althonayan
& Andronache, 2018).
Identify cybersecurity needs and develop objectives
PACKT (2020) has outlined the various tyeps of cybersecurity as: critical
infrastructure, networks, cloud security, application/system security, user
security, and internet of things (IoT) security. To be well protected it is
essential to outline how these types of cybersecurity relate to individuals
and organizations. Critical infrastructure security includes traffic lights,
electricity grids, water supply systems, and healthcare facilities as they
become increasingly digitized; network security in the context of attacks on
individual and corporate networks; and other forms attacks including
denial of service (DoS), cloud security, application/system security, user
security, and internet of things (IoT) security The cyber risk landscape has
become too complex to manage alone; it can only be done within a community. And you need the benefit of the experience of others to be able to
identify your assets in need of protection; to identify the many, everchanging ways in which they could be threatened; and to become aware of
the vulnerabilities of your organization to those threats.
Establishing key performance indicators (KPIs)
The US National Institute for Standards and Technology (NIST) has developed a framework for improving cybersecurity that organizations can use
within their established systematic processes to identify, assess, and manage
cybersecurity risks. Using the framework as a cybersecurity risk management tool, an organization can determine activities that are most important
to critical service delivery and prioritize expenditures to maximize the
impact of the investment” (NIST, 2018). According to NIST, organizations
can use measures and metrics to set goals or benchmarks against, which
compliance can be determined. The essence of the framework provides key
cybersecurity outcomes that are helpful in managing cybersecurity risk:
12
S. YUSIF AND A. HAFEEZ-BAIG
identify, protect, detect, respond and recover (Boerman, 2020). The framework is also applicable throughout the life cycle phases of plan, design,
build/buy, deploy, operate, and decommission keeping in mind that the
plan could change during the life cybersecurity lifecycle. It is important
that organizations ensure that all KPIs are relevant to measuring cybersecurity performance and gaps of their organizations.
Determining resource needs
How cyber risks and counter strategies are communicated to the management leadership has a large impact in determining the resources needed in
the context of understanding risks, impact, ownership, and governance
(PWC, 2017). For example, quantifying the overall cost/benefit of adding
connections and access to a network with the objective of helping decision
makers formally assess tradeoffs and set priorities given limited resource.
Cybersecurity resource availability differ from company size to industry
type. For example, unlike small companies, larger companies are better
equipped to address cyber security issues (Smith & Pate-Cornell, 2018). In
the healthcare industry, on the one hand, there is a chronic shortage of
healthcare providers. On the other hand, as digitization in the healthcare
industry continues to gain traction, concerns over the susceptibility of
cloud-based electronic health records (EHR) to cyberattacks has continued
to grow (Debra Cascardo, 2016). When investing in cyber security resources, authorities have to follow effective decision-making strategies, i.e., the
cyber security investment challenge (Fielder et al., 2016). Where applicable
a probabilistic risk analysis framework may be needed to address such
investment challenges (Smith & Pate-Cornell, 2018).
Determining risk appetite
Cybersecurity risk in its literal statements does not provide sufficient information for decision makers to embark on proactive risk management process. Unless they are translated into format or language that allow decision
makers to calibrate those risks against their exposure and potential impact
on business processes and operations, it is a major barrier (PWC, 2017).
The ability to quantify cyber risk and make informed decisions about cyber
risk appetite will often be the difference between success and failure for
modern enterprises (RSA, 2016). Cyber risk appetite is the level of tolerance an organization would make room for. It is set by those with decision
making right or cybersecurity governance body and brought to the attention of everyone in the organization. Using the appetite as a benchmark,
cyber risk can be quantified. Generally, quantification removes a large
amount of ambiguity and the risk of several thoughts and feelings from the
JOURNAL OF APPLIED SECURITY RESEARCH
13
assessment of cyber risk (PWC, 2017). What is required to manage cyber
risk is the integration of cyber risk management plans at C-suite levels, as
with external partners/contractors/subcontractors (Camillo, 2017). Least
mentioned throughout literature is physical cyber risks in the context of
the presence of physical and environmental risks. These seem to be ignored
by many risk managers, when talking about cyber risks (Boyes, 2015).
These physical risks range from theft of tangible cyber/information system
such as servers, switches, routers, etc. to natural disasters, which include
flood, bush fires, tornados disrupting the functioning of cyber equipment/
physical resources (Oliver & Foscarini, 2014; Tran et al., 2016; Urciuoli &
Hintsa, 2017).
