Skip to main content
Top
Published in: Information Systems Frontiers 3/2023

30-05-2022

Detecting Cybersecurity Threats: The Role of the Recency and Risk Compensating Effects

Authors: Roozmehr Safi, Glenn J. Browne

Published in: Information Systems Frontiers | Issue 3/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Detecting and responding to information security threats quickly and effectively is becoming increasingly crucial as modern attackers continue to engineer their attacks to operate covertly to maintain long-term access to victims’ systems after the initial penetration. We conducted an experiment to investigate various aspects of decision makers’ behavior in monitoring for threats in systems that potentially have been compromised by intrusions. In checking for threats, decision makers showed a recency effect: they deviated from optimal monitoring behavior by altering their checking pattern in response to recent random incidents. Decision makers’ monitoring behavior was also adversely affected when there was an increase in security, exhibiting a risk compensating behavior through which heightened security leads to debilitated security behaviors. Although the magnitude of the risk compensating behavior was significant, it was not enough to fully offset the benefits from added security. We discuss implications for theory and practice of information security.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
As we discuss later, from a probability perspective, the occurrence of security incidents is not completely without pattern. Rather, in most everyday situations the number of incidents in a unit of time (e.g., in a day) can be modelled using the Poisson distribution and the time between successive incidents can be modelled using the exponential distribution.
 
2
In fact, NIST, one of the most-widely used security frameworks (Cieslak, 2016) is voluntary to adopt and is deliberately designed not to be restrictive in its guidelines (National Institute of Standards and Technology, 2018).
 
3
Denoting the average time between incidents by α, the inspection cost by C1, and the cost of every undetected unit of time by C2, the optimum inspection time x is approximately equal to: \(x = \sqrt {\frac{{2\alpha {C_1}}}{{{C_2}}}} \)
 
4
In fact, this is a special case in which the optimum inspection time equals the average time between incidents. We intentionally chose C1 and C2 such that subjects’ intuitive answer to the problem coincided with the right inspection time (i.e., “the incident happens once every 30 seconds, so I might as well inspect once every 30 seconds”). It must be noted that this study is not particularly concerned with how accurately subjects assess the objectively-correct inspection interval. Rather, our goal is to understand differences in checking patterns in response to factors such as the outcome of previous checks, etc.
 
5
Prior research on risk compensating behavior shows that those who voluntarily adopt safety measures tend to behave more cautiously despite being safer (Scott et al., 2007). Although we do not test this hypothesis here, the voluntary nature of security in this task can therefore be expected to make the observed results more conservative than if all participants purchased security.
 
6
Since mean check intervals varied across conditions and rounds, directly comparing standard deviations was not justified; thus, we used the coefficients of variation.
 
7
The Payment Card Industry Data Security Standard (2018), Requirement 10: Security Tracking and Monitoring (https://​www.​pcisecuritystand​ards.​org/​documents/​PCI_​DSS-QRG-v3_​2_​1.​pdf).
 
8
Readers are referred to (Warkentin at al., 2012) for a discussion on the benefits and drawbacks of using various research methodologies in studying risk compensating behaviors in information security.
 
