Skip to main content

Communication is Not an Option

  • Chapter
  • First Online:
Building a Cybersecurity Culture in Organizations

Part of the book series: Studies in Systems, Decision and Control ((SSDC,volume 284))

  • 1394 Accesses

Abstract

In a psychosocial approach to cybersecurity, we cannot neglect the role played by communication, since it is the key of any security strategy and, generally speaking, it is fundamental in any environment where human beings interact. In this chapter, we discuss the importance of both internal communication, in order to disseminate contents related to cybersecurity, and crisis communication management, when crisis events such as data breaches occur. Firstly, communication supports the building of Cybersecurity Culture through the sharing of common values and beliefs among workers. For this goal, it is important to use clear and understandable communication, since it is not obvious that all employees know technical language. Moreover, for effective communication, cognitive and emotional aspects have to be taken into consideration. For example, since communication about risks can evocate adverse effects, messages need to balance positive and negative elements, in order to put people in the condition to feel able to handle threats; otherwise the real risk is the adoption of careless or passive behaviour. Finally, an effective communication strategy for managing crisis events is essential to preserve company’s reputation. In an always-on world the topic of reputation is vital for everyone, individuals and organizations, since it is more and more dependent on people’s interactions in the digital world. Data breaches can produce serious impacts for future business: compromising the relationship with their stakeholders, organizations put at risk the opportunities of new trade, and therefore, they should pay great attention to customers data protection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    See the research carried out by Opinium and commissioned by Trend Micro (2019). The online survey involved 1,125 IT decision-makers responsible for cybersecurity across the UK, US, Germany, Spain, Italy, Sweden, Finland, France, Netherlands, Poland, Belgium and Czech Republic. https://newsroom.trendmicro.com/press-release/commercial/trend-micro-finds-one-third-cybersecurity-staff-feel-isolated-business.

  2. 2.

    https://ec.europa.eu/digital-single-market/en/news/new-report-shows-digital-skills-are-required-all-types-jobs.

  3. 3.

    Think, for example, to Facebook-Cambridge Analytica scandal in early 2018. It was revealed that about 87 million user’s personal data of Facebook profiles were harvested by Cambridge Analytica and improperly used for political goal, without the consensus of those involved.

  4. 4.

    https://edgy.app/data-leak-normal-now.

  5. 5.

    The Labelling Theory (e.g. Becker 1973) is a sociological approach developed in the 1960s in order to understand deviant behaviour. Among factors influencing criminal behaviour, there is also the way by which people are labelled. This theory is associated with the concept of self-fulfilling prophecy (Rosenthal and Jacobson), negatively labelled individuals are more likely to develop negative behaviour. Even though this theory received several critics, it is however interesting to observe how the repetitive use of negative (and also positive) terms can affect individual self-identity.

  6. 6.

    See, for example, the C-Suite 2018, the Annual Survey of Global Business Executives, conducted by Global Business Policy Council in partnership with ATKearney. This report is based on results from a survey including four sections. The first asks executives to assess the likelihood of a variety of discrete potential global developments. The second focuses on the external environment (e.g. economic, political, social) affecting businesses. The third concentrates on business operations, that is firm’s internal processes, people, and systems. In the fourth section a topical issue is chosen; for this report the section is based on cybersecurity strategy, since this topic has consistently ranked as a top challenge among executives in past iterations of this survey. From the study, relating to this specific issue, it emerges that cybersecurity tops the list of challenges for business operations. https://www.kearney.com/web/global-business-policy-council/article?/a/2018-views-from-the-c-suite.

  7. 7.

    The Reputation Leaders study by Reputation Institute (2019) is based on the participation of 179 Global Communication executives. Cyber-attacks and data privacy are the second top Macro-Trends. Among others we can find fake news, female empowerment, CEO activism, and so on.

  8. 8.

    https://www.forbes.com/pictures/eede45imgh/it-takes-20-years-to-bui/#252b4f98ec35.

  9. 9.

    According to GDPR, personal data refers to any information that relates to an identified or identifiable, living individual, for example: name, address and phone number, location, health records, income, banking information, cultural preferences, and more https://ec.europa.eu/commission/sites/beta-political/files/data-protection-factsheet-sme-obligations_en.pdf.

  10. 10.

    https://ec.europa.eu/info/law/law-topic/data-protection/reform/rules-business-and-organisations/obligations/what-does-data-protection-design-and-default-mean_en.

  11. 11.

    https://en.wikipedia.org/wiki/2011_PlayStation_Network_outage.

  12. 12.

