Diversity and Behaviour Change

1. Capabilities and Resources in Cybersecurity

The paper by Chowdhury and Renaud (2023), titled “‘Ought’ Should Not Assume ‘Can’? Basic Capabilities in Cybersecurity to Ground Sen’s Capability Approach,” explores how capability and resource constraints shape cybersecurity behaviors. Drawing on Amartya Sen’s Capability Approach, the authors argue that individuals’ ability to engage in secure online behavior is heavily influenced by the resources and capabilities they possess.

Key Concepts from the Paper:

  • Capability Approach: Amartya Sen’s Capability Approach emphasizes the importance of enabling individuals to achieve the kind of lives they value. In the context of cybersecurity, this means ensuring that users have the necessary skills, knowledge, and resources to protect themselves online.
  • Basic Capabilities: The paper discusses the concept of “basic capabilities” in cybersecurity, which refers to the fundamental abilities and resources that individuals need to participate safely in the digital world. These include access to technology, digital literacy, and awareness of cybersecurity risks.
  • Resource Constraints: The authors highlight that resource constraints—such as financial limitations, lack of access to education, or inadequate infrastructure—can significantly hinder an individual’s ability to adopt secure behaviors. For example, a user without access to up-to-date software may be more vulnerable to cyber threats.

Implications for Behaviour Change:

  • Context-Specific Interventions: Behavior change programs in cybersecurity need to be tailored to the specific capabilities and resources of the target audience. A one-size-fits-all approach is ineffective because it does not account for the diverse needs and limitations of different user groups.
  • Empowerment through Education: Enhancing digital literacy and providing access to necessary resources can empower users to engage in more secure behaviors. Educational initiatives should focus on building the basic capabilities needed for cybersecurity.

2. Universal Barriers Framework

U. Schauberger’s (2023) Universal Barriers Framework identifies 11 potential sites where barriers to digital access and technology use might occur. These barriers are closely related to gaps in an individual’s capabilities and resources, which can prevent them from adopting secure online behaviors.

The 11 Sites of Barriers:

  1. Access to Technology: Barriers related to the availability and affordability of devices and internet access.
  2. Digital Literacy: Challenges stemming from a lack of skills or knowledge to use technology effectively.
  3. Language: Difficulties caused by language barriers, particularly for non-native speakers using digital platforms.
  4. Cultural Norms: Cultural differences that may influence attitudes towards technology and security.
  5. Socioeconomic Status: Economic constraints that limit access to technology and secure practices.
  6. Physical and Cognitive Disabilities: Accessibility issues for individuals with disabilities.
  7. Age: Differences in technology adoption and cybersecurity awareness across age groups.
  8. Geographical Location: Barriers related to living in remote or underdeveloped areas with limited infrastructure.
  9. Trust and Privacy Concerns: Reluctance to engage with digital platforms due to concerns about privacy and trust.
  10. Gender: Gender-specific challenges, such as reduced access to education or technology in some regions.
  11. Institutional Support: Lack of support from institutions, such as inadequate public policies or educational programs.

Using the Universal Barriers Framework for Behaviour Change:

  • Targeted Interventions: By identifying the specific barriers faced by a user group, behavior change practitioners can design targeted interventions to overcome these obstacles. For example, providing digital literacy training in local languages can help overcome language barriers.
  • Holistic Approach: Addressing multiple barriers simultaneously can create a more comprehensive and effective behavior change program. For instance, combining access to technology with education on cybersecurity practices can empower users to protect themselves online.
  • Inclusive Design: Ensuring that cybersecurity tools and educational materials are designed to be accessible to all, including individuals with disabilities, can help reduce barriers to secure behavior.

Book Reference:

  • “The Human Factor of Cybercrime” edited by Rutger Leukfeldt and Thomas J. Holt: This book explores the human elements that influence cybersecurity behavior, including diversity, capabilities, and barriers to secure practices. It provides insights into designing effective behavior change interventions by considering the diverse needs of different user groups.

Conclusion:

Diversity plays a crucial role in shaping cybersecurity behaviors, as individuals’ capabilities and resources vary widely. By understanding these differences and addressing the barriers identified in the Universal Barriers Framework, behavior change practitioners can design more effective and inclusive interventions. This approach ensures that cybersecurity measures are relevant and accessible to all, leading to a more secure digital environment.

Leave a Comment

Your email address will not be published. Required fields are marked *