You are on page 1of 17

Computers & Security 95 (2020) 101846

Contents lists available at ScienceDirect

Computers & Security


journal homepage: www.elsevier.com/locate/cose

Validation of a socio-technical management process for optimising


cybersecurity practices
Masike Malatji a, Annlizé Marnewick a,∗, Suné von Solms b
a
Postgraduate School of Engineering Management, University of Johannesburg, Gauteng, South Africa
b
Department of Electrical and Electronic Engineering Science, University of Johannesburg, Gauteng, South Africa

a r t i c l e i n f o a b s t r a c t

Article history: This study developed a socio-technical management process to optimise both technical and non-technical
Received 16 March 2020 security measures to provide optimal, rather than adequate, enterprise security safeguards. The rationale
Accepted 19 April 2020
was that over the last decade, studies have consistently shown that the human being remains the weak-
Available online 6 May 2020
est link in the entire enterprise security chain. As a result, the majority of cyberattacks have resulted
Keywords: from human behaviour or error. Despite this, evidence suggests that many enterprises are still taking
Cybersecurity overly technocentric approaches to cybersecurity risk and this has increased the chances of missing the
Information security bigger picture. Thus, a mechanism to optimise both technical and non-technical security measures by
Optimisation identifying and closing socio-technical security gaps in existing enterprise security frameworks was re-
Socio-technical quired. The mechanism was derived from the literature and validated by industry practitioners where
Systems security it was found that practitioners could categorise security controls into social (human included), technical
and environmental dimensions. Through this, it was found that there were mainly non-technical (social
and environmental dimensions) security gaps at practitioners’ organisations. To further demonstrate how
this security challenge can be identified and addressed, a desktop application of the management process
was carried out on the COBIT 5 for Information Security framework. The results reveal the non-technical
security gaps on COBIT 5 and the management process demonstrates how these could be closed and
optimised. The importance of this study is to highlight that taking overly technocentric approaches to
enterprise security risk does not yield significantly positive results in protecting assets. A new approach
is required and the socio-technical management process is this paper’s contribution to address that se-
curity challenge.
© 2020 Elsevier Ltd. All rights reserved.

1. Introduction human being remains the weakest link in the entire enterprise se-
curity chain (Benson et al., 2019; Caldwell, 2012; Green et al., 2015;
The number of enterprise security attacks is constantly increas- Heartfield & Loukas, 2018; Lehrman, 2010; Mann, 2017; Mitnick &
ing and different types are continuously evolving (Budzak, 2016). Simon, 2011; Pfleeger et al., 2014; Pieters, 2013; Safa et al., 2016).
These attacks are often characterised as cybercrime and even cy- A few examples of recent data breaches and cyberattacks where
berwarfare (Borky & Bradley, 2019). The increase in the number human error or behaviour was thought to have been exploited will
and evolution of cyberattack types is driven by various factors, serve to highlight the enterprise security challenge:
including increased digitalisation of organisational processes, so-
cial media usage and the rise of more ubiquitous edge and cloud • In 2017, the NotPetya ransomware caused global damage esti-
computing systems (Carcary et al., 2016; Gourisetti et al., 2020; mated at $10 billion (Kaspersky, 2018).
Vuorinen & Tetri, 2016). Furthermore, it seems that despite the • In 2018, Marriot hotels experienced a leakage of some of its 500
emergence of artificial intelligence powered enterprise security ap- million customers’ personal information (Kaspersky, 2019b).
proaches, at least 90% of cyberattacks result from human error or • In 2019, American cities of Baltimore, Maryland, incurred
behaviour (Carlton et al., 2019; Willis Towers Watson, 2017). As damages greater than $18 million for refusing to meet ran-
further evidenced by studies over the past decade (2010-2019), the somware demands, whereas Riviera Beach, Florida, elected to
settle the 65 bitcoin demands (roughly $60 0,0 0 0 in May 2019)
(Kaspersky, 2019a).

Corresponding author. • In 2020, a Manor Independent School District in Texas, United
E-mail address: amarnewick@uj.ac.za (A. Marnewick). States of America (USA), lost approximately $2.3 million as

https://doi.org/10.1016/j.cose.2020.101846
0167-4048/© 2020 Elsevier Ltd. All rights reserved.
2 M. Malatji, A. Marnewick and S. von Solms / Computers & Security 95 (2020) 101846

a result of an incident involving a phishing email scam


(Irwin, 2020).

To address the enterprise security challenge, there are numer-


ous security frameworks. These are implemented to help organi-
sations to identify and protect as well as detect, respond to and
recover from cyberattacks (Gourisetti et al., 2020). However, ev-
idence seems to suggest that most of these frameworks address
the enterprise security challenge by taking overly technocentric
approaches (Davis et al., 2014; Martin, 2018; Willis Towers Wat-
son, 2017), and for specific applications (Gourisetti et al., 2020). In
spite of all these efforts, enterprise security remains a persistent
challenge (Singh et al., 2014) for organisations in protecting their
assets.
The argument is made in this paper for a more optimised socio-
technical management process in which the effectiveness of the
social (human included) and technical enterprise systems security
controls in a given environment are considered. Thus, the aim of
this study was to validate the management process that identifies
and addresses socio-technical security gaps in existing enterprise
systems security frameworks, and how the frameworks’ security
controls could be optimised and matured. In this paper, enterprise
systems security refers to all forms of security within the organ-
isation, including information security, cybersecurity, information
technology (IT) security and physical security. The focus is on the Fig. 1. Socio-technical system.
effectiveness of security controls in an enterprise system and how
these could be socio-technically optimised to protect assets. Ac-
cording to Borky and Bradley (2019), if a system has effective se-
curity controls that could mitigate a vulnerability adequately, the system (STS) as shown in Fig. 1 and derived from Bostrom and
asset (e.g. data or critical infrastructure) is protected; otherwise, Heinen (1977), Davis et al. (2014), Hester (2014), Oosthuizen and
there could be an attack or exposure. Pretorius (2016) and Wu et al. (2015).
The paper starts by providing the research problem context dis- The STS in Fig. 1 is comprised of three dimensions, namely
cussed in this introductory section. This is followed by related the social, technical and environmental dimensions. The social
works in Section 2 where the shortcomings in the implementation and technical dimensions are subdivided further into two ca-
of existing enterprise systems security frameworks are discussed pability domains each. The social dimension is subdivided into
and an optimised solution is developed. The research methods em- the organisational structure and actors. These provide functions
ployed to validate the optimised solution are outlined in Section 3. that enable systems of authority, communication and work flow
The study findings and their implications are presented and dis- by people or stakeholders who influence and/or perform the or-
cussed in Section 4. In Section 5, a desktop application to demon- ganisational tasks (Hester, 2014). The technical dimension is fur-
strate the optimised solution is carried out. Finally, study conclu- ther subdivided into technology and work activities (Bostrom &
sions, contributions and recommendations for future research are Heinen 1977; Oosthuizen & Pretorius, 2016). These provide the
discussed in Section 6. necessary tools and resources used to carry out work activities
which are the actual day-to-day organisational tasks (Davis et al.,
2014; Hester, 2014; Wu et al., 2015). As seen in Fig. 1, both the
2. Related work
social and technical dimensions are embedded within an environ-
mental dimension that is complex and non-linear (Carayon et al.,
In this section, the main purpose is to provide an overview of
2015; Dasso et al., 2016; Friedberg et al., 2017; Washington &
the socio-technical shortcomings of the implementation of exist-
Hacker, 20 0 0).
ing enterprise security frameworks, and conceptually demonstrate
how these can be mitigated. The argument is that the biggest
threat to enterprise security remains human beings (Budzak, 2016). 2.1. Existing security frameworks: Socio-technical gaps
This is because humans are the most critical element in the man-
agement of enterprise security (Soomro et al., 2016). And yet, A detailed socio-technical analysis of 19 selected enterprise sys-
existing security frameworks consider enterprise security as pri- tems security frameworks was conducted by Malatji et al. (2019).
marily a technical issue (Laybats & Tredinnick, 2016). This is a The researchers found that only four frameworks partially ful-
shortcoming as advanced technical security measures will not filled the security requirements of the social dimension of a socio-
increase enterprise security if there are weak points elsewhere technical system. It was deduced from these conceptual findings
in the organisational system (Dán et al., 2012). It becomes ev- that the four security frameworks have the potential to expose or-
ident that a better understanding of the relationships between ganisations to cyberattacks through the social dimension security
the social and technical dimensions (Budzak, 2016; Craigen et al., gaps. The four frameworks are (Curley et al., 2017; ISACA, 2017;
2014; Laybats & Tredinnick, 2016) and their environmental influ- NIST, 2017; Rigon et al., 2014; Shen, 2014):
ences (Friedberg et al., 2016) on enterprise security is required.
The social, technical and environmental dimensions are there- • National Institute of Standards and Technology’s cybersecurity
fore the essential elements to accomplish a robust enterprise sys- framework (NIST-CF);
tems security safeguard, while maintaining acceptable levels of • ISO/IEC 27002;
organisational system performance, reliability and cost (Borky & • COBIT 5 for Information Security;
Bradley, 2019). They are the three dimensions of a socio-technical • IT capability maturity framework (IT-CMF).
M. Malatji, A. Marnewick and S. von Solms / Computers & Security 95 (2020) 101846 3

