A systematic literature review of how cybersecurity-related behavior has been assessed

被引:13
|
作者
Kannelonning, Kristian [1 ]
Katsikas, Sokratis K. [1 ]
机构
[1] Norwegian Univ Sci & Technol, Dept Informat Secur & Commun Technol, Gjovik, Norway
关键词
Cybersecurity; Human behavior; Assessment process; INFORMATION SECURITY POLICY; IMPACT; DETERRENCE; AWARENESS;
D O I
10.1108/ICS-08-2022-0139
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Purpose- Cybersecurity attacks on critical infrastructures, businesses and nations are rising and have reached the interest of mainstream media and the public's consciousness. Despite this increased awareness, humans are still considered the weakest link in the defense against an unknown attacker. Whatever the reason, naive-, unintentional- or intentional behavior of a member of an organization, the result of an incident can have a considerable impact. A security policy with guidelines for best practices and rules should guide the behavior of the organization's members. However, this is often not the case. This paper aims to provide answers to how cybersecurity-related behavior is assessed.Design/methodology/approach-Research questions were formulated, and a systematic literature review (SLR) was performed by following the recommendations of the Preferred Reporting Items for Systematic Reviews and Meta-Analyses statement. The SLR initially identified 2,153 articles, and the paper reviews and reports on 26 articles.Findings- The assessment of cybersecurity-related behavior can be classified into three components, namely, data collection, measurement scale and analysis. The findings show that subjective measurements from self-assessment questionnaires are the most frequently used method. Measurement scales are often composed based on existing literature and adapted by the researchers. Partial least square analysis is the most frequently used analysis technique. Even though useful insight and noteworthy findings regarding possible differences between manager and employee behavior have appeared in some publications, conclusive answers to whether such differences exist cannot be drawn.Research limitations/implications- Research gaps have been identified, that indicate areas of interest for future work. These include the development and employment of methods for reducing subjectivity in the assessment of cybersecurity-related behavior.Originality/value- To the best of the authors' knowledge, this is the first SLR on how cybersecurity-related behavior can be assessed. The SLR analyzes relevant publications and identifies current practices as well as their shortcomings, and outlines gaps that future research may bridge.
引用
收藏
页码:463 / 477
页数:15
相关论文
共 50 条
  • [1] Exploring the Frontiers of Cybersecurity Behavior: A Systematic Review of Studies and Theories
    Almansoori, Afrah
    Al-Emran, Mostafa
    Shaalan, Khaled
    APPLIED SCIENCES-BASEL, 2023, 13 (09):
  • [2] The cybersecurity-related ethical issues of cloud technology and how to avoid them
    Pawlicka, Aleksandra
    Pawlicki, Marek
    Renk, Rafal
    Kozik, Rafal
    Choras, Michal
    PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, ARES 2022, 2022,
  • [3] How universities teach cybersecurity courses online: a systematic literature review
    Ahmed, Ali
    Watterson, Craig
    Alhashmi, Saadat
    Gaber, Tarek
    FRONTIERS IN COMPUTER SCIENCE, 2024, 6
  • [4] Supervised injection services: What has been demonstrated? A systematic literature review
    Potier, Chloe
    Laprevote, Vincent
    Dubois-Arber, Francoise
    Cottencin, Olivier
    Rolland, Benjamin
    DRUG AND ALCOHOL DEPENDENCE, 2014, 145 : 48 - 68
  • [5] A systematic review of multi perspectives on human cybersecurity behavior
    Alsharida, Rawan A.
    Al-rimy, Bander Ali Saleh
    Al-Emran, Mostafa
    Zainal, Anazida
    TECHNOLOGY IN SOCIETY, 2023, 73
  • [6] Cognitively Available Cybersecurity: A Systematic Literature Review
    Kavrestad, Joakim
    Naqvi, Bilal
    HUMAN-CENTERED SOFTWARE ENGINEERING, HCSE 2024, 2024, 14793 : 160 - 170
  • [7] Text Mining in Cybersecurity: A Systematic Literature Review
    Ignaczak, Luciano
    Goldschmidt, Guilherme
    Da Costa, Cristiano Andre
    Righi, Rodrigo Da Rosa
    ACM COMPUTING SURVEYS, 2021, 54 (07)
  • [8] Cybersecurity in smart agriculture: A systematic literature review
    Campoverde-Molina, Milton
    Lujan-Mora, Sergio
    COMPUTERS & SECURITY, 2025, 150
  • [9] Blockchain for Cybersecurity: Systematic Literature Review and Classification
    Liu, Marina
    Yeoh, William
    Jiang, Frank
    Choo, Kim-Kwang Raymond
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2022, 62 (06) : 1182 - 1198
  • [10] Cybersecurity in the Automotive Industry: A Systematic Literature Review (SLR)
    Fernandez de Arroyabe, Ignacio
    Watson, Tim
    Angelopoulou, Olga
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2023, 63 (03) : 716 - 734