Decision-Makers’ Understanding of Cyber-Security’s Systemic and Dynamic Complexity: Insights from a Board Game for Bank Managers
Abstract
:1. Introduction
2. Background
3. Method
3.1. System Dynamics
3.2. System Analysis
3.3. Model Development and Validation
3.4. Game Design
3.4.1. Setting
- Four Bank Defenders (blue team):
- The Security Engineer (SecEng) is responsible for selecting, investing, maintaining and decommissioning security capabilities to protect the bank from specific attacks;
- The Development and Operation (DevOps) manager is responsible for maintaining the business operations supporting customer transactions as well as responding to incidents;
- The Cyber Emergency Response Team (CERT) manager is responsible for reacting to cyber-security incidents by proactively analysing threat intelligence and improving responsive policies, or reactively responding to incidents;
- The Chief Executive Officer (CEO) is responsible for budget allocation, gaining and maintaining customers, reporting on cyber-incidents and the financial performance of the internet bank.
- One Attacker (red team’s only player): this player analyses the blue team’s behaviour and selects a set of attack playing cards. These cards represent the attacks on the internet bank.
- The Facilitator: this role oversees data gathering, supports the game process and explains the rules to the players. The facilitators received ten hours of training.
3.4.2. Round Sequence
3.4.3. Game Board
3.4.4. Winning Criteria
3.4.5. Gameplay Testing and Validation
“This budget process is like our organisation. We have the same struggle.”
“Yes, these are actually the dependencies I observe within our organisation.”
“This is very realistic! We should play this with the people in my network.”
4. Results and Analysis
4.1. Empirical Evidence from Gameplay and Questionnaires
4.2. Game Observation Results
DevOps: “We have got more Security Engineers than DevOps Engineers”;
DevOps: “We need more, too much here, too much there. This is killing us”;
CEO: “Are you sure, 24 CERT resources? 24?”, CERT manager: “You are the CEO!”
5. Discussion
6. Limitations and Future Research
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Appendix A. Self-Evaluation Questionnaire
Please indicate what level and capabilities you have in your organisation | ||||||
Capability | Level 1 | Level 2 | Level 3 | Level 4 | Level 5 | |
Security Event Monitoring | ||||||
Identity & Access MGT | ||||||
Vulnerability Management | ||||||
DDOS Protection | ||||||
Malware Protection | ||||||
E-Banking Fraud Protection | ||||||
Secure Prog. & Testing | ||||||
Key Management | ||||||
Awareness | ||||||
Please indicate what possible strategies are important to you and how well they were executed by your team | ||||||
Strategic Importance | 1 Very Important | 2 | 3 Average | 4 | 5 Not Important | |
Prevent Cyber Attacks | ||||||
Respond to Cyber Attacks | ||||||
Serve Customers | ||||||
Lowest Costs | ||||||
Strategy Execution | 1 Very Well Executed | 2 | 3 Average | 4 | 5 Very Poor Executed | |
Prevent Cyber Attacks | ||||||
Respond to Cyber Attacks | ||||||
Serve Customers | ||||||
Lowest Costs | ||||||
What went well and why: | ||||||
What went wrong and why: | ||||||
Number of intervention cards received from facilitator: |
Appendix B. Gameboard
References
- Christina, Y.; Jeonga, C.Y.; Leeb, S.T.; Lim, J. Information security breaches and IT security investments: Impacts on competitors. Inf. Manag. 2019, 56, 681–695. [Google Scholar]
- Goel, S.; Williams, K.J.; Huang, J.; Warkentin, M. Can financial incentives help with the struggle for security policy compliance? Inf. Manag. 2021, 58, 103447. [Google Scholar] [CrossRef]
- Ritcher, F. 200,000+ Systems Affected by WannaCry Ransom Attack. Available online: https://www.statista.com/chart/9399/wannacry-cyber-attack-in-numbers (accessed on 21 December 2021).
- GReAT. The Great Bank Robbery: The Carbanak APT. Available online: https://securelist.com/the-great-bank-robbery-the-carbanak-apt/68732/ (accessed on 21 December 2021).
- Modderkolk, H. Het Is Oorlog Maar Niemand Die Het Ziet; Uitgeverij Podium: Amsterdam, The Netherlands, 2019. [Google Scholar]
- Armenia, S.; Angelini, M.; Nonino, F.; Palombi, G.; Schlitzer, M.F. A dynamic simulation approach to support the evaluation of cyber risks and security investments in SMEs. Decis. Support Syst. 2021, 147, 113580. [Google Scholar] [CrossRef]
- Goel, S.; Shawky, H.A. Estimating the market impact of security breach announcements on firm values. Inf. Manag. 2009, 46, 404–410. [Google Scholar] [CrossRef]
- Zeijlemaker, S. Exploring the dynamic complexity of the cyber-security economic equilibrium. In Proceedings of the 34th International Conference of the System Dynamics Society, Delft, The Netherlands, 17–21 July 2016. [Google Scholar]
- Zeijlemaker, S. Cyber-Security Quantification: Founding a Structural Understanding of Its Dynamic Complexity; Radboud University: Nijmegen, The Netherlands, 2017. [Google Scholar]
- Zeijlemaker, S.; Uriega, J.D.; Kilanc, G.P. Malware dynamics: How to develop a successful anti-malware defence reference architecture policy. In Proceedings of the 36th International Conference of the System Dynamics Society, Reykjavik, Iceland, 6–10 August 2018. [Google Scholar]
- Srinidhi, B.; Yan, J.; Tayi, G.K. Allocation of resources to cyber-security: The effect of misalignment of interest between managers and investors. Decis. Support Syst. 2015, 75, 49–62. [Google Scholar] [CrossRef]
- Moore, T. The economics of cybersecurity: Principles and policy options. Int. J. Crit. Infrastruct. Prot. 2010, 3, 103–117. [Google Scholar] [CrossRef]
- Zhou, Y.; Solak, S. Measuring and Optimizing Cybersecurity Investments: A Quantitative Portfolio Approach. In Proceedings of the 2014 Industrial and Systems Engineering Research Conference, Montréal, Canada, 31 May–3 June 2014. [Google Scholar]
- Anderson, R.; Barton, C.; Böhme, R.; Clayton, R.; van Eeten, M.J.G.; Levi, M.; Moore, T.; Savage, S. Measuring the Cost of Cybercrime. In The Economics of Information Security and Privacy; Springer: Berlin/Heidelberg, Germany, 2013; pp. 265–300. [Google Scholar]
- Schneier, B. CYA Security, Schneier on Security. Available online: https://www.schneier.com/blog/archives/2007/02/cya_security_1.html (accessed on 30 August 2015).
- Tongia, R.; Kanika, J. Investing in Security—Do not rely on FUD. Inf. Syst. Control. J. 2003, 5. Available online: https://www.researchgate.net/profile/Rahul-Tongia/publication/238746543_Investing_in_Security-Do_Not_Rely_on_FUD/links/559e759508aea946c06a0880/Investing-in-Security-Do-Not-Rely-on-FUD.pdf (accessed on 21 December 2021).
- Sterman, J. Modeling Managerial Behavior: Misperceptions of Feedback in a Dynamic Decision-making Experiment. Manag. Sci. 1989, 35, 321–339. [Google Scholar] [CrossRef] [Green Version]
- Sterman, J. Teaching Takes off: Flight Simulators for Management Education “The Beer Game”, October 1992. Available online: http://web.mit.edu/jsterman/www/SDG/beergame.html (accessed on 21 December 2021).
- Vennix, J.A.M. Group Model Building, Facilitating Team Learning Using System Dynamics; John Wiley & Sons Ltd.: Hoboken, NJ, USA, 1996. [Google Scholar]
- Sterman, J.D. Learning from Evidence in a Complex World. Am. J. Public Health 2006, 96, 505–514. [Google Scholar] [CrossRef]
- Moore, T.; Duynes, S.; Chang, F.R. Identifying How Firms Manage Security Investment. In Proceedings of the Workshop on the Economics of Information Security (WEIS), Berkeley, CA, USA, 13–14 June 2016. [Google Scholar]
- Hendrix, M.; Al-Sherbaz, A.; Bloom, V. Game Based Cyber-Security Training: Are Serious Games suitable for cyber-security training? Int. J. Serious Games 2016, 3, 53–61. [Google Scholar] [CrossRef]
- Wouters, P.; van Nimwegen, C.; van Oostendorp, H.; van der Spek, E.D. A meta-analysis of the cognitive and motivational effects of serious games. J. Educ. Psychol. 2013, 105, 249–265. [Google Scholar] [CrossRef] [Green Version]
- Tseng, S.S.; Yang, T.Y.; Wang, Y.J. Designing a Cyber-security Board Game Based on Design Thinking Approach. In International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing. Advances in Intelligent Systems and Computing; Barolli, L., Xhafa, F., Javaid, N., Enokido, T., Eds.; Springer: Cham, Switzerland, 2019; pp. 642–650. [Google Scholar] [CrossRef]
- Olano, M.; Sherman, A.; Oliva, L.; Cox, R.; Firestone, D.; Kubik, O.; Patil, M.; Saymour, J.; Sohn, I.; Thomas, D. Security Empire: Development and Evaluation of a Digital Game to Promote Cyber-Security Education. In Proceedings of the 2014 USENIX Summit on Gaming, Games and Gamification in Security Education, San Diego, CA, USA, 18 August 2014. [Google Scholar]
- Falco, G.; Eling, M.; Jablanski, D.; Miller, V.; Gordon, L.A.; Wang, S.F.; Schmit, J.; Thomas, R.; Elvedi, M.; Maillart, T.; et al. A Research Agenda for Cyber Risk and Cyber Insurance. In Proceedings of the 2019 Workshop on the Economics of Information Security, Boston, MA, USA, 3–4 June 2019. [Google Scholar]
- Kenneally, E.; Randazzese, L.; Balenson, D. Cyber Risk Economics Capability Gaps Research Strategy. United States Department of Homeland Security; Science and Technology Directorate: Washington, DC, USA, 2018. [Google Scholar] [CrossRef]
- Sterman, J. Business Dynamics: Systems Thinking and Modeling for a Complex World; Irwin/McGraw-Hill: Boston, MA, USA, 2000. [Google Scholar]
- Neth, H.; Gigerenzer, G. Heuristics: Tools for an Uncertain World Emerging. In Trends in the Social and Behavioral Sciences; Scott, R., Kosslyn, S., Eds.; John Wiley & Sons, Inc.: Hoboken, NJ, USA, 2015; ISBN 978-1-118-90077-2. [Google Scholar]
- Tversky, A.; Kahneman, D. Judgement under uncertainty: Heuristic and biases. Or. Inst. Res. Bull. 1973, 13, 1. [Google Scholar]
- Kahneman, D.; Slovic, P.; Tversky, A. Judgement under Uncertainty: Heuristics and Biases; Cambridge University Press: Cambridge, UK, 1982; ISBN 9780511809477. [Google Scholar]
- Myers, D.G. Social Psychology; McGraw-Hill Higher Education: New York, NY, USA, 2010. [Google Scholar]
- Gröβler, A.; Bleijenberg, I.; Vennix, J. 10 Years on Average Doesn’t Mean 10 Years in Any Case—An Experimental Investigation of People’s Understanding of Fixed and Continuous Delays. In Proceedings of the International System Dynamics Conference, Washington, DC, USA, 24–28 July 2011. [Google Scholar]
- Martinez-Moyano, I.J.; Morrison, D.; Sallach, D. Modeling Adversarial Dynamics. In Proceedings of the 2015 Winter Simulation Conference, Huntington Beach, CA, USA, 6–9 December 2015. [Google Scholar]
- Repenning, N.P.; Sterman, J.D. Capability Traps and Self-Confirming Attribution Errors in the Dynamics of Process Improvement. Adm. Sci. Q. 2002, 47, 265–295. [Google Scholar] [CrossRef]