The ISO/IEC 27002 is a compliance framework, whereas the STS dimensions. Key to the operationalisation of this system el-
COBIT 5 for Information Security is a governance framework ement are the attributes in Fig. 3 which were derived from
(Nicho, 2018). The NIST-CF and IT-CMF could be considered more Bostrom and Heinen (1977), Davis et al. (2014), Hester (2014),
as management frameworks as they, according to Dedeke and Mas- Mumford (2006), Oosthuizen and Pretorius (2016), Schuetz and
terson (2019), focus largely on the effective integration of IT and Schrefl (2017), Trist (1981) and Wu et al. (2015).
organisational goals, rather than purely on enterprise systems se- The second system element of the socio-technical management
curity. In their functionality, management frameworks are essen- process is the joint optimisation system element to determine the
tially a combination of the compliance and governance frameworks extent to which existing enterprise systems security frameworks
in that, rather than just align, they also seek to seamlessly inte- exhibit socio-technical security gaps, and close and optimise them.
grate IT and organisational goals. However, seamless integration of The third and final system element is the capability maturity indica-
IT and organisational goals does not, in and of itself, provide effec- tor system element to help organisations effectively monitor, mea-
tive security controls for optimised asset protection. It is the argu- sure, manage and continuously improve optimised security con-
ment in this paper that a socio-technical management approach is trols.
required to achieve this. It is worth highlighting that the revision and improvement of
the original framework system into the STS-COP resulted from the
reconfiguration of the first system element into the current secu-
2.2. Existing security frameworks: Implementation approach
rity controls classification system element. This was achieved by
shortcomings
taking the socio-technical system in Fig. 1, and creating a system
element operationalised by using enterprise systems security con-
All too often, it is assumed by some organisations that en-
trols as input data and categorising them into STS security con-
terprise systems security begins and ends with technical security
trols as output data. As previously mentioned, categorisation of the
measures such as firewalls (Borky & Bradley, 2019; Nicho, 2018).
input security controls is achieved through utilisation of the STS
This leads to high incidents of security breaches that could also
dimension attributes (see Fig. 3) as a guideline. Thus, the socio-
be attributed to organisations’ inability to adequately pay attention
technical management process is comprised of three system ele-
to non-technical security measures such as governance and strate-
ments integrated to provide an overarching process, rather than
gies (Nicho, 2018). Other organisations pursue security standards
to be a replacement for any existing and usually domain-specific
in the hope of providing a common basis to reduce security risks
enterprise systems security approaches. The goal is to provide or-
(Diesch et al., 2020). However, a major disadvantage of the security
ganisations with a mechanism to integrate both technical and non-
certification approach (compliance frameworks) is that an enter-
technical security controls for optimised, rather than adequate, as-
prise could achieve compliance with a standard, e.g. ISO/IEC 27001,
set protection. To validate the socio-technical management process,
without necessarily having a robust enterprise systems security
a mixed method research approach was adopted.
safeguard to reduce risk (Dedeke & Masterson, 2019; Diesch et al.,
2020).
3. Methodology: theory validation process
But even a robust enterprise systems security safeguard against
external attacks may be vulnerable to the insider threat by autho-
The socio-technical management process was developed deduc-
rised staff members, or third-party contractors (Gourisetti et al.,
tively from STS theory and systems engineering management con-
2020), due to misbehaviour or error (Borky & Bradley, 2019).
cepts. This meant that the literature-derived STS-COP in Fig. 2, as
Dawson and Thomson (2018) also point out that much of exist-
the socio-technical management process of the study, was a ten-
ing enterprise systems security research emphasises engineering
tative theory to be tested. The validation process of the socio-
and other technical skills while downplaying the importance of
technical management process is summarised in Fig. 4.
the social and organisational influences on daily occurrences. It
As seen in Fig. 4, the socio-technical management process was
is therefore necessary to explore enterprise systems security from
validated through the focus group and in-depth personal inter-
a holistic and non-linear perspective, which includes integrating
views, each method with completely different participants. To in-
domain-specific security requirements and balancing sociocentric
crease validity of the focus group and the in-depth interview
and technocentric approaches (Tisdale & Morris, 2015). Thus, fo-
findings, online surveys were completed by yet another, different
cusing solely on technical security safeguards does not necessarily
group of participants. Three main steps were carried out to vali-
prevent data breaches. Rather, both technical and non-technical se-
date the socio-technical management process of the study.
curity measures, anchored by a robust security standard and gover-
Step 1, validation of management process by practitioners. The
nance framework, are required to provide for optimised asset pro-
three system elements (security controls classification, joint opti-
tection (Nicho, 2018). In light of the above, a socio-technical man-
misation and capability maturity indicator) of the socio-technical
agement process to help optimise the technical and non-technical
management process were validated first through a series of inter-
security measures was developed in this study.
view questions with the focus group participants. Thereafter, the
focus group findings were used to inform the subsequent in-depth
2.3. A socio-technical management process personal interview protocol. Qualitative data from the in-depth
personal interviews was analysed concurrently and iteratively with
The original framework system to help mitigate against the the interview data collection and enabled the researchers to pro-
shortcomings of the implementation of enterprise systems security gressively decide on how to test emerging themes from the data
frameworks was developed by Malatji et al. (2019) from the litera- (Maxwell, 2013), and which ones required follow-up (Corbin &
ture. This framework system has since been revised and improved Strauss, 2008). A thematic content analysis technique was utilised
into a socio-technical systems cybersecurity optimisation process to analyse the data. This was achieved through the predefined
(STS-COP) as shown in Fig. 2. overarching themes and broader categories derived from the man-
The STS-COP is the socio-technical management process of agement process in Fig. 2. The interview protocol formed the ba-
the study. With reference to Fig. 2, the socio-technical manage- sis upon which the survey questionnaire was created and subse-
ment process is comprised of three system elements. The first quently distributed for triangulation of the findings.
one is the security controls classification system element to cate- Step 2, improvement of management process based on findings.
gorise enterprise systems security controls into one of the three The validation findings of the study were utilised to revise the
4 M. Malatji, A. Marnewick and S. von Solms / Computers & Security 95 (2020) 101846

Fig. 2. Literature-derived STS-COP.

Fig. 3. STS dimension attributes.

STS-COP. This ensured that the socio-technical management pro- 4. Validation with practitioners
cess was finalised.
Step 3, desktop application of management process. A desktop ap- The validation findings and discussions of them are outlined in
plication of the socio-technical management process was then car- this section based on the theory validation process as follows: (i)
ried out to demonstrate its readiness and usefulness to practition- Validation of management process by practitioners; (ii) improve-
ers. ment of management process based on findings; and (iii) desktop
application of management process. However, the desktop applica-
M. Malatji, A. Marnewick and S. von Solms / Computers & Security 95 (2020) 101846 5

Fig. 4. Theory validation process.

Fig. 5. Predefined data coding framework.

tion of the management process will be demonstrated separately view sessions and eventually coded for analysis as shown in Fig. 5.
in the next section (Section 5). Before the findings are discussed, As previously mentioned, the data analysis themes and categories
the validation activities with practitioners were as follows: in Fig. 5 were deductively derived from the socio-technical man-
Focus group. The focus group was held with seven participants. agement process in Fig. 2.
Although data generated through the focus group did not imme- Online surveys. By the closing date, only 12 respondents had
diately relate to the planned focus of analysis (Roulston, 2014), it completed the survey. Four out of 12 respondents were snow-
did prompt the researchers to revise and simplify the in-depth per- balled. Based on the purposive sample selection criteria, one re-
sonal interview protocol as attached in Appendix A. spondent did not qualify to complete the survey and the respon-
In-depth personal interviews. The data was collected face-to-face dent’s data was excluded from further analysis in this study. The
with 22 practitioners using the revised semi-structured interview respondent had less than the required 3 years of industry/research
questions in Appendix A. The levels at which interviewees exe- experience.
cuted security work were purposefully sought and these were at
strategic level (3 participants), which is policy driven, tactical level 4.1. Validation of management process by practitioners
(11 participants), which is guideline driven, and operational level
(8 participants), which is measures driven (Singh et al., 2014). In- Security controls classification system element. Without seeing
terview recordings were transcribed on the same day as the inter- the STS dimension attributes presented in Fig. 3, interviewees were
6 M. Malatji, A. Marnewick and S. von Solms / Computers & Security 95 (2020) 101846

asked to classify their organisations’ security controls into either Depending on the industry sector, the additional 76 STS security
the social, technical or environmental dimension. The findings are controls utilised by practitioners could be added to existing enter-
summarised in Table 1. In the third column of Table 1, a total of prise systems security frameworks as appropriate. This could be
27 STS security controls were validated by practitioners as these al- either to close the socio-technical security gaps or improve both
ready existed from the literature reviewed by Malatji et al. (2019). technical and non-technical security controls. The survey findings
Moreover, practitioners added a further 76 STS security controls as of the same question indicated that 91% of the respondents were of
listed in the last column of Table 1. the opinion that it is possible to categorise security controls along
the three STS dimensions. Triangulation of the interview and sur-

Table 1
Findings on security controls classification system element.