Literature
go back to reference Adams, J. G. (1988). Risk homeostasis and the purpose of safety regulation. Ergonomics, 31(4), 407–428CrossRef Adams, J. G. (1988). Risk homeostasis and the purpose of safety regulation. Ergonomics, 31(4), 407–428CrossRef
go back to reference Balozian, P., & Leidner, D. (2017). Review of IS security policy compliance: Toward the building blocks of an IS security theory. ACM SIGMIS Database: The DATABASE for Advances in Information Systems, 48(3), 11–43CrossRef Balozian, P., & Leidner, D. (2017). Review of IS security policy compliance: Toward the building blocks of an IS security theory. ACM SIGMIS Database: The DATABASE for Advances in Information Systems, 48(3), 11–43CrossRef
go back to reference Bazerman, M. H., & Moore, D. A. (2013). Judgment in Managerial Decision Making (8th ed.). Wiley Bazerman, M. H., & Moore, D. A. (2013). Judgment in Managerial Decision Making (8th ed.). Wiley
go back to reference Boss, S., Kirsch, L. J., Angermeier, I., Shingler, R. A., & Boss, W. (2009). If someone is watching, I’ll do what I’m asked: Mandatoriness, control, and information security. European Journal of Information Systems, 18(2), 151–164CrossRef Boss, S., Kirsch, L. J., Angermeier, I., Shingler, R. A., & Boss, W. (2009). If someone is watching, I’ll do what I’m asked: Mandatoriness, control, and information security. European Journal of Information Systems, 18(2), 151–164CrossRef
go back to reference Brandimarte, L., Acquisti, A., & Loewenstein, G. (2013). Misplaced confidences: Privacy and the control paradox. Social Psychological and Personality Science, 4(3), 340–347CrossRef Brandimarte, L., Acquisti, A., & Loewenstein, G. (2013). Misplaced confidences: Privacy and the control paradox. Social Psychological and Personality Science, 4(3), 340–347CrossRef
go back to reference Cassell, M. M., Halperin, D. T., Shelton, J. D., & Stanton, D. (2006). Risk compensation: The Achilles’ heel of innovations in HIV prevention? Bmj, 332(7541), 605–607CrossRef Cassell, M. M., Halperin, D. T., Shelton, J. D., & Stanton, D. (2006). Risk compensation: The Achilles’ heel of innovations in HIV prevention? Bmj, 332(7541), 605–607CrossRef
go back to reference Chen, M., Qian, C., & Nakagawa, T. (2011). Periodic and Random Inspection Policies for Computer Systems. In T. Kim, H. Adeli, H. Kim, H. Kang, K. J. Kim, A. Kiumi, & B. H. Kang (Eds.), Software Engineering, Business Continuity, and Education (pp. 346–353). Berlin Heidelberg: SpringerCrossRef Chen, M., Qian, C., & Nakagawa, T. (2011). Periodic and Random Inspection Policies for Computer Systems. In T. Kim, H. Adeli, H. Kim, H. Kang, K. J. Kim, A. Kiumi, & B. H. Kang (Eds.), Software Engineering, Business Continuity, and Education (pp. 346–353). Berlin Heidelberg: SpringerCrossRef
go back to reference Chong, A., & Restrepo, P. (2017). Regulatory protective measures and risky behavior: Evidence from ice hockey. Journal of Public Economics, 151, 1–11CrossRef Chong, A., & Restrepo, P. (2017). Regulatory protective measures and risky behavior: Evidence from ice hockey. Journal of Public Economics, 151, 1–11CrossRef
go back to reference Christin, N., Egelman, S., Vidas, T., & Grossklags, J. (2012). It’s All about the Benjamins: An Empirical Study on Incentivizing Users to Ignore Security Advice. In G. Danezis (Ed.), Financial Cryptography and Data Security (pp. 16–30). Berlin Heidelberg: SpringerCrossRef Christin, N., Egelman, S., Vidas, T., & Grossklags, J. (2012). It’s All about the Benjamins: An Empirical Study on Incentivizing Users to Ignore Security Advice. In G. Danezis (Ed.), Financial Cryptography and Data Security (pp. 16–30). Berlin Heidelberg: SpringerCrossRef
go back to reference Cohen, J. (1988). Statistical power analysis for the behavioral sciences (2nd ed.). L. Erlbaum Associates Cohen, J. (1988). Statistical power analysis for the behavioral sciences (2nd ed.). L. Erlbaum Associates
go back to reference Evans, L. (1986). Risk Homeostasis Theory and Traffic Accident Data. Risk Analysis, 6(1), 81–94CrossRef Evans, L. (1986). Risk Homeostasis Theory and Traffic Accident Data. Risk Analysis, 6(1), 81–94CrossRef
