The Cultural Dimension of Cyber Threats

Country-specific aspects of cybercrime.

The number of cyber attacks on businesses, governments and individuals is increasing worldwide. The human being in his cultural environment is an important element. Different cultures seem to be associated with different susceptibilities.

by JOCHEN WERNE – Original published in German at Der Bank-Blog – Translation with DeepL.com

In its annual management report „The Situation of IT Security in Germany“, the Federal Office for Information Security records a threatening scenario: The number of cyber attacks on the federal government, German industry and private individuals is increasing at an alarming rate. Germany, in particular, is being massively targeted by criminal hackers.

One thing is certain: almost 90 percent of all cyber attacks have a criminal background. Approximately ten percent of all cyber attacks are caused by state cyber warriors. The goal of criminals is either personal data (account connections, credit card numbers, passwords, etc.) or capturing the computer for new attacks via bot network or to extort ransom money for the renewed release of the computer. The ransomware „Wannacry“ is an equally prominent and frightening example of this. If state systems become the target of hackers, this usually results in sabotage, espionage and the spying out of trade secrets. The BSI discovered 800 million malicious programs for computer systems last year. In the previous year, the figure was 600 million – around 400,000 malware variants are added daily.

Cyber Security and the Human-Cultural Factor

The view must be directed to an important dimension of the human factor: The influence of different cultures on the handling of technology and in particular on the behaviour of individuals in the context of cyber security. Cultural peculiarities influence preferences, prejudices and behaviours. In his renowned book „The Culture Code“, anthropologist and marketing expert Dr. Clotaire Rapaille explores how members of different nationalities have developed very different codes for the image of products, companies or countries.

These findings come from client assignments in which Dr Rapaille conducted extensive interviews with focus groups to identify cultural preferences, prejudices, idiosyncrasies and behaviors. In more in-depth analyses, a piece of generalized psycho-cultural characteristics is then derived from representatives of the countries studied.

Country-specific aspects of cybercrime

Questions arise as to what protective concepts and guidelines might look like that take this background into account appropriately? And what role do cultural and country-specific aspects play here, such as the famous „German Angst“ and corporate cultural aspects, such as the comparison of a classical hierarchical system versus Holacracy models, which have become increasingly en vogue in times of digital transformation?

Some concise examples from the findings of Dr. Rapaille: Americans define themselves strongly through their work. In this culture, professional activity largely determines the image of one’s own identity. The importance of money in this culture is proof of diligence and success.

The author sees completely different meanings in European countries. In France, for example, work and money are regarded more as „necessary means to an end“ – those who can afford it expect at least a certain amount of entertainment and comfort from their job there. According to Dr. Rapaille, quality and technical perfection play an important and in some cases even absolute role in Germany or Japan, while US-Americans, according to his analyses, in many cases content themselves with „It just works“ and are even sceptical about excessive perfection.

The author recognizes the Germans‘ tendency towards perfectionism, which is partly exaggerated from a foreign point of view, as decisive for the quality of „German Engineering“ and the global economic success of the Germans in this field. Dr. Rapaille is convinced that US culture, on the other hand, is characterized by a widespread refusal to grow up, which in turn leads to a great competitive advantage in the field of innovation.

Conclusions for more cyber security

This raises the question what are the appropriate protection concepts in an increasingly complex threat situation. A classic approach is the definition and enforcement of policies, both on a technical and organizational level, which are intended to guarantee compliance with security measures. The more hierarchically and authoritatively a corporate culture is aligned, the more restrictive the corresponding guidelines usually become.

However, the approach of establishing security primarily through bans and restrictions on user freedoms has proven to be double-edged in practice. The more the possibilities of an individual user are restricted, the more this encourages the tendency to escape the corset of safety-related rules.

A typical consequence is the „Bring Your Own Device“ (BYOD) problem with which many company IT departments have been confronted for years – if the functions and authorizations of their work equipment are too limited, users bring private end devices with them to the workplace. These are then often not integrated at all into the protection and security concepts of the company. If the BYOD escape route is also suppressed, such measures often result in a refusal attitude à la „The desired is not possible with the means available – if the IT department wants it that way, then this task cannot be solved“.

Flat hierarchies and personal responsibility as a solution?

Is the better way, then, in holacracy models, in flat hierarchies, or in „loose reins“ in terms of security and a strengthening of employees‘ personal responsibility?

For the reasons derived in the preceding sections, this approach is by no means a guarantee for higher IT and information security. A healthy middle course could lie in adequate risk management. Technical and organisational security measures take into account the hazard level of specific data and applications. Sensitive areas and particularly sensitive data are subject to more stringent security measures, business areas or processes with less sensitivity are also protected, but assign employees a higher degree of personal responsibility. All protective measures take into account the above-mentioned psychological and cultural-historical findings.


more insights

Competence NOW: The DATA LITERACY CHARTA

Data literacy encompasses the data skills that are important for all people in a world shaped by digitalisation. It is an indispensable part of general education. With the Data Literacy Charter, the signatories express the common understanding of data literacy in the sense of comprehensive data literacy and its importance in educational processes. This understanding is in line with the Federal Government’s data strategy and with the Berlin Declaration on the Digital Society.

Read more >

Peacefully administering a continent together – an inspiring reality

The Hague, 7 December 2018 – An exciting part of The Netherlands’ 2018 Polar Symposium has been the ceremonial presentation of the Antarctic Blanc expedition flag to the Arctic Ambassador of The Netherlands, Ms. Carola Van Rijnsoever by a delegation of the Global Offshore Sailing. This special occasion recognized the commitment of The Netherlands in preserving Antarctica as a natural reserve, devoted to peace and science. In addition, it’s has also been an opportunity to remember the explorers, scientists and sailors who set foot on the Antarctic continent to discover and made us all aware how beautiful and equally important this ecosystem and its protection for our planet is.

Read more >

You’re the captain, but with what ship and crew?

In 1971, the BBC aired a series about James Onedin, a ship captain who navigated the turbulent waters of industrialization and the transition from sailing to steamships. Set in Victorian England in the late 19th century, the series illustrates the complexities of a shifting market, with new technologies and skill sets, rising conflicts between entrepreneurs and managers, and strategic changes amid shrinking margins—challenges that faced those determined to keep their traditional sailing ships afloat. The captain’s role was to deliver his ship, crew, and cargo safely and efficiently to the destination. But what happens when the ship can’t compete, and rivals dominate the seas with new, innovative vessels? What if the shipowner lacks the resources or trust to adopt new technologies? And what of the crew—do they have the skills needed to operate the new ships? This scenario is familiar to many business leaders across industries. Companies today are confronting a rapidly evolving market landscape where traditional business models are often strained by rising operational costs, increased competition, and rapidly changing customer expectations. In this environment, businesses must constantly adapt to remain competitive.

Read more >