Unravelling the three lines model in cybersecurity: a systematic literature review

被引:2
|
作者
Valkenburg, Bert [1 ]
Bongiovanni, Ivano [2 ]
机构
[1] Univ Queensland, Brisbane 4072, Australia
[2] Univ Queensland, Sch Business, Brisbane 4072, Australia
关键词
Three lines model; Cybersecurity governance; Risk management; Literature Review; Grounded Theory; Compliance; CHIEF INFORMATION SECURITY; MANAGEMENT; FRAMEWORK; DEFENSE;
D O I
10.1016/j.cose.2024.103708
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Enterprise risk management frameworks have gained popularity after the Global Financial Crisis for companies to be more in control of their risks. Since then, the Three Lines of Defence model (based on defence-in-depth approaches) has become one of the primary risk management frameworks in the Western world. Yet, its application in the cybersecurity space, one of the fastest-growing areas of risk for modern organisations, has been fragmented at best. In this article, we conducted a systematic literature review on the application of the Three Lines of Defence model in cybersecurity. The model has been recently renamed the Three Lines Model. After the seminal publication by the Institute of Internal Auditors in 2013, academics and practitioners have either referenced this model as the primary governance framework for risk management or analysed it in depth in various areas. To the best of our knowledge, this is the first systematic literature review on the topic. We have performed a methodical analysis of existing research using best practices in the field and adopted the grounded theory approach as the theoretical underpinning of our investigation. This way, we unraveled details, critiques and possible alternatives to the Three Lines Model in cybersecurity. Our study expands our understanding of the Three Lines Model and its application in cybersecurity, highlighting the status quo of research in the space and offering practical recommendations for organisations interested in exploring its implementation to mitigate the impact of cyber-risks.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] Cybersecurity maturity model: Systematic literature review and a proposed model
    Buyukozkan, Gulcin
    Guler, Merve
    TECHNOLOGICAL FORECASTING AND SOCIAL CHANGE, 2025, 213
  • [2] Blockchain for Cybersecurity: Systematic Literature Review and Classification
    Liu, Marina
    Yeoh, William
    Jiang, Frank
    Choo, Kim-Kwang Raymond
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2022, 62 (06) : 1182 - 1198
  • [3] Dynamic Risk Assessment in Cybersecurity: A Systematic Literature Review
    Cheimonidis, Pavlos
    Rantos, Konstantinos
    FUTURE INTERNET, 2023, 15 (10)
  • [4] Enterprise architecture modeling for cybersecurity analysis in critical infrastructures -A systematic literature review
    Jiang, Yuning
    Jeusfeld, Manfred A.
    Mosaad, Michael
    Oo, Nay
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2024, 46
  • [5] Cybersecurity Analysis via Process Mining: A Systematic Literature Review
    Macak, Martin
    Daubner, Lukas
    Sani, Mohammadreza Fani
    Buhnova, Barbora
    ADVANCED DATA MINING AND APPLICATIONS, ADMA 2021, PT I, 2022, 13087 : 393 - 407
  • [6] The impact of time pressure on cybersecurity behaviour: a systematic literature review
    Chowdhury, Noman H.
    Adam, Marc T. P.
    Skinner, Geoffrey
    BEHAVIOUR & INFORMATION TECHNOLOGY, 2019, 38 (12) : 1290 - 1308
  • [7] Unravelling the definition of business process innovation: a systematic literature review
    Qerimi, Detrin
    Demeter, Krisztina
    Losonci, David
    INTERNATIONAL JOURNAL OF INNOVATION SCIENCE, 2024,
  • [8] Unraveling trust management in cybersecurity: insights from a systematic literature review
    Pigola, Angelica
    Meirelles, Fernando de Souza
    INFORMATION TECHNOLOGY & MANAGEMENT, 2024,
  • [9] Systematic literature review of threat modeling and risk assessment in ship cybersecurity
    Erbas, Muhammed
    Khalil, Shaymaa Mamdouh
    Tsiopoulos, Leonidas
    OCEAN ENGINEERING, 2024, 306
  • [10] An exploratory analysis of the last frontier: A systematic literature review of cybersecurity in space
    Kavallieratos, Georgios
    Katsikas, Sokratis
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2023, 43