Digital Design Thinking With 'Locus of Control'

Rimesh Patel CEng

What it means for Cyber Security.


How businesses behave can be based on the perceived traits of consumers and clients, or professionally said, the personality construct of an entities belief system whose competency considerations attributes failure or success, so in today's new norm, how does your business operating environment consider;

•Perceived Control: Internal/External Locus of Control.
•Success Based Services: Risk Appetite Behaviour.
•Life Science Services: Consumer Traits & Influences.
•Patent Development: Marketplace Execution.
•Thematic Designs: Regulation & Framework Selection.

The term is mainly used within the psychology industry but it gives a welcomed sounding board for progressing your cyber security posture. The new low-touch economy and its use of cognitive last mile technology has heightened consumer needs, not only from a service delivery perspective, but also by innovating accessible technologies for health and well-being.

Overnight, the design of new products and industries has created the newest categories of data-disposition strategies and from our cyber security perspective it assists in clarifying applicable data privacy risks.

We've seen some concentric business units referred to as blobs or bubbles - these are now the new perimeters for technology that your design and privacy principals need to adapt to, including identifying applicable cyber security mechanisms.

If you are designing a new product or service, it is important to consider the functional traits and behaviours of new platforms and associated product interactions and how they represent risk perception. Consumers by necessity may need access to your new platform, but if the user design does not feel safe or the platform introduces technology risk, then your value is undermined. From a business view, it is important to understand the thematic and scientific telemetry -based thinking approach when considering what risk model is appropriate for your new product or service.

New modern smart solutions are extending the ‘just in time model’ of the 1980's to envelope consumer led customisation. It's only now possible as 5G, Internet of Things and Edge technologies provide the new foundations required to give consumers the ability to experience real time needs, but also select solutions based on their risk appetites.

Individuals with an 'internal' locus of control have higher propensity of adopting appropriate technologies, while those with an 'external' locus of control are less likely to adopt these newer technologies - 'Hierarchy Of Needs' play an important factor, so the reverse can be true too, and that's where design thinking is vital for your design and business resiliency.

Commonly, engineers adopt the view 'there is a design fault with the glass - not that it's half empty or half full'. Qualified design thinking will let you take digital logic into discrete thinking, so you can design for the multiple propensities of technology adoption. If you design a new pandemic-based solution, it is inherently going to have digital privacy techniques afore whilst also considering the perception of social distancing and other published pandemic standards.

Perhaps federated consent is mandatory across your technology ecosystem, if so, how will it be designed into your low-touch economy proposition? Getting it right now will mean you do not have an unmanageable list of compensatory controls within your risk register. Perhaps your new solution will use smart API's to connect the physical and virtual realities - if so, what assurances have you in place for data privacy against the new attach vectors,

Consumer technology must promote the concept of control, smart automatic lawn mowers only work once you have manually configured the garden range of the base unit - the user-based locus of control is simple here. For automated cars, the complex trait for each ecosystem vehicle-component needs to have applicable internal and external locus of control considerations applied correctly.

Whatever your industry, getting independent, qualified help in design thinking techniques will clarify your value proposition so your business can enterprise by design securely.


#RUCyberReady

#RUCyberReady #CyberSecurity #AI  #2026
by Rimesh Patel 29 December 2025
What does 2026 mean for Cyber Security?
by Rimesh Patel 31 December 2024
What does 2025 mean for Cyber Security?
#RUCyberReady #CyberSecurity #2024
by Rimesh Patel CEng 30 December 2023
What does 2024 mean for Cyber Security?
by Rimesh Patel CEng 5 March 2023
Securmeo & Cyberette
by Rimesh Patel CEng 30 December 2022
What does 2023 mean for Cyber Security?
by Rimesh Patel CEng 28 December 2021
What does 2022 mean for Cyber Security?
by Rimesh Patel CEng 15 October 2021
What it means for Cyber Security ?
by Rimesh Patel CEng 13 June 2021
Empower your customers and partners, by not being their digital weakest link.
by Rimesh Patel CEng 28 December 2020
What to expect in 2021 for digital ecosystems.
by Rimesh Patel CEng 17 August 2020
For your customer it means they feel safe and confident that your products or services are less likely to get caught out by the trending hack in the news. For your business, it means you are not the weakest link in the supply chain, and for industry, you can interact with others who also demonstrate good governance a chosen threat and vulnerability management framework. A vulnerability management framework has to consider assets, inherent risks and frequency of threats, including; Secure Development Life Cycle Programme User Acceptance Testing & Penetration Testing Risk Remediation & Ownership Resilience Services Patch Scheduling A vulnerability management programme will unite the above into one programme that will increase your security posture. If you are dependent on your online internet facing servers, laptops or devices, then having a dedicate resource is recommended, you can also look at outsourcing repeatable activities, however assessing each risk should have final sign-off from internal leads only. Internal risk postures are constantly moving as are external ones, so making the assessment on how actual attack vectors are going to effect your core business activities is best done internally as the vulnerability categories for risk remediation is only understood by you - including how they effect your security policy. You might have a vulnerability management policy, especially if you are risk appetite is low or your core business interacts with regulated products like heath devices, smart vehicles, utility services or any critical service. Having a dedicated policy will let you validate you have selected the right framework to make assessments of each vulnerability and making sure old vulnerability patterns are not repeated. A good vulnerability management programme will make sure you own your risk and have the right security controls in place, even if you use compensatory controls, they too will be in scope for vulnerability tests, so you must know how your resilience frameworks take effect if those controls fails. SAIBER Ltd's Vendor Neutral Vulnerability Management package will let you execute vulnerability management efficiently by empowering your resources will the correct mechanisms that consider all the above, including technical assessments. #RUCyberReady