    A global company specialized on reputation measurement and management. Its model for measurement company’s reputation (RepTrack Model) is a standardized framework internationally recognised.

  13. 13.

    Hackers justified their actions on the grounds that Ashley Madison lied to users and didn’t protect their data properly.

  14. 14.

    https://www.reuters.com/article/us-ashleymadison-settlement-idUSKBN19Z2F0.

  15. 15.

    https://www.bbc.com/news/technology-34044506.

References

  • Ablon, L., Heaton, P., Lavery, D., et al.: Consumer Attitudes Toward Data Breach Notifications and Loss of Personal Information. The RAND Corporation, Santa Monica, CA (2016)

    Google Scholar 

  • Bada, M., Sasse, A.: Cyber Security Awareness Campaigns: Why Do They Fail to Change Behaviour? Global Cyber Security Capacity Centre. University of Oxford, Oxford, UK (2014)

    Google Scholar 

  • Becker, H.S.: Outsiders Studies in the Sociology of Deviance. New York: The Free Press (1973)

    Google Scholar 

  • Coombs, W.T.: Protecting organization reputations during a crisis: the development and application of situational crisis communication theory. Corp. Reput. Rev. 10(3), 163–176 (2007)

    Article  Google Scholar 

  • Coombs, W.T., Holladay, S.J.: The Handbook of Crisis Communication, Wiley-Blackwell, John Wiley & Sons, Ltd, Publication (2010)

    Google Scholar 

  • Corradini, I., Nardelli, E.: La reputazione aziendale. Aspetti sociali, di misurazione e di gestione, Franco Angeli (2015)

    Google Scholar 

  • Corradini, I., Nardelli, E.: Is data protection a relevant indicator for measuring corporate reputation? Submitted to: 6th International Conference on Human Factors in Cybersecurity, AHFE, San Diego, California, USA, 16–20 July 2020

    Google Scholar 

  • Chun, R.: Corporate reputation: meaning and measurement. Int. J. Manag. Rev. 7(2), 91–109 (2005)

    Article  MathSciNet  Google Scholar 

  • Dawson, J., Thomson, R.: The future cybersecurity workforce: going beyond technical skills for successful cyber performance. Front. Psychol. 9, 744 (2018)

    Article  Google Scholar 

  • De Loitte Report: Global survey on reputation risk (2014) https://www2.deloitte.com/content/dam/Deloitte/pl/Documents/Reports/pl_Reputation_Risk_survey_EN.pdf

  • European Commission: New report shows digital skills are required in all types of jobs. (2017). https://ec.europa.eu/digital-single-market/en/news/new-report-shows-digital-skills-are-required-all-types-jobs

  • European Commission: The GDPR: new opportunities, new obligations. What every business needs to know about the EU’s General Data Protection Regulation (2018). https://ec.europa.eu/commission/sites/beta-political/files/data-protection-factsheet-sme-obligations_en.pdf

  • Feldman P.M., Bahamonde R.A., Bellido I.V.: A new approach for measuring corporate reputation, RAE. Revista de Administracao de Empresas 54(1), 53–66 (2014)

    Google Scholar 

  • Fink, S.: Crisis Management: Planning for the Inevitable. AMACOM, New York (1986)

    Google Scholar 

  • Fombrun, C.: Reputation: Realizing Value from the Corporate Image. Harvard Business School Press, Boston, MA (1996)

    Google Scholar 

  • Fombrun, C.J., van Riel, C.B.M.: The reputational landscape. Corp. Reput. Rev. 1(1/2), 6–13 (1997)

    Google Scholar 

  • Garcia-Marques, T., Mackie, D.M.: The feeling of familiarity as a regulator of persuasive processing. Soc. Cogn. 18, 9–34 (2001)

    Article  Google Scholar 

  • Haney, J.M., Lutters, W.G.: Skills and characteristics of successful cybersecurity advocates. In: Third Workshop on Security Information Workers (2017)

    Google Scholar 

  • Infanti, J., Sixsmith, J., Barry, M.M., Núñez-Córdoba, J., Oroviogoicoechea-Ortega, C., Guillén-Grima, F.: A Literature Review on Effective Risk Communication for the Prevention and Control of Communicable Diseases in Europe. Stockholm, ECDC (2013)

    Google Scholar 

  • Johansen, W., Aggerholm, H.K., Frandsen, F.: Entering new territory: a study of internal crisis management and crisis communication in organizations. Public Relat. Rev. 38(2), 270–279 (2012)

    Article  Google Scholar 

  • Jøsang, A.: Trust and reputation systems. In: Foundations Security Analysis Design IV, FOSAD 2006/2007-Tutorial Lectures, (Bertinoro, Italy), Springer LNCS 4677 (2007)

