The IKEA effect and cybersecurity investment decisions
ON2IT Cybersecurity
The MDR provider you wish you had. Always based on Zero Trust.
By Yuri Bobbert
Have you ever been to an IKEA store? Then you are perhaps already familiar with the satisfying effect of assembling and building stuff yourself. The IKEA effect has been investigated extensively in behavioral and decision sciences. But what does it tell us, and how does it help us with better cybersecurity investment decisions in the long term? What can we learn from the IKEA effect, and how does it help us sharpen our minds while crafting cybersecurity as an organizational function?
IKEA effect explained
Buying furniture from IKEA tends to save us on pricing and transportation (almost all parts are stored and transported flat). But the most significant psychological value is that “labor leads to love.” Daniel Moshon examined the IKEA effect: “The increased valuation that people have for self-assembled products compared to objectively similar products which they did not assemble.”
Moshon’s paper describes possible consequences of the IKEA effect in corporate environments:?“The self-overvaluation that occurs as a result of the IKEA effect has implications for organizations more broadly, as a contributor to two key organizational pitfalls: sunk cost effects, which can cause managers to continue to devote resources to failing projects in which they have previously invested and the “not invented here” syndrome, in which managers refuse to use perfectly good ideas developed elsewhere in favor of own ideas.
The shift of focus: Outsourcing
So how can we use the IKEA effect as a learning opportunity in regards to cybersecurity? Let’s have a look at how businesses procure cybersecurity. Nowadays, companies increasingly tend to issue Request for Information or Proposals concerning outsourcing their security function or specific services. Nothing wrong with that, but they tend to forget this requires clarity on the demand-supply relationship.
We’re talking responsibility and accountability, not only during Business As Usual (BAU) but precisely when the “shit hits the fan.” What can we expect from the supplier? And what can they expect from ourselves, and are we able to live up to that urgent demand when you least expect it? By the way, this is when CISOs are put to the (stress)test.?
I observe the following pitfalls that are related to the?IKEA effect during RFI and RFP processes
Managers with business management or economic background tend to be more aware of their own organizations' “not invented here” syndrome. Opening up to more outcome-driven results that are measurable and, therefore, better expressed in a price.
It simply makes more sense to consume security services with a clear outcome, such as Mean Time to Detect (MTD) or Mean Time to Resolve (MTR), than the number of log megabytes or firewall throughput. Due to their price elasticity, these old-school metrics contribute to the seller rather than the buyer.
Pricing models from SaaS providers charging for additional security services on top of their SaaS services are not uncommon but perverse since security should be an inherent part of the offering. I’m not surcharged for airbags in my car, right?
Decision-making process
?The message here is simple: before companies embark on a security journey of outsourcing, issuing out RFPs or RFI’s, they should challenge themselves on:
领英推荐
My general advisory here would be to develop a pre-mortem analysis where together with supplier and internal stakeholders, two scenarios are created in the form of a story; one with a positive outcome and one with a negative effect.
Organizations that conduct pre-mortems tend to make better long-term decisions since they share common interests, outcomes, and expectations. Pre-mortems are done via stories and must be done under professional and objective guidance.
I would also suggest working with Best Value Propositions rather than prescriptive RFI or RFPs. A value proposition is a statement that identifies clear, measurable, and verifiable benefits consumers get when buying a particular product or service. It should convince consumers based on verifiable propositions that this product or service is better than others, adds value, and contributes to solving the problem(s).
I like IKEA’s concept of building and assembling your furniture, but it becomes another ball game if you want to buy a large closet with mirrors, sliding doors, and lighting. Those are the moments when my better half “objectively” advises to leave that up to the specialists. And I could not agree more.
In Cybersecurity, we tend to perceive ourselves as experts and know everything. In most cases, you cannot know everything, and the higher you come in the leadership food chain, you need to rely on others and delegate to get the best results. For some security leaders, that capability requires investing in delegation, talent management, orchestration, and financing
Do it yourself or outsource; That is the question
To guide these security leaders and avoid the IKEA effect, the “IKEA assembly line” of Zero Trust supports both doing it yourself or outsourcing (parts).
Zero Trust views security through the lens of the data, assets, applications, and services needed to contribute to bringing products or services vital to the organization's business goals. It reasons from a business perspective rather than the IT or security department alone. Continuous improvement and adjustments to the technology are evident.
The great thing about Zero Trust is that it is a way of looking at the environment more simplistically, eliminating trust that was inherently built in from the past—allowing you to re-use tools and parts that you already have and enabling you to work via a structured way (guiding principles) to build and run better cybersecurity.
Building sustainable Zero Trust environments requires a craftsmen's eye; running them requires brilliant orchestration and technology automation rules. The combination of two calls for unique capabilities beyond an IKEA manual and a “do it yourself” mindset. Not falling prey to the IKEA effect and finding a balance between do it yourself or outsourcing is the best way to provide this reasonable assurance.
Used Sources
[1] M. Norton, D. Mochon and D. Ariely, The “IKEA Effect”: When Labor Leads to Love, Harvard Business School, 2011.
[2] Y. Bobbert and J. Scheerder, "On the Design and Engineering of a Zero Trust Security Artefact," in Future of Information and Communication Conference (FICC), Vancouver, 2021.
[3] Y. Bobbert, J. Scheerder and T. Timmermans, "Perspectives from 50+ years practical Zero Trust experience and learnings on buyer expectations and industry promises," in SAI Conference, London, 2022.
[4] Y. Bobbert, "Which of these 4 CISO archetypes do you deserve?," Antwerp Management School, 2020. [Online]. Available: https://blog.antwerpmanagementschool.be/en/which-of-these-4-ciso-archetypes-do-you-deserve.
[5] Y. Bobbert and M. Butterhoff, Leading Digital Security; 12 ways to combat the silent enemy, Utrecht: https://12ways.net/blogs/emerging-roles-in-digital-security/, 2020.