STS dimension Capability domain Literature STS security controls STS security controls added by practitioners

Social Organisational Communication Continuous self-learning by cybersecurity team


structure (Functions) Cybersecurity change management activities Cybersecurity operations centre management
Cybersecurity governance Cybersecurity team management
Cybersecurity team training Organisational structure impact on cybersecurity
Human resources (HR) onboarding activities of new Organisational culture-driven cybersecurity activities
employees Phishing campaigns
HR employee management during employment Understanding information security standards
Other physical security activities
Physical access controls
Frequent user awareness training
User awareness campaigns
User identity awareness
Actors (People) Business managers Artisans
Chief information security officer Chief executive officer
Employees (new, existing, leaving) Chief information officer
Chief technology officer
Cybersecurity team
Data governance officer
Executives (other)
Finance team
Governance, risk and compliance specialist
Hospital manager
HR executive
Internal auditors
IT auditor
IT governance and risk director
IT governance and security manager
IT manager
IT security officer
IT team
Legal team
Managing director
Security guard
Software developers
Systems administrator
Technical Technology (Tools & Antimalware Active directory
resources) Antivirus software Application layer filtering
Firewall Assets management policy
Host-based intrusion prevention system Back-up-as-a-service
User awareness policy Cloud security policy
Cybersecurity policy
Cybersecurity standards
Data breach policy
E-mail security
Honeypot
Network authentication controls
Password policy
Steganography
Work activities (Tasks) Cyberrisk assessments and analysis (internal and Systems access control
external) Systems hardening
Disaster recovery and business continuity Video surveillance
Cybersecurity audit (internal and external)
Data encryption
Data leakage protection
Documentation of cybersecurity practices
Identity and access management
Incident response and management
Network segmentation
Network traffic monitoring
Patching and systems security updates
Penetration testing (red team exercise)
Virtual private network configuration
Vulnerability scans and assessments
(continued on next page)
M. Malatji, A. Marnewick and S. von Solms / Computers & Security 95 (2020) 101846 7

Table 1 (continued)

STS dimension Capability domain Literature STS security controls STS security controls added by practitioners

Environmental Customers Basel accords


External service providers (suppliers) Contracts with customers
Government Contracts with external service providers
Office space Cybercrimes and cybersecurity bill
Regulatory compliance and statutory requirements Datacentre
Service level agreements Earthquakes
Financial Intelligence Centre Act
General Data Protection Regulation (GDPR)
Health Insurance Portability and Accountability Act
International data privacy laws
Minimum information security standards
Payment Card Industry Data Security Standard
(PCI-DSS)
Private security industry regulatory authority
Protection of Personal Information Act
Reserve banks
Sarbanes-Oxley
South African Revenue Service

Fig. 6. Cybersecurity STS dimension attributes.

vey findings was therefore achieved for the security controls clas- with equal emphasis in a contextual environment (Emery, 1982;
sification system element. Mumford, 2006). Interviewees were asked, firstly, if it would be
The implication of the findings of the security controls clas- possible to determine the security baseline optimisation state in
sification system element is that during categorisation of secu- order to identify socio-technical security gaps in their existing se-
rity controls, some interviewees viewed systems-driven policies curity frameworks. The joint optimisation interview question was
as technical and governance-driven policies as organisational and whether it would be possible to determine the security joint opti-
human-related. Additionally, other interviewees distinguished be- misation state in order to close identified socio-technical security
tween human-driven and systems-driven physical security (e.g. gaps. This question inquired about socio-technically categorised se-
video surveillance integrated with facial recognition and related curity controls actively in operation that interviewees did not have.
technologies). These findings implied that the original STS dimen- Thus, only expert opinions were sought to test for validation of
sion attributes in Fig. 3, as the key driver of the security controls the joint optimisation system element. The following three themes
classification system element, needed to be revised with additional emerged from their responses in order of prominence: (i) Secu-
attributes as shown in italics in Fig. 6. rity optimisation is possible; (ii) unspecified; and (iii) security op-
Joint optimisation system element. Upon classification of the timisation is not possible. Unspecified means that responses could
security controls listed in Table 1, interviewees were asked if, in not be coded as either ‘optimisation is possible, or not’. Responses
their experience, it would be possible to optimise their enterprise from the ‘unspecified’ theme, for example, stated that:
systems security controls along the three STS dimensions. It should
“…technical and environmental equally so (important) because
be recalled that joint optimisation refers to harnessing the best of
they work hand in hand.” (I5);
both the social and technical dimensions of enterprise practices
8 M. Malatji, A. Marnewick and S. von Solms / Computers & Security 95 (2020) 101846