Establishing continuous monitoring and evaluation
The last decade has witnessed a substantial shift in business operation from
conventional brick and mortar and hardcopy/product-based to online
digital/information/virtual-based. This trend continues and is revolutionizing how products and services are offered in nearly every industry. With
the opportunities in this shift come cybersecurity threats. A fundamental
goal is “to provide near-real time security status-related information to
organizational officials so they may take appropriate risk mitigation actions
and make cost-effective, risk-based decisions regarding the operation of the
information systems” (Malin & VAN Heule, 2013). The US NIST defines
risk monitoring as “maintaining ongoing awareness of an organizations
risk environment, risk management program, and associated activities to
support risk decisions” (Dempsey et al., 2012). Given the evolving nature
of digitization, and the continuously changing and unpredictable nature of
cyberattacks, there is need for continuous monitoring to stay up to date
with both situations—technology changes and changes in cyberattacks. This
will ensure that the set of deployed security controls continue to be effective over time. The implication of the enhanced rate of change is one of
unsustainability, which requires continuous monitoring and evaluation of
cyber risks and existing cybersecurity. Rather than carry out scheduled tests
on information systems during accreditation and certification, continuous
monitoring is necessary to ensure the security controls that are most vital
and most volatile in a computer system are tested continuously to assure a
high level of system security (Malin & VAN Heule, 2013).
Organizational culture
Organizations have always been busy at work to protect their information
systems and assets from cyberattacks, a responsibility that used to be the
remit of only the chief information officer (CIO) and his department.
14
S. YUSIF AND A. HAFEEZ-BAIG
According to Schein, culture is “a set of basic tacit assumptions about how
the world is and ought to be that a group of people share and that determines their perceptions, thoughts, feelings, and, to some degree, their overt
behavior” (Schein, 1996, p. 11). Put differently and more broadly, culture is
the way a group of people live. When used in the context of organization,
culture, i.e., organizational culture is the belief system that distinguishes
one organization from another in even the minutest way, encompassing
values, expectations, and practices that guide all its members. When made
an integral component of the organization, cybersecurity culture would be
perceived as an aspect of organizational culture. Cybersecurity culture will
define its policies and processes motivated by overarching organizational
values, expectations and social principles owed to the organization. Whilst
technical/system security has remained the first line of cybersecurity, the
impact of organizational culture on the efficiency of cybersecurity system
remains enormous in the circumstances of noncompliance, reasons attributed to organizational belief system. The most advanced technological
security cannot protect an organization from a cyberattack if the organizational and cybersecurity cultures respectively do not reflect the perceptions
of employees—being careful and protective (Huang & Pearlson, 2019).
Reports analyzing cyberattacks concurred this—employee opening malicious/phishing emails, attached files, and falling victims to social engineering attacks. As a result, cybersecurity-education and training will be
regarded as an important complementary defense to technical security.
Employee’s cybersecurity risk perception is a key indicator that a tailormade training program will be invaluable (Corradini & Nardelli, 2018).
Human factor
The risk of “insiders” in organizations pose increasing threat to information
systems assets.
On 29 January 2019, six months after the Singhealth data breach, confidential
records of 14,200 people who had been diagnosed with HIV were stolen from the
Singapore Ministry of Health (“MOH”) and leaked online. In what may be
considered a “classic” insider attack, the perpetrator had allegedly gained access to
the confidential records by exploiting a personal relationship with a Singapore doctor
who had authorised access to the MOH’s HIV registry. In March 2019, it was
reported that compromised login credentials of Singapore government agency
personnel were found to be leaked and put up for sale on the dark web (Hooi, 2019,
p. 2).
Unlike systems,’ human behavior is unpredictable and errors from these
behaviors can cost individuals and organizations more in the cyberspace.
The human factor in cyber security represents actions and events where
human error, lack of attention to detail, poor planning, and ignorance have
JOURNAL OF APPLIED SECURITY RESEARCH
15
led to successful incident giving rise to “unintentional insider” (Hadlington,
2018; Sotira, 2018), a challenge organizations have not consistently paid
attention to. Cybercriminals have shifted their attack from technology to
people exploiting their vulnerabilities through errors of judgment, share
lack of knowledge, psychological manipulation or social engineering and
betrayal of trust in the case of insiders when initiating, implementing, management of industrial processes. Weak cybersecurity knowledge and skills
in the workforce and leadership have atop the list of several human vulnerabilities in the minds of corporate decision makers, governments, and academic researchers (Ani et al., 2019) . Routinization of activities in an
organization not only reduces uncertainties and errors but it also reduces
exposure of business processes to risk. A business process is defined as an
interrelated set of tasks that are carried out, resulting in a business objective or policy goal being achieved (Maines et al., 2016). As such, standardization increases optimal output and consistency in the context of
management solutions to cyber risks. Consistency is a necessary ingredient
to successfully achieve cybersecurity policy compliance among employees as
with strengthening the case for resource commitment (Swinton & Hedges,
2019). However, it does not necessarily imply a culture of repetition. For
example, a routine cybersecurity program including un-updated compliance
training programs in terms of content and application may end up becoming unproductive due to a lack of interest from employees, thus, not supporting cybersecurity strategy (Li et al., 2017). Routine Active Theory
(RAT) (Cohen & Felson, 1979) has outlined three criteria that must be present for a crime to take place—the offender, a target and the absence of
prevention of threat in the context of routine day-to-day activities and sensitive data generated. Information, communication and technology (ICT)
has become an integral part of society in the way it has infiltrated into all
critical infrastructure providing opportunities for novel attackers (Liu et al.,
2018). For example, given the incorporation of Internet connectivity with
operations and communication technologies, IT has become an extension
of the respective critical infrastructures (Shackelford et al., 2017).