- Hofstede, G. Management control of public and not-for-profit activities. Account. Organ. Soc. 1981, 6, 193–211. [Google Scholar] [CrossRef] [Green Version]
- Kahneman, D.; Tversky, A. Prospect Theory: An Analysis of Decision Under Risk. Econometrica 1979, 47, 263–292. [Google Scholar] [CrossRef] [Green Version]
- Rosoff, H.; Cui, J.; John, R.S. Heuristics and biases in cyber security dilemmas. Environ. Syst. Decis. 2013, 33, 517–529. [Google Scholar] [CrossRef]
- Gomez, M.A.; Villar, E.B. Fear, Uncertainty, and Dread: Cognitive Heuristics and Cyber Threats. Politics Gov. 2018, 6, 61–72. [Google Scholar] [CrossRef]
- Van Schaik, P.; Renaud, K.; Wilson, C.; Jansen, J.; Onibokun, J. Risk as affect: The affect heuristic in cybersecurity. Comput. Secur. 2020, 90, 101651. [Google Scholar] [CrossRef]
- Jalali, M.S.; Siegel, M.; Madnick, S. Decision-making and Biases in Cyber-security Capability Development: Evidence from a Simulation Game Experiment. J. Strateg. Inf. Syst. 2017, 28, 66–82. [Google Scholar] [CrossRef]
- Forrester, J. Industrial Dynamics; Massachusetts Institute of Technology Press: Cambridge, MA, USA, 1961. [Google Scholar]
- Sterman, J.D.; Meadows, D. STRATAGEM-2. Simul. Games 1985, 16, 174–202. [Google Scholar] [CrossRef] [Green Version]
- Duggan, J. An Introduction to System dynamics. In System Dynamics Modeling with R; Springer: Cham, Switzerland, 2016; pp. 1–24. [Google Scholar] [CrossRef] [Green Version]
- Pruyt, E. Small System Dynamics Models for Big Issues: Triple Jump towards Real World Complexity; TU Delft Library: Delft, The Netherlands, 2013; 324p. [Google Scholar]
- Lane, D.C. On a resurgence of management simulations and games. J. Oper. Res. Soc. 1995, 46, 604–625. [Google Scholar] [CrossRef]
- Meadows, D. A brief and incomplete history of operational gaming in system dynamics. Syst. Dyn. Rev. 2007, 23, 199–203. [Google Scholar] [CrossRef]
- Cunico, G.; Aivazidou, E.; Mollona, E. System dynamics gamification: A proposal for shared principles. Syst. Res. Behav. Sci. 2021. preprint. [Google Scholar] [CrossRef]
- Papathanasiou, J.S.; Armenia, S.; Barnabè, F.; Carlini, C.; Ciobanu, N.; Digkoglou, P.; Jarzabek, L.; Kulakowska, M.; Lanzuisi, A.; Morfoulaki, M.; et al. Game Based Learning on Urban Sustainability: The “Sustain” Project. In Proceedings of the 11th International Conference on Education and New Learning Technologies, Palma, Spain, 1–3 July 2019. [Google Scholar] [CrossRef] [Green Version]
- Connolly, T.M.; Boyle, E.A.; MacArthur, E.; Hainey, T.; Boyle, J.M. A systematic literature review of empirical evidence on computer games and serious games. Comput. Educ. 2012, 59, 661–686. [Google Scholar] [CrossRef]
- Qudrat-Ullah, H. Perceptions of the effectiveness of system dynamics-based interactive learning environments: An empirical study. Comput. Educ. 2010, 55, 1277–1286. [Google Scholar] [CrossRef]
- Martinez-Moyano, I.J.; Conrad, S.H.; Andersen, D.F. Modeling behavioral considerations related to information security. Comput. Secur. 2011, 30, 397–409. [Google Scholar] [CrossRef]
- Bier, A.; Anderson, B. Cooperation and Learning in Cyber-security Training Exercises. In Proceedings of the 31st International Conference of the System Dynamics Society, Cambridge, MA, USA, 21–25 July 2013. [Google Scholar]
- Armenia, S.; Franco, E.F.; Nonino, F.; Spagnoli, E.; Medaglia, C.M. Towards the Definition of a Dynamic and Systemic Assessment for Cybersecurity Risks. Syst. Res. Behav. Sci. 2018, 36, 404–423. [Google Scholar] [CrossRef]
- Zeijlemaker, S. Unravelling the Dynamic Complexity of Cyber-Security: Towards Identifying Core Systemic Structures Driving Cyber-Security Investment Decision-Making. Ph.D. Thesis, Radboud University, Nijmegen, The Netherlands, 16 March 2022. [Google Scholar]
- Andersen, D.; Moore, A.P.; Stanton, J.M.; Cappelli, D.M.; Rich, E.; Weaver, E.A.; Gonzalez, J.J.; Sarriegui, J.M.; Zagonel, A.; Mojtahedzadeh, M.; et al. Preliminary System Dynamics Maps of the Insider Cyber-threat Problem. In Proceedings of the 22nd International Conference of the Systems Dynamics Society, Oxford, UK, 25–29 July 2004; pp. 1–36. [Google Scholar]
- Armenia, S.; Cardazzone, A.; Carlini, C. Understanding Security Policies in the Cyber Warfare Domain through System Dynamics. In Proceedings of the 4th International Defense and Homeland Security Simulation Workshop (DHSS 2014), International Multidisciplinary Modeling and Simulation Multi-conference (I3M 2014), Bordeaux, France, 10–12 September 2014. [Google Scholar]
- ISACA. CISM Review Manual 2015; ISACA: Rolling Meadows, IL, USA, 2015. [Google Scholar]
- Baskerville, R.; Spagnoletti, P.; Kim, J. Incident-centered information security: Managing a strategic balance between prevention and response. Inf. Manag. 2014, 51, 138–151. [Google Scholar] [CrossRef]
- Böhme, R.; Moore, T. The Iterated Weakest Link, a Model of Adaptive Security Investment. J. Inf. Sci. 2016, 7, 81–102. [Google Scholar] [CrossRef] [Green Version]
- Su, X. An Overview of Economic Approaches to Information Security Management; University of Twente, Information System Group: Enschede, The Netherlands, 2006. [Google Scholar]
- Chismon, D.; Ruks, M. Threat Intelligence: Collecting, Analysing, Evaluating; MWR Info Security: Basingstoke, UK, 2015. [Google Scholar]
- Syed, R. Cybersecurity vulnerability management: A conceptual ontology and cyber intelligence alert system. Inf. Manag. 2020, 57, 103334. [Google Scholar] [CrossRef]
- Vogus, J.T.; Sutcliffe, K.M. Organisational resilience: Towards a theory and research agenda. In Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, Montréal, QC, Canada, 7–10 October 2007. [Google Scholar]
- Linkov, I.; Bridges, T.S.; Creutzig, F.; Decker, J.; Fox-Lent, C.; Kröger, W.; Lambert, J.H.; Levermann, A.; Montreuil, B.; Nathwani, J.; et al. Changing the resilience paradigm. Nat. Clim. Chang. 2014, 4, 407–409. [Google Scholar] [CrossRef]
- Reinmoeller, P.; Baardwijk, N. The Link between Diversity and Resilience. MIT Sloan Manag. Rev. 2005, 46, 60–65. [Google Scholar]
- Scott, R.J.; Cavana, R.Y.; Cameron, D. Recent evidence on the effectiveness of group model building. Eur. J. Oper. Res. 2016, 249, 908–918. [Google Scholar] [CrossRef] [Green Version]
- Ford, D.N.; Sterman, J.D. Expert knowledge elicitation to improve formal and mental models. Syst. Dyn. Rev. 1998, 14, 309–340. [Google Scholar] [CrossRef]
- Forrester, J.W.; Senge, P.M. Tests for building confidence in system dynamics models. TIMS Stud. Manag. Sci. 1980, 14, 209–228. [Google Scholar]
- Barlas, Y. Formal Aspects of Model validity and validation in system dynamics. Syst. Dyn. Rev. 1996, 12, 183–210. [Google Scholar] [CrossRef]
- Liang, T.Y.; Ta, C.K. Strategic information technology plan: A vital component in the corporate strategies of banks. Inf. Manag. 1994, 26, 265–272. [Google Scholar] [CrossRef]
- Montazemi, A.R.; Qahri-Saremi, H. Factors affecting adoption of online banking: A meta-analytic structural equation modeling study. Inf. Manag. 2015, 52, 210–226. [Google Scholar] [CrossRef]
- European Network and Information Security Directive 2016/1148 (NIS 2.0); European Commission: Luxembourg, 2016.
