Shame in cyber security: effective behavior modification tool or counterproductive foil?

Karen Renaud, Rosalind Searle, Marc Dupuis

Research output: Contribution to conferencePaperpeer-review

Abstract

Organizations often respond to cyber security breaches by blam- ing and shaming the employees who were involved. There is an intuitive natural justice to using such strategies in the belief that the need to avoid repeated shaming occurrences will encourage them to exercise more care. However, psychology highlights sig- nificant short- and long-term impacts and harmful consequences of felt shame. To explore and investigate this in the cyber domain, we asked those who had inadvertently triggered an adverse cyber security incident to tell us about their responses and to recount the emotions they experienced when this occurred. We also examined the impact of the organization’s management of the incident on the “culprit’s” future behaviors and attitudes. We discovered that those who had caused a cyber security incident often felt guilt and shame, and their employers’ responses either exacerbated or ameliorated these negative emotions. In the case of the former, there were enduring unfavorable consequences, both in terms of employee well-being and damaged relationships. We conclude with a set of recommendations for employers, in terms of responding to adverse cyber security incidents. The aim is to ensure that negative emotions, such as shame, do not make the incident much more damaging than it needs to be.
Original languageEnglish
Publication statusAccepted/In press - 6 Sep 2021
EventNew Security Paradigms Workshop 2021 - Online
Duration: 25 Oct 202128 Oct 2021
https://www.nspw.org/

Conference

ConferenceNew Security Paradigms Workshop 2021
Period25/10/2128/10/21
Internet address

Keywords

  • cyber security incidents
  • security breaches
  • behaviour modification

Fingerprint

Dive into the research topics of 'Shame in cyber security: effective behavior modification tool or counterproductive foil?'. Together they form a unique fingerprint.

Cite this