Hofstede’s Cultural Markers in Successful Victim Cyber Exploitations

Abstract:

Hofstede, Hofstede, and Minkov (2010) observed that culture acts as “software of the mind”. These authors have written that culture influences behaviour and motivation for behaviour. This phenomenon may also be connected to underlying behaviours that inadvertently lead to successful exploitation. The current study was undertaken in order to determine if a statistical relationship exists between culture and successfully exploited government and military websites housed in victim countries. The researchers relied on the use of quantitative statistical techniques to inform and to support decisions. While the researchers provide some cursory analysis on the meaning of the results, the nature of this study is quantitative, and is thus reliant upon statistical findings.


AUTHORS

Photo of Andre Karamanian

Cisco Systems San Jose CA,
U.S.A.

Dr. Andre Karamanian is a consulting solutions architect at Cisco Systems, where he consults for Fortune 500 and enterprise clients. He is the author of ‘PKI uncovered: certificate-based security solutions for next-generation networks. He periodically speaks at Networkers and Cisco Live. He did his doctoral dissertation at Capitol College in information assurance and has a dozen industry-leading certifications, including the CCIE and CISSP. Andre enjoys finding synergies between different areas of research and fields of study.

Photo of Dr. Char Sample

ICFI at US Army Research Labs Aberdeen, MD,
U.S.A.

Dr. Char Sample is a research fellow employed for ICF International at the US Army Research Laboratory in Adelphi, Maryland, and is also with the University of Warwick, Coventry, UK. Dr. Sample has over 20 years' experience in the information security industry. Most recently, Dr. Sample has been advancing the research into the role of national culture in cyber security events. Presently, Dr. Sample is continuing research on modeling cyber- behaviors by culture; other areas of research are information weaponization, data fidelity, and deception.

Photo of Marc M. Kolenko

Information Innovators Inc. Springfield, VA,
U.S.A.

Marc M. Kolenko is a solutions-oriented Cyber Defense and Information Systems Security Engineering Professional with more than 30 years of notable success directing a broad range of Enterprise IT initiatives in both the private sector and government. He is currently the Senior Cyber Security Solutions Architect and Strategist at Information Innovators, Inc. (Springfield, VA). He is responsible for delivering Computer Network Defense (CND), Continuous Monitoring, Security Operations, Cyber Threat Intelligence, Information Assurance (IA) & Compliance, and Systems Security Engineering solutions that aid clients with meeting federal government cybersecurity mandates (i.e., RMF/FISMA, FedRAMP, ICD 503, CNSS 1253, and the Comprehensive National Cyber Security Initiative) through technology.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Media Parner to JIW.

Media Partner

Keywords

C

C2
C2S
CDX
CIA
CIP
CPS

I

IA
ICS

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

  • Journal of Information Warfare
    114 Ballard Street
    Yorktown, VA
    23690
  • 757.234.6664
  • jiw@gbpts.com