go back to reference Fox, C. R., & Ülkümen, G. (2011). Distinguishing two dimensions of uncertainty. In W. Brun, G. Keren, G. Kirkebøen, & H. Montgomery (Eds.), Perspectives on thinking, judging, and decision making. Universitetsforlaget Fox, C. R., & Ülkümen, G. (2011). Distinguishing two dimensions of uncertainty. In W. Brun, G. Keren, G. Kirkebøen, & H. Montgomery (Eds.), Perspectives on thinking, judging, and decision making. Universitetsforlaget
go back to reference Galletta, D. F., & Zhang, P. (2009). Introducing AIS Transactions on Human-Computer Interaction. AIS Transactions on Human-Computer Interaction, 1(1), 7–12CrossRef Galletta, D. F., & Zhang, P. (2009). Introducing AIS Transactions on Human-Computer Interaction. AIS Transactions on Human-Computer Interaction, 1(1), 7–12CrossRef
go back to reference Glendon, A. I., Hoyes, T., Haigney, D., & Taylor, R. (1996). A review of risk homeostasis theory in simulated environments. Safety Science, 22(1–3), 15–25CrossRef Glendon, A. I., Hoyes, T., Haigney, D., & Taylor, R. (1996). A review of risk homeostasis theory in simulated environments. Safety Science, 22(1–3), 15–25CrossRef
go back to reference Gutzwiller, R. S., Fugate, S., Sawyer, B. D., & Hancock, P. (2015). The human factors of cyber network defense. Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 59, 322–326 Gutzwiller, R. S., Fugate, S., Sawyer, B. D., & Hancock, P. (2015). The human factors of cyber network defense. Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 59, 322–326
go back to reference Herath, T., & Rao, H. R. (2009). Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness. Decision Support Systems, 47(2), 154–165CrossRef Herath, T., & Rao, H. R. (2009). Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness. Decision Support Systems, 47(2), 154–165CrossRef
go back to reference Jarvik, M. (1951). Probability learning and a negative recency effect in the serial anticipation of alternative symbols. Journal of Experimental Psychology, 41(4), 291–297CrossRef Jarvik, M. (1951). Probability learning and a negative recency effect in the serial anticipation of alternative symbols. Journal of Experimental Psychology, 41(4), 291–297CrossRef
go back to reference Johnston, A. C., Warkentin, M., McBride, M., & Carter, L. (2016). Dispositional and situational factors: Influences on information security policy violations. European Journal of Information Systems, 25(3), 231–251CrossRef Johnston, A. C., Warkentin, M., McBride, M., & Carter, L. (2016). Dispositional and situational factors: Influences on information security policy violations. European Journal of Information Systems, 25(3), 231–251CrossRef
go back to reference Kabacoff, R. I. (2015). R in Action; R in Action, Data Analysis and Graphics with R (2nd ed.). Manning Kabacoff, R. I. (2015). R in Action; R in Action, Data Analysis and Graphics with R (2nd ed.). Manning
go back to reference Kahneman, D. (2011). Thinking, Fast and Slow. Farrar, Straus and Giroux Kahneman, D. (2011). Thinking, Fast and Slow. Farrar, Straus and Giroux
go back to reference Posey, C., Roberts, T., Lowry, P. B., Bennett, B., & Courtney, J. (2013). Insiders’ protection of organizational information assets: Development of a systematics-based taxonomy and theory of diversity for protection-motivated behaviors (SSRN Scholarly Paper ID 2173642). Social Science Research Network. https://papers.ssrn.com/abstract=2173642 Posey, C., Roberts, T., Lowry, P. B., Bennett, B., & Courtney, J. (2013). Insiders’ protection of organizational information assets: Development of a systematics-based taxonomy and theory of diversity for protection-motivated behaviors (SSRN Scholarly Paper ID 2173642). Social Science Research Network. https://​papers.​ssrn.​com/​abstract=​2173642
go back to reference Rabin, M. (2002). Inference by Believers in the Law of Small Numbers. The Quarterly Journal of Economics, 117(3), 775–816CrossRef Rabin, M. (2002). Inference by Believers in the Law of Small Numbers. The Quarterly Journal of Economics, 117(3), 775–816CrossRef
go back to reference Saltzer, J. H., & Schroeder, M. D. (1975). The protection of information in computer systems. Proceedings of the IEEE, 63(9), 1278–1308 Saltzer, J. H., & Schroeder, M. D. (1975). The protection of information in computer systems. Proceedings of the IEEE, 63(9), 1278–1308
