Article Reviews
Article #1
Behavioral Insights in Security Information Sharing
The topic discussed in this article looks at behavioral tendencies in humans’ participation in surveys and experiments regarding security information sharing. This article applies to specific cybersecurity principles such as determinism, ethical neutrality, and objectivity. It relates to determinism by locating reasons for people doing things. Many people in the study were unwilling to provide security information even after being assured of technological advances that they were protected, prompting them to consider previous events in these people’s way of thinking that may’ve affected the outcome. It relates to ethical neutrality as each individual was provided the same questionnaire format regardless of their ethnic background and used English as the language to keep things orderly and not mix things up with translation. It was put through studies of seven different focus groups and then into its final form. It was free of charge, allowing easy access for all participants and not hindering those with economic restrictions. All individuals who took the survey were offered the same compensation to avoid offering to one person in hopes of garnering falsified results. Lastly, it relates to objectivity as the survey was inspected for consistency and then converted into a chart for data. Although analyzing the opinions of different individuals, it is objectively present that questions can be asked and answered and provided in a way for data to be looked at in an unbiased lens to piece together aspects of ways that people think in an interdisciplinary manner while altogether being considered empirical.
The hypothesis was listed as follows: “Humans are unlikely to randomly participate in SIS, such that SIS does not occur “naturally.” Hence, theorizing is required regarding how and why human behavior may be associated with SIS. Applying prior behavioral research to our research context, we develop testable hypotheses about five salient constructs which may be associated with SIS.” The research method was a questionnaire that wanted a behavioral analysis of security information sharing. Questions were asked and had answers provided in a most likely, neutral, and least likely to garner certain emotions on the subjects at hand. It was considered and filtered through the interchange of people’s answers and how they all related to one another based on specific backgrounds or what had caused decision-making for those people.
An individual’s attitude toward information sharing was the main factor in the data captured. Concepts discussed in class, like sociology and psychology, relate to this because we can see what has caused people of specific backgrounds to answer the way they did, which directly correlates to how people would think these ways, whether it was previous experiences, negative or positive, or utterly unbiased thought. The whole study can relate to marginalized groups because although being a part of the said group was not a requirement to participate in the study, participants from all backgrounds were considered, meaning we can compare and contrast what certain people outside of marginalized groups might think as compared to those who are in those groups, allowing for a better understanding overall, and not look through a narrowed lens on the world. This can contribute back to society as companies dealing with security and information sharing can look at this questionnaire provided by scholars who objectively analyzed the material and tried to optimize and develop technology that could allow for a better information-sharing system.
Article from Journal of Cybersecurity
https://academic.oup.com/cybersecurity/article/5/1/tyz006/5554880?searchresult=1