“The strength…no, you can’t make them equally stronger. The only 36% indicated that a CMM was the only tool they used to deter-
thing you can strengthen is security tools. Your measures.” (I7); mine maturity levels and 45% said that other non-CMM tools were
available that could be used for the same purpose. Triangulation
“…with artificial intelligence we are going to depend on techni-
was therefore achieved for the capability maturity indicator system
cal. So, my answer to you is that artificial intelligence, sorry, (the)
element.
technical (dimension) is going to hold more power, if I can put it in
The implication of the findings of the capability maturity indi-
that way, than (the) social and environmental (dimensions).” (I22).
cator system element is that a 5-level CMM is used by the ma-
Further analysis of some of the ‘unspecified’ responses indi- jority of enterprises to carry out maturity assessments. Consis-
cated that the interviewees were, in fact, not really opposed to tent with the literature, the 5-level CMM can be represented in
the possibility of enterprise systems security optimisation. They Table 3 as derived from Borrett et al. (2013), Curley et al. (2017),
were merely emphasising STS dimensions that were more impor- Dorville (2014), ISACA (2017), Le and Hoang (2016), NIST (2017),
tant in their environments. To confirm this interpretation by the Ross et al. (2016), The Open Group (2011) and USA Department of
researchers, a follow-up question was asked to rate whether the Energy (2014). Level 0 is not counted in this paper. It is merely
three STS dimensions were equally important. Views expressed es- used to signify the absence of the implementation of a formalised
sentially corroborated (or contradicted) responses already given to socio-technical management process.
the ‘optimisation possibility’ interview question. This is because In light of the implications of the study findings discussed, the
the two questions were exactly the same, just asked differently. literature-derived STS-COP in Fig. 2 is revisited.
Five themes emerged from the data on the follow-up question and
these were denoted as: (i) Equally important; (ii) social is impor- 4.2. Improvement of management process based on findings
tant; (iii) technical is important; (iv) social and technical are im-
portant; and (v) unspecified. Triangulation of the findings was achieved for two of the three
The findings show that the ‘equally important’ theme was sig- system elements of the socio-technical management process. These
nificantly dominant. This means that the majority of interviewees are, firstly, the ability of the security controls classification system
thought that the three STS dimensions were equally important. element to categorise enterprise systems security controls along
This is a concise definition of joint optimisation in STS theory ac- the three STS dimensions, and secondly, the ability of the capabil-
cording to Bostrom and Heinen (1977), Carayon et al. (2015), ity maturity indicator system element to effectively monitor, mea-
Emery (1982), Mumford (2006), Oosthuizen and Preto- sure, manage and continuously improve optimised security con-
rius (2016) and Walker et al. (2007). That is, ‘equally important’ trols. Both system elements have therefore been validated. How-
and ‘optimisation is possible’ mean exactly the same thing in joint ever, triangulation could not be achieved for testing validity of the
optimisation parlance. Thus, the dominant themes were consistent ability of the joint optimisation system element to identify and
in both questions and the researchers’ interpretation was correct. close socio-technical security gaps. According to Bazeley (2018),
To triangulate this finding, the same two questions were asked some of the potential sources of dissonance include research meth-
through surveys. The majority of the survey respondents provided ods, design and context, as well as participants and researchers.
contradictory answers to both the same questions. Due to this Analysis of the sources reveals that there are three options to rec-
contradiction, it can be inferred that the majority of the survey oncile dissonance between the interview and survey findings. This
respondents either misinterpreted the two questions, did not variety of options is called bracketing (Given, 2008), and involves
understand the concept of joint optimisation, or they truly had no the focusing in and reduction of a phenomenon to its essential
idea if and how it is possible to optimise STS security controls. elements by suspending or bracketing out its external and inter-
Triangulation was therefore not achieved for the joint optimisation nal suppositions so that it can be seen as it is (Denzin, 2002;
system element. Schwandt, 2007).
The implication of the findings of the joint optimisation sys- The first bracketing option considers outliers to general trends
tem element is that, since it was validated through expert opin- in the data patterns and themes (Bazeley, 2018). However, there
ion by interviewees, a more quantitative validation of the socio- were no outliers in either method. The first option therefore
technical management process should be carried out in a longi- fails to provide an explanation for dissonance. The second op-
tudinal study. Moreover, an empirical, theoretical and/or practical tion could simply be to rerun the online surveys with a larger
explanation for dissonance (Flick, 2018; Salkind, 2010) between the sample size because it is thought to produce more accurate re-
survey and interview findings is required. This is provided in detail sults (Denscombe, 2014). This option points to the survey research
in Section 4.2. method as the possible source of dissonance. However, even with
Capability maturity indicator system element. Through the in- a larger sample size, if participants misinterpreted the questions
depth personal interviews, it was found that some practitioners due to insufficient theoretical context, or for whatever reasons, the
performed what they referred to as cybersecurity maturity assess- causes of dissonance would still be present. The second option
ments. The dominant results theme indicates that the majority of therefore also fails to provide an explanation for dissonance.
interviewees performed cybersecurity maturity assessments with The third and final bracketing option considers the context of
security frameworks that are embedded with a capability maturity the overall data collection and analysis phases. Oliver-Hoyo and
model (CMM). However, other practitioners did indicate that non- Allen (2006) acknowledge that it is impossible for researchers to
CMM tools are available that could be utilised for the same pur- identify possible misinterpretation of questions by survey respon-
pose, e.g. Plan-Do-Check-Act (PDCA). To determine maturity levels dents, without context, as it is with interviewees. This means that,
for enterprise systems security capabilities, interviewees indicated because self-administered survey questionnaires do not allow re-
the types of CMMs utilised, as shown in Table 2. spondents to explain their choices (Denscombe, 2014), it becomes
On average, a 5-level CMM is used across enterprises to carry impossible to infer an accurate estimate. Given that the findings of
out cybersecurity (capability) maturity assessments. It can also be the joint optimisation system element discussed in Section 4.1 pro-
seen from Table 2 that CMMs are in fact enterprise systems secu- vide a context for the contradiction in responding to the two ques-
rity frameworks. To express this correctly, enterprise systems se- tions that are exactly the same but phrased differently, it is con-
curity frameworks have embedded CMMs within them. For the cluded that either the survey respondents misinterpreted one or
same question, the survey findings indicate that 81% of respon- both questions or the joint optimisation concept was not clear.
dents agreed that maturity assessments were performed. Of these, Therefore, this renders the survey finding for the joint optimisa-
M. Malatji, A. Marnewick and S. von Solms / Computers & Security 95 (2020) 101846 9

Table 2
Findings on capability maturity indicator system element.

Capability maturity model

Centre for Internet Security (CIS®)


Capability Maturity Model Integration (CMMI)
COBIT 5 for Information Security
ISO/IEC 27002
Information Security Forum (ISF)
NIST-CF
Payment Card Industry Data Security Standard (PCI-DSS)
PDCA
Formerly, Information Technology Infrastructure Library (ITIL); Now IT Service Management

Table 3
Cybersecurity capability maturity indicator.

Maturity level Maturity requirements

0 (Non-existent) No socio-technical systems cybersecurity optimisation programme in place.


1 (Haphazard) The organisation has realised the need to address cybersecurity with equal emphasis on the social
and technical dimensions of security within a complex environment. However, no standardised
socio-technical systems cybersecurity management processes exist; instead, there are haphazard
and disorganised socio-technical systems security approaches.
2 (Basic) Although no formal socio-technical systems cybersecurity optimisation programme is in place, some
basic processes are being followed. However, these are followed by different competency areas (or
business units) with no standardised procedures. There is strong reliance on the knowledge of
individuals and therefore a tendency to make mistakes.
3 (Formalised processes) There is a formal socio-technical systems cybersecurity optimisation programme in place. Processes
have been formally defined and documented. Policies, processes and procedures have also been
communicated through awareness and training. The procedures themselves are not yet advanced
but are the mandated and formalised practices.
4 (Measurable outcomes) Proactive performance monitoring and evaluation of the socio-technical systems cybersecurity
optimisation practices are done by management. Where processes appear not to be effective,
mitigating actions are undertaken. Limited usage of automated tools is supplemented by continuous
process improvement.
5 (Optimising) The socio-technical systems cybersecurity optimisation programme has been terminated and
processes are now embedded within daily practices. In addition, socio-technical systems
cybersecurity optimisation practices have become fully automated and seamlessly integrated into
the overall security strategy of the business.

tion system element unreliable. Instead of triangulation, bracketing optimisation system element can be summarised by the optimise
has been achieved. The researchers further acknowledge that this process activity. Lastly, the operationalisation of the capability ma-
aspect may need future research but the in-depth personal inter- turity indicator system element can be summarised by the ma-
views have given some indication that enterprise systems security ture process activity where optimised security controls are mon-
joint optimisation is likely possible. itored, measured, managed and continuously improved for an ef-
Based on the validation findings discussed here, the STS-COP fective enterprise systems security safeguard. As shown in Fig. 7,
in Fig. 2 is revised and improved as follows: Firstly, the opera- the practitioner-validated socio-technical management process is a
tionalisation of the security controls classification system element systematic amalgamation of the following three process activities:
can be summarised by the classify process activity where security (i) Classify; (ii) optimise; and (iii) mature. Moreover, each of the
controls are categorised into either the social, technical or envi- three process activities contains three process tasks. As can be seen
ronmental dimension. Secondly, the operationalisation of the joint in Fig. 7, an effective enterprise systems security safeguard should
optimisation system element is driven primarily by equation [1] be anchored by good corporate governance, of which cybersecu-
which is used to compute what Washington and Hacker (20 0 0) re- rity governance is a part (De Bruin & Von Solms, 2016), and risk
fer to as the systems equivalence and it is called the joint optimi-
sation score in this paper.

Systems equivalence (SE )


{Max. systems score (social, technical, environmental ) − Min. systems score(social, technical, environmental )}
= (1)
Average score (social, technical, environmental)

In equation [1], the Max. systems score (social, technical, environ- management, as cybersecurity impacts both the internal stakehold-
mental) variable refers to the usage of only the highest score from ers (boards of directors, executive directors, security guards, etc.)
the three STS dimensions; likewise the Min. systems score (social, and external stakeholders (regulators, customers, suppliers, etc.)
technical, environmental) refers to the lowest score (Washington & (Susskind, 2014).
Hacker, 20 0 0). The Average (social, technical, environmental) vari- As with many architecture strategies (Borky & Bradley, 2019),
able, on the other hand, refers to the average score of the secu- the flow of the socio-technical management process is also highly
rity controls from the three STS dimensions. Therefore, the joint iterative. This implies that the outcomes at any process activity
10 M. Malatji, A. Marnewick and S. von Solms / Computers & Security 95 (2020) 101846

Fig. 7. Socio-technical management process.