go back to reference Sheridan, T. B., & Johannsen, G. (Eds.). (1976). Monitoring Behavior and Supervisory Control (1st ed. 1976). Imprint: Springer Sheridan, T. B., & Johannsen, G. (Eds.). (1976). Monitoring Behavior and Supervisory Control (1st ed. 1976). Imprint: Springer
go back to reference Slovic, P. (2010). The Feeling of Risk: New Perspectives on Risk Perception. Earthscan Slovic, P. (2010). The Feeling of Risk: New Perspectives on Risk Perception. Earthscan
go back to reference Stafford, T., Deitz, G., & Li, Y. (2018). The role of internal audit and user training in information security policy compliance. Managerial Auditing Journal, 33(4), 410–424CrossRef Stafford, T., Deitz, G., & Li, Y. (2018). The role of internal audit and user training in information security policy compliance. Managerial Auditing Journal, 33(4), 410–424CrossRef
go back to reference Straub, D. W., & Welke, R. J. (1998). Coping with systems risk: Security planning models for management decision making.MIS Quarterly,441–469 Straub, D. W., & Welke, R. J. (1998). Coping with systems risk: Security planning models for management decision making.MIS Quarterly,441–469
go back to reference Trimpop, R. M. (1994). The Psychology of Risk Taking Behavior. Elsevier Trimpop, R. M. (1994). The Psychology of Risk Taking Behavior. Elsevier
go back to reference Verizon (2018). 2018 data breach investigations report, 11th edition (Research Report No. 11th). Verizon. verizonenterprise.com/DBIR2018 Verizon (2018). 2018 data breach investigations report, 11th edition (Research Report No. 11th). Verizon. verizonenterprise.com/DBIR2018
go back to reference Warkentin, M., Crossler, R. E., & Malimage, N. (2012). Are You Sure You’re Safe? Perceived Security Protection as an Enabler of Risky IT Behavior. Proceedings of the 2012 International Federation of Information Processing (IFIP) International Workshop on Information Systems Security Research, Dewald Roode Information Security Workshop Warkentin, M., Crossler, R. E., & Malimage, N. (2012). Are You Sure You’re Safe? Perceived Security Protection as an Enabler of Risky IT Behavior. Proceedings of the 2012 International Federation of Information Processing (IFIP) International Workshop on Information Systems Security Research, Dewald Roode Information Security Workshop
go back to reference Warkentin, M., Goel, S., Williams, K. J., & Renaud, K. (2018). Are we Predisposed to Behave Securely? Influence of Risk Disposition on Individual Security Behaviours. ECIS, 25 Warkentin, M., Goel, S., Williams, K. J., & Renaud, K. (2018). Are we Predisposed to Behave Securely? Influence of Risk Disposition on Individual Security Behaviours. ECIS, 25
go back to reference Wickens, C. D., Gordon, S. E., & Liu, Y. (1998). & others. An introduction to human factors engineering Wickens, C. D., Gordon, S. E., & Liu, Y. (1998). & others. An introduction to human factors engineering
go back to reference Wilde, G. (1994). Target risk: Dealing with the danger of death, disease and damage in everyday decisions. Castor & Columba Wilde, G. (1994). Target risk: Dealing with the danger of death, disease and damage in everyday decisions. Castor & Columba
go back to reference Wilde, G. (1998). Risk homeostasis theory: An overview. Injury Prevention, 4(2), 89–91CrossRef Wilde, G. (1998). Risk homeostasis theory: An overview. Injury Prevention, 4(2), 89–91CrossRef
go back to reference Zhang, P., Li, N., Scialdone, M., & Carey, J. (2009). The intellectual advancement of human-computer interaction research: A critical assessment of the MIS literature (1990–2008). AIS Transactions on Human-Computer Interaction, 1(3), 55–107CrossRef Zhang, P., Li, N., Scialdone, M., & Carey, J. (2009). The intellectual advancement of human-computer interaction research: A critical assessment of the MIS literature (1990–2008). AIS Transactions on Human-Computer Interaction, 1(3), 55–107CrossRef
Metadata
Title
Detecting Cybersecurity Threats: The Role of the Recency and Risk Compensating Effects
Authors
Roozmehr Safi
Glenn J. Browne
Publication date
30-05-2022
Publisher
Springer US
Published in
Information Systems Frontiers / Issue 3/2023
Print ISSN: 1387-3326
Electronic ISSN: 1572-9419
DOI
https://doi.org/10.1007/s10796-022-10274-5

Other articles of this Issue 3/2023

Information Systems Frontiers 3/2023 Go to the issue

Premium Partner