- Digital Operational Rescilience for Financial Services 2020/0266 (DORA); European Commission: Brussels, Belgium, 2020.
- Desouza, C.K. Strategic contributions of game rooms to knowledge management: Some prelimenary insights. Inf. Manag. 2003, 41, 63–74. [Google Scholar] [CrossRef] [Green Version]
- Woolley, A.W.; Chabris, C.F.; Pentland, A.; Hashmi, N.; Malone, T.W. Evidence for a Collective Intelligence Factor in the Performance of Human Groups. Science 2010, 330, 686–688. [Google Scholar] [CrossRef] [Green Version]
- Tversky, A.; Kahneman, D. Extensional versus intuitive reasoning: The conjunction fallacy in probability judgment. Psychol. Rev. 1983, 90, 293–315. [Google Scholar] [CrossRef]
- Park, C.; Whan, L.; Parker, V. Familiarity and Its Impact on Consumer Decision Biases and Heuristics. J. Consum. Res. 1981, 8, 223–230. [Google Scholar] [CrossRef]
- Slovic, P.; Finucane, M.L.; Peters, E.; MacGregor, D.G. The affect heuristic. Eur. J. Oper. Res. 2007, 177, 1333–1352. [Google Scholar] [CrossRef]
- Rao, H.; Greve, H.R.; Davis, G.F. Fool’s Gold: Social Proof in the Initiation and Abandonment of Coverage by Wall Street Analysts. Adm. Sci. Q. 2001, 46, 502–526. [Google Scholar] [CrossRef] [Green Version]
- Festinger, L. A Theory of Cognitive Dissonance; Row & Peterson: Evanston, IL, USA, 1957. [Google Scholar]
- Seligman, M.P.; Maier, S.F. Failure to escape traumatic shock. J. Exp. Psychol. 1967, 74, 1–9. [Google Scholar] [CrossRef]
- Grossklags, J.; Christin, N.; Chuang, J. Predicted and observed user behaviour in the weakest-link security game. In Proceedings of the Workshop on Usability, Psychology, and Security, San Francisco, CA, USA, 14 April 2008. [Google Scholar]
- Grossklags, J.; Reitter, R. How Task Familiarity and Cognitive Predispositions Impact Behaviour in a Security Game of Timing. In Proceedings of the IEEE 27th Computer Security Foundations Symposium, Vienna, Austria, 19–22 July 2014. [Google Scholar]
- Nochenson, A.; Grossklags, J. A behavioural Investigation of the Flipit Game. In Proceedings of the Workshop on the Economics of Information Security, Washington, DC, USA, 11–12 June 2013. [Google Scholar]
Overview of Actions and Game Data Gathered for Each Game Role | ||
---|---|---|
Role | Actions | Game Data Gathered |
Attacker | Attacking and attack preparation | Strength of attack Security incident was handled in the war room (1) or not (0) Security incident resulted in damaging the defender (1) or not (0) |
Collecting revenue | The amount of damage paid for by the defender to the attacker | |
CERT | Resource allocation | Number of CERT resources in the game |
Proactively analysing threat intelligence or improving responsive policies | Number of CERT resources allocated to improvements. | |
SecEng | Resource allocation | Number of SecEng resources in the game |
Selecting, investing, maintaining and decommissioning security capabilities | Total level of capabilities in the data centre (=indication of maturity and number of capabilities). Data centre can handle up to 5 different capabilities (of 9 available) | |
DevOps | Resource allocation | Number of CERT resources in the game |
Improving responsive policies | Number of DevOps resources allocated to improvements | |
Maintaining business operations (customer transactions) | Number of DevOps resources allocated to serve customers | |
CEO | Gaining and maintaining customers | Number of customers |
Reporting on cyber-security incidents | Cyber-security incident was handled in the war room (1) or not (0) Cyber-security incident resulted in damaging the defender (1) or not (0) | |
Financial performance | Total income, total resource costs and net result Amount allocated to operational reserve and to strategic reserve Income loss (amount of missed income caused by lack of DevOps resources serving customers) Supervisor warning (given when net result is negative) | |
Resource allocation | Number of CEO resources (these are fixed in the game). |
Information | ## Rounds | CERT *** | DevOps *** | |
---|---|---|---|---|
Game data | Losing teams-FE average | 124 | 1.6 | 2.8 |
losing teams-FE SD | 124 | 2.9 | 4.1 | |
Winning teams-FE average | 116 | 0.7 | 1.2 | |
Winning teams-FE SD | 116 | 1.0 | 1.3 | |
t-test statistics | difference | 0.93 | 1.62 | |
standard error | 0.285 | 0.396 | ||
t-statistics | 3.262 | 4.093 | ||
CI | 95% | 95% | ||
DF | 238 | 238 | ||
significance level | 0.0013 | 0.0001 |
Game Results-Financial Performance | Questionnaire-Financial Performance | |||||||||
---|---|---|---|---|---|---|---|---|---|---|
Team | ## | cumulative Supervisor Warnings *** | Cumulative Net Result *** | Cumulative Operational Reserve *** | Cumulative Strategic Reserve *** | ## | Execute | Importance | ||
Game data | winning teams | 7 | average | 3.0 | 109.4 | 56.1 | 78.4 | 4 | 3.0 | 2.3 |
SD | 1.7 | 67.3 | 42.8 | 45.8 | 0.8 | 1.0 | ||||
losing teams | 9 | Average | 8.0 | −69.8 | −94.2 | 13.9 | 5 | 3.6 | 3.8 | |
SD | 3.8 | 110.8 | 199.5 | 16.2 | 1.7 | 1.5 | ||||
t-test statistics | difference | 5 | −179.2 | −150.3 | −64.5 | 0.6 | 1.45 | |||
standard error | 1.552 | 76.693 | 77.3 | 16.3 | 0.931 | 0.878 | ||||
T-statistic | 3.221 | −3.757 | −1.944 | −3.952 | 0.645 | 1.651 | ||||
CI | 0.95 | 0.95 | 0.95 | 0.95 | 0.95 | 0.95 | ||||
DF | 14 | 14 | 14 | 14 | 7 | 7 | ||||
significance level | 0.0062 | 0.0021 | 0.0722 | 0.0014 | 0.5398 | 0.1427 |
Area | Topics | Source | Losing Teams | Winning Teams |
---|---|---|---|---|
Game performance | Resource allocation strategy | Game results |
|
|
Security strategy |
|
| ||
Financial performance |
|
| ||
Decision-making processes | Self-evaluation | Questionnaire | Acceptable performance | Acceptable performance |
Decision-making environment | Facilitator observations | Dominant decision-makers, being self-interested, covering up, and fearing consequences | Constructive and cooperative behaviour, being calm and prudent, and seeking justification for decisions | |
Expressions | Blaming others, frustration, helplessness, ignoring criticism on decisions | None |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Zeijlemaker, S.; Rouwette, E.A.J.A.; Cunico, G.; Armenia, S.; von Kutzschenbach, M. Decision-Makers’ Understanding of Cyber-Security’s Systemic and Dynamic Complexity: Insights from a Board Game for Bank Managers. Systems 2022, 10, 49. https://doi.org/10.3390/systems10020049
Zeijlemaker S, Rouwette EAJA, Cunico G, Armenia S, von Kutzschenbach M. Decision-Makers’ Understanding of Cyber-Security’s Systemic and Dynamic Complexity: Insights from a Board Game for Bank Managers. Systems. 2022; 10(2):49. https://doi.org/10.3390/systems10020049
Chicago/Turabian StyleZeijlemaker, Sander, Etiënne A. J. A. Rouwette, Giovanni Cunico, Stefano Armenia, and Michael von Kutzschenbach. 2022. "Decision-Makers’ Understanding of Cyber-Security’s Systemic and Dynamic Complexity: Insights from a Board Game for Bank Managers" Systems 10, no. 2: 49. https://doi.org/10.3390/systems10020049
APA StyleZeijlemaker, S., Rouwette, E. A. J. A., Cunico, G., Armenia, S., & von Kutzschenbach, M. (2022). Decision-Makers’ Understanding of Cyber-Security’s Systemic and Dynamic Complexity: Insights from a Board Game for Bank Managers. Systems, 10(2), 49. https://doi.org/10.3390/systems10020049