Skip to main content
Kent Academic Repository

To Patch or Not to Patch: Motivations, Challenges, and Implications for Cybersecurity

Nurse, Jason R. C. (2024) To Patch or Not to Patch: Motivations, Challenges, and Implications for Cybersecurity. In: 7th International Conference HCI for Cybersecurity, Privacy and Trust (27th HCI International Conference). . Springer Nature (In press) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:108759)

PDF Author's Accepted Manuscript
Language: English

Restricted to Repository staff only
Contact us about this Publication
[thumbnail of HCII-CPT-2025-Patching-Nurse.pdf]

Abstract

As technology has become more embedded into our society, the security of modern-day systems is paramount. One topic which is constantly under discussion is that of patching, or more specifically, the installation of updates that remediate security vulnerabilities in software or hardware systems. This continued deliberation is motivated by complexities involved with patching; in particular, the various incentives and disincentives for organizations and their cybersecurity teams when deciding whether to patch. In this paper, we take a fresh look at the question of patching and critically explore why organizations and IT/security teams choose to patch or decide against it (either explicitly or due to inaction). We tackle this question by aggregating and synthesizing prominent research and industry literature on the incentives and disincentives for patching, specifically considering the human aspects in the context of these motives. Through this research, this study identifies key motivators such as organizational needs, the IT/security team's relationship with vendors, and legal and regulatory requirements placed on the business and its staff. There are also numerous significant reasons discovered for why the decision is taken not to patch, including limited resources (e.g., person-power), challenges with manual patch management tasks, human error, bad patches, unreliable patch management tools, and the perception that related vulnerabilities would not be exploited. These disincentives, in combination with the motivators above, highlight the difficult balance that organizations and their security teams need to maintain on a daily basis. Finally, we conclude by discussing implications of these findings and important future considerations.

Item Type: Conference or workshop item (Paper)
Uncontrolled keywords: Patching, Vulnerabilities, Security Updates, Human Aspects, Decision-making in Cybersecurity, Cyber Resilience, Generative Artificial Intelligence (GenAI), AI for Cybersecurity
Subjects: H Social Sciences > H Social Sciences (General)
Q Science > QA Mathematics (inc Computing science)
T Technology > T Technology (General)
Divisions: Divisions > Division of Computing, Engineering and Mathematical Sciences > School of Computing
University-wide institutes > Institute of Cyber Security for Society
Funders: University of Kent (https://ror.org/00xkeyj56)
Depositing User: Jason Nurse
Date Deposited: 15 Feb 2025 11:59 UTC
Last Modified: 17 Feb 2025 12:27 UTC
Resource URI: https://kar.kent.ac.uk/id/eprint/108759 (The current URI for this page, for reference purposes)

University of Kent Author Information

  • Depositors only (login required):

Total unique views of this page since July 2020. For more details click on the image.