Wicked security behaviour change problems

Concept of Wicked Problems:

  • Definition: Wicked problems are complex issues that defy straightforward solutions. They are often interlinked with other problems, and any attempt to address them can lead to unforeseen consequences. The term was introduced by Rittel and Webber in 1973.
  • Characteristics: They are difficult to define clearly, solutions are not easily identified or implemented, and each solution may create new problems.

Cybersecurity as a Wicked Problem:

  • Complexity: Cybersecurity involves a vast array of threats, actors, technologies, and behaviors. This complexity makes it challenging to develop one-size-fits-all solutions.
  • Behavior Change: Since cybersecurity is a wicked problem, influencing user behavior is crucial. Security practices need to adapt to the evolving threat landscape and varied user behaviors.

Relevant Literature:

  1. Carr, M., & Lesniewska, F. (2020). “Internet of Things, cybersecurity and governing wicked problems: Learning from climate change governance.” International Relations, 34(3), 391–412.
    • Summary: This paper explores how concepts from climate change governance can be applied to cybersecurity. It highlights that both areas share characteristics of wicked problems, including the need for adaptive and multifaceted approaches.
    • Key Points:
      • Governance: Effective governance strategies for wicked problems involve iterative processes, stakeholder engagement, and adaptive policies.
      • Lessons from Climate Change: The paper suggests learning from climate change management strategies, such as multi-level governance and integrating diverse stakeholder perspectives, to tackle cybersecurity challenges.

Implications for Cybersecurity Behavior Change:

  • Adaptive Solutions: Security measures and behavior change interventions must be flexible and responsive to new threats and vulnerabilities.
  • Stakeholder Engagement: Engaging with various stakeholders, including users, organizations, and policymakers, helps address diverse needs and perspectives.
  • Iterative Approach: Continuous assessment and adjustment of strategies are necessary to manage the evolving nature of cybersecurity threats.

Further Reading:

  • Rittel, H. W. J., & Webber, M. M. (1973). “Dilemmas in a General Theory of Planning.” Policy Sciences, 4(2), 155-169.
    • Summary: This foundational paper defines wicked problems and discusses their implications for policy and planning.

By understanding and addressing cybersecurity as a wicked problem, practitioners can better design interventions and strategies to manage rather than solve these complex issues.

4o mini

Leave a Comment

Your email address will not be published. Required fields are marked *