Abstract

Understanding human-technology co-adaptation processes is becoming of utmost importance. Co-adaptation required among various actors is critical for their survival especially in turbulent environments such as the cyberspace. Indeed, cyberspace is marked by imminent cyber threats forcing IT stakeholders to act promptly, re-enforcing cybersecurity with complex and increasingly intrusive technologies with significant social impact. Based on a field study where a governmental organization (GO) acquired cybersecurity systems; and leveraging a constructive grounded theory extended with and abductive research, this study showcases that cybersecurity being as strong as its weakest actor, a requirement for a collective successful co-adaptation amongst various actors is of utmost importance. A technology-human co-adaptation model is proposed. It is processual in nature, with a holistic reach driven inspired by various adaptation dynamics such as power, identity, ethics and technology; that are driving the overall co-adaptation. Knowing what it takes for a better co-adaptation will allow cybersecurity stakeholders, managers and practitioners to bring more focus on pre-adaptation efforts facilitating the co-adaptation processes therefore allowing the acceleration of the much needed success of cybersecurity systems deployments or any other controversial but required technology.

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.