EN
A Review on cyber security in oil and gas rig sites by itemizing human errors in turn-torque-systems
Abstract
Information technology (IT) is widely utilized at rig sites, with its growing volume and complexity introducing potential errors that may lead to system failures. While various studies propose preventive solutions, human errors remain a leading cause of system failures and cybersecurity vulnerabilities. Investigating the factors contributing to these errors has become increasingly important. Human error is often regarded as the weakest link in the security chain and a primary cause of system failures. This study examines human factors influencing Turn-Torque Systems, critical control systems used at rig sites in the oil and gas sector. Human errors weaken the cybersecurity of these systems, creating vulnerabilities. By focusing on failures caused specifically by human errors rather than broader cybersecurity challenges, this review identified several human factors impacting IT, including time pressure, security culture, inadequate security policies, lack of education and training, insufficient security awareness, peer behavior, poor communication, work-related stressors, flawed system design, and misalignment with security policies. Itemizing these factors allows targeted interventions to address them individually, thereby reducing human errors and mitigating cybersecurity risks at rig sites.
Keywords
References
- [1] Zwilling M, Klien G, Lesjak D, Wiechetek Ł, Cetin F, Basim HN. Cyber security awareness, knowledge and behavior: A comparative study. Journal of Computer Information Systems. 2022;62(1):82-97. DOI: https://doi.org/10.1080/08874417.2020.1712269
- [2] Hanzu-Pazara R, Raicu G, Zagan R. The impact of human behaviour on cyber security of the maritime systems. Advanced Engineering Forum. 2019;34:267-274. DOI: https://doi.org/10.4028/www.scientific.net/AEF.34.267
- [3] Alissa KA, Alshehri HA, Dahdouh SA, Alsubaie BM, Alghamdi AM, Alharby A, et al. An instrument to measure human behavior toward cyber security policies. In: 21st Saudi Computer Society National Computer Conference (NCC); 25-26 April 2018; Riyadh, Saudi Arabia: IEEE; 2018. p. 1-6. DOI: https://doi.org/10.1109/NCG.2018.8592978
- [4] Esparza J, Caporusso N, Walters A. Addressing human factors in the design of cyber hygiene self-assessment tools. In: Corradini I, Nardelli E, Ahram T, editors. International Conference on Applied Human Factors and Ergonomics; 16-20 Jul 2020; San Diego: Springer, Cham; 2020. p. 88-94. DOI: https://doi.org/10.1007/978-3-030-52581-1_12
- [5] Malatji M, Marnewick A, Solms Sv. Validation of a socio-technical management process for optimising cybersecurity practices. Computers & Security. 2020;95:101846. DOI: https://doi.org/10.1016/j.cose.2020.101846
- [6] Donalds C, Osei-Bryson K-M. Cybersecurity compliance behavior: Exploring the influences of individual decision style and other antecedents. International Journal of Information Management. 2020;51:102056. DOI: https://doi.org/10.1016/j.ijinfomgt.2019.102056
- [7] Chowdhury NH, Adam MTP, Teubner T. Time pressure in human cybersecurity behavior: Theoretical framework and countermeasures. Computers & Security. 2020;97:101963. DOI: https://doi.org/10.1016/j.cose.2020.101963
- [8] Alshaikh M. Developing cybersecurity culture to influence employee behavior: A practice perspective. Computers & Security. 2020;98:102003. DOI: https://doi.org/10.1016/j.cose.2020.102003
Details
Primary Language
English
Subjects
Information Security Management , Information Systems User Experience Design and Development
Journal Section
Review
Early Pub Date
May 5, 2025
Publication Date
June 30, 2025
Submission Date
July 23, 2024
Acceptance Date
April 16, 2025
Published in Issue
Year 1970 Volume: 5 Number: 1