Skip to main content

Culture + Cyber: Exploring the Relationship

  • Conference paper
  • First Online:
Book cover Advances in Human Factors in Cybersecurity (AHFE 2017)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 593))

Included in the following conference series:

Abstract

Distinguished social psychologist Geert Hofstede observed, “This dominance of technology over culture is an illusion. The software of the machines may be globalized, but the software of the minds that use them is not.” The role of culture in the thought process is prevalent, yet unstated, that many cultural beliefs and biases are accepted as truths. Cultural beliefs and biases are incorporated into the thought process where they reveal themselves in patterns of thought. Once the thought patterns are established they may be observed in the digital trail that results from online interactions. Once captured online, the behaviors can be reviewed and examined in multiple ways so that researchers can gain new insights.

Historically, observations have taken place in the physical environment; this talk discusses findings of cultural markers in the cyber realm. The results of evidence-based research exploring the relationship between national culture and cyber behaviors will be discussed. These quantitative, observational studies were the result of researchers mining the raw website defacements found in the Zone-H archives containing over 10 million records. Mining the dataset and evaluating the findings within Hofstede’s cultural framework allowed for research into behaviors, preferences, reasons, imaging, sentiment analysis, and various other aspects of attacker and victim cybersecurity actors. The use of Hofstede’s six dimensional cultural framework to define culture, along with some basic inferential statistics, resulted in specific digital identifiers that were associated with specific cultural dimensions. Over time findings can be trended, allowing for more accurate modeling of cyber actors based on cultural values. The results supported Nisbett’s observation that people “think the way they do because of the nature of the societies they line in”.

This discussion centers on the six dimensions of culture, the values associated with each dimension, and examples of those values in cyber space for victims, attackers and defenders. The six cultural dimensions measure views on self-determination, collectivism, aggression, nurturing, uncertain outcomes, holism, instant gratification, and levels of societal openness. The behavioral traits that associate with the cultural values are behavioural traits that are consistent with cyber behaviors.

Cultural values provide context for individual behaviors by determining the norm for a group. Thus, behavior that may seem perfectly normal in one environment may stand out as odd in a different environment. Cultural difference have been historically used to model adversaries in the kinetic world. Moving this analysis into the cyber realm offers the potential to gain greater insights into all cyber actors.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The small number of records and the scope of the study made this an unreported finding. Of the 20 countries examined 10 showed strong preferences where the frequency of first choice vector was used in over 50% of the cases and 5 showed no preference where the frequency of the first choice and other choices were evenly distributed. The group that showed the median value of the no preference group’s long-term orientation to be 20.

References

  1. Hofstede, G., Hofstede, G.J., Minkov, M.: Cultures and Organizations. McGraw-Hill Publishing, New York (2010)

    Google Scholar 

  2. Henshel, D., Sample, C., Cains, M.G., Hoffman, B.: Integrating cultural factors into human factors framework for cyber attackers. In: 7th Annual Conference on Applied Human Factors and Ergonomics Conference, Orlando, FL (2016)

    Google Scholar 

  3. Sample, C., Cowley, J., Watson, T., Maple, C.: Re-thinking threat intelligence. In: International Conference on Cyber Conflict (CyCon US), pp. 1–9. IEEE (2016)

    Google Scholar 

  4. Sample, C., Cowley, J., Hutchinson, S.: Cultural exploration of attack vector preferences for self-identified attackers. In: IEEE 11th International Conference on Research Challenges in Information Science, Brighton, UK (2017, submitted)

    Google Scholar 

  5. Sample, C., Hutchinson, S., Karamanian, A., Maple, C.: Cultural observations on social engineering victims. In: 16th European Conference on Cyber Warfare and Security (ECCWS) Dublin, Ireland (2017, accepted)

    Google Scholar 

  6. Sample, C., Bakdash, J., Abdelnour-Nocera, J., Maple, C.: What’s in a name? Cultural observations on nationally named hacking groups. In: 12th International Conference on Cyber Warfare and Security (ICCWS) Dayton, Ohio, pp. 332–340 (2017)

    Google Scholar 

  7. Sample, C., Karamanian, A.: Culture and cyber behaviours: DNS defending. In: 14th ECCWS, Hatfield, UK, pp. 233–240 (2015)

    Google Scholar 

  8. Nisbett, R.: The Geography of Thought: How Asians and Westerners Think Differently… and Why. Simon & Schuster, New York (2010)

    Google Scholar 

  9. Guess, C.D.: Decision-making in Individualistic and Collectivist Cultures, Readings in Psychology and Culture, 4. http://scholarworks.gvsu.edu/cgi/viewcontent.csg?article=1032&context=orpc

  10. Guss, C.D., Dorner, D.: Cultural differences in dynamic decision-making strategies in a non-linear, time-delayed task. Cog. Sys. Res. 12(3), 365–376 (2011)

    Article  Google Scholar 

  11. Bishop, M., Butler, E., Butler, K., Gates, C., Greenspan, S.: Forgive and forget. In: 21st EICAR Annual Conference Proceedings, pp. 151–159 (2012)

    Google Scholar 

  12. Wang, Q.: Why we should all be cultural psychologists? Lessons learned from the study of social cognition. Perspect. Psychol. Sci. 11(5), 583–596 (2016)

    Article  Google Scholar 

  13. Rathje, S.: The definition of culture: an application-oriented overhaul. Interculture J. 8, 35–59 (2009)

    Google Scholar 

  14. Birukou, A., Blanzieri, E., Giorgini, P., Giunchiglia, F.: A formal definition of culture, University of Trento, Italy (2009)

    Google Scholar 

  15. Faulkner, S.L., Baldwin, J.R., Lindsley, S.L., Hecht, M.L.: Layers of Meaning: An Analysis of Definitions of Culture. Redefining Culture: Perspectives Across the Disciplines, pp. 27–51. Lawrence Erlbaum Associates, Publishers, Mahwah, (2006)

    Google Scholar 

  16. Bhabha, H.K.: The world and the home. Cult. Polit. 11, 445–455 (1997)

    Google Scholar 

  17. Roberts Jr., J.M., Moore, C.C., Romney, A.K., Barbujani, G., Bellwood, P., Dunnell, R.C., Green, R.C., Kirch, P.V., Marcus, J., Flannery, K.V., Terrell, J.: Predicting similarity in material culture among new guinea villages from propinquity and language: a log-linear approach [and comments and reply]. Curr. Anthropol. 36(5), 769–788 (1995)

    Article  Google Scholar 

  18. Arrindell, W.A., Hatzichristou, C., Wensink, J., Rosenberg, E., van Twillert, B., Sedema, J., Meijer, D.: Dimensions of national culture as predictors of cross-national differences in subjective well-being. Personality Individ. Differ. 23(1), 37–53 (1997)

    Article  Google Scholar 

  19. Doney, P.M., Cannon, J.P., Mullen, M.R.: Understanding the influence of national culture on the development of trust. Acad. Manag. Rev. 23(3), 601–620 (1998)

    Google Scholar 

  20. Huff, L., Kelley, L.: Levels of organizational trust in individualist versus collectivist societies: a seven-nation study. Organ. Sci. 14(1), 81–90 (2003)

    Article  Google Scholar 

  21. Singelis, T.M., Brown, W.J.: Culture, self, and collectivist communication linking culture to individual behavior. Hum. Commun. Res. 21(3), 354–389 (1995)

    Article  Google Scholar 

  22. Vitell, S.J., Nwachukwu, S.L., Barnes, J.H.: The effects of culture on ethical decision-making: an application of hofstede’s typology. J. Bus. Ethics 12(10), 753–760 (1993)

    Article  Google Scholar 

  23. Aguayo, D., Herman, K., Ojeda, L., Flores, L.Y.: Culture predicts mexican americans’ college self-efficacy and college performance. J. Divers. High. Educ. 4(2), 79 (2011)

    Article  Google Scholar 

  24. Dawar, N., Parker, P.M., Price, L.J.: A cross-cultural study of interpersonal information exchange. J. Int. Bus. Stud. 27(3), 497–516 (1996)

    Article  Google Scholar 

  25. Al-Gahtani, S.S., Hubona, G.S., Wang, J.: Information technology (IT) in Saudi Arabia: culture and the acceptance and use of IT. Inf. Manage. 44(8), 681–691 (2007)

    Article  Google Scholar 

  26. Shane, S.: Uncertainty avoidance and the preference for innovation championing roles’. J. Int. Bus. Stud. 26(1), 47–68 (1995)

    Article  Google Scholar 

  27. Zaheer, S., Zaheer, A.: Country effects on information seeking in global electronic networks. J. Int. Bus. Stud. 28(1), 77–100 (1997)

    Article  MATH  Google Scholar 

  28. Kirkman, B.L., Lowe, K.B., Gibson, C.B.: A quarter century of culture’s consequences: a review of empirical research incorporating hofstede’s cultural values framework. J. Int. Bus. Stud. 37(3), 285–320 (2006)

    Article  Google Scholar 

  29. Gazzaniga, M., Ivry, R.B., Mangun, G.R.: Cognitive Neuroscience: The Biology of the Mind. W.W. Norton & Company Inc, London (2014)

    Google Scholar 

  30. Bargh, J., Morsella, E.: The unconscious mind. Perspect. Psychol. Sci. 3(1), 73–79 (2008)

    Article  Google Scholar 

  31. Buchtel, E.E., Norenzayan, A.: Thinking across cultures: implications for dual processes. J. St. BT Evans & K. Frankish, pp. 217–38 (2009)

    Google Scholar 

  32. Evans, J.S.B.T.: Dual-processing accounts of reasoning, judgment, and social cognition. Annu. Rev. Psychol. 59, 255–278 (2008)

    Article  Google Scholar 

  33. Minkov, M.: Cultural Differences in a Globalizing World. Emerald Group Publishing Limited, WA (2011)

    Google Scholar 

  34. Zone-H archives: http://www.Zone-h.org

  35. ICANN: http://www.icann.org

  36. Geert Hofstede: https://geert-hofstede.com/countries.html

  37. Hofstede, G.: Cultures Consequences: International Differences in Work-Related Values (5). Sage, Thousand Oaks

    Google Scholar 

  38. Sample, C.: Applicability of cultural markers in computer network attack attribution. In: Proceedings of the 12th ECCWS, Finland, pp. 361–369 (2013)

    Google Scholar 

  39. Fiske, S.T., Taylor, S.E.: Social cognition: from brains to culture. Sage, Thousand Oaks (2013)

    Book  Google Scholar 

  40. Van de Vijver, F., Leung, K.: Methods and Data Analysis for Cross-Cultural Research, vol. 1. Sage, Thousand Oaks (1997)

    Google Scholar 

  41. Martin, B., Brown, M., Paller, A., Kirby, D.D., Christey, S.: 2011 CWE/SANS Top 25 Most Dangerous Software Errors. Common Weakness Enumeration (2011)

    Google Scholar 

  42. MITRE website: Common Weaknesses Enumerated. http://cwe.mitre.org/top25/#listing

  43. MITRE website: Common Cyber Observables. http://cybox.mitre.org

  44. Su, Z., Wassermann, G.: The essence of command injection attacks in web applications. ACM SIGPLAN Not. 41(1), 372–382 (2006)

    Article  Google Scholar 

  45. Arends, R., Austein, R., Larson, M., Massey, D., Rose, S.:. DNS Security Introduction and Requirements, Internet Engineering Task Force (IETF) RFC 4033 (2005)

    Google Scholar 

  46. St. Johns, M.: Automated updates of DNS security (DNSSEC) trust anchors. In: IETF (2007)

    Google Scholar 

  47. Binford, L.R.: Archaeology as anthropology, pp. 217–225. American Antiquity (1962)

    Google Scholar 

  48. Watson, R.A.: Inference in Archaeology, pp. 58–66. American Antiquity (1976)

    Google Scholar 

  49. Sullivan, A.P.: Inference and evidence in archaeology: a discussion of the conceptual problems. Adv. Archaeol. Method Theory 1, 183–222 (1978)

    Article  Google Scholar 

  50. Sample, C.: Cyber + Culture Early Warning Study, CMU/SEI-2015–SR-025 (2015)

    Google Scholar 

  51. Landry, D.: 12 Defensible aesthetics. Graffiti and Street Art: Reading, Writing and Representing the City (2016)

    Google Scholar 

Download references

Acknowledgments

This research was sponsored by the Army Research Laboratory. The U.S. Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation here on. Contributing studies for this research were performed with the University of Warwick through the IAS fellowship. Special thanks to Professor Tim Watson, Professor Carsten Maple and Bil Hallaq at the University of Warwick, Dr. Andre Karamanian at Cisco Systems and Marc Kolenko at Price-Waterhouse Coopers for their assistance on the referenced studies and their assistance in attacker identification.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Char Sample .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Sample, C., Cowley, J., Hutchinson, S., Bakdash, J. (2018). Culture + Cyber: Exploring the Relationship. In: Nicholson, D. (eds) Advances in Human Factors in Cybersecurity. AHFE 2017. Advances in Intelligent Systems and Computing, vol 593. Springer, Cham. https://doi.org/10.1007/978-3-319-60585-2_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-60585-2_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-60584-5

  • Online ISBN: 978-3-319-60585-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics