This research examines the critical intersection of cultural dimensions and cybersecurity practices within multinational corporations (MNCs) through the lens of cyberpsychology. By analyzing how cultural factors influence human-computer interaction and security behavior, this study provides insights into developing culturally informed cybersecurity strategies. The research employs a qualitative methodology, including case studies across 15 organizations spanning Asia, Europe, and the Middle East, utilizing document analysis, semi-structured interviews, and observational techniques. Neuroimaging studies reveal that security information processing varies neurologically across cultural contexts, with collectivist cultures showing distinct brain activation patterns compared to individualist environments. Empirical findings demonstrate that MNCs implementing culturally adapted security protocols experience up to 40% higher compliance rates, a 35% improvement in threat detection, and a 45% reduction in response times. The study concludes that effective cybersecurity in global environments requires the integration of cultural considerations into security frameworks, addressing both technical systems and the human operators who manage them.
References
[1]
Jeong, J., Mihelcic, J., Oliver, G. and Rudolph, C. (2019) Towards an Improved Understanding of Human Factors in Cybersecurity. 2019 IEEE 5th International Conference on Collaboration and Internet Computing (CIC), Los Angeles, 12-14 December 2019, 338-345. https://doi.org/10.1109/cic48465.2019.00047
[2]
Pollini, A., Callari, T.C., Tedeschi, A., Ruscio, D., Save, L., Chiarugi, F., et al. (2021) Leveraging Human Factors in Cybersecurity: An Integrated Methodological Approach. Cognition, Technology&Work, 24, 371-390. https://doi.org/10.1007/s10111-021-00683-y
[3]
Hofstede, G. (1984) Cultural Dimensions in Management and Planning. AsiaPacificJournalofManagement, 1, 81-99. https://doi.org/10.1007/bf01733682
[4]
Pavlova, E. (2020) Enhancing the Organisational Culture Related to Cyber Security during the University Digital Transformation. Information&Security: AnInternationalJournal, 46, 239-249. https://doi.org/10.11610/isij.4617
[5]
Fenech, J., Richards, D. and Formosa, P. (2024) Ethical Principles Shaping Values-Based Cybersecurity Decision-Making. Computers & Security, 140, Article ID: 103795. https://doi.org/10.1016/j.cose.2024.103795
[6]
Shah, M.U., Iqbal, F., Rehman, U. and Hung, P.C.K. (2023) A Comparative Assessment of Human Factors in Cybersecurity: Implications for Cyber Governance. IEEEAccess, 11, 87970-87984. https://doi.org/10.1109/access.2023.3296580
[7]
Onumo, A., Cullen, A. and Ullah-Awan, I. (2017). An Empirical Study of Cultural Dimensions and Cybersecurity Development. 2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud), Prague, 21-23 August 2017, 70-76. https://doi.org/10.1109/ficloud.2017.41
[8]
Dinev, T., Goo, J., Hu, Q. and Nam, K. (2009) User Behaviour towards Protective Information Technologies: The Role of National Cultural Differences. InformationSystemsJournal, 19, 391-412. https://doi.org/10.1111/j.1365-2575.2007.00289.x
[9]
Yayla, A. and Lei, Y. (2018) Information Security Policies and Value Conflict in Multinational Companies. Information&ComputerSecurity, 26, 230-245. https://doi.org/10.1108/ics-08-2017-0061
[10]
Andrade, R.O. and Yoo, S.G. (2019) Cognitive Security: A Comprehensive Study of Cognitive Science in Cybersecurity. JournalofInformationSecurityandApplications, 48, Article ID: 102352. https://doi.org/10.1016/j.jisa.2019.06.008
[11]
Choo, C.W. (2009) Information Use and Early Warning Effectiveness: Perspectives and Prospects. JournaloftheAmericanSocietyforInformationScienceandTechnology, 60, 1071-1082. https://doi.org/10.1002/asi.21038
[12]
Kharlamov, A. and Pogrebna, G. (2019) Using Human Values‐Based Approach to Understand Cross‐Cultural Commitment toward Regulation and Governance of Cybersecurity. Regulation&Governance, 15, 709-724. https://doi.org/10.1111/rego.12281
[13]
Neupane, A., Saxena, N., Maximo, J.O. and Kana, R. (2016) Neural Markers of Cybersecurity: An fMRI Study of Phishing and Malware Warnings. IEEETransactionsonInformationForensicsandSecurity, 11, 1970-1983. https://doi.org/10.1109/tifs.2016.2566265
[14]
Hu, Q., West, R. and Smarandescu, L. (2015) The Role of Self-Control in Information Security Violations: Insights from a Cognitive Neuroscience Perspective. JournalofManagementInformationSystems, 31, 6-48. https://doi.org/10.1080/07421222.2014.1001255
[15]
West, R., Budde, E. and Hu, Q. (2019) Neural Correlates of Decision Making Related to Information Security: Self-Control and Moral Potency. PLOSONE, 14, e0221808. https://doi.org/10.1371/journal.pone.0221808
[16]
Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., et al. (2016). Cultural and Psychological Factors in Cyber-Security. Proceedings of the 18th International Conference on Information Integration and Web-Based Applications and Services, Singapore, 28-30 November 2016, 318-324. https://doi.org/10.1145/3011141.3011165
[17]
Kleist, V.F. (2021) Global Multinational Organizations: Unintended Threats from Nation-State Cyberwarfare. JournalofGlobalInformationTechnologyManagement, 24, 229-234. https://doi.org/10.1080/1097198x.2021.1996925
[18]
Bailey, D., Kornegay, M., Partlow, L., Bowens, C., Gareis, C. and Kornegay, K. (2024) Utilizing Culturally Responsive Strategies to Inspire African American Female Participation in Cybersecurity American Female Participation in Cybersecurity. Journal of Pre-College Engineering Education Research, 13, Article No. 8. https://par.nsf.gov/biblio/10507902
[19]
Hatzivasilis, G., Ioannidis, S., Smyrlis, M., Spanoudakis, G., Frati, F., Goeke, L., et al. (2020) Modern Aspects of Cyber-Security Training and Continuous Adaptation of Programmes to Trainees. AppliedSciences, 10, Article No. 5702. https://doi.org/10.3390/app10165702
[20]
Cowley, J.A., Nauer, K.S. and Anderson, B.R. (2015) Emergent Relationships between Team Member Interpersonal Styles and Cybersecurity Team Performance. ProcediaManufacturing, 3, 5110-5117. https://doi.org/10.1016/j.promfg.2015.07.526
[21]
Braun, T. (2019) The Impact of Cultural Differences on Compliance Norms. In: Braun, T., Ed., ComplianceNormsinFinancialInstitutions, Springer International Publishing, 257-284. https://doi.org/10.1007/978-3-030-24966-3_5
[22]
Bowers, C. (2016) Misconceptions about Language. In: Digital Detachment, Routledge, 26-34.
[23]
Kshetri, N. (2016) Cybersecurity in Japan. In: Kshetri, N., Ed., TheQuesttoCyberSuperiority, Springer International Publishing, 159-170. https://doi.org/10.1007/978-3-319-40554-4_9
[24]
Bhatia, D. (2022) A Comprehensive Review on the Cyber Security Methods in Indian Organisation. InternationalJournalofAdvancesinSoftComputingandItsApplications, 14, 103-124. https://doi.org/10.15849/ijasca.220328.08
[25]
Jacuch, A. (2021) Comparative Analysis of Cybersecurity Strategies. European Union Strategy and Policies. Polish and Selected Countries Strategies. OnlineJournalModellingtheNewEurope, No. 37, 102-120. https://doi.org/10.24193/ojmne.2021.37.06
[26]
Darmois, E. and Schméder, G. (2016) Cybersecurity: A Case for a European Approach. Security in Transition: An Interdisciplinary into the Security Gap. London School of Economics (LSE), 9. https://uk.fes.de/fileadmin/user_upload/publications/files/FES_LSE_Cybersecurity_Schmeder_Darmois_160223.pdf
[27]
Górka, M. (2018) The Cybersecurity Strategy of the Visegrad Group Countries. PoliticsinCentralEurope, 14, 75-98. https://doi.org/10.2478/pce-2018-0010
[28]
Haner, J.K. and Knake, R.K. (2021) Breaking Botnets: A Quantitative Analysis of Individual, Technical, Isolationist, and Multilateral Approaches to Cybersecurity. JournalofCybersecurity, 7, tyab003. https://doi.org/10.1093/cybsec/tyab003
[29]
Segal, A., Akimenko, V., Giles, K., Pinkston, D.A., Lewis, J.A., Bartlett, B. and Noor, E. (2020) The Future of Cybersecurity across the Asia-Pacific. Asia Policy, 15, 57-114.
[30]
Othman, S.N., Jawad, A.M., Hameed, R., Kawad, R.T. and Khlaponin, D. (2025) The Impact of Cybersecurity Law in the Middle East. Encuentros: Revista de CienciasHumanas, Teoría Social y Pensamiento Crítico, No. 23, 392-420. https://doi.org/10.5281/zenodo.1429128
[31]
Muahammad, N. and Khan, S.U. (2024) Global Culture of Cybersecurity: A Multi-Vocal Literature Review Protocol. The Lighthouse Journal of Social Sciences, 3, 67-88. https://kpheart.edu.pk/ojs/index.php/ljss/article/view/132
[32]
Deibert, R.J. (2018) Toward a Human-Centric Approach to Cybersecurity. Ethics & International Affairs, 32, 411-424. https://doi.org/10.1017/s0892679418000618
[33]
Wright, S.A. and Xie, G. (2017) Perceived Privacy Violation: Exploring the Malleability of Privacy Expectations. JournalofBusinessEthics, 156, 123-140. https://doi.org/10.1007/s10551-017-3553-z
[34]
Schreider, T. (2020) Cybersecurity Law, Standards, and Regulations. Rothstein Publishing.
[35]
Chernenko, E., Demidov, O. and Lukyanov, F. (2022) Increasing International Co-operation in Cybersecurity and Adapting Cyber Norms. Council on Foreign Relations. https://eng.globalaffairs.ru/articles/increasing-international-cooperation-in-cybersecurity-and-adapting-cyber-norms/
[36]
Juneja, A., Goswami, S.S. and Mondal, S. (2024) Cyber Security and Digital Economy: Opportunities, Growth and Challenges. Journal of Technology Innovations and Energy, 3, 1-22. https://doi.org/10.56556/jtie.v3i2.907
[37]
Pattinson, M.R., Butavicius, M.A., Ciccarello, B., Lillie, M., Parsons, K., Calic, D. and McCormac, A. (2018) Adapting Cyber-Security Training to Your Employees. In: HAISA, 67-79. https://www.cscan.org/openaccess/?id=379
[38]
Pattinson, M., Butavicius, M., Lillie, M., Ciccarello, B., Parsons, K., Calic, D., et al. (2019) Matching Training to Individual Learning Styles Improves Information Security Awareness. Information&ComputerSecurity, 28, 1-14. https://doi.org/10.1108/ics-01-2019-0022
[39]
Labuschagne, W.A. and Veerasamy, N. (2017) Metrics for Smart Security Awareness. In: European Conference on Cyber Warfare and Security, Academic Conferences International Limited, 235-242. https://www.proquest.com/conference-papers-proceedings/metrics-smart-security-awareness/docview/1966800515/se-2
[40]
Milliman, J., Taylor, S. and Czaplewski, A. J. (2002) Cross-Cultural Performance Feedback in Multinational Enterprises: Opportunity for Organizational Learning. Human Resource Planning, 25, 29-43. https://www.proquest.com/trade-journals/cross-cultural-performance-feedback-multinational/docview/224568979/se-2
[41]
Knapp, K.J., Marshall, T.E., Kelly Rainer, R. and Nelson Ford, F. (2006) Information Security: Management’s Effect on Culture and Policy. InformationManagement&ComputerSecurity, 14, 24-36. https://doi.org/10.1108/09685220610648355
[42]
Deans, P.C., Karwan, K.R., Goslar, M.D., Ricks, D.A. and Toyne, B. (1991) Identification of Key International Information Systems Issues in U.S.-Based Multinational Corporations. JournalofManagementInformationSystems, 7, 27-50. https://doi.org/10.1080/07421222.1991.11517902
[43]
Steinke, J., Bolunmez, B., Fletcher, L., Wang, V., Tomassetti, A.J., Repchick, K.M., et al. (2015) Improving Cybersecurity Incident Response Team Effectiveness Using Teams-Based Research. IEEESecurity&Privacy, 13, 20-29. https://doi.org/10.1109/msp.2015.71
[44]
Ahmad, A., Maynard, S.B. and Shanks, G. (2015) A Case Analysis of Information Systems and Security Incident Responses. InternationalJournalofInformationManagement, 35, 717-723. https://doi.org/10.1016/j.ijinfomgt.2015.08.001
[45]
Van der Kleij, R., Kleinhuis, G. and Young, H. (2017) Computer Security Incident Response Team Effectiveness: A Needs Assessment. FrontiersinPsychology, 8, Article No. 2179. https://doi.org/10.3389/fpsyg.2017.02179
[46]
Grispos, G., Glisson, W.B. and Storer, T. (2017) Enhancing Security Incident Response Follow-Up Efforts with Lightweight Agile Retrospectives. DigitalInvestigation, 22, 62-73. https://doi.org/10.1016/j.diin.2017.07.006
[47]
Hudson, P. (2010) Integrating Organisational Culture into Incident Analyses: Extending the Bow Tie Model. SPE International Conference on Health, Safety and Environment in Oil and Gas Exploration and Production, Rio de Janeiro, April 2010, SPE-127180-MS. https://doi.org/10.2118/127180-ms
[48]
Abraham, S. and Shih, L. (2015) Instructional Perspective: Towards an Integrative Learning Approach in Cybersecurity Education. Information Security Education Journal, 2, 84-90. http://www.dline.info/isej/fulltext/v2n2/5.pdf
[49]
Hasani, T., O’Reilly, N., Dehghantanha, A., Rezania, D. and Levallet, N. (2023) Evaluating the Adoption of Cybersecurity and Its Influence on Organizational Performance. SNBusiness&Economics, 3, Article No. 97. https://doi.org/10.1007/s43546-023-00477-6
[50]
Tziarras, Z. (2014) The Security Culture of a Global and Multileveled Cybersecurity. In: Carayannis, E.G., et al., Eds., Cyber-Development, Cyber-DemocracyandCyber-Defense, Springer, 319-335. https://doi.org/10.1007/978-1-4939-1028-1_13
[51]
MÜller, S.D., KrÆmmergaard, P. and Mathiassen, L. (2009) Managing Cultural Variation in Software Process Improvement: A Comparison of Methods for Subculture Assessment. IEEETransactionsonEngineeringManagement, 56, 584-599. https://doi.org/10.1109/tem.2009.2013829
[52]
Lokare, A., Bankar, S. and Mhaske, P. (2025) Integrating Cybersecurity Frameworks into IT Security: A Comprehensive Analysis of Threat Mitigation Strategies and Adaptive Technologies. https://doi.org/10.48550/arXiv.2502.00651
[53]
Balcetis, E. (2022) Sociocultural Orientation and Perceived Utility of Base Rates in Self and Social Judgments of Cyber Risk. Current Research in Psychology and Behavioral Science (CRPBS), 3, Article No. 1059.
[54]
Kure, H.I., Islam, S. and Mouratidis, H. (2022) An Integrated Cyber Security Risk Management Framework and Risk Predication for the Critical Infrastructure Protection. NeuralComputingandApplications, 34, 15241-15271. https://doi.org/10.1007/s00521-022-06959-2
[55]
Al-Mayahi, I. and Mansoor, S.P. (2013) Information Security Culture Assessment: Case Study. 2013 IEEE 3rd International Conference on Information Science and Technology (ICIST), Yangzhou, 23-25 March 2013, 789-792. https://doi.org/10.1109/icist.2013.6747661
[56]
Norman, M.D. and Koehler, M.T.K. (2017) Cyber Defense as a Complex Adaptive System: A Model-Based Approach to Strategic Policy Design. Proceedings of the 2017 International Conference of the Computational Social Science Society of the Americas, Santa Fe, 19-22 October 2017, 1. https://doi.org/10.1145/3145574.3145595
[57]
Nurcan, E.S. (2022) Theoretical, Empirical, and Normative Dimensions of State Involvement in Cybersecurity: The Case of Japan. Ordu Üniversitesi SosyalBilimlerEnstitüsüSosyalBilimlerAraştırmalarıDergisi, 12, 689-708. https://doi.org/10.48146/odusobiad.1079425