Enforcement and accountability are about cybersecurity policy compliance (discussed earlier). They are the infrastructure put in place to ensure
that employees comply with available cybersecurity policies, education and
training and implementation (Ashford, 2016).
Standardized processes, enforcement, and accountability
Routinization of activities in an organization not only reduces uncertainties
and errors but it also reduces exposure of business processes to risk. A
business process is defined as an interrelated set of tasks that are carried
16
S. YUSIF AND A. HAFEEZ-BAIG
out, resulting in a business objective or policy goal being achieved (Maines
et al., 2016). As such, standardization increases optimal output and consistency in the context of management solutions to cyber risks. Consistency is
a necessary ingredient to successfully achieve cybersecurity policy compliance among employees as with strengthening the case for resource commitment (Swinton & Hedges, 2019). However, it does not necessarily imply a
culture of repetition. For example, a routine cybersecurity program including un-updated compliance training programs in terms of content and
application may end up becoming unproductive due to a lack of interest
from employees, thus, not supporting cybersecurity strategy (Li et al.,
2017). Routine Active Theory (RAT) (Cohen & Felson, 1979) has outlined
three criteria that must be present for a crime to take place—the offender,
a target and the absence of prevention of threat in the context of routine
day-to-day activities and sensitive data generated. Information, communication and technology (ICT) has become an integral part of society in the
way it has infiltrated into all critical infrastructure providing opportunities
for novel attackers (Liu et al., 2018). For example, given the incorporation
of Internet connectivity with operations and communication technologies,
IT has become an extension of the respective critical infrastructures
(Shackelford et al., 2017).
Enforcement and accountability are about cybersecurity policy compliance (discussed earlier). They are the infrastructure put in place to ensure
that employees comply with available cybersecurity policies, education and
training and implementation. A cybersecurity policy is a high-level instrument developed by organizations to inform employees about their rights
and responsibilities toward data/information risks and safety to prevent
cyberattacks and incidents in an era of widespread reality of work environment where instant information, mobility and social networks are the
norm of its operation. Risk management and security and private capabilities must be embedded in information systems development life cycle as
with effective communication among senior management team (Swinton &
Hedges, 2019).
Management leadership oversight
Cybersecurity governance is an organization-wide phenomenon that
requires the full participation and attention of management leadership who
must consistently show support for the cybersecurity program by providing
oversight to ensure that the process is achieving its goals (Swinton &
Hedges, 2019). Moreover, the role of management leadership is fundamentally to provide cybersecurity governance with relevant support and stay
the course to ensure cyber risk management is successful. The senior
JOURNAL OF APPLIED SECURITY RESEARCH
17
Figure 2. Proposed conceptual model for cybersecurity model.
leadership oversight will champion efforts of the governance and individuals with decision right to steer and institutionalize rules, standards and
practices that manage and minimize the risks associated with engagement
in cyberspace (Mueller, 2017). Additionally, management leadership enforces appropriate behavior through accountability in the valuation, creation,
storage, use, archiving and deletion of information. It includes the processes, roles and policies, standards and metrics that ensure the effective and
efficient use of information in enabling an organization achieve its goals”
(Proença et al., 2016, p. 33). With the decision-making mandate, management leadership oversight, a surrogate of cybersecurity governance can
employ some of the best cybersecurity practices and procedures to successfully protect data and ensure governance is of the highest standard, while
remaining effective and relevant. Management leadership can enforce the
maintenance of “security patches and updates; accomplish and test backups;
use the principle of least privilege; use two-factor authentication; handle passwords securely; change default passwords for the IoT (Internet of Things)
devices; physical security measures; human resource security measures; educate users; encrypt data; employ access controls regularly test incident
response; implement a network monitoring, analytics and management tool;
implement network security devices; implement a comprehensive endpoint
security solution” (Eugen & Petruţ, 2018, p. 361) (Figure 2).
