A Practical Human-Centric Risk Management (HRM) Methodology
Abstract
:1. Introduction
1.1. Human-Centric Risk Management (HRM) Objectives and Main Principles
1.2. HRM Tools for Estimating Technical Risks
- Specific knowledge of the company’s cybersecurity;
- The methodologies employed within the company;
- The distribution of administrative fees on systems;
- The information segmentation policy;
- Authentication policies for accessing corporate systems;
- Previous assessments conducted.
1.3. HRM Socio-Psychological Instruments for Estimating Social Risks
- Diversity of Participants: These workshops prioritize the inclusion of a diverse range of ICT users, such as organizational insiders (e.g., CISOs, risk managers, incident handlers, defenders, administrators, and general employees), suppliers or supply chain partners, and third parties (e.g., suppliers, auditors, external penetration testers). This diversity is crucial for capturing a wide array of perspectives and experiences, which enriches the security discourse [20];
- Collaboration: Participants are encouraged to collaborate in a structured setting, facilitated by experienced leaders. This approach mirrors effective teamwork strategies that are essential for problem-solving and innovation in cybersecurity [21];
- Interactive Activities: Employing methods such as brainstorming sessions, design thinking exercises, and prototyping fosters a creative and engaging environment. These activities are foundational to generating practical and innovative solutions [22];
- Risk Treatment Generation and Refinement: The workshops focus on co-developing a comprehensive set of social and technical measures that ICT users embrace and comprehend, which are refined through collaboration into viable security controls. This process aligns with best practices in risk management [23].
2. Comprehensive User and Adversary Profiling for Enhanced Cybersecurity Readiness
2.1. ICT User Profile (UP)
2.2. Adversary Profile (AP)
2.3. Measuring Profiles
3. Phases of the HRM Methodology and Implementation
3.1. Phase A: Cartography (Set Boundaries)
- (a)
- Compile the profiles of potential adversaries using Table 2:To compile adversary profiles, we analyze past history, including previous attacks and sector-specific threat intelligence. Using Table 2, adversaries are classified based on their personality traits (e.g., extraversion, conscientiousness, openness to experiences) and social-behavioral traits (e.g., manipulative behavior, selected social exposure). For example, an adversary active in hacking communities and demonstrating leadership in forums would score highly in Extraversion, while one persistently employing new attack techniques would score highly in Openness to Experiences. Traits such as Manipulative Behavior are evaluated based on their ability to conduct phishing or social engineering attacks. This classification is supported by historical data and incident analysis;
- (b)
- Measure the Adversaries Profiles (AP) using the scales in Table 3. Adversary traits from Table 2 are scored on a semi-quantitative scale (1–5) based on historical data, threat intelligence, and crowd-sourced insights. These individual trait scores are aggregated into a composite AP score, which is then categorized using Table 3 thresholds (e.g., Very High = 96–100%, High = 80–95%). Adversaries with higher AP scores represent greater sophistication and require advanced social and technical measures, such as ethical training and cybersecurity exercises, while lower scores suggest basic awareness and secure behavior interventions are sufficient. This approach ensures targeted and proportional risk treatment.
3.2. Phase B: Risk Assessment
3.3. Phase C: Risk Management (Treatment)
4. Applying HRM Methodology for Risk Management in Healthcare SMEs: A Comprehensive Use Case
4.1. Phase A (Cartography)
4.2. Phase B: Risk Assessment
- T is the Threat (unauthorized access to patient data);
- V is the Vulnerability (potential for unauthorized access due to weak access control);
- I is the Impact (severity of unauthorized data access);
- AP is the Adversary Profile (e.g., motivated, skilled attackers with resources);
- UP is the ICT User Profile (doctors’ compliance with security protocols).
- Technical Controls: Advanced access control, data encryption, network and endpoint security;
- Administrative Controls: Policy development, access management, employee training, and security audits;
- Physical Controls: Access control systems, surveillance, alarms, and restricted-access storage;
- Social Controls: Enhance software and IT skills based on personality traits, social factors, and technical skills identified earlier.
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- ISO/IEC 27001:2005; Information Technology—Security Techniques—Information Security Management Systems—Requirements. ISO: Geneva, Switzerland, 2005.
