{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T20:18:39Z","timestamp":1770754719815,"version":"3.50.0"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2021,5,10]],"date-time":"2021-05-10T00:00:00Z","timestamp":1620604800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,5,10]],"date-time":"2021-05-10T00:00:00Z","timestamp":1620604800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100000617","name":"Foreign and Commonwealth Office","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000617","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004752","name":"State Government of Victoria","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004752","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2021,10]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>This paper presents an empirical study of the social and cultural aspects of cybersecurity capacity building in 78 nations. While nations within geographically defined regions might be expected to share similar attitudes, values, and practices around cybersecurity, this analysis finds that regional differences can be explained largely by cross-national differences in development and the scale of Internet use. These results question the centrality of regions in shaping social and cultural attributes directly tied to cybersecurity capacity. However, the analysis identifies some countries with greater and some with lesser levels of maturity in capacity building than expected only on the basis of their development and scale of Internet use. Further research focused on the dynamics of under- and over-performance of different nations might illuminate where regional contexts could place a brake on, or provide an impetus for, under- or over-performance in cybersecurity capacity building. That said, national development and the scale of Internet use are the most explanatory of cultural attitudes, values, and practices of societies tied to cybersecurity, such as trust on the Internet.<\/jats:p>","DOI":"10.1007\/s00779-021-01569-6","type":"journal-article","created":{"date-parts":[[2021,5,10]],"date-time":"2021-05-10T11:03:59Z","timestamp":1620644639000},"page":"941-955","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["The social and cultural shaping of cybersecurity capacity building: a comparative study of nations and regions"],"prefix":"10.1007","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2414-9657","authenticated-orcid":false,"given":"Sadie","family":"Creese","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0141-6804","authenticated-orcid":false,"given":"William H.","family":"Dutton","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3740-1396","authenticated-orcid":false,"given":"Patricia","family":"Esteve-Gonz\u00e1lez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,10]]},"reference":[{"key":"1569_CR1","doi-asserted-by":"crossref","unstructured":"Aguerre C, Galperin H (2015) Internet Policy Formation in Latin America: Understanding the Links between the National, the Regional, and the Global. Working Paper of the Center for Global Communication Studies, University of San Andr\u00e9s. http:\/\/hdl.handle.net\/10908\/15568. Accessed 4 Nov 2020","DOI":"10.2139\/ssrn.2809883"},{"key":"1569_CR2","doi-asserted-by":"publisher","first-page":"51","DOI":"10.5121\/csit.2017.70305","volume":"65","author":"S Almuhammadi","year":"2017","unstructured":"Almuhammadi S, Alsaleh M (2017) Information Security Maturity Model for NIST Cyber Security Framework. Comput Sci Inf Technol 65:51\u201362. https:\/\/doi.org\/10.5121\/csit.2017.70305 Accessed 1 April 2021","journal-title":"Comput Sci Inf Technol"},{"issue":"2","key":"1569_CR3","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1080\/23738871.2018.1520271","volume":"3","author":"R Azmi","year":"2018","unstructured":"Azmi R, Tibben W, Win KT (2018) Review of Cybersecurity Frameworks: Context and Shared Concepts. J Cyber Policy 3(2):258\u2013283","journal-title":"J Cyber Policy"},{"issue":"12","key":"1569_CR4","doi-asserted-by":"publisher","first-page":"1523","DOI":"10.1177\/0010414012463905","volume":"46","author":"C Boix","year":"2012","unstructured":"Boix C, Miller M, Rosato S (2012) A Complete Data Set of Political Regimes, 1800-2002. Comp Polit Stud 46(12):1523\u20131554","journal-title":"Comp Polit Stud"},{"issue":"6","key":"1569_CR5","doi-asserted-by":"publisher","first-page":"917","DOI":"10.1080\/01436597.2020.1729729","volume":"41","author":"A Calderaro","year":"2020","unstructured":"Calderaro A, Craig AJS (2020) Transnational Governance of Cybersecurity: Policy Challenges and Global Inequalities in Cyber Capacity Building. Third World Q 41(6):917\u2013938","journal-title":"Third World Q"},{"key":"1569_CR6","volume-title":"World Wide Internet: Changing Societies, Economies and Cultures","year":"2009","unstructured":"Cardoso G, Cheong A, Cole J (eds) (2009) World Wide Internet: Changing Societies, Economies and Cultures. University of Macau, Macau"},{"key":"1569_CR7","volume-title":"Computer Science and Telecommunications Board, At the Nexus of Cybersecurity and Public Policy","year":"2014","unstructured":"Clark D, Berson T, Lin HS (eds) (2014) Computer Science and Telecommunications Board, At the Nexus of Cybersecurity and Public Policy. The National Academy Press, Washington DC"},{"key":"1569_CR8","doi-asserted-by":"publisher","unstructured":"Creese S, Dutton WH, Esteve-Gonzalez P, Shillair R (2020) Cybersecurity Capacity Building: Cross-National Benefits and International Divides. https:\/\/doi.org\/10.2139\/ssrn.3658350","DOI":"10.2139\/ssrn.3658350"},{"key":"1569_CR9","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1093\/oso\/9780198843498.003.0010","volume-title":"Society and the Internet: How Networks of Information and Communication are Changing our Lives","author":"S Creese","year":"2019","unstructured":"Creese S, Shillair R, Bada M, Reisdorf BC, Roberts T, Dutton WH (2019) The Cybersecurity Capacity of Nations. In: Graham M, Dutton WH (eds) Society and the Internet: How Networks of Information and Communication are Changing our Lives, 2nd edn. Oxford University Press, Oxford, pp 165\u2013179","edition":"2"},{"key":"1569_CR10","unstructured":"Dutta S, Lanvin B (2020) (eds) The Network Readiness Index 2020: Accelerating Digital Transformation in a post-COVID Global Economy. Portulans Institute. https:\/\/networkreadinessindex.org\/wp-content\/uploads\/2020\/11\/NRI-2020-V8_28-11-2020.pdf. Accessed 1 April 2021"},{"key":"1569_CR11","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780198774617.001.0001","volume-title":"Society on the Line","author":"WH Dutton","year":"1999","unstructured":"Dutton WH (1999) Society on the Line. Oxford University Press, Oxford"},{"key":"1569_CR12","doi-asserted-by":"publisher","unstructured":"Dutton WH (2017) Fostering a Cyber Security Mindset. Internet Policy Rev 6(1). https:\/\/doi.org\/10.14763\/2017.1.443","DOI":"10.14763\/2017.1.443"},{"key":"1569_CR13","doi-asserted-by":"publisher","first-page":"280","DOI":"10.5325\/jinfopoli.9.2019.0280","volume":"9","author":"WH Dutton","year":"2019","unstructured":"Dutton WH, Creese S, Shillair R, Bada M (2019) Cyber Security Capacity: Does It Matter? J Inf Policy 9:280\u2013306","journal-title":"J Inf Policy"},{"key":"1569_CR14","unstructured":"Dutton WH, Law G, Bolsover G, Dutta S (2013, released 2014) The Internet Trust Bubble: Global Values, Beliefs and Practices. World Economic Forum, New York. http:\/\/www3.weforum.org\/docs\/WEF_InternetTrustBubble_Report2_2014.pdf. Accessed 4 Nov 2020"},{"issue":"4","key":"1569_CR15","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1080\/13691180600858606","volume":"9","author":"WH Dutton","year":"2006","unstructured":"Dutton WH, Shepherd A (2006) Trust in the Internet as an Experience Technology. Inf Commun Soc 9(4):433\u2013451","journal-title":"Inf Commun Soc"},{"key":"1569_CR16","unstructured":"Eriksen TH (2015) What\u2019s Wrong with the Global North and the Global South? Concepts of the Global South - Voices from Around the World. Global South Studies Center, University of Cologne, Germany. https:\/\/kups.ub.uni-koeln.de\/6399\/1\/voices012015_concepts_of_the_global_south.pdf. Accessed 1 April 2021"},{"key":"1569_CR17","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1007\/978-3-658-21655-9_38","volume-title":"Cybersecurity Best Practices","author":"S Ghernaouti","year":"2018","unstructured":"Ghernaouti S, Wanner B (2018) Research and Education as Key Success Factors for Developing a Cybersecurity Culture. In: Bartsch M, Frey S (eds) Cybersecurity Best Practices. Springer Vieweg, Wiesbaden, pp 539\u2013552"},{"key":"1569_CR18","unstructured":"Global Cyber Security Capacity Centre (2016) Cybersecurity Capacity Maturity Model for Nations (CMM). Revised Edition. https:\/\/gcscc.ox.ac.uk\/files\/cmmrevisededition090220171pdf. Accessed 4 Nov 2020"},{"key":"1569_CR19","unstructured":"Global Cyber Security Capacity Centre (2016) Cybersecurity Capacity Review of the Republic of Madagascar. https:\/\/gcscc.ox.ac.uk\/files\/cmmrapportfinalcybersecuritemadagascarpdf. Accessed 4 Nov 2020"},{"key":"1569_CR20","unstructured":"Global Cyber Security Capacity Centre (2018). Cybersecurity Capacity Review. Former Yugoslav Republic of Macedonia (FYR Macedonia). https:\/\/mioa.gov.mk\/sites\/default\/files\/pbl_files\/documents\/reports\/cmm_fyrom_report_final_13_august2018_2.pdf. Accessed 4 Nov 2020"},{"key":"1569_CR21","unstructured":"Hathaway M (2013) Cyber Readiness Index 1.0. Belfer Center for Science and International Affairs, Harvard Kennedy School. https:\/\/www.belfercenter.org\/publication\/cyber-readiness-index-10. Accessed 1 April 2021"},{"key":"1569_CR22","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1353\/asp.2014.0026","volume":"18","author":"CH Heinl","year":"2014","unstructured":"Heinl CH (2014) Regional Cybersecurity: Moving Toward a Resilient ASEAN Cybersecurity Regime. Asia Policy 18:131\u2013160","journal-title":"Asia Policy"},{"key":"1569_CR23","first-page":"123","volume-title":"Advances in Human Factors in Cybersecurity, Advances in Intelligent Systems and Computing, 501","author":"D Henshel","year":"2016","unstructured":"Henshel D, Sample C, Cains M, Hoffman B (2016) Integrating Cultural Factors into Human Factors Framework and Ontology for Cyber Attackers. In: Nicholson D (ed) Advances in Human Factors in Cybersecurity, Advances in Intelligent Systems and Computing, 501. Springer International Publishing, Switzerland, pp 123\u2013137"},{"key":"1569_CR24","volume-title":"Culture\u2019s Consequences: Comparing Values, Behaviors, Institutions and Organizations Across Nations","author":"G Hofstede","year":"2003","unstructured":"Hofstede G (2003) Culture\u2019s Consequences: Comparing Values, Behaviors, Institutions and Organizations Across Nations, 2nd edn. Sage, London","edition":"2"},{"key":"1569_CR25","unstructured":"Inter-American Development Bank, Organization of American States (2020) Cybersecurity. Risks, Progress and the Way Forward in Latin America and the Caribbean. 2020 Cybersecurity Report. https:\/\/publications.iadb.org\/publications\/english\/document\/2020-Cybersecurity-Report-Risks-Progress-and-the-Way-Forward-in-Latin-America-and-the-Caribbean.pdf. Accessed 4 Nov 2020"},{"key":"1569_CR26","doi-asserted-by":"publisher","unstructured":"Jeong JJ, Mihelcic J, Oliver G, Rudolph C (2019) Towards an Improved Understanding of Human Factors in Cybersecurity. IEE 5th International Conference on Collaboration and Internet Computing. https:\/\/doi.org\/10.1109\/CIC48465.2019.00047","DOI":"10.1109\/CIC48465.2019.00047"},{"key":"1569_CR27","doi-asserted-by":"publisher","first-page":"205395171983523","DOI":"10.1177\/2053951719835238","volume":"6","author":"A Jonas","year":"2019","unstructured":"Jonas A, Burrell J (2019) Friction, Snake Oil, and Weird Countries: Cybersecurity Systems Could deepen Global Inequality through Regional Blocking. Big Data Soc 6:205395171983523. https:\/\/doi.org\/10.1177\/2053951719835238","journal-title":"Big Data Soc"},{"key":"1569_CR28","unstructured":"Kaufmann D, Kraay A, Mastruzzi M (2010) The Worldwide Governance Indicators: Methodology and Analytical Issues. World Bank Policy Research Working Paper No. 5430. https:\/\/ssrn.com\/abstract=1682130. Accessed 4 Nov 2020"},{"key":"1569_CR29","volume-title":"Successful Focus Groups: Advancing the State of the Art","author":"J Knodel","year":"1993","unstructured":"Knodel J (1993) The Design and Analysis of Focus Group Studies: A Practical Approach. In: Morgan DL (ed) Successful Focus Groups: Advancing the State of the Art. SAGE Publications Inc., Newbury Park chapter 3"},{"key":"1569_CR30","volume-title":"Focus Groups: A Practical Guide for Applied Research","author":"RA Krueger","year":"2014","unstructured":"Krueger RA, Casey MA (2014) Focus Groups: A Practical Guide for Applied Research. SAGE Publications Ltd., London"},{"key":"1569_CR31","volume-title":"The Social Shaping of Technology","year":"1993","unstructured":"MacKenzie D, Wajcman J (eds) (1993) The Social Shaping of Technology. Open University Press, Milton Keynes"},{"issue":"1","key":"1569_CR32","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1080\/23738871.2019.1604781","volume":"4","author":"CA Makridis","year":"2019","unstructured":"Makridis CA, Smeets M (2019) Determinants of Cyber Readiness. J Cyber Policy 4(1):72\u201389. https:\/\/doi.org\/10.1080\/23738871.2019.1604781","journal-title":"J Cyber Policy"},{"issue":"1","key":"1569_CR33","first-page":"6","volume":"5","author":"G Oliver","year":"2017","unstructured":"Oliver G (2017) Understanding Information Culture: Conceptual and Implementation Issues. J Inf Sci Theory Pract 5(1):6\u201314","journal-title":"J Inf Sci Theory Pract"},{"key":"1569_CR34","doi-asserted-by":"publisher","unstructured":"Onumo A, Cullen A, Ullah-Awan I (2017) An Empirical Study of Cultural Dimensions and Cybersecurity Development. 2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud). https:\/\/doi.org\/10.1109\/FiCloud.2017.41","DOI":"10.1109\/FiCloud.2017.41"},{"issue":"1","key":"1569_CR35","first-page":"129","volume":"14","author":"N Shafqat","year":"2016","unstructured":"Shafqat N, Masood A (2016) Comparative Analysis of Various National Cyber Security Strategies. Int J Comput Sci Inf Secur 14(1):129\u2013136","journal-title":"Int J Comput Sci Inf Secur"},{"key":"1569_CR36","unstructured":"Shoqata p\u00ebr Teknologji t\u00eb Informacionit dhe t\u00eb Komunikimit t\u00eb Kosov\u00ebs, Kantar Index Kosova (2019) Internet Penetration and Usage in Kosovo. https:\/\/stikk.org\/wp-content\/uploads\/2019\/11\/STIKK_IK_Report_Internet_Penetration_V3-final-1.pdf. Accessed 4 Nov 2020"},{"key":"1569_CR37","unstructured":"Spidalieri F (2015) State of the States on Cybersecurity. Pell Center for International Relations and Public Policy. https:\/\/www.pellcenter.org\/wp-content\/uploads\/2017\/02\/State-of-the-States-Report.pdf. Accessed 1 April 2021"},{"key":"1569_CR38","volume-title":"Routledge Handbook of Democracy and Security","year":"2021","unstructured":"Weinberg L, Francis E, Assoudeh E (eds) (2021) Routledge Handbook of Democracy and Security. Routledge, London"},{"key":"1569_CR39","volume-title":"Making Sense of Social Research","author":"M Williams","year":"2002","unstructured":"Williams M (2002) Making Sense of Social Research. SAGE Publications Ltd., London"},{"key":"1569_CR40","unstructured":"World Bank (2020) World Bank Country and Lending Groups. Historical classification by income. https:\/\/datahelpdesk.worldbank.org\/knowledgebase\/articles\/906519-world-bank-country-and-lending-groups. Accessed 4 Nov 2020"},{"key":"1569_CR41","unstructured":"World Bank (2020) World Development Indicators. https:\/\/datacatalog.worldbank.org\/dataset\/world-development-indicators. Accessed 9 Sept 2020"},{"key":"1569_CR42","unstructured":"World Bank (2020) Worldwide Governance Indicators. https:\/\/datacatalog.worldbank.org\/dataset\/worldwide-governance-indicators. Accessed 9 Sept 2020"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-021-01569-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00779-021-01569-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-021-01569-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,3]],"date-time":"2023-11-03T14:19:37Z","timestamp":1699021177000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00779-021-01569-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,10]]},"references-count":42,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2021,10]]}},"alternative-id":["1569"],"URL":"https:\/\/doi.org\/10.1007\/s00779-021-01569-6","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,10]]},"assertion":[{"value":"9 November 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 April 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 May 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}