Discussion
Neither cybercrime nor cybersecurity is a new concept. However, the evolving mechanics or the mode of operandi of cybercrimes and the need for
cybersecurity programs to be sophisticated to keep up with the pace make
18
S. YUSIF AND A. HAFEEZ-BAIG
these two “rivals” being treated as such. Organizations have sought to
leverage the Internet as a global resource to drive cost down and improve
employee and customer satisfactions. By doing so they will increase their
global presence, productivity, and competitive advantage in the wake of
developments cloud computing, Internet of Things (IoTs) and initiatives
such as BYOD (Bryan & Larsen, 2017). An effective cybersecurity governance is required for organizations to successfully embrace the exposure to
cyber risks as with promoting the institutionalization of cybersecurity practice among individuals and organizations (Ng & Kwok, 2017).
Cybersecurity is an important program for all organizations not only to
secure data but also human safety (Al-Sharidah et al., 2020). Consequently,
cybersecurity governance, encompasses cybersecurity policies; procedures,
standards and guidelines developed; and enforcement by cybersecurity governance to secure Information Systems, data and digital economy.
Enforcing cybersecurity strategy-policies and procedures in the context of
compliance requires an understanding of human factors, too. Compliance
is not a once-off practice. It is continuous and must be monitored,
reviewed, and supported/supplemented with relevant cybersecurity policy
and awareness programs in a dynamic business environment.
Organizational culture impacts cybersecurity compliance. For example, factors such as supportive organizational culture—leadership and peers, and
significant end-user involvement substantially impact on employees’ attitude and behavioral intention toward compliance of information systems
security policy (Amankwa et al., 2018). On the contrary, a poor organizational culture has a high propensity to develop insiders as they seek opportunities, rationalization and neutralize pressure. Cyber security is everyone
is responsibility, but it is management’s responsibility to provide a healthy
landscape against cybercrime by formulating appropriate policies and procedures in the cybersecurity space.
Conclusion
Cybersecurity attacks on organizations have not abated, nor will they ever.
More and more organizations are embracing Internet empowered processes
and solutions to business operations, increasing reliance on information.
The natural consequence of this is more exposure to cyber risks and vulnerabilities, eventual cyberattacks and far-reaching consequences for incidents as service failures increase. Human factors are responsible for more
than 95 per cent of incidents with the most common being misconfiguration, poor patch management, lost devices, etc. As such, noncompliance
of cybersecurity policies remains a deeply underated challenge that emanates from pressure, rationalization, opportunity, leadership behavior, and
JOURNAL OF APPLIED SECURITY RESEARCH
19
organizational culture. Relevant measures guiding how employees, contractors, and other organizations’ affiliates access and use corporate networks
against standards should be enforced by cybersecurity governance. For
cybersecurity governance to be effective, it must address concepts that
include but may not be limited to: cybersecurity strategy and goals; compliance/enforcement and accountability; standardized, compliance/enforcement and accountability, and resources. These standards need to be
integrated into existing systems and processes and remain on the agenda of
management leadership. Cybersecurity strategy as a component of governance must be built on the premise of resilience and active cyber defence
and encompass technology and human factors. Management leadership
oversight is critical for effective cybersecurity governance and a strong
voice for cybersecurity awareness, education and training programs that are
based on best practices attributed by accountability, fun, hands-on, interactivity, just-in-time training, and personalization.
References
Abraham, C., Chatterjee, D., & Sims, R. (2019). Muddling through cybersecurity: Insights
from the US healthcare industry. Business Horizons, 62(4), 539–548. https://doi.org/10.
1016/j.bushor.2019.03.010
Adams, M., & Makramalla, M. (2015). Cybersecurity skills training: An attacker-centric
gamified approach. Technology Innovation Management Review, 5(1), 5–14. https://doi.
org/10.22215/timreview/861
Adams, R. (2018). Our approach to employee security training. [Online]. PagerDuty.
Retrieved 12 November 2020 from https://www.pagerduty.com/blog/security-trainingatpagerduty/
Ahlmeyer, M., & Chircu, A. (2016). Securing the internet of things: A review. Issues in
Information Systems, 17(4), 21–28. https://orcid.org/0000-0002-7925-9191
Al-Sharidah, A., Syed, A., Alsannat, E., & Gaddourah, A. (2020). How cybersecurity policies
enable IR 4.0 emerging technologies. International Petroleum Technology Conference.
https://doi.org/10.2523/IPTC-20241-MS
Althonayan, A., & Andronache, A. (2018). Shifting from information security towards a
cybersecurity paradigm. Proceedings of the 2018 10th International Conference on
Information Management and Engineering, 68–79. https://doi.org/10.1145/3285957.
3285971
Amankwa, E., Loock, M., & Kritzinger, E. (2018). Establishing information security policy
compliance culture in organizations. Information & Computer Security, 26(4), 420–436.
https://doi.org/10.1108/ICS-09-2017-0063
American Management Association. (2008). Electronic monitoring & surveillance survey:
Over half of all employers combined fire workers for email and Internet abuse.
American Management Association, March 13, 2008.
Ani, U., He, H., & Tiwari, A. (2019). Human factor security: Evaluating the cybersecurity
capacity of the industrial workforce. Journal of Systems and Information Technology,
21(1), 2–35. https://doi.org/10.1108/JSIT-02-2018-0028
20
S. YUSIF AND A. HAFEEZ-BAIG
Ashford, W. (2016). Lack of cyber security awareness putting UK organisations at risk
[Online]. ComputerWeekl.com Computer Weekly. Retrieved 6 November 2020 from
http://www.computerweekly.com/news/4500278074/Lack-of-cyber-security-awarenessputting-UK-organisations-at-risk.
Australian Computing Society. (2016). Cybersecurity: Threats challenges opportunities (p.
51). ACS.
Baror, S., & Venter, H. (2019).A taxonomy for cybercrime attack in the public cloud. In
International conference on cyber warfare and security (pp. 505-X). Academic
Conferences International Limited.
Bodeau, D. (2012). Cyber security governance: A component of MITRE’s cyber prep methodology. Washington: MITRE Corporation. Disponıvel em:. Acesso em, 15.
Boerman, D. (2020). Reporting on cybersecurity performance. University of Twente.
Boutwell, M. (2019). Exploring industry cybersecurity strategy in protecting critical
infrastructure.
Boyes, H. (2015). Cybersecurity and cyber-resilient supply chains. Technology Innovation
Management Review, 5(4), 28–34. https://doi.org/10.22215/timreview/888
Bryan, E., & Larsen, A. (2017). Cybersecurity policies and procedures. In The cyber risk
handbook: Creating and measuring effective cybersecurity capabilities (pp. 35–65). IRM
and Willis Towers Watson.
Camillo, M. (2017). Cybersecurity: Risks and management of risks for global banks and
financial institutions. Journal of Risk Management in Financial Institutions, 10, 196–200.
Chabinsky, S. (2010). Cybersecurity strategy: A primer for policy makers and those on the
front line. Journal of National Security Law & Policy, 4, 27.
Chen, H., & Soltes, E. (2018). Why compliance programs fail—and how to fix them.
Harvard Business Review, 96, 115–125.
Cohen, L., & Felson, M. (1979). Social change and crime rate trends: A routine activity
approach. American Sociological Review, 44(4), 588–608. https://doi.org/10.2307/2094589
College of Healthcare Information Management Executives. (2018). Healthcare’s Most
Wired 2018. CHIME.
Cook, A., Janicke, H., Smith, R., & Maglaras, L. (2017). The industrial control system cyber
defence triage process. Computers & Security, 70, 467–481. https://doi.org/10.1016/j.cose.
2017.07.009
Corradini, I., & Nardelli, E. (2018). Building organizational risk culture in cyber security:
The role of human factors. In International Conference on Applied Human Factors and
Ergonomics (pp. 193–202), Springer.
Cressey, D. (1973). Introduction to the reprint edition. In Other people’s money. A study in
the social psychology of embezzlement, 2.
Dankwa, K. (2020). Deciphering the myth about non-compliance and its impact on cyber
security and safety. In Modern theories and practices for cyber ethics and security compliance. IGI Global.
Debra Cascardo, M. (2016). Insights into cyber security risks: The key to survival is resiliency. The Journal of Medical Practice Management, 32, 169.
Dempsey, K., Chawla, N., Johnson, A., Johnston, R., Jones, A., Orebaugh, A., Scholl, M., &
Stine, K. (2012). Information Security Continuous Monitoring (ISCM) for Federal
Information Systems and Organizations: National Institute of Standards and Technology
Special Publication 800–137. CreateSpace Independent Publishing Platform.
Donaire, N. (2018). Cybersecurity: A to-do list for your board [Online]. Retrieved 10
November 2020 from https://diligent.com/au/e1-cybersecurity-a-to-do-list-for-yourboard/
JOURNAL OF APPLIED SECURITY RESEARCH
21
Ellis, R., & Mohan, V. (2019). Rewired: Cybersecurity governance. John Wiley & Sons.
