A systematic literature review of how cybersecurity-related behavior has been assessed

被引:12
|
作者
Kannelonning, Kristian [1 ]
Katsikas, Sokratis K. [1 ]
机构
[1] Norwegian Univ Sci & Technol, Dept Informat Secur & Commun Technol, Gjovik, Norway
关键词
Cybersecurity; Human behavior; Assessment process; INFORMATION SECURITY POLICY; IMPACT; DETERRENCE; AWARENESS;
D O I
10.1108/ICS-08-2022-0139
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Purpose- Cybersecurity attacks on critical infrastructures, businesses and nations are rising and have reached the interest of mainstream media and the public's consciousness. Despite this increased awareness, humans are still considered the weakest link in the defense against an unknown attacker. Whatever the reason, naive-, unintentional- or intentional behavior of a member of an organization, the result of an incident can have a considerable impact. A security policy with guidelines for best practices and rules should guide the behavior of the organization's members. However, this is often not the case. This paper aims to provide answers to how cybersecurity-related behavior is assessed.Design/methodology/approach-Research questions were formulated, and a systematic literature review (SLR) was performed by following the recommendations of the Preferred Reporting Items for Systematic Reviews and Meta-Analyses statement. The SLR initially identified 2,153 articles, and the paper reviews and reports on 26 articles.Findings- The assessment of cybersecurity-related behavior can be classified into three components, namely, data collection, measurement scale and analysis. The findings show that subjective measurements from self-assessment questionnaires are the most frequently used method. Measurement scales are often composed based on existing literature and adapted by the researchers. Partial least square analysis is the most frequently used analysis technique. Even though useful insight and noteworthy findings regarding possible differences between manager and employee behavior have appeared in some publications, conclusive answers to whether such differences exist cannot be drawn.Research limitations/implications- Research gaps have been identified, that indicate areas of interest for future work. These include the development and employment of methods for reducing subjectivity in the assessment of cybersecurity-related behavior.Originality/value- To the best of the authors' knowledge, this is the first SLR on how cybersecurity-related behavior can be assessed. The SLR analyzes relevant publications and identifies current practices as well as their shortcomings, and outlines gaps that future research may bridge.
引用
收藏
页码:463 / 477
页数:15
相关论文
共 50 条
  • [1] How has healthcare research performance been assessed? A systematic review
    Patel, Vanash M.
    Ashrafian, Hutan
    Ahmed, Kamran
    Arora, Sonal
    Jiwan, Sejal
    Nicholson, Jeremy K.
    Darzi, Ara
    Athanasiou, Thanos
    JOURNAL OF THE ROYAL SOCIETY OF MEDICINE, 2011, 104 (06) : 251 - 261
  • [2] How dietary intake has been assessed in African countries? A systematic review
    Vila-Real, Catarina
    Pimenta-Martins, Ana
    Gomes, Ana Maria
    Pinto, Elisabete
    Maina, Ndegwa Henry
    CRITICAL REVIEWS IN FOOD SCIENCE AND NUTRITION, 2018, 58 (06) : 1002 - 1022
  • [3] How cognition has been assessed in research with people with aphasia: a systematic scoping review
    Tessaro, Bruna
    Salis, Christos
    Hameau, Solene
    Nickels, Lyndsey
    SPEECH LANGUAGE AND HEARING, 2024, 27 (03) : 176 - 190
  • [4] How Has Intervention Fidelity Been Assessed in Smoking Cessation Interventions? A Systematic Review
    Begum, Suhana
    Yada, Ayumi
    Lorencatto, Fabiana
    JOURNAL OF SMOKING CESSATION, 2021, 2021
  • [5] The cybersecurity-related ethical issues of cloud technology and how to avoid them
    Pawlicka, Aleksandra
    Pawlicki, Marek
    Renk, Rafal
    Kozik, Rafal
    Choras, Michal
    PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, ARES 2022, 2022,
  • [6] How Has the Health of Software Ecosystems Been Evaluated? A Systematic Review
    Amorim, Simone da Silva
    Neto, Felix Simas S.
    McGregor, John D.
    de Almeida, Eduardo Santana
    Chavez, Christina von Flach G.
    XXXI BRAZILIAN SYMPOSIUM ON SOFTWARE ENGINEERING (SBES 2017), 2017, : 14 - 23
  • [7] How universities teach cybersecurity courses online: a systematic literature review
    Ahmed, Ali
    Watterson, Craig
    Alhashmi, Saadat
    Gaber, Tarek
    FRONTIERS IN COMPUTER SCIENCE, 2024, 6
  • [8] Supervised injection services: What has been demonstrated? A systematic literature review
    Potier, Chloe
    Laprevote, Vincent
    Dubois-Arber, Francoise
    Cottencin, Olivier
    Rolland, Benjamin
    DRUG AND ALCOHOL DEPENDENCE, 2014, 145 : 48 - 68
  • [9] How Learning Has Been Personalised: A Review of Literature from 2009 to 2018
    Li, Kam Cheong
    Wong, Billy Tak-Ming
    BLENDED LEARNING: EDUCATIONAL INNOVATION FOR PERSONALIZED LEARNING, ICBL 2019, 2019, 11546 : 72 - 81
  • [10] Dynamic capabilities and performance: How has the relationship been assessed?
    Baia, Elisabeth P.
    Ferreira, Joao J. M.
    JOURNAL OF MANAGEMENT & ORGANIZATION, 2024, 30 (01) : 188 - 217