- ISO/IEC—Global Standards. Available online: https://www.iso.org/home.html (accessed on 5 September 2024).
- ISO 31000:2018; Risk Management—Guidelines. International Organization for Standardization (ISO): Geneva, Switzerland, 2018.
- NIST Cyber Hygiene Guidelines. Available online: https://www.nist.gov/blogs/taking-measure/stay-safe-and-secure-online-during-cybersecurity-awareness-month-and-all-year (accessed on 5 September 2024).
- Katsumata, P.; Hemenway, J.; Gavins, W. Cybersecurity risk management. In Proceedings of the Milcom 2010 Military Communications Conference, San Jose, CA, USA, 31 October–3 November 2010; pp. 890–895. [Google Scholar]
- Al-Zahrani, A. Assessing and Proposing Countermeasures for Cyber-Security Attacks. Int. J. Adv. Comput. Sci. Appl. West Yorks. 2022, 13, 885–895. [Google Scholar] [CrossRef]
- Kioskli, K.; Polemi, N. Estimating attackers’ profiles results in more realistic vulnerability severity scores. In Proceedings of the 13th International Conference on Applied Human factors and Ergonomics (AHFE2022), New York, NY, USA, 24–28 July 2022; Volume 53, pp. 138–150. [Google Scholar]
- Kioskli, K.; Fotis, T.; Nifakos, S.; Mouratidis, H. The Importance of conceptualising the human-centric approach in maintaining and promoting cybersecurity-hygiene in healthcare 4.0. Appl. Sci. Spec. Issue Ehealth Innov. Approaches Appl. 2023, 13, 3410. [Google Scholar] [CrossRef]
- Alwaheidi, M.; Islam, S.; Papastergiou, S.; Kioskli, K. Integrating Human Factors into Data-driven Threat Management for Overall Security Enhancement. In Human Factors in Cybersecurity, Proceedings of the AHFE (2024) International Conference, Nice, France, 24–27 July 2025; Moallem, A., Ed.; AHFE Open Access; AHFE International: Orlando, FL, USA, 2024; Volume 127. [Google Scholar] [CrossRef]
- ENISA Risk Management Toolbox. Available online: https://www.enisa.europa.eu/publications/interoperable-eu-risk-management-toolbox (accessed on 5 September 2024).
- OWASP Risk Assessment Calculator. Available online: https://owasp-risk-rating.com/ (accessed on 5 September 2024).
- OWASP Threat Modeling Process. Available online: https://owasp.org/www-community/Threat_Modeling_Process (accessed on 5 September 2024).
- MISP Project. Available online: https://www.misp-project.org/ (accessed on 5 September 2024).
- Cyberwatching. The European watch on Cybersecurity & Privacy. Available online: https://cyberrisk.cyberwatching.eu/Pages/Home.aspx (accessed on 5 September 2024).
- Egelman, S.; Peer, E. The Security Behaviour Intentions Scale; Frontiers: Lausanne, Switzerland, 2015. [Google Scholar]
- Nobles, C. Understanding the Human Factor of Cyber Security. IEEE IT Prof. 2018, 20, 7–15. [Google Scholar] [CrossRef]
- Fogg, B.J. A behavior model for persuasive design. In Proceedings of the 4th International Conference on Persuasive Technology, Claremont, CA, USA, 26–29 April 2009; pp. 1–7. [Google Scholar]
- Kioskli, K.; Polemi, N. A psychosocial approach to cyber threat intelligence. Int. J. Chaotic Comput. 2020, 7, 159–165. [Google Scholar] [CrossRef]
- Williams, H. The impact of collective intelligence on cybersecurity. Cyber Psychol. 2020, 7, 111–126. [Google Scholar]
- Schneier, B. Liars and Outliers: Enabling the Trust That Society Needs to Thrive; Wiley: Hoboken, NJ, USA, 2012. [Google Scholar]
- West, D.M. Digital Government: Technology and Public Sector Performance; Princeton University Press: Princeton, NJ, USA, 2012. [Google Scholar]
- Brown, T. Change by Design: How Design Thinking Transforms Organizations and Inspires Innovation; HarperBusiness: New York, NY, USA, 2009. [Google Scholar]
- Stoneburner, G.; Goguen, A.; Feringa, A. Risk Management Guide for Information Technology Systems (NIST Special Publication 800-30); National Institute of Standards and Technology: Gaithersburg, MD, USA, 2022. [Google Scholar]
- Ramaswamy, V.; Ozcan, K. What is co-creation? An interactional creation framework and its implications for value creation. J. Bus. Res. 2018, 84, 196–205. [Google Scholar] [CrossRef]
- ENISA ECSF. Available online: https://www.enisa.europa.eu/topics/education/european-cybersecurity-skills-framework (accessed on 4 September 2024).
- StaySafeOnline Guidelines. Available online: https://staysafeonline.org/resources/online-safety-basics/ (accessed on 5 September 2024).
- Smith, J.; Doe, A.; James, S. The efficacy of questionnaires in the assessment of secure behaviors in IT users. J. Cybersecur. Res. 2019, 12, 45–59. [Google Scholar]
- Kioskli, K.; Polemi, N. Measuring psychosocial and behavioural factors improves attack potential estimates. In Proceedings of the 15th International Conference for Internet Technology and Secured Transactions, London, UK, 8–10 December 2020; pp. 216–219. [Google Scholar]
- Kioskli, K.; Polemi, N. A socio-technical approach to cyber risk assessment. Int. J. Electr. Comput. Eng. 2020, 14, 305–309. [Google Scholar]
- Mattelmäki, T.; Vaajakallio, K.; Koskinen, I. What happened to empathic design? Des. Issues 2014, 30, 67–77. [Google Scholar] [CrossRef]
- ISO/IEC 27005:2022; Information Security, Cybersecurity and Privacy Protection—Guidance on Managing Information Security Risks. International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC): Geneva, Switzerland, 2022.
- ISO/IEC 27005:2018; Information Technology—Security Techniques—Information Security Risk Management. International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC): Geneva, Switzerland, 2018.
- ISO/IEC 27000:2018; Information Technology—Security Techniques—Information Security Management Systems—Overview and Vocabulary. International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC): Geneva, Switzerland, 2018.
HRM ICT Users’ Profiles (HRM-UP) | |
---|---|
Personality Traits | |
Vigilance | Consistently remains alert and attentive to potential security threats, and is proactive in identifying and addressing suspicious activities. |
Responsibility, Curiosity | Takes full ownership of their role, with an innate curiosity that drives them to deepen their understanding of cybersecurity threats and vulnerabilities. |
Adaptable-Openness to experiences | Displays flexibility and openness to new security technologies, strategies, and approaches that enhance their security posture. Possesses a blend of intellect and creativity, demonstrates originality, and shows a keen scientific interest alongside a spirit of adventurousness. |
Resilient | Has the capacity to cope with stress, setbacks, and failures, demonstrating resilience by quickly bouncing back and steadfastly maintaining a strong focus on achieving security objectives. |
Social Traits | |
Social exposure | Adapts to conventional social norms with ease, excelling in forging strong bonds with each co-worker. Collaborates effectively with colleagues, security teams, and external partners to tackle security challenges, sharing information and insights for collective benefit. |
Conventional relationships | Effortlessly establishes professional virtual relationships, fostering collaborations and creating synergies. |
Ethical | Individuals with integrity prioritize honesty, transparency, and respect, steadfastly adhering to ethical principles and professional codes of conduct. |
Personality Traits | Description and Examples |
---|---|
Extraversion | Gregariousness (e.g., social engagement in attackers’ groups); assertiveness/outspokenness (e.g., leadership skills); activity/energy level (e.g., enjoys a busy life); positive emotions/mood (e.g., happiness) |
Conscientiousness | Orderliness/Neatness (e.g., well-organized) Striving/Perseverance (e.g., aims to achieve excellence) Self-Discipline (e.g., persistent engagement to goals) Dutifulness/Carefulness (e.g., strong sense of duty), Self-Efficacy (e.g., confidence to achieve goals) |
Openness to experiences | Intellect/Creativity Imaginative (e.g., intellectual style) Scientifically Interested/Originality (e.g., evidence-based) Adventurousness (e.g., experiences of different things) |
Social—Behavioral Traits | Description and Examples |
Selected social exposure | Difficult to adapt to conventional social norms (e.g., events) Easy to build virtual anonymous, professional relationships (e.g., using anonymous identity has contacts with other attackers in the Deep Web) Easy to build strong e-bonds in hacking communities (e.g., these communities are closed to the public) |
Not conventional relationships | Difficult to build physical relationships or contacts Easy to build professional (with other attackers) virtual, anonymous relationships under their moral code (us versus them approach) |
Not talkative | Difficult to initiate small casual talk or social talk Difficult to express him/herself |
Manipulative | Easy manipulating people via electronic means (e.g., phishing) |
Levels | Description | Semi-Quantitative Values | UP/AP Score of Profile | Indicative Social Measures Needed | |
---|---|---|---|---|---|
Very High (VH)-5 | Sophisticated | 96–100 | 10 | >96% of each of the traits in each category | social and technical threat intelligence updates, ethical training, advance cybersecurity exercises |
High (H)-4 | Experienced | 80–95 | 8 | >80% | ethical training, cybersecurity exercises, social and technical threat intelligence updates, ethical training |
Medium (M)-3 | Moderate | 21–79 | 5 | >21% | secure behavior intervention, training in operational cybersecurity, cybersecurity exercises |
Basic (B)-2 | Basic | 5–20 | 2 | >5% | awareness, secure behavior interventions, training in operational cybersecurity exercises |
Low (I)-1 | Insufficient | 1–4 | 0 | <5% | awareness, secure behavior interventions, training in basic concepts, basic cyber exercises |
General Information | Technical Specifications | Location and Owner | Network Configuration (for Servers) | Implementation of Controls—History of Updates | |
---|---|---|---|---|---|
1 | Asset ID: Unique identifier for each piece of equipment. | Processor: Type and speed of the processor. | Location: Physical location of the asset. | IP Address: Network IP address. | Controls implemented |
2 | Asset Type: Differentiates between PCs and servers. | RAM: Amount of memory in GB. | Owner of Asset (Assigned to): Name of the employee responsible for the asset. | Role: Function or role of the server (e.g., file server, web server). | Update history of controls |
3 | Brand/Model: Specific model of the hardware. | Storage: Size and type of storage (e.g., SSD, HDD). | Owner/User(s) of asset: interacting entity. | - | Testing date of controls |
4 | Serial Number: Manufacturer’s serial number. Date of purchase …… | Operating System: Installed operating system and version. | - | - | - |
User ID: 001 | User ID: 002 | … | |
---|---|---|---|
General Information | Name: Full name of the employee/Role/Location/Contact | … | - |
System and Credential System Access | Privileges, List of systems the user has access to (e.g., CRM, ERP, Email), | … | - |
Supervisor and Interrelations | Direct supervisor or manager interactions with other users (model interaction) | … | - |
User ID: 001 | User ID: 002 | … | |
---|---|---|---|
General Information | Name: Full name of the employee/Role/Location/Contact | ... | - |
System and Credential System Access | Privileges, List of systems the user has access to (e.g., CRM, ERP, email) | ... | - |
Supervisor and Interrelations | Direct supervisor or manager interactions with other users (model interaction) | ... | - |
UP score | See Table 3 above | ... | - |
Social Measures Implemented/Required | See Table 3 above | ... | ... |
General Information | Technical Specifications | Location and Owner | Network Configuration (for Servers) | Implementation of Controls—History of Updates |
---|---|---|---|---|
Asset ID: Unique identifier for each asset. | Software suite for patient records, network infrastructure etc. | Location: physical location of the asset. | Wired and wireless setup | Controls implemented |
Asset Type: Software or Hardware | Software suite for patients records /Server hardware for data storage | Owner of Asset (assigned to): name of the employee responsible of the asset. | Role: function or role of the software or hardware | Update history of controls |
Brand/Model: Specific model of the software or hardware. | Electronic Medical Records (EMR) system, database management platform etc. | Owner/user(s) of asset: doctor, nurse, admin etc | - | Testing date of controls |
Serial Number: Manufacturer’s serial number. Date of purchase …… | Software versions, hardware specifications | - | - | - |
User ID: 001-Doctor1 | User ID: 002-Nurse | … | |
---|---|---|---|
General Information | Name: Full name of the employee/Role/Location/Contact | … | |
System and Credential System Access | Privileges, list of systems the user has access to (e.g., CRM, ERP, email), | ||
Supervisor and Interrelations | Direct supervisor or manager interactions with other users (model interaction) | - | |
UP score | Basic (B)-2 | ||
Social Measures Implemented/Required | According to Table 3 the measures needed are: awareness, secure behavior interventions, training in operational cybersecurity exercises |
Threat | Category | Security Dimension | Action | Assets | Explanation |
---|---|---|---|---|---|
Hardware or Software failure | Industrial | Availability | Deliberate or Accidental | H/W devices and equipment—S/W and applications | Failures in the equipment (e.g., user PC, server, router etc.) and/or programs (e.g., apps, OS etc.) |
User errors | Errors and unintentional failures | Confidentiality, Integrity, Availability | Accidental | H/W devices and equipment—S/W and applications—organizational infrastructure | Mistakes by persons when using the services, data, etc. For example, making a mistake in saving data, or in a PC’s usage. |
Threat of system/security administrator errors | Errors and unintentional failures | Confidentiality, Integrity, Availability | Accidental | H/W devices and equipment—S/W and applications—organizational infrastructure | Mistakes by persons with responsibilities for installation and operation of the systems/system’s security. For example, the PC technician can unintentionally cause the system failure of a user PC or server. |
Destruction of information | Errors and unintentional failures | Availability | Accidental | All the categories of supporting assets | The accidental loss of the information due to a user’s (doctor or nurse) mistake. |
S/W vulnerabilities | Errors and unintentional failures | Confidentiality, Integrity, Availability | Accidental | S/W and applications | Defects in the code that cause a defective operation without intention on the part of the user but with consequences to the data confidentiality, integrity, availability or to its capacity to operate. This can be detected in apps or OS, for example. |
Abuse of access privileges | Willful attacks | Confidentiality, Integrity, Availability | Deliberate | S/W and applications—Locations and Utilities—organizational infrastructure | When users abuse their privilege level to carry out tasks that are not their responsibility, there are problems. For example, a user might use a doctor’s account and delete patients’ data. |
Misuse | Willful attacks | Confidentiality, Integrity, Availability | Deliberate | S/W and applications—Locations and Utilities—organizational infrastructure | The use of system resources for unplanned purposes, typically of personal interest. For example, a user connects an app or to a PC inside the HSME’s facility. |
Threat | Skill Level | Motive | Opportunity | Size |
---|---|---|---|---|
Unauthorized access | 6 | 9 | 4 | 9 |
Threat | Ease of Discovery | Ease of Exploit | Awareness | Intrusion Detection |
---|---|---|---|---|
Unauthorized access | 7 | 9 | 6 | 3 |
Threat | Loss of Confidentiality | Loss of Integrity | Loss of Availability | Loss of Accountability |
---|---|---|---|---|
Unauthorized access | 7 | 7 | 7 | 9 |
Threat | Financial Damage | Reputation Damage | Non-Compliance | Privacy Violation |
---|---|---|---|---|
Unauthorized access | 3 | 5 | 7 | 7 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Kioskli, K.; Seralidou, E.; Polemi, N. A Practical Human-Centric Risk Management (HRM) Methodology. Electronics 2025, 14, 486. https://doi.org/10.3390/electronics14030486
Kioskli K, Seralidou E, Polemi N. A Practical Human-Centric Risk Management (HRM) Methodology. Electronics. 2025; 14(3):486. https://doi.org/10.3390/electronics14030486
Chicago/Turabian StyleKioskli, Kitty, Eleni Seralidou, and Nineta Polemi. 2025. "A Practical Human-Centric Risk Management (HRM) Methodology" Electronics 14, no. 3: 486. https://doi.org/10.3390/electronics14030486
APA StyleKioskli, K., Seralidou, E., & Polemi, N. (2025). A Practical Human-Centric Risk Management (HRM) Methodology. Electronics, 14(3), 486. https://doi.org/10.3390/electronics14030486