of the management process may iteratively trigger a return to an The application of the socio-technical management process fol-
earlier process activity to, for example, perform additional security lowed the classify, optimise and mature process activities as dis-
controls classifications, refine security controls requirements or cussed next.
address one or more challenges. To that effect, the three process Classify. Application of the classify process activity on the CO-
activities of the management process are linked by two feedback BIT 5 for Information Security framework yielded categorised se-
loops. The first feedback loop is the maturity event, which is an curity controls listed in Appendix B. These were categorised by
annual event (proactive) in which capability maturity assessments mapping each security control to the applicable STS dimension at-
of enterprise systems security practices are carried out. This event tribute (see Fig. 3). Compared to the study findings listed in the
is triggered iteratively from the mature to the optimise process third column of Appendix B, the categorised COBIT 5 security con-
activity. The second feedback loop is the cyberincident (reactive) trols in the last column of Appendix B are missing all the envi-
which gets triggered from the optimise to the classify process ronmental dimension security controls. For example, the suppliers
activity every time there is a successful cyberattack. Organisations (vendor/contractor security management) and general data protec-
should therefore strive to have effective capabilities to respond tion regulation (GDPR) security controls are missing. According to
and recover under critical cyberincidents (Gourisetti et al., 2020). Politou et al. (2018), compliance with the GDPR is now mandatory
Testing for readiness and usefulness of the socio-technical man- for all business activities carried out in the European Union (EU) as
agement process in real-life settings requires good implementation of 25 May 2018. These and other potentially missing security con-
and governance procedures. trols are referred to as socio-technical security gaps that should be
closed for optimisation of enterprise systems security. The COBIT 5
for Information Security framework thus needs to be updated. The
caution, however, is that the seemingly “missing” COBIT 5 security
5. Desktop application of management process controls in Appendix B do not necessarily mean that every single
STS dimension attribute should have a corresponding security con-
A desktop application of the socio-technical management pro- trol. For example, under the technical dimension, the equipment
cess was carried out on the COBIT 5 for Information Security and machines attribute (see Fig. 3) may not necessarily apply in
framework by executing 9 process tasks and 15 process steps as a professional services firm. It may only apply in heavy industri-
shown in Fig. 8. This figure was derived from the operationalisation als and pharmaceutical companies. It all depends on the industry
steps of the literature-derived STS-COP in Fig. 2 (and discussed in sector in which an enterprise systems security framework is im-
Section 2), and the socio-technical management process in Fig. 7. plemented.
The COBIT 5 for Information Security framework (ISACA, 2012) was Optimise. To optimise the categorised COBIT 5 security controls
chosen because it was the most frequently mentioned enterprise in Appendix B, all the relevant stakeholders in the organisation
systems security framework during the in-depth personal inter- (e.g. business process owners and their key users) such as IT, HR,
views, followed by ISO/IEC 27002 and NIST-CF, respectively. More- legal, and so on, should be convened to allocate an effectiveness
over, it is one of the 19 enterprise systems security frameworks score for each categorised security control. Tables 4 and 5 illustrate
reviewed in detail by Malatji et al. (2019) for the development of this better using the COBIT 5 security controls separated into the
the original framework system later revised into the STS-COP in social and technical dimensions, respectively. Notice that there is
this paper.
M. Malatji, A. Marnewick and S. von Solms / Computers & Security 95 (2020) 101846 11

Fig. 8. Implementation steps - socio-technical management process.

Table 4.
Effectiveness score for social dimension security controls.

Capability domain Categorised security controls Effectiveness score

Organisational structure • Behaviours X1


(Functions) • Information security governance X2
• Information security policy X3
• Information security principles X4
• Policies X5
• Security awareness X6
• Specific information security policies driven by other functions within the enterprise X7
Actors (People) • Chief information security officer X8
• Enterprise risk management committee X9
• Information custodians/business owners X10
• Information security manager X11
• Information security steering committee X12 
Xn
Aggregate score Xb = n

no third table for the environmental dimension security controls score for all the technical dimension effectiveness scores (Yn ) as
for reasons outlined above (missing). This means that the environ- indicated by the formula in the table. In this case, n = 32 security
mental dimension’s aggregate score denoted by Zb is zero. As seen controls.
in Table 4, the aggregate score for a certain number n of security As can be seen in Tables 4 and 5, there is only one cell per
controls is denoted by Xb , which is the baseline average score for categorised security control. This means that various effectiveness
all the social dimension effectiveness scores (Xn ) as indicated by scores from different stakeholders concerning the same security
the formula in the table. In this case, n = 12 security controls. control should be averaged into one score. Once all the controls
Furthermore, the COBIT 5 categorised security controls (see have been allocated an effectiveness score, an aggregate score (ag-
Appendix B) for the technical dimension are listed in Table 5. Simi- gregate scores Xb , Yb and Zb ) should be computed. The baseline
larly, as seen in Table 5, the aggregate score for a certain number n measurements are therefore used to compute or determine the se-
of security controls is denoted by Yb , which is the baseline average curity baseline optimisation state. The lower effectiveness scores in
12 M. Malatji, A. Marnewick and S. von Solms / Computers & Security 95 (2020) 101846

Table 5.
Effectiveness score for technical dimension security controls.

Capability domain Categorised security controls Effectiveness score

Technology • Adequate incident response Y1


(Tools & resources) • Adequate protection against malware Y2
• Adequately secured & configured systems, aligned with security requirements & security architecture Y3
• Awareness material Y4
• Information security budget Y5
• Information security dashboard Y6
• Information security plan Y7
• Information security policy Y8
• Information security requirements Y9
• Information security review reports Y10
• Information security stakeholders’ template Y11
• Information security strategy Y12
• Policies Y13
• Secure development Y14
• Security architecture Y15
• Specific information security policies driven by the information security function Y16
• User access & access rights in line with business requirements Y17
Work activities • Align, plan & organise Y18
(Tasks) • Build, acquire & implement Y19
• Deliver, service & support Y20
• Evaluate, direct & monitor Y21
• External attacks and intrusion attempts Y22
• Information assessment, testing & compliance Y23
• Information risk management Y24
• Information security architecture development Y25
• Information security operations Y26
• Information security strategy formulation Y27
• Monitor, evaluate & assess Y28
• Monitoring & alert services for security-related events Y29
• Security assessments Y30
• Security testing Y31
• Security awareness leadership Y32 
Yn
Aggregate score Yb = n

Table 6.
Joint optimisation score.

STS dimension Baseline measurement Follow-up measurement

Social Xb Xa
Technical Yb Ya
Environmental Zb Za
Max (Xb ,Yb ,Zb ) − Min (Xb ,Yb ,Zb ) Max (Xa ,Ya ,Za ) − Min (Xa ,Ya ,Za )
JO score JObe f ore = Average (Xb ,Yb ,Zb )
JOa f ter = Average (Xa ,Ya ,Za )

these measurements are the socio-technical security gaps and, ac- sion security controls, respectively, after security improvement in-
cording to Washington and Hacker (20 0 0), this is where interven- tervention efforts have taken effect. To determine the security joint
tion efforts for improvement should be introduced. To determine optimisation state of an enterprise, three scenarios should be un-
the security baseline optimisation state, the joint optimisation (JO) derstood. Firstly, if JObefore < JOafter , then the enterprise systems
score before security improvement intervention efforts (JObefore ) security performance has deteriorated and appropriate improve-
should be computed. This is achieved by utilising equation [1] dis- ment intervention efforts are urgently required to close identi-
cussed earlier in Section 4. The second column in Table 6 sum- fied socio-technical security gaps for potential cyberattacks. Sec-
marises why the baseline measurements should be taken and how ondly, if JObefore = JOafter , then the enterprise systems security per-
the security baseline optimisation state (identify socio-technical formance has neither improved nor deteriorated from the base-
security gaps) should be determined/computed. line score. This means that any socio-technical security gaps were
Once the security intervention efforts to improve the lower ef- identified during the baseline measurements have not been closed
fectiveness scores (socio-technical security gaps) have been given and the organisation is still vulnerable to potential cyberattacks.
time, say a year, to take effect, follow-up measurements should Lastly, if JObefore > JOafter , then the enterprise systems security per-
be carried out. This is to determine the security joint optimisa- formance has improved and the security joint optimisation state
tion state where follow-up measurements should be carried out of an enterprise has been achieved. All that is required is con-
to compute the joint optimisation score after (JOafter ) security im- tinuous improvement through a capability maturity model ow-
provement intervention efforts have taken effect. The last column ing to the changing enterprise risk posture and environmental
of Table 6 summarises why the follow-up measurements should be conditions.
taken and how the security joint optimisation state (close socio- Mature. Although no theoretical COBIT 5 security capability
technical security gaps) should be determined/computed. In this maturity assessment scenario was possible to demonstrate the ca-
column, Xa , Ya and Za represent the follow-up measurements for pability maturity level of its optimised security controls, the CO-
the effectiveness of the social, technical and environmental dimen- BIT 5 for Information Security framework has the same number of
M. Malatji, A. Marnewick and S. von Solms / Computers & Security 95 (2020) 101846 13

embedded CMM levels as those in the literature (see Table 3) and have proven to be inadequate. Specifically, the purely governance-
findings (see Table 2). Ultimately, the purpose is to evaluate each and compliance-based enterprise systems security frameworks are
optimised security control according to set criteria, such as those no longer adequate. Only a combination of these provides ade-
in Table 3, to determine the level at which an enterprise is mature quate protection of assets. But even that is no longer enough to
in terms of the security joint optimisation state. guard against evolving cyberthreats and attacks. A seamless inte-
gration of both the governance- and compliance-based enterprise
6. Conclusion and recommendations systems security frameworks that considers effectiveness of both
technical and non-technical security controls provides optimised
The aim of this paper was to validate the management pro- protection of assets. The socio-technical management process facil-
cess that identifies and addresses socio-technical security gaps itates this seamless integration for enterprise systems security op-
in existing enterprise systems security frameworks, and how the timisation. Finally, as a recommendation for future research, three
frameworks’ security controls could be optimised and matured. A opportunities have been identified. Firstly, there is a need to de-
socio-technical management process with three main system el- ploy the socio-technical management process in real-life settings
ements was developed from the literature to achieve this aim. to quantitatively validate its readiness and usefulness to practition-
To validate it, practitioners were able to categorise security con- ers. This requires a longitudinal study. Secondly, the application
trols along the three socio-technical systems dimensions (secu- of the socio-technical management process to non-security disci-
rity controls classification system element), potentially identify and plines such health and safety, risk management, and so on, and
close socio-technical security gaps in existing enterprise systems other security-related disciplines such as cloud computing, Internet
security frameworks (joint optimisation system element) and ma- of Things and cyber-physical systems, should be explored. Lastly,
ture socio-technically optimised enterprise systems security prac- the application of linear programming and other advanced math-
tices with a 5-level CMM (capability maturity indicator system ematical algorithms could tremendously improve and potentially
element). Moreover, the readiness and usefulness of the socio- automate the computation of the enterprise systems security joint
technical management process to practitioners was demonstrated optimisation state more than is currently proposed in the study.
through a desktop application on the COBIT 5 for Information In conclusion, socio-technical thinking in enterprise systems secu-
Security framework. A comparison of the practitioner (validation rity requires courage and immersion by all stakeholders from the
findings) and COBIT 5 security controls is attached in Appendix B. boards of directors and executive directors to security guards.
Appendix B demonstrates the inadequacy of the COBIT 5 for Infor-
mation Security framework to provide optimised, rather than ade- Supplementary material
quate, enterprise systems security. This is the practical contribution
of the study. The theoretical contribution of the study is that the Supplementary material associated with this article can
validation findings advance the application of STS theory to other be found, in the online version, at https://doi.org/10.1108/
domains as there is little research on its extension, especially to ICS- 03- 2018- 0031.
enterprise systems security.
It is therefore recommended that enterprise systems security be Declaration of Competing Interest
treated as a holistic business function rather than a bloated stack
of security tasks within an IT department. In this regard, organ- The authors would like to declare that they have no known per-
isations should adopt a multidisciplinary approach to enterprise sonal relationships or competing financial interests that could have
systems security as conventional information security approaches influenced the outcome of this paper.
14 M. Malatji, A. Marnewick and S. von Solms / Computers & Security 95 (2020) 101846

Appendix A. Improved personal interview protocol

Focus group interview questions Revised and improved personal interviews questions

IQ1. Which information and cybersecurity controls can be IQ1. In your experience, which information and cybersecurity practices
classified as having social aspects of security? and/or controls do you consider having any of the following attributes:
IQ2. Which information and cybersecurity controls can be a) Social
classified as having technical aspects of security?
IQ3. Which information and cybersecurity controls can be b) Technical
classified as having environmental aspects of security?
c) Environmental
IQ4. Which aspect of information and cybersecurity IQ2. In your opinion, do you think any of the three attributes (social,
controls is more important than the others: Is it the technical, environmental) is more important than the others regarding
social, technical, environmental, or none? information and cybersecurity practices and/or controls? Please elaborate.
If you responded above that a particular aspect of
information and cybersecurity controls is more important
than the others, why do you think that is?
However, if you did respond that none of the three
aspects of information and cybersecurity controls is more
important than the others, why do you think that is?
IQ5. (Once classified, the information and cybersecurity IQ3. In your experience, do you think it is possible to optimise (i.e., give
controls are now referred to as the socio-technical mutually beneficial or interdependent weight to) these STS information and
systems information and cybersecurity controls). Do you cybersecurity controls when implementing
think it is possible, or even necessary, to optimise (give
equivalent weight to) these socio-technical systems
information and cybersecurity controls by using a
Likert-type rating scale?
If so, why?
If not, why not and which methods can be used?
IQ6. (Once optimised, the socio-technical systems IQ4. In your experience, how do you think we can measure, manage and
information and cybersecurity controls are referred to as improve upon practicing the joint optimisation security controls in order to
the joint optimisation security controls). How do you achieve a capability maturity?
think we can measure, manage and improve upon the
joint optimisation security practices in order to achieve a
capability maturity of a system?
IQ7. Can a capability maturity model be used to measure, IQ5. In your opinion, can a capability maturity model (CMM) be used to
manage and improve upon the joint optimisation security measure, manage and improve upon practicing the joint optimisation
practices? security practices? Please elaborate.
If yes, why do you think that is?
If not, why not and which methods can be used?
IQ8. Assuming that a capability maturity model (CMM) IQ6. If a CMM were to be adopted for measuring, managing and improving
has been adopted for measuring, managing and upon practicing the joint optimisation security controls, is there an
improving upon the joint optimisation security practices, appropriate number of maturity levels, in your opinion, a CMM should have
is there an appropriate number of maturity levels a CMM to be considered suitable? Please elaborate.
should have to be considered suitable?
If yes, why do you think that is?
If not, why do you think that is?

Legend: IQ = Interview question

Appendix B. COBIT® 5 for Information Security framework

The table below compares the practitioner security controls in the third column and COBIT 5 security controls in the last column. It
can be seen in the table that the COBIT 5 for Information Security framework is missing all the environmental dimension related security
controls, for example the general data protection regulation.

STS dimension Capability domain Practitioner security controls COBIT 5 security controls

Social Organisational Communication Behaviours


structure
(Functions)
Continuous self-learning by cybersecurity team Information security principles
Cybersecurity change management activities Specific information security policies driven by other
functions within the enterprise
Cybersecurity operations centre management Information security governance
(continued on next page)
M. Malatji, A. Marnewick and S. von Solms / Computers & Security 95 (2020) 101846 15

STS dimension Capability domain Practitioner security controls COBIT 5 security controls

Cybersecurity governance Information security policy


Cybersecurity team management Policies
Cybersecurity team training Security awareness
HR onboarding activities of new employees
HR employee management during employment
Organisational structure impact on cybersecurity
Organisational culture-driven cybersecurity activities
Other physical security activities
Phishing campaigns
Physical access controls
Frequent user awareness training
Understanding information security standards
User awareness campaigns
User identity awareness
Actors (People) Artisans Chief information security officer
Business managers Information custodians/business owners
Chief executive officer Information security manager
Chief information officer Enterprise risk management committee
Chief information security officer Information security steering committee
Chief technology officer
Cybersecurity team
Data governance officer
Employees (new, existing, leaving)
Executives (other)
Finance team
GRC specialist
Hospital manager
HR executive
Internal auditors
IT auditor
IT governance and risk director
IT governance and security manager
IT manager
IT security officer
IT team
Legal team
Managing director
Security guard
Software developers
Systems administrator
Technical Technology (Tools Active directory Adequate incident response
& resources)
Antimalware Adequate protection against malware
Antivirus software Awareness material
Application layer filtering User access and access rights in line with business
requirements
Assets management policy Adequately secured and configured systems aligned with
security requirements and security architecture
Back-up-as-a-service Information security stakeholders’ template
Cloud security policy Information security budget
Cybersecurity policy Information security dashboard
Cybersecurity standards Information security plan
Data breach policy Information security requirements
E-mail security Information security review reports
Firewall Information security strategy
Host-based intrusion prevention system Policies
Honeypot Security architecture
Network authentication controls Secure development
Password policy Specific information security policies driven by the
information security function
Steganography Video surveillance
User awareness policy
Work activities Systems access control Build, acquire and implement
(Tasks)
Systems hardening Deliver, service and support
Video surveillance Evaluate, direct and monitor
Cyberrisk assessments and analysis (internal and External attacks and intrusion attempts
external)
Cybersecurity audit (internal and external) Information assessment, testing and compliance
Data encryption Information security architecture development
Data leakage protection Information risk management
Disaster recovery and business continuity Information security operations
Documentation of cybersecurity practices Information security strategy formulation
Identity and access management Monitoring and alert services for security-related events
Incident response and management Monitor, evaluate and assess
(continued on next page)
16 M. Malatji, A. Marnewick and S. von Solms / Computers & Security 95 (2020) 101846

STS dimension Capability domain Practitioner security controls COBIT 5 security controls

