sented in (Østby et al., 2019). The results showed that
cybersecurity is everyone’s responsibility in the orga-
nization. Therefore, training the workforce by using
socio-technical RCA to create best scenarios for ex-
ercises is necessity to maintain the organization se-
cure. A weakness in the SBC RC approach is that it
is based on expert knowledge of the organization and
highly subjective. Another path for future work is to
research the model further across multiple universities
for validation and improvement.
7 CONCLUSION
In this study, we employed a socio-technical root
cause analysis to uncover causes of compromised ac-
count at the University. We carried out this analysis
in the direction of problem analysis and solving. The
results from the scoring scheme shows that on the
individual level, PW reuse across multiple services
is the largest contributor to the problem and makes
out 42% of the problem in the collected sample. PW
strength is the second largest contributor at 25%, Mal-
ware is at 19% and phishing attacks accounts for 10%.
Low awareness has been attributed to 3% of the in-
cidents, but is not mutually exclusive from top four
causes. Several respondents had high scores in multi-
ple categories indicating weak security practices over-
all. Applying the STA, we found multiple contribut-
ing causes on different layers in societal and techni-
cal hierarchy. Our proposed hypotheses for RCs in-
cludes organizational and culture aspects as key as-
pects in understanding the problem. This work has
also identified the emerging conflict between the re-
quirements from modern cybersecurity and the open
academic culture. As the pressure increases these is-
sues will need to be dealt with at both an organiza-
tional and national level. To summarize the findings,
we ended up with several RCs that can be explored
and validated in future work.
ACKNOWLEDGEMENTS
This research paper has been supported by the
NTNU project CREATE@IIK. We also thank Fredrik
Theien, Thomas Huse, Ole Martin Søgnen, Vasileios
Gkioulos, the NTNU Digital Security Section, the
study participants, and the anonymous reviewers for
their contributions.
REFERENCES
Abubakar, A., Zadeh, P. B., Janicke, H., and Howley, R.
(2016). Root cause analysis (rca) as a preliminary tool
into the investigation of identity theft. In Cyber Secu-
rity And Protection Of Digital Services (Cyber Secu-
rity), 2016 International Conference On, pages 1–5.
IEEE.
Andersen, B. and Fagerhaug, T. (2006). Root cause anal-
ysis: simplified tools and techniques. ASQ Quality
Press.
Chapman, J. (2019). How safe is your data? cyber-security
in higher education. HEPI Policy Note, April(12).
Collmann, J. and Cooper, T. (2007). Breaching the secu-
rity of the kaiser permanente internet patient portal:
the organizational foundations of information secu-
rity. Journal of the American Medical Informatics As-
sociation, 14(2):239–243.
Debrincat, J., Bil, C., and Clark, G. (2013). Assessing or-
ganisational factors in aircraft accidents using a hy-
brid reason and accimap model. Engineering Failure
Analysis, 27:52–60.
Grassi, P., Garcia, M., and Fenton, J. (2017). Nist special
publication 800-63-3–digital identity guidelines.
Hellesen, N., Torres, H., and Wangen, G. (2018). Empiri-
cal case studies of the root-cause analysis method in
information security. International Journal On Ad-
vances in Security, 11(1&2).
Huse, T. H., Nyblom, P. B., Søgnen, O. M., and
Theien, F. L. (2018). En case-studie p
˚
a bruk av
rot
˚
arsaksanalyse innen informasjonssikkerhet. B.S.
thesis, NTNU in Gjøvik.
Huynen, J.-L. and Lenzini, G. (2017). From situation
awareness to action: An information security manage-
ment toolkit for socio-technical security retrospective
and prospective analysis. In Proceedings of the 3rd
International Conference on Information Systems Se-
curity and Privacy, pages 213 – 224.
Julisch, K. (2003). Clustering intrusion detection alarms
to support root cause analysis. ACM transactions on
information and system security (TISSEC), 6(4):443–
471.
Kowalski, S. (1994). IT Insecurity: A Mult-disciplinary In-
quiry. PhD thesis, Stockholm University.
Østby, G., Berg, L., Kianpour, M., Katt, B., and Kowalski,
S. (2019). A socio-technical framework to improve
cyber security training: A work in progress. In 5th In-
ternational Workshop on Socio-Technical Perspective
in IS development (STPIS’19). CEUR-WS.
Thomas, K., Li, F., Zand, A., Barrett, J., Ranieri, J., In-
vernizzi, L., Markov, Y., Comanescu, O., Eranti, V.,
Moscicki, A., et al. (2017). Data breaches, phishing,
or malware?: Understanding the risks of stolen cre-
dentials. In Proceedings of the 2017 ACM SIGSAC
Conference on Computer and Communications Secu-
rity, pages 1421–1434. ACM.
Wangen, G. (2019). Quantifying and analyzing information
security risk from incident data. In The Sixth Inter-
national Workshop on Graphical Models for Security.
Springer.
Wangen, G., Brodin, E. Ø., Skari, B. H., and Berglind, C.
(2019). Unrecorded security incidents at NTNU 2018
(Mørketallsundersøkelsen ved NTNU 2018). NTNU
Open Gjøvik.
The Root Causes of Compromised Accounts at the University
551