2022
DOI: 10.1177/1071181322661490
|View full text |Cite
|
Sign up to set email alerts
|

Opportunity Cost of Action Bias in Cybersecurity Incident Response

Abstract: The hours and days immediately following the discovery of a cyber intrusion can be stressful and chaotic for victims. Without a documented and well-rehearsed incident response plan, people are prone to costly fear-based reactions. Action bias is the human tendency to favor action over inaction. It feels better for victims to do something even if rushed decisions are suboptimal to thoughtful, careful alternatives. Furthermore, the null baseline of doing nothing or watchful waiting can sometimes be advantageous.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(7 citation statements)
references
References 15 publications
0
1
0
Order By: Relevance
“…According to the Federal Bureau of Investigations, cybercrime accounted for a total loss of $27.6 billion in 2022 [6]. By limiting the resources an adversary has at their disposal in a process called sludge, organizations are able to manipulate the very psychology of an attacker to avoid or slow potential attacks [7]. This can be as simple as a warning or notice explaining that a user will be trespassing which reinforces that what the hacker is doing is wrong.…”
Section: Behavioral Sciencesmentioning
confidence: 99%
See 3 more Smart Citations
“…According to the Federal Bureau of Investigations, cybercrime accounted for a total loss of $27.6 billion in 2022 [6]. By limiting the resources an adversary has at their disposal in a process called sludge, organizations are able to manipulate the very psychology of an attacker to avoid or slow potential attacks [7]. This can be as simple as a warning or notice explaining that a user will be trespassing which reinforces that what the hacker is doing is wrong.…”
Section: Behavioral Sciencesmentioning
confidence: 99%
“…Conversely, high-interaction honeypots like Sebek & HonSSH offer attackers real operating systems, facilitating deeper engagement and analysis [11]. These systems exemplify the strategic deployment of cyber deception to study and mitigate cyber threats effectively [7].…”
Section: Behavioral Sciencesmentioning
confidence: 99%
See 2 more Smart Citations
“…Participants incurred more cost to the system in the loss frame, as putting machines into quarantine was generally avoided more than bringing them out (Bos et al 2016). Other factors of decision-making, such as action-bias and opportunity costs have also been examined in defensive contexts (Dykstra, Shortridge, Met, & Hough, 2022a).…”
Section: Introductionmentioning
confidence: 99%