Network segmentation Security assessments


Network traffic monitoring Security testing
Patching and systems security updates Align, plan and organise
Penetration testing (red team exercise) Security awareness leadership
Virtual private network configuration
Vulnerability scans and assessments
Environmental Basel accords
Contracts with customers
Contracts with external service providers
Customers
Cybercrimes and cybersecurity bill
Datacentre
Earthquakes
External service providers (suppliers)
Financial Intelligence Centre Act
General Data Protection Regulation (GDPR)
Government
Health Insurance Portability and Accountability Act
International data privacy laws
Minimum information security standards
Office space
Payment Card Industry Data Security Standard (PCI-DSS)
Private security industry regulatory authority
Protection of Personal Information Act
Regulatory compliance and statutory requirements
Reserve banks
Sarbanes-Oxley
Service level agreements
South African Revenue Service

CRediT authorship contribution statement Dasso, A., Funes, A., Montejano, G., Riesco, D., Uzal, R., Debnath, N., 2016. Model
based evaluation of cybersecurity implementations in information technology:
new generations. In: Proceedings of the 13th International Conference on Infor-
Masike Malatji: Conceptualization, Methodology, Data curation, mation Technology. Springer Verlag, pp. 303–313.
Investigation, Writing - original draft. Annlizé Marnewick: Super- Davis, M.C., Challenger, R., Jayewardene, D.N.W., Clegg, C.W., 2014. Advancing so-
vision, Validation, Writing - review & editing. Suné von Solms: Su- cio-technical systems thinking: a call for bravery. Appl. Ergonom. 45 (2A),
171–180.
pervision, Validation, Writing - review & editing. Dawson, J., Thomson, R., 2018. The future cybersecurity workforce: going beyond
technical skills for successful cyber performance. Front. Psychol. 9 (744), 1–12.
De Bruin, R., Von Solms, S.H., 2016. Cybersecurity governance: how can we mea-
References sure it? In: Proceedings of the 11th IST-Africa Week Conference. Durban: South
Africa.
Dedeke, A., Masterson, K., 2019. Contrasting cybersecurity implementation frame-
Bazeley, P., 2018. Exploring dissonance and divergence. In: Bazeley, P. (Ed.), Integrat- works (CIF) from three countries. Inf. Comput. Secur. 26 (1), 10–38.
ing Analyses in Mixed Methods Research. Sage, London, England: United King- Denscombe, M., 2014. The Good Research Guide: For Small-scale Social Research,
dom, pp. 263–276. doi:10.4135/9781526417190. 5th ed. McGraw Hill Education, Berkshire, England: United Kingdom.
Benson, V., McAlaney, J., Frumkin, L.A., 2019. Emerging threats for the human el- Denzin, N., 2002. The interpretive process. In: Huberman, A.M., Miles, M.B. (Eds.),
ement and countermeasures in current cyber security landscape. In: Manage- The Qualitative Researcher’s Companion. Sage, Thousand Oaks, California:
ment Association (Ed.), Cyber Law, Privacy, and Security. IGI Global, Hershey, United States, pp. 349–366. doi:10.4135/9781412986274.
Pennsylvania: United States, pp. 1264–1269. Diesch, R., Pfaff, M., Krcmar, H., 2020. A comprehensive model of information secu-
Borky, J.M., Bradley, T.H., 2019. Protecting information with cybersecurity. Effective rity factors for decision-makers. Comput. Secur. 92 (1), 1–21. https://doi.org/10.
Model-Based Systems Engineering. Springer, Cham: Switzerland. 1016/j.cose.2020.101747.
Borrett, M., Buecker, A., Arunkumar, S., Blackshaw, B., Brittenham, P., Flegr, J., Ja- Dorville, K. (2014). Department of Homeland Security: Cybersecurity capability
cobs, J., Jeremic, V., Johnston, M., Mark, C., Marx, G., Van Daele, S., Vereecke, S., maturity model, version 1.0. Available from: https://niccs.us-cert.gov/sites/
2013. Using the IBM Security Framework and IBM Security Blueprint to realize default/files/Capability%20Maturity%20Model%20White%20Paper.pdf?trackDocs=
Business-driven Security, 3rd Edition Redbooks, IBM Corporation, Armonk, New Capability%20Maturity%20Model%20White%20Paper.pdf, (Accessed 06 January
York. 2018).
Bostrom, R.P., Heinen, J.S., 1977. MIS problems and failures: a socio-technical per- Emery, F.E., 1982. Sociotechnical foundations for a new social order? Hum. Relat. 35
spective; part I: the causes. MIS Q. 1 (3), 17–32. (12), 1095–1123.
Budzak, D., 2016. Information security – the people issue. Bus. Inf. Rev. 33 (2), Friedberg, I., McLaughlin, K., Smith, P., Laverty, D., Sezer, S., 2017. SafeSec: Safety
85–89. and security analysis for cyber-physical systems. J. Inf. Secur. Appl. 34, 183–
Caldwell, T., 2012. Training – the weakest link. Comput. Fraud Secur. 2012 (9), 8–14. 196.
Carayon, P., Hancock, P., Leveson, N., Noy, I., Sznelwa, L., Van Hootegem, G., 2015. Flick, U., 2018. Triangulation in data collection. In: Flick, U. (Ed.), The SAGE Hand-
Advancing a sociotechnical systems approach to workplace safety – developing book of Qualitative Data Analysis. London, England: United Kingdom, pp. 527–
the conceptual framework. Ergonomics 58 (4), 548–564. 544. doi:10.4135/9781526416070.
Carcary, M., Renaud, K., McLaughlin, S., O’Brien, C., 2016. A framework for informa- Given, L.M., 2008. The SAGE Encyclopedia of Qualitative Research Methods (Vols. 1-
tion security governance and management. IT Prof. 18 (2), 22–30. 0). Sage, Thousand Oaks, California: United States doi:10.4135/9781412963909.
Carlton, M., Levy, Y., Ramim, M., 2019. Mitigating cyber attacks through the mea- Gourisetti, S.N., Mylrea, M., Patangia, H., 2020. Cybersecurity vulnerability mitiga-
surement of non-IT professionals’ cybersecurity skills. Inf. Comput. Secur. 27 (1), tion framework through empirical paradigm: enhanced prioritized gap analysis.
101–121. Future Gener. Comput. Syst. 105, 410–431.
Corbin, J., Strauss, A., 2008. Basics of Qualitative Research, 3rd Edition Sage, Thou- Green, B., Prince, D., Busby, J., Hutchison, D., 2015. The impact of social engineering
sand Oaks, California: United States. on industrial control systems security. In: Proceedings of the 1st ACM Workshop
Craigen, D., Diakun-Thibault, N., Purse, R., 2014. Defining cybersecurity. Technol. In- on Cyber-Physical Systems Security and Privacy. Denver, Colorado: United States.
nov. Manag. Rev. 4 (10), 13–21. Heartfield, R., Loukas, G., 2018. Detecting semantic social engineering attacks with
Curley, M., Kenneally, J., Carcary, M., Kavanagh, D., 2017. IT-CMF – A Management the weakest link: Implementation and empirical evaluation of a human-as-a-se-
Guide: Based on the IT Capability Maturity Framework (IT-CMF), 2nd Edition curity-sensor framework. Comput. Secur. 76, 101–127.
Van Haren, Zaltbommel: Netherlands. Hester, A.J., 2014. Socio-technical systems theory as a diagnostic tool for examining
Dán, G., Sandberg, H., Ekstedt, M., Björkman, G., 2012. Challenges in power system underutilization of wiki technology. Learn. Organ. 21 (1), 48–68.
information security. IEEE Secur. Privacy 10 (4), 62–70.
M. Malatji, A. Marnewick and S. von Solms / Computers & Security 95 (2020) 101846 17

Irwin, L. (2020). List of data breaches and cyber attacks in January 2020 – 1.5 Schwandt, T.A., 2007. The SAGE Dictionary of Qualitative Inquiry. Sage, Thousand
billion records breached. Available from: https://www.itgovernance.co.uk/blog/ Oaks, California: United States doi:10.4135/9781412986281.
list- of- data- breaches- and- cyber- attacks- in- january- 2020- 1- 5- billion- records- Shen, L., 2014. The NIST cybersecurity framework: overview and potential impacts.
breached, (Accessed 24 February 2020). J. Internet Law 18 (6), 3–6.
ISACA. (2012). COBIT 5 for Information Security. ISACA, Rolling Meadows, Illinois: Singh, N.A., Gupta, M., Ojha, A., 2014. Identifying factors of ‘organizational informa-
United States. tion security management’. J. Enterprise Inf. Manag. 27 (5), 644–667.
ISACA. (2017). What is COBIT 5.0? Available from: https://www.isaca.org/COBIT/ Soomro, Z.A., Shah, M.H., Ahmed, J., 2016. Information security management needs
Pages/default.aspx, (Accessed 25 March 2017). more holistic approach: a literature review. Int. J. Inf. Manag. 36 (2), 215–
Kaspersky. (2018). The top 5 most notorious cyberattack. Available from: https: 225.
//www.kaspersky.com/blog/five- most- notorious- cyberattacks/24506/, (Accessed Susskind, N.G., 2014. Cybersecurity compliance and risk management strategies:
24 July 2019). what directors, officers and managers need to know. NYUJL Bus. 11 (5), 73–
Kaspersky. (2019a). Encrypted cities. Available from: https://www.kaspersky.com/ 76.
blog/encrypted-city-administrations/27452/, (Accessed 24 July 2019). The Open Group. (2011). The Open Group releases maturity model information
Kaspersky. (2019b). The true value of digital privacy: are consumers sell- security management. Available from: https://http://www.opengroup.org/news/
ing themselves short. Available from: https://www.kaspersky.com/blog/ press/open-group-releasesmaturity-model-information-security-management,
privacy-report-2019/, (Accessed 24 July 2019). (Accessed 26 October 2017).
Laybats, C., Tredinnick, L., 2016. Information security. Bus. Inf. Rev 33 (2), 76–80. Tisdale, S.M., Morris, R., 2015. Cybersecurity: challenges from a systems, complexity,
Lehrman, Y., 2010. The weakest link: the risks associated with social networking knowledge management and business intelligence perspective. Issues Inf. Syst.
websites. J. Strat. Secur. 3 (2), 63–72. 16 (3), 191–198.
Le, N.T., Hoang, D.B., 2016. Can maturity models support cyber security? In: Pro- Trist, E., 1981. The Evolution of Socio-Technical Systems. Quality of Working Life
ceedings of the 35th IEEE International Performance Computing and Communi- Center, Toronto.
cations Conference. Las Vegas, Nevada: United States. USA Department of Energy. (2014). Oil and natural gas subsector: cybersecurity
Malatji, M., Von Solms, S., Marnewick, A., 2019. Socio-technical systems cy- capability maturity model version 1.1. Available from: https://energy.gov/sites/
bersecurityfFramework. Inf. Comput. Secur. 27 (2), 233–272. doi:10.1108/ prod/files/2014/03/f13/ONG- C2M2- v1- 1_cor.pdf, (Accessed 27 November 2017).
ICS- 03- 2018- 0031. Vuorinen, J., Tetri, P., 2016. Paradoxes in information security. IEEE Potent. 35 (5),
Mann, I., 2017. Hacking the Human: Social Engineering Techniques and Security 36–39.
Countermeasures. Routledge, London, England: United Kingdom. Washington, M., Hacker, M., 20 0 0. Joint optimisation system element: the applica-
Martin, K. (2018). 5 questions to ask your cybersecurity professional. Avail- tion of joint optimization. Measur. Bus. Excell. 4 (4), 18–24.
able from: https://www.nist.gov/blogs/manufacturing- innovation- blog/ Willis Towers Watson (2017). When it comes to cyber risk,
5- questions- ask- your- cybersecurity- professional, (Accessed 27 May 2019). businesses are missing the human touch. Available from:
Maxwell, J.A., 2013. Qualitative Research Design: An Interactive Approach. Sage, https://www.willistowerswatson.com/en-US/press/2017/03/
Thousand Oaks, California: United States. when- it- comes- tocyber- risk- businesses- are- missing- the- human- touch, (Ac-
Mitnick, K.D., Simon, W.L., 2011. The Art of Deception: Controlling the Human Ele- cessed 27 May 2019).
ment of Security. Wiley, Indianapolis, Indiana: United States. Walker, G.H., Stanton, N.A., Jenkins, D., Salmon, P., Young, M., Aujla, A., 2007. So-
Mumford, E., 2006. The story of socio-technical design: feflections on its successes, ciotechnical theory and NEC system design. In: Harris, D. (Ed.), Engineering Psy-
failures and potential. Inf. Syst. J. 16 (4), 317–342. chology and Cognitive Ergonomics. Springer-Verlag, Berlin: Germany.
Nicho, M., 2018. A process model for implementing information systems security Wu, P.P., Fookes, C., Pitchforth, J., Mengersen, K., 2015. A framework for model in-
governance. Inf. Comput. Secur. 26 (1), 10–38. tegration and holistic modelling of socio-technical systems. Decis. Support Syst.
NIST. (2017). Framework for improving critical infrastructure cybersecurity, draft 71, 14–27.
version 1.1. Available from: https://www.nist.gov/sites/default/files/documents///
/draft- cybersecurity- framework- v1.11.pdf, (Accessed 01 September 2017). Masike Malatji is a technology management practitioner with over 19 years of in-
Oliver-Hoyo, M., Allen, D., 2006. The use of triangulation methods in qualitative ed- dustry experience and is currently working as a research associate at the postgrad-
ucational research. J. College Sci. Teach. 35, 42–47. uate school of engineering management of the University of Johannesburg, South
Oosthuizen, R., Pretorius, L., 2016. Assessing the impact of new technology on com- Africa. He is also a part-time lecturer of mainly one but sometimes both of the
plex socio-technical systems. South Afr. J. Ind. Eng. 27 (2), 15–29. following courses at the Tshwane University of Technology Business School, Preto-
Pfleeger, Y., Sasse, M.A., Furnham, A., 2014. From weakest link to security hero: ria, South Africa: (i) Management of technology & innovation; and (ii) Technology
transforming staff security behaviour. J. Homeland Secur. Emerg. Manag. 11 (4), entrepreneurship. His current research interests are in engineering and technology
489–510. management in the context of the fourth industrial revolution and associated tech-
Pieters, W., 2013. Defining “the weakest link” comparative security in complex sys- nologies. He completed his doctor of engineering in engineering management de-
tems of systems. In: Proceedings of the IEEE 5th International Conference on gree at the University of Johannesburg in November 2019.
Cloud Computing Technology and Science. Bristol, England: United Kingdom.
Politou, E., Alepis, E., Patsakis, C, 2018. Forgetting personal data and revoking con-
Annlizé L. Marnewick received a BIng in Electrical & Electronic Engineering from
sent under the GDPR: challenges and proposed solutions. J. Cybersecur. 4 (1),
Potchefstroom University, a BSc Honours in Applied Mathematics at the Rand
1–20. doi:10.1093/cybsec/tyy001.
Afrikaans University, and MIng and DIng in Engineering Management at Univer-
Rigon, E.A., Westphall, C.M., Dos Santos, D.R., Westphall, C.B., 2014. A cyclical evalu-
sity of Johannesburg. She worked in industry for 14 years as a requirements en-
ation model of information security maturity. Inf. Manag. Comput. Secur. 22 (3),
gineer. She is currently an associate professor at the Postgraduate School of En-
265–278.
gineering Management, University of Johannesburg. Her research focus is solving
Ross, R.S., McEvilley, M. & Oren, J. (2016). National institute of standards and tech-
cross-discipline industry problems through the application of systems engineering
nology special publication 800-160, systems security engineering - Considera-
principles. She is a registered Professional Engineer.
tions for a multidisciplinary approach in the engineering of trustworthy secure
systems, Available from: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/
NIST.SP.800-160.pdf, (Accessed 04 January 2018). Suné von Solms is an Associate Professor at the Faculty of Engineering and the
Roulston, K., 2014. Analysing interviews. In: Flick, U. (Ed.), The SAGE Handbook of Built Environment at the University of Johannesburg, South Africa. She is a reg-
Qualitative Data Analysis. Sage, London, England: United Kingdom, pp. 297–312. istered professional engineer with the Engineering Council of South Africa (ECSA)
doi:10.4135/9781446282243. and a National Research Foundation (NRF) rated researcher. Her research interests
Safa, N.S., Von Solms, R., Futcher, L., 2016. Human aspects of information security in include networks and communication, engineering education and the social and
organisations. Comput. Fraud Secur. 2016 (2), 15–18. human aspects of engineering. She is actively involved in engineering and com-
Salkind, N.J., 2010. Encyclopedia of Research Design. Sage, Thousand Oaks, Califor- munity engagement projects within rural communities. Suné is also involved in
nia: United States doi:10.4135/9781412961288. research relating to cybersecurity-related skills and competency development of
Schuetz, C.G., Schrefl, M., 2017. Towards formal strategy analysis with goal models engineers.
and semantic web technologies. In: De Cesare, S., Frank, U. (Eds.), Advances in
Conceptual Modelling. Springer, Cham: Switzerland, pp. 144–153.

You might also like