Unravelling the three lines model in cybersecurity: a systematic literature review

被引:2
作者
Valkenburg, Bert [1 ]
Bongiovanni, Ivano [2 ]
机构
[1] Univ Queensland, Brisbane 4072, Australia
[2] Univ Queensland, Sch Business, Brisbane 4072, Australia
关键词
Three lines model; Cybersecurity governance; Risk management; Literature Review; Grounded Theory; Compliance; CHIEF INFORMATION SECURITY; MANAGEMENT; FRAMEWORK; DEFENSE;
D O I
10.1016/j.cose.2024.103708
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Enterprise risk management frameworks have gained popularity after the Global Financial Crisis for companies to be more in control of their risks. Since then, the Three Lines of Defence model (based on defence-in-depth approaches) has become one of the primary risk management frameworks in the Western world. Yet, its application in the cybersecurity space, one of the fastest-growing areas of risk for modern organisations, has been fragmented at best. In this article, we conducted a systematic literature review on the application of the Three Lines of Defence model in cybersecurity. The model has been recently renamed the Three Lines Model. After the seminal publication by the Institute of Internal Auditors in 2013, academics and practitioners have either referenced this model as the primary governance framework for risk management or analysed it in depth in various areas. To the best of our knowledge, this is the first systematic literature review on the topic. We have performed a methodical analysis of existing research using best practices in the field and adopted the grounded theory approach as the theoretical underpinning of our investigation. This way, we unraveled details, critiques and possible alternatives to the Three Lines Model in cybersecurity. Our study expands our understanding of the Three Lines Model and its application in cybersecurity, highlighting the status quo of research in the space and offering practical recommendations for organisations interested in exploring its implementation to mitigate the impact of cyber-risks.
引用
收藏
页数:11
相关论文
共 50 条
  • [41] Machine Maintenance Decision Support System: A Systematic Literature Review
    Gandhi, Kanika
    Ng, Amos H. C.
    ADVANCES IN MANUFACTURING TECHNOLOGY XXXII, 2018, 8 : 349 - 354
  • [42] Internet of Things (IoT) Cybersecurity: Literature Review and IoT Cyber Risk Management
    Lee, In
    FUTURE INTERNET, 2020, 12 (09)
  • [43] A systematic literature review of 'empathy' and 'games'
    Schrier, Karen
    Farber, Matthew
    JOURNAL OF GAMING AND VIRTUAL WORLDS, 2021, 13 (02) : 195 - 214
  • [44] Fatigue in aviation: A systematic review of the literature
    Bendak, Salaheddine
    Rashid, Hamad S. J.
    INTERNATIONAL JOURNAL OF INDUSTRIAL ERGONOMICS, 2020, 76 (76)
  • [45] Circular procurement: A systematic literature review
    Xu, Linqi
    Jia, Fu
    Yan, Fangxu
    Chen, Lujie
    JOURNAL OF CLEANER PRODUCTION, 2022, 365
  • [46] Case-based learning for cybersecurity leaders: A systematic review and research agenda
    Anderson, Ashley
    Ahmad, Atif
    Chang, Shanton
    INFORMATION & MANAGEMENT, 2024, 61 (07)
  • [47] Microservice security: a systematic literature review
    Berardi, Davide
    Giallorenzo, Saverio
    Mauro, Jacopo
    Melis, Andrea
    Montesi, Fabrizio
    Prandini, Marco
    PEERJ COMPUTER SCIENCE, 2022, 8
  • [48] Shipbuilding 4.0: A Systematic Literature Review
    Zhang, Xiaowei
    Chen, Daoyi
    APPLIED SCIENCES-BASEL, 2024, 14 (14):
  • [49] A Systematic Review of Defensive and Offensive Cybersecurity with Machine Learning
    Aiyanyo, Imatitikua D.
    Samuel, Hamman
    Lim, Heuiseok
    APPLIED SCIENCES-BASEL, 2020, 10 (17):
  • [50] A Systematic Review of Cybersecurity Audit Frameworks for the Internet of Things
    Hanson, Danielle
    Straub, Jeremy
    2024 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2024, : 133 - 138