Bias, Breach and Breakdown: Framework for cybersecurity Control Failures

Authors

  • Garima Rao

Keywords:

cybersecurity, control failure, cognitive bias, data breach, policy non-compliance, insider threat, protection motivation theory, neutralisation theory, human factors, information security policy, BBB framework, organisational breakdown

Abstract

The growing costs of cybersecurity control failure to organisations globally can be traced to present frameworks that capture only limited aspects of its causes. This paper draws on evidence from 25 academic and practice-based publications to 2018 to propose the Bias, Breach, and Breakdown (BBB) framework, a trinity of cognitive, technical, and organisational causes of security control failure. The paper cites Ponemon Institute (2018), which reported a global average cost of a breach of USD 3.86 million (6.4% annual growth) and the Verizon (2018) Data Breach Investigations Report documenting 2,216 confirmed breaches in 65 countries to demonstrate that the three major types of control failure are human cognitive biases, non-compliance with policy and systemic organisational breakdown. The paper is supported by theoretical frameworks of dual-process cognitive theory (Kahneman, 2011), Protection Motivation Theory (Herath & Rao, 2009), neutralisation theory (Siponen & Vance, 2010), and escalation of commitment (Kolkowska et al., 2017). Industry-specific examination of healthcare reports the highest per-record breach cost of USD 408 across all sectors (Ponemon Institute, 2018) and pervasive access control failure among 54% of organisations (Jalali & Kaiser, 2018). The framework reveals that 81% of hacked breaches using stolen credentials are a combination of cognitive and technical control vulnerabilities (Verizon, 2018). Solutions include debiasing training, human-centered control design, multi-factor authentication and organisational culture interventions as a holistic approach to multi-pillar control failure.

Downloads

Download data is not yet available.

References

Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness. MIS Quarterly, 34(3), 523–548. https://doi.org/10.2307/25750690

Burns, A. J., Posey, C., Roberts, T. L., & Lowry, P. B. (2017). Examining the relationship of organizational insiders' psychological capital with information security threat and coping appraisals. Computers in Human Behavior, 68, 190–209. https://doi.org/10.1016/j.chb.2016.11.018

Cheng, L., Liu, F., & Yao, D. (2017). Enterprise data breach: Causes, challenges, prevention, and future directions. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 7(5), e1211. https://doi.org/10.1002/widm.1211

D'Arcy, J., & Lowry, P. B. (2017). Cognitive-affective drivers of employees' daily compliance with information security policies: A multilevel, longitudinal study. Information Systems Journal, 29(1), 43–69. https://doi.org/10.1111/isj.12173

De Matas, S. S., & Keegan, B. P. (2018). An exploration of research information security data affecting organizational compliance. Data in Brief, 22, 116–125. https://doi.org/10.1016/j.dib.2018.11.002

Herath, T., & Rao, H. R. (2009). Protection motivation and deterrence: A framework for security policy compliance in organisations. European Journal of Information Systems, 18(2), 106–125. https://doi.org/10.1057/ejis.2009.6

Jalali, M. S., & Kaiser, J. P. (2018). Cybersecurity in hospitals: A systematic, organizational perspective. Journal of Medical Internet Research, 20(5), e10059. https://doi.org/10.2196/10059

Kahneman, D. (2011). Thinking, fast and slow. Farrar, Straus and Giroux. https://doi.org/10.1017/S0140525X12001045

Kim, S. H., Yang, K. H., & Park, S. (2014). An integrative behavioral model of information security policy compliance. The Scientific World Journal, 2014, 463870. https://doi.org/10.1155/2014/463870

Kolkowska, E., Karlsson, F., & Hedström, K. (2017). Escalation of commitment as an antecedent to non-compliance with information security policy. Information and Computer Security, 26(2), 39–57. https://doi.org/10.1108/ICS-09-2017-0066

Loch, K. D., Carr, H. H., & Warkentin, M. E. (1992). Threats to information systems: Today's reality, yesterday's understanding. MIS Quarterly, 16(2), 173–186. https://doi.org/10.2307/249574

Menard, P., Bott, G. J., & Crossler, R. E. (2017). User motivations in protecting information security: Protection motivation theory versus self-determination theory. Journal of Management Information Systems, 34(4), 1203–1230. https://doi.org/10.1080/07421222.2017.1394083

Nobles, C. (2018). Botching human factors in cybersecurity in business organizations. HOLISTICA – Journal of Business and Public Administration, 9(3), 71–88. https://doi.org/10.2478/hjbpa-2018-0024

Nurse, J. R. C., Creese, S., Goldsmith, M., & Lamberts, K. (2011). Guidelines for usable cybersecurity: Past and present. 2011 Third International Workshop on Cyberspace Safety and Security (CSS), 21–26. https://doi.org/10.1109/CSS.2011.6058566

Safa, N. S., Von Solms, R., & Furnell, S. (2016). Information security policy compliance model in organizations. Computers & Security, 56, 70–82. https://doi.org/10.1016/j.cose.2015.10.006

Sasse, M. A., Brostoff, S., & Weirich, D. (2001). Transforming the 'weakest link': A human/computer interaction approach to usable and effective security. BT Technology Journal, 19(3), 122–131. https://doi.org/10.1023/A:1011902718709

Siponen, M., & Vance, A. (2010). Neutralization: New insights into the problem of employee information systems security policy violations. MIS Quarterly, 34(3), 487–502. https://doi.org/10.2307/25750688

Siponen, M., Mahmood, M. A., & Pahnila, S. (2014). Employees' adherence to information security policies: An exploratory field study. Information & Management, 51(2), 217–224. https://doi.org/10.1016/j.im.2013.08.006

Sohrabi Safa, N., Von Solms, R., & Furnell, S. (2016). Information security policy compliance model in organizations. Computers & Security, 56, 70–82. https://doi.org/10.1016/j.cose.2015.10.006

Sommestad, T., Karlzén, H., & Hallberg, J. (2017). The theory of planned behavior and information security policy compliance. Journal of Computer Information Systems, 59(4), 344–353. https://doi.org/10.1080/08874417.2017.1368421

Vance, A., Siponen, M., & Pahnila, S. (2012). Motivating IS security compliance: Insights from habit and protection motivation theory. Information & Management, 49(3–4), 190–198. https://doi.org/10.1016/j.im.2012.04.002

Verizon. (2018). 2018 Data breach investigations report. Verizon Enterprise Solutions. https://www.verizon.com/business/resources/reports/dbir/2018/

Warkentin, M., & Willison, R. (2009). Behavioral and policy issues in information systems security: The insider threat. European Journal of Information Systems, 18(2), 101–105. https://doi.org/10.1057/ejis.2009.12

West, R. (2008). The psychology of security. Communications of the ACM, 51(4), 34–40. https://doi.org/10.1145/1330311.1330320

Downloads

Published

28.01.2020

How to Cite

Garima Rao. (2020). Bias, Breach and Breakdown: Framework for cybersecurity Control Failures. International Journal of Intelligent Systems and Applications in Engineering, 8(1), 57–68. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/8226

Issue

Section

Research Article

Similar Articles

You may also start an advanced similarity search for this article.