    Google Scholar 

  • Lundgren, R.E., McMakin, A.H.: Risk Communication: A Handbook for Communicating Environmental, Safety, and Health Risks. Wiley, Hoboken, NJ (2013)

    Book  Google Scholar 

  • McDonald, N.: Organizational resilience and industrial risk. In: Hollnagel, E., Woods, D.D., Leveson, N. (eds) Resilience Engineering, Concepts and Precepts, pp. 155–180. Ashgate Publishing Limited, Hampshire (2006). ISBN 0-7546-4641-6

    Google Scholar 

  • Pearson, C. M., Mitroff, I.I.: From crisis prone to crisis prepared: a framework for crisis management. Acad. Manag. Rev. 7(1), 48–59 (1993)

    Google Scholar 

  • Ponemon Institute: Cost of a data breach study: global overview (2018). https://www.ibm.com/downloads/cas/861MNWN2

  • Reich, Z., Bentman, M., Jackman, O.: A crisis communication guide for public organisations. In: Vos, M., Lund, R., Reich, Z., Harro-Loit, H. (eds) Developing a Crisis Communication Scorecard. Outcomes of an International Research Project 2008–2011, Jyväskylä Studies in Humanities 152, pp. 265–324. Jyväskylä University Press, Jyväskylä (2011)

    Google Scholar 

  • Reputation Institute: Global RepTrack 100. The World’s Most Reputable Companies (2012)

    Google Scholar 

  • Reputation Institute: What’s on the mind of the CCO when it comes to corporate brand reputation? Reputation Leaders study 2018 (February, 2019)

    Google Scholar 

  • Reuters: Ashley Madison parent in 11, 2 million settlement over data breach (2015). https://www.reuters.com/article/us-ashleymadison-settlement-idUSKBN19Z2F0. Accessed 14 July 2017

  • Ruiter, R.A.C., Kok, G., Verplanken, B., Brug, J.: Evoked fear and effect of appeals on attitudes to performing breast self-examination: an information-processing perspective. Health Educ. Res. 16, 307–319 (2001)

    Article  Google Scholar 

  • Ruiter, R.A., Kessels, L.T., Peters, G.J.Y., Kok, G.: Sixty years of fear appeal research: current state of the evidence. Int. J. Psychol. 49, 63–70 (2014)

    Article  Google Scholar 

  • Seeger, M.W., Sellnow, T.L., Ulmer, R.R.: Communication and Organizational Crisis. Quorum Press, Westport, CT (2003)

    Google Scholar 

  • Soroka, S.N.: Good news and bad news: asymmetric responses to economic information. J. Polit. 68(2), 372–385 (2006)

    Article  Google Scholar 

  • Tannenbaum, M.B., Hepler, J., Zimmerman, R.S., Saul, L., Jacobs, S., Wilson, K., Albarracín, D.: Appealing to fear: a meta-analysis of fear appeal effectiveness and theories. Psychol. Bull. 141(6), 1178–1204 (2015)

    Article  Google Scholar 

  • van der Meer, T.G.L.A., Verhoeven, J.W.M.: Emotional crisis communication. Public Relat Rev. 40, 526–536 (2014)

    Article  Google Scholar 

  • Walsh, F.: Strengthening Family Resilience. Guilford Press, New York (1998)

    Google Scholar 

  • Winkielman, P., Schwarz, N., Fazendeiro, T.A., Reber, R.: The hedonic marking of processing fluency: implications for evaluative judgment. In: Musch, J., Klauer, K.C. (eds.) The Psychology of Evaluation: Affective Processes in Cognition and Emotion, pp. 189–217. Lawrence Erlbaum, Mahwah, NJ (2003)

    Google Scholar 

  • Xu, X., Alexander Jr., R.L., Simpson, S.A., Goates, S., Nonnemaker, J.M., Davis, K.C., McAfee, T.: A cost-effectiveness analysis of the first federally funded antismoking campaign. Am. J. Prev. Med. 48, 318–325 (2015)

    Article  Google Scholar 

  • Zamoum, K., Gorpe, T.S.: Crisis management: a historical and conceptual approach for a better understanding of today’s crises (2018) (interchopen.com)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Isabella Corradini .

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Corradini, I. (2020). Communication is Not an Option. In: Building a Cybersecurity Culture in Organizations. Studies in Systems, Decision and Control, vol 284. Springer, Cham. https://doi.org/10.1007/978-3-030-43999-6_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-43999-6_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-43998-9

  • Online ISBN: 978-3-030-43999-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics