Cognitively Available Cybersecurity: A Systematic Literature Review

被引:0
|
作者
Kavrestad, Joakim [1 ]
Naqvi, Bilal [2 ]
机构
[1] Jonkoping Sch Engn, Jonkoping, Sweden
[2] Lappeenranta Univ Technol, Lappeenranta, Finland
关键词
cognition; cognitive disabilities; cybersecurity; usability; usable security;
D O I
10.1007/978-3-031-64576-1_9
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cybersecurity is imperative to safeguard the digital systems on which the world has come to rely. A core part of cybersecurity is users' ability to adopt protective behavior by using security functions and adhering to security policies. Protective behavior requires cognitive effort, and some research suggests that users with cognitive challenges may struggle. There is no cohesive body of knowledge addressing those struggles and that gap is addressed in this research. A systematic literature was conducted to review how cognitive challenges are discussed in relationship to end-users' cybersecurity. The findings reveal that the research on the topic is limited but agrees that adopting protective behavior is cognitively demanding. That hinders both users with cognitive disabilities and neurotypical users from being secure. While addressing cognitive challenges is the cybersecurity domain is identified as an important future challenge, limiting the effort put on users to minimize the required cognitive energy is identified as a starting point.
引用
收藏
页码:160 / 170
页数:11
相关论文
共 50 条
  • [11] When LLMs meet cybersecurity: a systematic literature review
    Zhang, Jie
    Bu, Haoyu
    Wen, Hui
    Liu, Yongji
    Fei, Haiqiang
    Xi, Rongrong
    Li, Lun
    Yang, Yun
    Zhu, Hongsong
    Meng, Dan
    CYBERSECURITY, 2025, 8 (01):
  • [12] Postural stability in the cognitively impaired elderly: A systematic review of the literature
    Cieslik, Blazej
    Jaworska, Lilianna
    Szczepanska-Gieracha, Joanna
    DEMENTIA-INTERNATIONAL JOURNAL OF SOCIAL RESEARCH AND PRACTICE, 2019, 18 (01): : 178 - 189
  • [13] Cybersecurity maturity model: Systematic literature review and a proposed model
    Buyukozkan, Gulcin
    Guler, Merve
    TECHNOLOGICAL FORECASTING AND SOCIAL CHANGE, 2025, 213
  • [14] Application of Large Language Models in Cybersecurity: A Systematic Literature Review
    Hasanov, Ismayil
    Virtanen, Seppo
    Hakkala, Antti
    Isoaho, Jouni
    IEEE ACCESS, 2024, 12 : 176751 - 176778
  • [15] The impact of time pressure on cybersecurity behaviour: a systematic literature review
    Chowdhury, Noman H.
    Adam, Marc T. P.
    Skinner, Geoffrey
    BEHAVIOUR & INFORMATION TECHNOLOGY, 2019, 38 (12) : 1290 - 1308
  • [16] Cybersecurity Awareness Through Serious Games: A Systematic Literature Review
    Moumouh, Chaimae
    Chkouri, Mohamed Yassin
    Fernandez-Aleman, Jose L.
    EMERGING TRENDS IN INTELLIGENT SYSTEMS & NETWORK SECURITY, 2023, 147 : 190 - 199
  • [17] Cybersecurity Analysis via Process Mining: A Systematic Literature Review
    Macak, Martin
    Daubner, Lukas
    Sani, Mohammadreza Fani
    Buhnova, Barbora
    ADVANCED DATA MINING AND APPLICATIONS, ADMA 2021, PT I, 2022, 13087 : 393 - 407
  • [18] Machine Learning and Big Data for Cybersecurity: Systematic Literature Review
    El Bouchtioui, En Naji
    Bentaleb, Asmae
    Abouchabaka, Jaafar
    DIGITAL TECHNOLOGIES AND APPLICATIONS, ICDTA 2024, VOL 1, 2024, 1098 : 97 - 106
  • [19] Unravelling the three lines model in cybersecurity: a systematic literature review
    Valkenburg, Bert
    Bongiovanni, Ivano
    COMPUTERS & SECURITY, 2024, 139
  • [20] The social contract theory meets cybersecurity: systematic literature review
    Kleiner, Jan
    DIGITAL POLICY REGULATION AND GOVERNANCE, 2024,