IEEE Technology and Society Magazine - March 2022 - 61

found that Japanese respondents expressed less
trust than New Zealanders in how organizations
managed their data, however, Cullen attributed this
to the negative experience with specific individuals
rather than an overall distrust in corporate entities.
These findings are important in that they might suggest
that while cultural norms might promote datafication
and information sharing, individuals might
remain concerned about the integrity of a system.
Discussion
Cybersecurity strategies can no longer afford to
focus on software and hardware. Rather, designers,
developers, and distributors must perceive cybersecurity
as a sociotechnical system defined by interaction
between human and nonhuman agents. The social
cognitive processes and representations that support
cyber hygiene behavior must be understood and
incorporated into design to promote the acceptance
of, and compliance with, cybersecurity practices.
This requires that we understand users' mental models
of privacy and security to determine the extent to
which they overlap, compliment, and conflict with
one another. Although not all these concerns can, or
should, be addressed in the design of cybersecurity
systems, a general understanding of privacy engineering
and privacy concerns can help create effective
cybersecurity practices that preserve users' privacy
and trust in these systems.
Challenges to privacy implementation
ICS professionals are at the frontlines of network
defense. The recognition that users resign themselves
to privacy policies [72], [73] suggests that
their perspectives are often neglected leading to
learned helplessness [74]. This learned helplessness
might in turn result in reduced compliance with
cyber hygiene practices. Cybersecurity professionals
must go beyond the technical affordances to
address these concerns. Understanding users' mental
representations represents a key starting point.
The philosophical and legal literatures on " privacy "
are vast and emphasize facets of privacy
such as self-determination, socially embedded
conceptions of dignity, and control over self-presentation
[18], [19]. Each of these facets will likely
vary in their degree of importance across cultures
based on the weighting of other values. Adding
further complexity, users might not themselves
have a clear understanding of their own mental
March 2022
models of security and privacy, and these models
are likely to develop over the course their interactions
with technology. Consequently, security and
privacy requirements must be equally adaptive and
dynamic, promoting both transparency within the
design of these systems as well as advocacy for the
users' best interest.
From a design perspective, accommodating user
beliefs and attitudes creates challenges for ICS professionals.
Making a more general point, Norman
[75] cautions about shifting from activity-centered
design to human-centered design. He notes that
human-centered design focuses on accommodating
individuals or groups and that this can create tradeoffs
that might disadvantage other individuals and
groups and overly complicate design, a sentiment
that has also been echoed in algorithmic design
[76]. Consequently, design frameworks must be
adopted that translate the goals of network security
into technical affordances [17].
National legislation and regulation represent
a starting point in that they can codify the norms
and conventions of a group. Despite the regulatory
weight that can be placed behind such systems,
the need to accommodate large groups of individuals
means that these norms will necessarily be
general. If privacy is ultimately about the individual
and their relationship with others, there will inevitably
be considerable variation from one individual
to the next in terms of what information should be
deemed private, which can be shared within an individual's
immediate social network, and which can
be more widely distributed. These demands go far
outside any general policy or legislation scope. Consequently,
ICS professionals are the best positioned
to ensure that software is both secure and that user
personal information is sufficiently obscured based
on their needs.
Beyond technical affordance and compliance
The plurality of definitions of privacy and security
might explain the concerns and doubts of ICS professionals
identified in studies of PEM [38], [40]. By
focusing on tangible goals (e.g., data integrity and
network security) and technical affordances, they
might fail to consider users' perception of privacy.
Compounding this issue, users' concepts of privacy
might be ill-defined, suggested that standards
other than privacy (e.g., obscurity) [54] should be
adopted. Here, an explainability framework should
61

IEEE Technology and Society Magazine - March 2022

Table of Contents for the Digital Edition of IEEE Technology and Society Magazine - March 2022

Contents
IEEE Technology and Society Magazine - March 2022 - Cover1
IEEE Technology and Society Magazine - March 2022 - Cover2
IEEE Technology and Society Magazine - March 2022 - Contents
IEEE Technology and Society Magazine - March 2022 - 2
IEEE Technology and Society Magazine - March 2022 - 3
IEEE Technology and Society Magazine - March 2022 - 4
IEEE Technology and Society Magazine - March 2022 - 5
IEEE Technology and Society Magazine - March 2022 - 6
IEEE Technology and Society Magazine - March 2022 - 7
IEEE Technology and Society Magazine - March 2022 - 8
IEEE Technology and Society Magazine - March 2022 - 9
IEEE Technology and Society Magazine - March 2022 - 10
IEEE Technology and Society Magazine - March 2022 - 11
IEEE Technology and Society Magazine - March 2022 - 12
IEEE Technology and Society Magazine - March 2022 - 13
IEEE Technology and Society Magazine - March 2022 - 14
IEEE Technology and Society Magazine - March 2022 - 15
IEEE Technology and Society Magazine - March 2022 - 16
IEEE Technology and Society Magazine - March 2022 - 17
IEEE Technology and Society Magazine - March 2022 - 18
IEEE Technology and Society Magazine - March 2022 - 19
IEEE Technology and Society Magazine - March 2022 - 20
IEEE Technology and Society Magazine - March 2022 - 21
IEEE Technology and Society Magazine - March 2022 - 22
IEEE Technology and Society Magazine - March 2022 - 23
IEEE Technology and Society Magazine - March 2022 - 24
IEEE Technology and Society Magazine - March 2022 - 25
IEEE Technology and Society Magazine - March 2022 - 26
IEEE Technology and Society Magazine - March 2022 - 27
IEEE Technology and Society Magazine - March 2022 - 28
IEEE Technology and Society Magazine - March 2022 - 29
IEEE Technology and Society Magazine - March 2022 - 30
IEEE Technology and Society Magazine - March 2022 - 31
IEEE Technology and Society Magazine - March 2022 - 32
IEEE Technology and Society Magazine - March 2022 - 33
IEEE Technology and Society Magazine - March 2022 - 34
IEEE Technology and Society Magazine - March 2022 - 35
IEEE Technology and Society Magazine - March 2022 - 36
IEEE Technology and Society Magazine - March 2022 - 37
IEEE Technology and Society Magazine - March 2022 - 38
IEEE Technology and Society Magazine - March 2022 - 39
IEEE Technology and Society Magazine - March 2022 - 40
IEEE Technology and Society Magazine - March 2022 - 41
IEEE Technology and Society Magazine - March 2022 - 42
IEEE Technology and Society Magazine - March 2022 - 43
IEEE Technology and Society Magazine - March 2022 - 44
IEEE Technology and Society Magazine - March 2022 - 45
IEEE Technology and Society Magazine - March 2022 - 46
IEEE Technology and Society Magazine - March 2022 - 47
IEEE Technology and Society Magazine - March 2022 - 48
IEEE Technology and Society Magazine - March 2022 - 49
IEEE Technology and Society Magazine - March 2022 - 50
IEEE Technology and Society Magazine - March 2022 - 51
IEEE Technology and Society Magazine - March 2022 - 52
IEEE Technology and Society Magazine - March 2022 - 53
IEEE Technology and Society Magazine - March 2022 - 54
IEEE Technology and Society Magazine - March 2022 - 55
IEEE Technology and Society Magazine - March 2022 - 56
IEEE Technology and Society Magazine - March 2022 - 57
IEEE Technology and Society Magazine - March 2022 - 58
IEEE Technology and Society Magazine - March 2022 - 59
IEEE Technology and Society Magazine - March 2022 - 60
IEEE Technology and Society Magazine - March 2022 - 61
IEEE Technology and Society Magazine - March 2022 - 62
IEEE Technology and Society Magazine - March 2022 - 63
IEEE Technology and Society Magazine - March 2022 - 64
IEEE Technology and Society Magazine - March 2022 - 65
IEEE Technology and Society Magazine - March 2022 - 66
IEEE Technology and Society Magazine - March 2022 - 67
IEEE Technology and Society Magazine - March 2022 - 68
IEEE Technology and Society Magazine - March 2022 - 69
IEEE Technology and Society Magazine - March 2022 - 70
IEEE Technology and Society Magazine - March 2022 - 71
IEEE Technology and Society Magazine - March 2022 - 72
IEEE Technology and Society Magazine - March 2022 - 73
IEEE Technology and Society Magazine - March 2022 - 74
IEEE Technology and Society Magazine - March 2022 - 75
IEEE Technology and Society Magazine - March 2022 - 76
IEEE Technology and Society Magazine - March 2022 - 77
IEEE Technology and Society Magazine - March 2022 - 78
IEEE Technology and Society Magazine - March 2022 - 79
IEEE Technology and Society Magazine - March 2022 - 80
IEEE Technology and Society Magazine - March 2022 - 81
IEEE Technology and Society Magazine - March 2022 - 82
IEEE Technology and Society Magazine - March 2022 - 83
IEEE Technology and Society Magazine - March 2022 - 84
IEEE Technology and Society Magazine - March 2022 - 85
IEEE Technology and Society Magazine - March 2022 - 86
IEEE Technology and Society Magazine - March 2022 - 87
IEEE Technology and Society Magazine - March 2022 - 88
IEEE Technology and Society Magazine - March 2022 - 89
IEEE Technology and Society Magazine - March 2022 - 90
IEEE Technology and Society Magazine - March 2022 - 91
IEEE Technology and Society Magazine - March 2022 - 92
IEEE Technology and Society Magazine - March 2022 - 93
IEEE Technology and Society Magazine - March 2022 - 94
IEEE Technology and Society Magazine - March 2022 - 95
IEEE Technology and Society Magazine - March 2022 - 96
IEEE Technology and Society Magazine - March 2022 - Cover3
IEEE Technology and Society Magazine - March 2022 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2013
https://www.nxtbookmedia.com