Eugen, P., & Petruţ, D. (2018). Exploring the new era of cybersecurity governance. Ovidius
University Annals, Series Economic Sciences, 18, 361
Farahmand, F., & Spafford, E. (2013). Understanding insiders: An analysis of risk-taking
behavior. Information Systems Frontiers, 15(1), 5–15. https://doi.org/10.1007/s10796-0109265-x
Fehr, R., Yam, K., & Dang, C. (2015). Moralized leadership: The construction and consequences of ethical leader perceptions. Academy of Management Review, 40(2), 182–209.
https://doi.org/10.5465/amr.2013.0358
Fielder, A., Panaousis, E., Malacaria, P., Hankin, C., & Smeraldi, F. (2016). Decision support approaches for cyber security investment. Decision Support Systems, 86, 13–23.
https://doi.org/10.1016/j.dss.2016.02.012
Gross, A. (2018). Effective security training requires change in employee behavior [Online].
Health IT Answers. Retrieved 12 November 2020 from https://www.hitechanswers.net/
effective-security-training-requires-change-in-employee-behavior/
Gundu, T. (2019). Acknowledging and reducing the knowing and doing gap in employee
cybersecurity complaince. In ICCWS 2019 14th International Conference on Cyber
Warfare and Security (pp. 94–102).
Gyunka, B., & Christiana, A. (2017). Analysis of human factors in cyber security: A case
study of anonymous attack on Hbgary. Computing & Information Systems, 21.
Hadlington, L. (2018). The “human factor” in cybersecurity: Exploring the accidental
insider. In Psychological and behavioral examinations in cyber security. IGI Global.
Han, J., Kim, Y., & Kim, H. (2017). An integrative model of information security policy
compliance with psychological contract: Examining a bilateral perspective. Computers &
Security, 66, 52–65. https://doi.org/10.1016/j.cose.2016.12.016
Hoffmann, R., Napiorkowski, J., Protasowicki, T., & Stanik, J. (2020). Risk based approach
in scope of cybersecurity threats and requirements. Procedia Manufacturing, 44, 655–662.
https://doi.org/10.1016/j.promfg.2020.02.243
Hooi, E. (2019). Cyber security: Beware the human factor (p. 2). Nanyang Technological
University.
Huang, K., & Pearlson, K. (2019). For what technology can’t fix: Building a model of
organizational cybersecurity culture. Proceedings of the 52nd Hawaii International
Conference on System Sciences. https://doi.org/10.24251/HICSS.2019.769
IBM. (2014). IBM security services 2014 cyber security intelligence index (p. 3). IBM.
IBM (2014). IBM security services 2014 cyber security intelligence index. IBM.
ITRC (2016). Breach Statistics 2005–2015 [Online]. ITRC. Retrieved 1 March 2020 from
http://www.idtheftcenter.org/images/breach/2005to2015multiyear.
ITU. (2008). ITU-T X.1205, Overview of cybersecurity (p. 2). International
Telecommunication Union.
Jackson, C. (2017). Cybersecurity policy: Exploring leadership strategies that influence insider
compliance. Capella University.
Kaminski, P., Rezek, C., Richter, W., Sorel, M. (2017). Protecting your critical digital assets:
Not all systems and data are created equal. McKinsey and Company. https://www.mckinsey.com/business-functions/risk/our-insights/protecting-your-critical-digital-assets-not-allsystems-and-data-are-created-equal.
Kostadinov, D. (2018). The components of a successful security awareness program. [Online].
Infosec. Retrieved 12 November 2020 from https://resources.infosecinstitute.com/components-successful-security-awareness-program/#gref
22
S. YUSIF AND A. HAFEEZ-BAIG
Lee, K., & Lim, J. (2016). The reality and response of cyber threats to critical infrastructure:
A case study of the cyber-terror attack on the Korea Hydro & Nuclear Power Co., Ltd.
KSII Transactions on Internet & Information Systems, 10.
Li, J., Yu, F., Deng, G., Luo, C., Ming, Z., & Yan, Q. (2017). Industrial internet: A survey
on the enabling technologies, applications, and challenges. IEEE Communications Surveys
& Tutorials, 19(3), 1504–1526. https://doi.org/10.1109/COMST.2017.2691349
Li, L., He, W., Xu, L., Ash, I., Anwar, M., & Yuan, X. (2019). Investigating the impact of
cybersecurity policy awareness on employees’ cybersecurity behavior. International
Journal of Information Management, 45, 13–24. https://doi.org/10.1016/j.ijinfomgt.2018.
10.017
Liu, X., Dong, M., Ota, K., Yang, L., & Liu, A. (2018). Trace malicious source to guarantee
cyber security for mass monitor critical infrastructure. Journal of Computer and System
Sciences, 98, 1–26. https://doi.org/10.1016/j.jcss.2016.09.008
Madnick, S., Jalali, M., Siegel, M., Lee, Y., Strong D., Wang, R., Ang, W., Deng, V., &
Mistree, D. (2016) Measuring stakeholders’ perceptions of cybersecurity for renewable
energy systems. In International workshop on data analytics for renewable energy integration (pp. 67–77). Springer.
Maines, C., Zhou, B., Tang, S., & Shi, Q. (2016). Adding a third dimension to BPMN as a
means of representing cyber security requirements. In 2016 9th International Conference
on Developments in eSystems Engineering (DeSE) (pp. 105–110). IEEE.
Malin, A., & VAN Heule, G. (2013).Continuous monitoring and cyber security for high
performance computing. In Proceedings of the first workshop on Changing landscapes in
HPC security (pp. 9–14). https://doi.org/10.1145/2465808.2465810
Martin, G., Martin, P., Hankin, C., Darzi, A., & Kinross, J. (2017). Cybersecurity and
healthcare: How safe are we? BMJ, 358:j3179. https://doi.org/10.1136/bmj.j3179.
Mathieu, C., Neumann, C., Hare, R., & Babiak, P. (2014). A dark side of leadership:
Corporate psychopathy and its influence on employee well-being and job satisfaction.
Personality and Individual Differences, 59, 83–88. https://doi.org/10.1016/j.paid.2013.11.
010
Mccollum, T. (2015). Cyber disconnect [Online]. The Institute of Internal Auditors.
Retrieved 20 January 2020 from http://www.theiia.org
Morse, A. (2018). Investigation: WannaCry cyber attack and the NHS. Report by the
National Audit Office.
Mueller, M. (2017). Is cybersecurity eating internet governance? Causes and consequences
of alternative framings. Digital Policy, Regulation and Governance, 19(6), 415–428.
https://doi.org/10.1108/DPRG-05-2017-0025
Murphy, D., & Murphy, R. (2013). Teaching cybersecurity: Protecting the business environment. In Proceedings of the 2013 on InfoSecCD’13: Information Security Curriculum
Development Conference (pp. 88–93).
Ng, A., & Kwok, B. (2017). Emergence of Fintech and cybersecurity in a global financial
centre. Journal of Financial Regulation and Compliance, 25(4), 422–434. https://doi.org/
10.1108/JFRC-01-2017-0013
NIST. (2018). Framework for improving critical infrastructure cybersecurity. NIST.
Nolan, C., Lawyer, G., & Dodd, R. (2019). Cybersecurity: Today’s most pressing governance
issue. Journal of Cyber Policy, 4(3), 425–441. https://doi.org/10.1080/23738871.2019.
1673458
Oliver, G., & Foscarini, F. (2014). Information culture: An essential concept for next generation records management. In DLM Forum-7th Triennial Conference (p. 31).
JOURNAL OF APPLIED SECURITY RESEARCH
23
PACKT (2020). The scope of cybersecurity [Online]. Retrieved 1 December 2020 from
https://subscription.packtpub.com/book/networking_and_servers/9781788836296/1/
ch01lvl1sec12/the-scope-of-cybersecurity
Page, S., & Page, S. (2000). Achieving 100% compliance of policies and procedures. Policies
and Procedures.
Pham, H., Pham, D., Brennan, L., & Richardson, J. (2017). Information security and people:
A conundrum for compliance. Australasian Journal of Information Systems, 21. https://
doi.org/10.3127/ajis.v21i0.1321
Pigni, F., Bartosiak, M., Piccoli, G., & Ives, B. (2018). Targeting Target with a 100 million
dollar data breach. Journal of Information Technology Teaching Cases, 8(1), 9–23. https://
doi.org/10.1057/s41266-017-0028-0
Plachkinova, M., & Maurer, C. (2018). Security breach at target. Journal of Information
Systems Education, 29, 11–20.
Posey, C., & Canham, M. (2018). A Computational social science approach to examine the
duality between productivity and cybersecurity policy compliance within organizations.
In International Conference on Social Computing, Behavioralcultural Modeling &
Prediction and Behavior Representation in Modeling and Simulation (SBP-BRiMS).
PRC. (2021). Cost of data breach study [Online]. Retrieved 1 March 2021 from https://
www.ibm.com/security/databreach
Proença, D., Vieira, R., & Borbinha, J. (2016). A maturity model for information governance. In International Conference on Theory and Practice of Digital Libraries (pp. 33,
15–26). Springer.
Pullin, D. (2018). Cybersecurity: Positive changes through processes and team culture.
Frontiers of Health Services Management, 35(1), 3–12. https://doi.org/10.1097/HAP.
0000000000000038
PWC. (2017). Cyber risk – Enlightenment through information risk management. PWC.
