Skip to main content

Beyond Locks and Keys: Structural Equation Modeling Based Framework to Explore Security Breaches Through the Lens of Crime Theories

  • Conference paper
  • First Online:
Networked Systems (NETYS 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14067))

Included in the following conference series:

  • 121 Accesses

Abstract

The current evolution of the cyber-threat ecosystem shows that no organization can be considered invulnerable against security breach. It is therefore important to highlight exogenous factors other than those related to an organization’s security posture to predict security breach incidents.

We present “Beyond Locks and Keys”, a framework that analyzes the projection of crime theories applied in science of victimology, to study the risk of victimization to security breach in cyber space. Factors that could be associated to information security breach in organizations are studied through hypotheses extracted from crime theories. Victimization risk analysis is built by creating a comprehensive profile for each organization, capturing its characteristics, and grouping them in constructs used to measure the likelihood of data breach. We use structural equation modeling and statistical hypothesis testing approach to build our framework. We evaluate the validity of our model on a dataset of 4868 organizations based in the United states (US) collected between the years 2018 and 2020.

“Beyond Locks and Keys” highlights the importance of exogenous factors, besides the technical security ones, that contribute to the understanding of victimization risk to security breach.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 44.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 59.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mansfield-Devine, S.: IBM: cost of a data breach (2022)

    Google Scholar 

  2. Data Breach Report, Tech. rep., Ponemon Institute, IBM (2019)

    Google Scholar 

  3. Thales Data Threat Report, Tech. rep., Thales (2022)

    Google Scholar 

  4. Straub, J.: Evaluating the use of technology readiness levels (TRLS) for cybersecurity systems. In: 2021 IEEE International Systems Conference (SysCon), pp. 1–6. IEEE (2021)

    Google Scholar 

  5. Da Veiga, A., Astakhova, L.V., Botha, A., Herselman, M.: Defining organisational information security culture—perspectives from academia and industry. Comput. Secur. 92, 101713 (2020)

    Google Scholar 

  6. Gupta, R., Tanwar, S., Tyagi, S., Kumar, N.: Machine learning models for secure data analytics: a taxonomy and threat model. Comput. Commun. 153, 406–440 (2020)

    Article  Google Scholar 

  7. Harris, D., Khan, L., Paul, R., Thuraisingham, B.: Standards for secure data sharing across organizations. Comput. Stand. Interfaces 29(1), 86–96 (2007)

    Article  Google Scholar 

  8. Hammouchi, H., Nejjari, N., Mezzour, G., Ghogho, M., Benbrahim, H.: Strisk: a socio-technical approach to assess hacking breaches risk. IEEE Trans. Depend. Secure Comput. 20(2), 1074–1087 (2022)

    Google Scholar 

  9. Hu, J., Vasilakos, A.V.: Energy big data analytics and security: challenges and opportunities. IEEE Trans. Smart Grid 7(5), 2423–2436 (2016)

    Article  Google Scholar 

  10. Wieringa, J., Kannan, P., Ma, X., Reutterer, T., Risselada, H., Skiera, B.: Data analytics in a privacy-concerned world. J. Bus. Res. 122, 915–925 (2019)

    Article  Google Scholar 

  11. Nejjari, N., Lahlou, S., Fadi, O., Zkik, K., Oudani, M., Benbrahim, H.: Conflict spectrum: an empirical study of geopolitical cyber threats from a social network perspective. In: 2021 Eighth International Conference on Social Network Analysis, Management and Security (SNAMS), pp. 01–07. IEEE (2021)

    Google Scholar 

  12. Natarajan, M.: Crime opportunity theories: routine activity, rational choice and their variants. Routledge (2017)

    Google Scholar 

  13. Felson, M., Clarke, R.V.: Opportunity makes the thief, police research series, paper 98 (1–36) (1998) 10

    Google Scholar 

  14. Miethe, T.D., Meier, R.F.: Crime and its social context: toward an integrated theory of offenders, victims, and situations. Suny Press (1994)

    Google Scholar 

  15. Hindelang, M.J., Gottfredson, M.R., Garofalo, J.: Victims of personal crime: an empirical foundation for a theory of personal victimization. Ballinger Cambridge, MA (1978)

    Google Scholar 

  16. Cohen, L.E., Felson, M.: Social change and crime rate trends: a routine activity approach, American sociological review 588–608 (1979)

    Google Scholar 

  17. Alshalan, A.: Cyber-crime fear and victimization: an analysis of a national survey

    Google Scholar 

  18. Yang, Y., Green, S.B.: Coefficient alpha: a reliability coefficient for the 21st century? J. Psycho Educ. Assess. 29(4), 377–392 (2011)

    Article  Google Scholar 

  19. Canatay, A., Emegwa, T., Lybolt, L.M., Loch, K.D.: Reliability assessment in SEM models with composites and factors: a modern perspective. Data Anal. Perspect. J. 3(1), 1–6 (2022)

    Google Scholar 

  20. Babin, B.J., Svensson, G.: Structural equation modeling in social science research: issues of validity and reliability in the research process. Eur. Bus. Rev. 24(4), 320–330 (2012)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Narjisse Nejjari .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Nejjari, N., Zkik, K., Benbrahim, H., Ghogho, M. (2023). Beyond Locks and Keys: Structural Equation Modeling Based Framework to Explore Security Breaches Through the Lens of Crime Theories. In: Mohaisen, D., Wies, T. (eds) Networked Systems. NETYS 2023. Lecture Notes in Computer Science, vol 14067. Springer, Cham. https://doi.org/10.1007/978-3-031-37765-5_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-37765-5_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-37764-8

  • Online ISBN: 978-3-031-37765-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics