The role of cognitive biases in anticipating and responding to cyberattacks
Information Technology & People
ISSN: 0959-3845
Article publication date: 8 January 2019
Issue publication date: 30 January 2019
Abstract
Purpose
The purpose of this paper is to explore the role of four cognitive biases, namely, selective perception, exposure to limited alternatives, adjustment and anchoring, and illusion of control in anticipating and responding to Distributed-Denial-of-Service (DDoS) attacks.
Design/methodology/approach
The paper is based on exploratory case study research and secondary data on decision making in the Australian Bureau of Statistics (ABS) in regards to planning and managing DDoS attacks on Census day in 2016.
Findings
Cognitive biases limited the ABS’s awareness of the eCensus system’s vulnerabilities, preparation for and management of DDoS attacks. Cyberattacks are on the increase, and managers should expect and be prepared to deal with them.
Research limitations/implications
Due to the sensitivity of the topic, it was not possible to interview relevant stakeholders. Analysis is based on high-quality secondary data that includes comprehensive government reports investigating the events on Census day.
Practical implications
Cyberattacks are inevitable and not an aberration. A checklist of actions is identified to help organisations avoid the failures revealed in the case study. Managers need to increase their awareness of cyberattacks, develop clear processes for dealing with them and increase the robustness of their decision-making processes relating to cybersecurity.
Originality/value
This the authors believe that it is the first major study of the DDoS attacks on the Australian census. DDoS is a security reality of the twenty-first century and this case study illustrates the significance of cognitive biases and their impact on developing effective decisions and conducting regular risk assessments in managing cyberattacks.
Keywords
Citation
Ceric, A. and Holland, P. (2019), "The role of cognitive biases in anticipating and responding to cyberattacks", Information Technology & People, Vol. 32 No. 1, pp. 171-188. https://doi.org/10.1108/ITP-11-2017-0390
Publisher
:Emerald Publishing Limited
Copyright © 2019, Emerald Publishing Limited