Abstract
Distinguished social psychologist Geert Hofstede observed, “This dominance of technology over culture is an illusion. The software of the machines may be globalized, but the software of the minds that use them is not.” The role of culture in the thought process is prevalent, yet unstated, that many cultural beliefs and biases are accepted as truths. Cultural beliefs and biases are incorporated into the thought process where they reveal themselves in patterns of thought. Once the thought patterns are established they may be observed in the digital trail that results from online interactions. Once captured online, the behaviors can be reviewed and examined in multiple ways so that researchers can gain new insights.
Historically, observations have taken place in the physical environment; this talk discusses findings of cultural markers in the cyber realm. The results of evidence-based research exploring the relationship between national culture and cyber behaviors will be discussed. These quantitative, observational studies were the result of researchers mining the raw website defacements found in the Zone-H archives containing over 10 million records. Mining the dataset and evaluating the findings within Hofstede’s cultural framework allowed for research into behaviors, preferences, reasons, imaging, sentiment analysis, and various other aspects of attacker and victim cybersecurity actors. The use of Hofstede’s six dimensional cultural framework to define culture, along with some basic inferential statistics, resulted in specific digital identifiers that were associated with specific cultural dimensions. Over time findings can be trended, allowing for more accurate modeling of cyber actors based on cultural values. The results supported Nisbett’s observation that people “think the way they do because of the nature of the societies they line in”.
This discussion centers on the six dimensions of culture, the values associated with each dimension, and examples of those values in cyber space for victims, attackers and defenders. The six cultural dimensions measure views on self-determination, collectivism, aggression, nurturing, uncertain outcomes, holism, instant gratification, and levels of societal openness. The behavioral traits that associate with the cultural values are behavioural traits that are consistent with cyber behaviors.
Cultural values provide context for individual behaviors by determining the norm for a group. Thus, behavior that may seem perfectly normal in one environment may stand out as odd in a different environment. Cultural difference have been historically used to model adversaries in the kinetic world. Moving this analysis into the cyber realm offers the potential to gain greater insights into all cyber actors.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
The small number of records and the scope of the study made this an unreported finding. Of the 20 countries examined 10 showed strong preferences where the frequency of first choice vector was used in over 50% of the cases and 5 showed no preference where the frequency of the first choice and other choices were evenly distributed. The group that showed the median value of the no preference group’s long-term orientation to be 20.
References
Hofstede, G., Hofstede, G.J., Minkov, M.: Cultures and Organizations. McGraw-Hill Publishing, New York (2010)
Henshel, D., Sample, C., Cains, M.G., Hoffman, B.: Integrating cultural factors into human factors framework for cyber attackers. In: 7th Annual Conference on Applied Human Factors and Ergonomics Conference, Orlando, FL (2016)
Sample, C., Cowley, J., Watson, T., Maple, C.: Re-thinking threat intelligence. In: International Conference on Cyber Conflict (CyCon US), pp. 1–9. IEEE (2016)
Sample, C., Cowley, J., Hutchinson, S.: Cultural exploration of attack vector preferences for self-identified attackers. In: IEEE 11th International Conference on Research Challenges in Information Science, Brighton, UK (2017, submitted)
Sample, C., Hutchinson, S., Karamanian, A., Maple, C.: Cultural observations on social engineering victims. In: 16th European Conference on Cyber Warfare and Security (ECCWS) Dublin, Ireland (2017, accepted)
Sample, C., Bakdash, J., Abdelnour-Nocera, J., Maple, C.: What’s in a name? Cultural observations on nationally named hacking groups. In: 12th International Conference on Cyber Warfare and Security (ICCWS) Dayton, Ohio, pp. 332–340 (2017)
Sample, C., Karamanian, A.: Culture and cyber behaviours: DNS defending. In: 14th ECCWS, Hatfield, UK, pp. 233–240 (2015)
Nisbett, R.: The Geography of Thought: How Asians and Westerners Think Differently… and Why. Simon & Schuster, New York (2010)
Guess, C.D.: Decision-making in Individualistic and Collectivist Cultures, Readings in Psychology and Culture, 4. http://scholarworks.gvsu.edu/cgi/viewcontent.csg?article=1032&context=orpc
Guss, C.D., Dorner, D.: Cultural differences in dynamic decision-making strategies in a non-linear, time-delayed task. Cog. Sys. Res. 12(3), 365–376 (2011)
Bishop, M., Butler, E., Butler, K., Gates, C., Greenspan, S.: Forgive and forget. In: 21st EICAR Annual Conference Proceedings, pp. 151–159 (2012)
Wang, Q.: Why we should all be cultural psychologists? Lessons learned from the study of social cognition. Perspect. Psychol. Sci. 11(5), 583–596 (2016)
Rathje, S.: The definition of culture: an application-oriented overhaul. Interculture J. 8, 35–59 (2009)
Birukou, A., Blanzieri, E., Giorgini, P., Giunchiglia, F.: A formal definition of culture, University of Trento, Italy (2009)
Faulkner, S.L., Baldwin, J.R., Lindsley, S.L., Hecht, M.L.: Layers of Meaning: An Analysis of Definitions of Culture. Redefining Culture: Perspectives Across the Disciplines, pp. 27–51. Lawrence Erlbaum Associates, Publishers, Mahwah, (2006)
Bhabha, H.K.: The world and the home. Cult. Polit. 11, 445–455 (1997)
Roberts Jr., J.M., Moore, C.C., Romney, A.K., Barbujani, G., Bellwood, P., Dunnell, R.C., Green, R.C., Kirch, P.V., Marcus, J., Flannery, K.V., Terrell, J.: Predicting similarity in material culture among new guinea villages from propinquity and language: a log-linear approach [and comments and reply]. Curr. Anthropol. 36(5), 769–788 (1995)
Arrindell, W.A., Hatzichristou, C., Wensink, J., Rosenberg, E., van Twillert, B., Sedema, J., Meijer, D.: Dimensions of national culture as predictors of cross-national differences in subjective well-being. Personality Individ. Differ. 23(1), 37–53 (1997)
Doney, P.M., Cannon, J.P., Mullen, M.R.: Understanding the influence of national culture on the development of trust. Acad. Manag. Rev. 23(3), 601–620 (1998)
Huff, L., Kelley, L.: Levels of organizational trust in individualist versus collectivist societies: a seven-nation study. Organ. Sci. 14(1), 81–90 (2003)
Singelis, T.M., Brown, W.J.: Culture, self, and collectivist communication linking culture to individual behavior. Hum. Commun. Res. 21(3), 354–389 (1995)
Vitell, S.J., Nwachukwu, S.L., Barnes, J.H.: The effects of culture on ethical decision-making: an application of hofstede’s typology. J. Bus. Ethics 12(10), 753–760 (1993)
Aguayo, D., Herman, K., Ojeda, L., Flores, L.Y.: Culture predicts mexican americans’ college self-efficacy and college performance. J. Divers. High. Educ. 4(2), 79 (2011)
Dawar, N., Parker, P.M., Price, L.J.: A cross-cultural study of interpersonal information exchange. J. Int. Bus. Stud. 27(3), 497–516 (1996)
Al-Gahtani, S.S., Hubona, G.S., Wang, J.: Information technology (IT) in Saudi Arabia: culture and the acceptance and use of IT. Inf. Manage. 44(8), 681–691 (2007)
Shane, S.: Uncertainty avoidance and the preference for innovation championing roles’. J. Int. Bus. Stud. 26(1), 47–68 (1995)
Zaheer, S., Zaheer, A.: Country effects on information seeking in global electronic networks. J. Int. Bus. Stud. 28(1), 77–100 (1997)
Kirkman, B.L., Lowe, K.B., Gibson, C.B.: A quarter century of culture’s consequences: a review of empirical research incorporating hofstede’s cultural values framework. J. Int. Bus. Stud. 37(3), 285–320 (2006)
Gazzaniga, M., Ivry, R.B., Mangun, G.R.: Cognitive Neuroscience: The Biology of the Mind. W.W. Norton & Company Inc, London (2014)
Bargh, J., Morsella, E.: The unconscious mind. Perspect. Psychol. Sci. 3(1), 73–79 (2008)
Buchtel, E.E., Norenzayan, A.: Thinking across cultures: implications for dual processes. J. St. BT Evans & K. Frankish, pp. 217–38 (2009)
Evans, J.S.B.T.: Dual-processing accounts of reasoning, judgment, and social cognition. Annu. Rev. Psychol. 59, 255–278 (2008)
Minkov, M.: Cultural Differences in a Globalizing World. Emerald Group Publishing Limited, WA (2011)
Zone-H archives: http://www.Zone-h.org
ICANN: http://www.icann.org
Geert Hofstede: https://geert-hofstede.com/countries.html
Hofstede, G.: Cultures Consequences: International Differences in Work-Related Values (5). Sage, Thousand Oaks
Sample, C.: Applicability of cultural markers in computer network attack attribution. In: Proceedings of the 12th ECCWS, Finland, pp. 361–369 (2013)
Fiske, S.T., Taylor, S.E.: Social cognition: from brains to culture. Sage, Thousand Oaks (2013)
Van de Vijver, F., Leung, K.: Methods and Data Analysis for Cross-Cultural Research, vol. 1. Sage, Thousand Oaks (1997)
Martin, B., Brown, M., Paller, A., Kirby, D.D., Christey, S.: 2011 CWE/SANS Top 25 Most Dangerous Software Errors. Common Weakness Enumeration (2011)
MITRE website: Common Weaknesses Enumerated. http://cwe.mitre.org/top25/#listing
MITRE website: Common Cyber Observables. http://cybox.mitre.org
Su, Z., Wassermann, G.: The essence of command injection attacks in web applications. ACM SIGPLAN Not. 41(1), 372–382 (2006)
Arends, R., Austein, R., Larson, M., Massey, D., Rose, S.:. DNS Security Introduction and Requirements, Internet Engineering Task Force (IETF) RFC 4033 (2005)
St. Johns, M.: Automated updates of DNS security (DNSSEC) trust anchors. In: IETF (2007)
Binford, L.R.: Archaeology as anthropology, pp. 217–225. American Antiquity (1962)
Watson, R.A.: Inference in Archaeology, pp. 58–66. American Antiquity (1976)
Sullivan, A.P.: Inference and evidence in archaeology: a discussion of the conceptual problems. Adv. Archaeol. Method Theory 1, 183–222 (1978)
Sample, C.: Cyber + Culture Early Warning Study, CMU/SEI-2015–SR-025 (2015)
Landry, D.: 12 Defensible aesthetics. Graffiti and Street Art: Reading, Writing and Representing the City (2016)
Acknowledgments
This research was sponsored by the Army Research Laboratory. The U.S. Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation here on. Contributing studies for this research were performed with the University of Warwick through the IAS fellowship. Special thanks to Professor Tim Watson, Professor Carsten Maple and Bil Hallaq at the University of Warwick, Dr. Andre Karamanian at Cisco Systems and Marc Kolenko at Price-Waterhouse Coopers for their assistance on the referenced studies and their assistance in attacker identification.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Sample, C., Cowley, J., Hutchinson, S., Bakdash, J. (2018). Culture + Cyber: Exploring the Relationship. In: Nicholson, D. (eds) Advances in Human Factors in Cybersecurity. AHFE 2017. Advances in Intelligent Systems and Computing, vol 593. Springer, Cham. https://doi.org/10.1007/978-3-319-60585-2_18
Download citation
DOI: https://doi.org/10.1007/978-3-319-60585-2_18
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-60584-5
Online ISBN: 978-3-319-60585-2
eBook Packages: EngineeringEngineering (R0)