ing both theories in combination (JCM and HBM),
therefore, we believe that there is a sound theoreti-
cal basis to warrant further validation of CJML and
SSM together to raise awareness of cyber threats and
encourage proactive engagement within SMEs to be
able to handle those threats, i.e., to encourage desired
cybersecure behaviours.
As future work, we will carry out validation case
studies with SMEs in four different business sectors.
As a starting point, we will define representative sce-
narios and environments where the tools should be ef-
fective. We will then apply the tools and investigate
how they support i) the identification and analysis of
risks, ii) communication among security experts and
non-technical personnel, and iii) general cybersecu-
rity awareness across organisational units and roles.
ACKNOWLEDGEMENTS
This research is funded by the European Com-
mission through the CyberKit4SME project
(www.cyberkit4sme.eu) under Grant Agreement
883188. CyberKit4SME will provide cybersecurity
tools that help SMEs become aware of, analyse, and
manage cybersecurity and data protection risks.
REFERENCES
Acquisti, A., Brandimarte, L., and Loewenstein, G. (2015).
Privacy and human behavior in the age of information.
Science, 347(6221):509–514.
Arctic Wolf (2017). The state of mid-market
cybersecurity: Findings and implica-
tions. https://2p167arhj4lo70dn1q26fm1c-
wpengine.netdna-ssl.com/wp-content/uploads/-
AW Brief Midmarket Cybersecurity Survey.pdf
(Accessed 09 Aug 2020).
Bellamy, R. K., Erickson, T., Fuller, B., Kellogg, W. A.,
Rosenbaum, R., Thomas, J. C., and Wolf, T. V. (2007).
Seeing is believing: Designing visualizations for man-
aging risk and compliance. IBM Systems Journal,
46(2):205–218.
Benz, M. and Chatterjee, D. (2020). Calculated risk? A cy-
bersecurity evaluation tool for SMEs. Business Hori-
zons, 63:531–540.
Blythe, J. (2013). Cyber security in the workplace: Un-
derstanding and promoting behaviour change. In Pro-
ceedings of CHItaly 2013 Doctoral Consortium, vol-
ume 1065, pages 92–101. CEUR Workshop Proceed-
ings.
Carpenter, C. J. (2010). A meta-analysis of the effectiveness
of health belief model variables in predicting behavior.
Health communication, 25(8):661–669.
Champion, V. L. and Skinner, C. S. (2008). The health be-
lief model. In Glanz, K., Rimer, B. K., and Viswanath,
K., editors, Health behavior and health education:
Theory, research, and practice, pages 45–65. John
Wiley & Sons, 4th edition.
Hackman, R. J. and Oldham, G. (1976). Motivation through
the design of work: Test of a theory. Organizational
behavior and human performance, 16(2):250–279.
Halvorsrud, R., Haugstveit, I. M., and Pultier, A. (2016a).
Evaluation of a modelling language for customer
journeys. In Proceedings of IEEE Symposium on
Visual Languages and Human-Centric Computing
(VL/HCC), pages 40–48. IEEE.
Halvorsrud, R., Kvale, K., and Følstad, A. (2016b). Improv-
ing service quality through customer journey analysis.
Journal of Service Theory and Practice, 24(6):840–
867.
Haugstveit, I. M., Halvorsrud, R., and Karahasanovic, A.
(2016). Supporting redesign of C2C services through
customer journey mapping. In Service Design Ge-
ographies. Proceedings of the ServDes. 2016 Confer-
ence, number 125, pages 215–227. Link
¨
oping Univer-
sity Electronic Press.
Kullman, K., Buchanan, L., Komlodi, A., and Engel, D.
(2020). Mental model mapping method for cyberse-
curity. In Proceedings of the International Confer-
ence on Human-Computer Interaction, volume 12210,
pages 458–470. Springer.
Lindsay, J. J. and Strathman, A. (1997). Predictors of re-
cycling behavior: an application of a modified health
belief model 1. Journal of Applied Social Psychology,
27(20):1799–1823.
Lipkus, I. M. (2007). Numeric, verbal, and visual formats of
conveying health risks: suggested best practices and
future recommendations. Medical decision making,
27(5):696–713.
Lipkus, I. M. and Hollands, J. G. (1999). The visual com-
munication of risk. JNCI monographs, 1999(25):149–
163.
Martin, G., Ghafur, S., Kinross, J., Hankin, C., and Darzi,
A. (2018). WannaCry - a year on. BMJ, 361.
Meshkat, L., Miller, R. L., Hillsgrove, C., and King, J.
(2020). Behavior modeling for cybersecurity. In Pro-
ceedings of the 2020 Annual Reliability and Maintain-
ability Symposium (RAMS), pages 1–7. IEEE.
Meszaros, J. and Buchalcevova, A. (2017). Introducing
ossf: A framework for online service cybersecurity
risk management. Computers & security, 65:300–313.
Nurse, J. R., Creese, S., Goldsmith, M., and Lamberts, K.
(2011). Trustworthy and effective communication of
cybersecurity risks: A review. In Proceedings of the
1st Workshop on Socio-Technical Aspects in Security
and Trust (STAST), pages 60–68. IEEE.
Olli, E., Grendstad, G., and Wollebaek, D. (2001). Corre-
lates of environmental behaviors: Bringing back so-
cial context. Environment and behavior, 33(2):181–
208.
Paulsen, C. (2016). Cybersecuring small businesses. Com-
puter, 49(8):92–97.
Pickering, B., Bartholomew, R., Janian, M. N., Moreno,
B. L., and Surridge, M. (2020). Ask me no ques-
tions: Increasing empirical evidence for a qualitative
approach to technology acceptance. In Proceedings
Cybersecurity for SMEs: Introducing the Human Element into Socio-technical Cybersecurity Risk Assessment
273