Riley, M., Elgin, B., Lawrence, D., & Matlack, C. (2014). Missed alarms and 40 million stolen credit card numbers: How target blew it. In Bloomberg Businessweek. Bloomberg.
Romero-Mariona, J., Hallman, R., Kline, M., Palavicini, G., Bryan, J., San Miguel, J., Kerr,
L., Major, M., & Alvarez, J. (2015). An approach to organizational cybersecurity. In
International workshop on enterprise security (pp. 203–222). Springer.
Roskot, M., Wanasika, I., & Kroupova, Z. (2020). Cybercrime in Europe: Surprising results
of an expensive lapse. Journal of Business Strategy, 42(2), 91–98. https://doi.org/10.1108/
JBS-12-2019-0235
RSA. (2016). Cyber risk appetite: Defining and understanding risk in the modern enterprise.
RSA.
Sabillon, R., Cano, J., Cavaller Reyes, V., & Serra Ruiz, J. (2016). Cybercrime and cybercriminals: A comprehensive study. International Journal of Computer Networks and
Communications Security, 4 (6).
Scala, N., Reilly, A., Goethals, P., & Cukier, M. (2019). Risk and the five hard problems of
cybersecurity. Risk Analysis, 39(10), 2119–2126. https://doi.org/10.1111/risa.13309
Schein, E. (1996). Three cultures of management: The key to organizational learning. Sloan
Management Review, 38, 9–20.
SEC. (2018). Commission statement and guidance on public company cybersecurity disclosures. SEC.
Shackelford, S., Sulmeyer, M., Deckard, A., Buchanan, B., & Micic, B. (2017). From Russia
with love: Understanding the Russian cyber threat to us critical infrastructure and what
to do about it. Nebraska Law Review, 96, 320.
24
S. YUSIF AND A. HAFEEZ-BAIG
Siebel, T. (2017). Why digital transformation is now on the CEO’s shoulders. McKinsey
Quarterly, 4, 1–7.
Siponen, M., Pahnila, S., & Mahmood, M. (2010). Compliance with information security
policies: An empirical investigation. Computer Magazine, 43(2), 64–71. https://doi.org/10.
1109/MC.2010.35
Smith, K., Jones, A., Johnson, L., & Smith, L. (2019). Examination of cybercrime and its
effects on corporate stock value. Journal of Information, Communication and Ethics in
Society, 17(1), 42–60. https://doi.org/10.1108/JICES-02-2018-0010
Smith, M., & Pate-Cornell, M. (2018). Cyber risk analysis for a smart grid: How smart is
smart enough? a multiarmed bandit approach to cyber security investment. IEEE
Transactions on Engineering Management, 65(3), 434–447. https://doi.org/10.1109/TEM.
2018.2798408
Sotira, N. (2018). The human factor in cyber security. Cyber Security: A Peer-Reviewed
Journal, 1, 326–330.
Swinton, S., Hedges, S. (2019). Cybersecurity Governance, Part 1: 5 Fundamental Challenges
[Online]. Retrieved 9 November 2020 from https://insights.sei.cmu.edu/insider-threat/
2019/07/cybersecurity-governance-part-1-5-fundamental-challenges.html
Tam, K., & Jones, K. (2018). Maritime cybersecurity policy: The scope and impact of evolving technology on international shipping. Journal of Cyber Policy, 3(2), 147–164. https://
doi.org/10.1080/23738871.2018.1513053
Tran, T., Childerhouse, P., & Deakins, E. (2016). Supply chain information sharing:
Challenges and risk mitigation strategies. Journal of Manufacturing Technology
Management, 27(8), 25.
Underwood, K. (2015). Protiviti 2015 IT priorities survey. EDPACS, 52(1), 14–16. https://
doi.org/10.1080/07366981.2015.1063931
Urciuoli, L., & Hintsa, J. (2017). Adapting supply chain management strategies to security
– An analysis of existing gaps and recommendations for improvement. International
Journal of Logistics Research and Applications, 20(3), 276–295. https://doi.org/10.1080/
13675567.2016.1219703
Vaidya, R. (2019). Cyber security breaches survey 2019. Assets. publishing.service.gov.uk.
Wang, P., & Johnson, C. (2018). Cybersecurity incident handling: A case study of the equifax data breach. Issues in Information Systems, 19.
Winkler, I. (2018). The fundamental flaw in security awareness programs. InformationWeek.
[Online]. Retrieved 12 November 2020 from https://www.darkreading.com/endpoint/thefundamental-flaw-in-security-awareness-programs/a/d-id/133230
Young, K. (2010). Policies and procedures to manage employee Internet abuse. Computers
in Human Behavior, 26(6), 1467–1471. https://doi.org/10.1016/j.chb.2010.04.025
Download