A systematic literature review of how cybersecurity-related behavior has been assessed

被引:12
|
作者
Kannelonning, Kristian [1 ]
Katsikas, Sokratis K. [1 ]
机构
[1] Norwegian Univ Sci & Technol, Dept Informat Secur & Commun Technol, Gjovik, Norway
关键词
Cybersecurity; Human behavior; Assessment process; INFORMATION SECURITY POLICY; IMPACT; DETERRENCE; AWARENESS;
D O I
10.1108/ICS-08-2022-0139
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Purpose- Cybersecurity attacks on critical infrastructures, businesses and nations are rising and have reached the interest of mainstream media and the public's consciousness. Despite this increased awareness, humans are still considered the weakest link in the defense against an unknown attacker. Whatever the reason, naive-, unintentional- or intentional behavior of a member of an organization, the result of an incident can have a considerable impact. A security policy with guidelines for best practices and rules should guide the behavior of the organization's members. However, this is often not the case. This paper aims to provide answers to how cybersecurity-related behavior is assessed.Design/methodology/approach-Research questions were formulated, and a systematic literature review (SLR) was performed by following the recommendations of the Preferred Reporting Items for Systematic Reviews and Meta-Analyses statement. The SLR initially identified 2,153 articles, and the paper reviews and reports on 26 articles.Findings- The assessment of cybersecurity-related behavior can be classified into three components, namely, data collection, measurement scale and analysis. The findings show that subjective measurements from self-assessment questionnaires are the most frequently used method. Measurement scales are often composed based on existing literature and adapted by the researchers. Partial least square analysis is the most frequently used analysis technique. Even though useful insight and noteworthy findings regarding possible differences between manager and employee behavior have appeared in some publications, conclusive answers to whether such differences exist cannot be drawn.Research limitations/implications- Research gaps have been identified, that indicate areas of interest for future work. These include the development and employment of methods for reducing subjectivity in the assessment of cybersecurity-related behavior.Originality/value- To the best of the authors' knowledge, this is the first SLR on how cybersecurity-related behavior can be assessed. The SLR analyzes relevant publications and identifies current practices as well as their shortcomings, and outlines gaps that future research may bridge.
引用
收藏
页码:463 / 477
页数:15
相关论文
共 50 条
  • [31] Showrooming and webrooming: how the study of these behaviors has been discussed in the literature
    Pastre, Gabriela
    Silveira Fiates, Gabriela Goncalves
    NAVUS-REVISTA DE GESTAO E TECNOLOGIA, 2019, 9 (02): : 121 - 134
  • [32] A systematic review of multi perspectives on human cybersecurity behavior
    Alsharida, Rawan A.
    Al-rimy, Bander Ali Saleh
    Al-Emran, Mostafa
    Zainal, Anazida
    TECHNOLOGY IN SOCIETY, 2023, 73
  • [33] What is this thing called misfit? A systematic review into how employee misfit has been defined and researched
    Sun, Yuwei
    Billsberry, Jon
    MANAGEMENT REVIEW QUARTERLY, 2024,
  • [34] How has co-design been used to address vaccine hesitancy globally? A systematic review
    Alpeza, Filipa
    Avermark, Helena
    Gobbo, Elisa
    Herzig van Wees, Sibylle
    HUMAN VACCINES & IMMUNOTHERAPEUTICS, 2024, 20 (01)
  • [35] How has implementation been incorporated in health technology assessments in the United Kingdom? A systematic rapid review
    Robert Heggie
    Kathleen Boyd
    Olivia Wu
    Health Research Policy and Systems, 19
  • [36] How has implementation been incorporated in health technology assessments in the United Kingdom? A systematic rapid review
    Heggie, Robert
    Boyd, Kathleen
    Wu, Olivia
    HEALTH RESEARCH POLICY AND SYSTEMS, 2021, 19 (01)
  • [37] What Has Been Trending in the Research of Polyhydroxyalkanoates? A Systematic Review
    Guzik, Maciej
    Witko, Tomasz
    Steinbuechel, Alexander
    Wojnarowska, Magdalena
    Soltysik, Mariusz
    Wawak, Slawomir
    FRONTIERS IN BIOENGINEERING AND BIOTECHNOLOGY, 2020, 8
  • [38] Multimedia, teaching method that has been neglected: A systematic review
    Habibipour, Behzad
    Khalili, Arash
    Davodi, Masoumeh
    Talebiyanpour, Mohammad Shafie
    Mobaser, Noshin
    INTERNATIONAL JOURNAL OF MEDICAL RESEARCH & HEALTH SCIENCES, 2016, 5 (09): : 479 - 481
  • [39] Cybersecurity maturity model: Systematic literature review and a proposed model
    Buyukozkan, Gulcin
    Guler, Merve
    TECHNOLOGICAL FORECASTING AND SOCIAL CHANGE, 2025, 213
  • [40] Application of Large Language Models in Cybersecurity: A Systematic Literature Review
    Hasanov, Ismayil
    Virtanen, Seppo
    Hakkala, Antti
    Isoaho, Jouni
    IEEE ACCESS, 2024, 12 : 176751 - 176778