A systematic literature review of how cybersecurity-related behavior has been assessed

被引:13
|
作者
Kannelonning, Kristian [1 ]
Katsikas, Sokratis K. [1 ]
机构
[1] Norwegian Univ Sci & Technol, Dept Informat Secur & Commun Technol, Gjovik, Norway
关键词
Cybersecurity; Human behavior; Assessment process; INFORMATION SECURITY POLICY; IMPACT; DETERRENCE; AWARENESS;
D O I
10.1108/ICS-08-2022-0139
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Purpose- Cybersecurity attacks on critical infrastructures, businesses and nations are rising and have reached the interest of mainstream media and the public's consciousness. Despite this increased awareness, humans are still considered the weakest link in the defense against an unknown attacker. Whatever the reason, naive-, unintentional- or intentional behavior of a member of an organization, the result of an incident can have a considerable impact. A security policy with guidelines for best practices and rules should guide the behavior of the organization's members. However, this is often not the case. This paper aims to provide answers to how cybersecurity-related behavior is assessed.Design/methodology/approach-Research questions were formulated, and a systematic literature review (SLR) was performed by following the recommendations of the Preferred Reporting Items for Systematic Reviews and Meta-Analyses statement. The SLR initially identified 2,153 articles, and the paper reviews and reports on 26 articles.Findings- The assessment of cybersecurity-related behavior can be classified into three components, namely, data collection, measurement scale and analysis. The findings show that subjective measurements from self-assessment questionnaires are the most frequently used method. Measurement scales are often composed based on existing literature and adapted by the researchers. Partial least square analysis is the most frequently used analysis technique. Even though useful insight and noteworthy findings regarding possible differences between manager and employee behavior have appeared in some publications, conclusive answers to whether such differences exist cannot be drawn.Research limitations/implications- Research gaps have been identified, that indicate areas of interest for future work. These include the development and employment of methods for reducing subjectivity in the assessment of cybersecurity-related behavior.Originality/value- To the best of the authors' knowledge, this is the first SLR on how cybersecurity-related behavior can be assessed. The SLR analyzes relevant publications and identifies current practices as well as their shortcomings, and outlines gaps that future research may bridge.
引用
收藏
页码:463 / 477
页数:15
相关论文
共 50 条
  • [21] Cybersecurity Analysis via Process Mining: A Systematic Literature Review
    Macak, Martin
    Daubner, Lukas
    Sani, Mohammadreza Fani
    Buhnova, Barbora
    ADVANCED DATA MINING AND APPLICATIONS, ADMA 2021, PT I, 2022, 13087 : 393 - 407
  • [22] The social contract theory meets cybersecurity: systematic literature review
    Kleiner, Jan
    DIGITAL POLICY REGULATION AND GOVERNANCE, 2024,
  • [23] The impact of time pressure on cybersecurity behaviour: a systematic literature review
    Chowdhury, Noman H.
    Adam, Marc T. P.
    Skinner, Geoffrey
    BEHAVIOUR & INFORMATION TECHNOLOGY, 2019, 38 (12) : 1290 - 1308
  • [24] Machine Learning and Big Data for Cybersecurity: Systematic Literature Review
    El Bouchtioui, En Naji
    Bentaleb, Asmae
    Abouchabaka, Jaafar
    DIGITAL TECHNOLOGIES AND APPLICATIONS, ICDTA 2024, VOL 1, 2024, 1098 : 97 - 106
  • [25] Systematic Literature Review on Cybersecurity and its Influence on Cyber Attacks Targeting IoT Devices
    Padilla-Gomez, Mario
    Gamboa-Cruzado, Javier
    Tavara-Aponte, Segundo
    Nunez-Meza, Angel
    Amayo-Gamboa, Flavio
    Arauco-Esquivel, Saul
    COMPUTACION Y SISTEMAS, 2024, 28 (04): : 1847 - 1864
  • [26] IoT cybersecurity in 5G and beyond: a systematic literature review
    Pirbhulal, Sandeep
    Chockalingam, Sabarathinam
    Shukla, Ankur
    Abie, Habtamu
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (04) : 2827 - 2879
  • [27] Unraveling trust management in cybersecurity: insights from a systematic literature review
    Pigola, Angelica
    Meirelles, Fernando de Souza
    INFORMATION TECHNOLOGY & MANAGEMENT, 2024,
  • [28] Gamification of Cybersecurity Awareness for Non-IT Professionals: A Systematic Literature Review
    Gwenhure, Anderson Kevin
    Rahayu, Flourensia Sapty
    INTERNATIONAL JOURNAL OF SERIOUS GAMES, 2024, 11 (01): : 83 - 99
  • [29] A systematic literature review of cybersecurity scales assessing information security awareness
    Rohan, Rohani
    Pal, Debajyoti
    Hautamaki, Jari
    Funilkul, Suree
    Chutimaskul, Wichian
    Thapliyal, Himanshu
    HELIYON, 2023, 9 (03)
  • [30] An exploratory analysis of the last frontier: A systematic literature review of cybersecurity in space
    Kavallieratos, Georgios
    Katsikas, Sokratis
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2023, 43