Software Compliance Requirements, Factors, and Policies: A Systematic Literature Review

被引:7
作者
Mubarkoot, Mohammed [1 ,5 ]
Altmann, Jorrn [1 ,2 ,5 ]
Rasti-Barzoki, Morteza [3 ]
Egger, Bernhard [4 ]
Lee, Hyejin [1 ]
机构
[1] Seoul Natl Univ, Coll Engn, Technol Management Econ & Policy Program, Seoul 08826, South Korea
[2] Seoul Natl Univ, Inst Engn Res, Coll Engn, Seoul 08826, South Korea
[3] Isfahan Univ Technol, Dept Ind & Syst Engn, Esfahan 8415683111, Iran
[4] Seoul Natl Univ, Coll Engn, Dept Comp Sci & Engn, Seoul 08826, South Korea
[5] Seoul Natl Univ, Integrated Major Smart City Global Convergence, Seoul 08826, South Korea
基金
新加坡国家研究基金会;
关键词
Software Compliance; Requirements; Policies; Factors; Impact; Systematic literature Review; INFORMATION SECURITY POLICIES; PROTECTION MOTIVATION; ORGANIZATIONS; DETERRENCE; BEHAVIOR; SUPPORT; MODEL; USERS; NONCOMPLIANCE; MANAGEMENT;
D O I
10.1016/j.cose.2022.102985
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Background: Recent statistics reveal that 56% of software attacks are caused by insider negligence and 26% are caused by malicious insiders. They also show that 67% of organizations experience at least 21 incidents per year. Most of these incidents require significant time and effort to contain them. In this re-gard, ensuring compliance with corporate policies, regulations, and industry best practices is paramount.Purpose: This study investigates software compliance requirements, factors, and policies together with the challenges they address. By taking a wider perspective, this study aims at bringing an understanding of existing research foci, evolving issues, and research directions.Method: The study uses a systematic literature review and keyword analysis, to identify relevant studies that address the derived research questions. Considering scholarly articles published in the last decade, 4,772 results were retrieved and checked through an initial screening. A thorough screening is then con-ducted to further reduce the results to 77 primary articles.Findings: The requirement on security of end users is gaining more attention. There is an emphasis on the gap between domain and compliance experts on the one side and software engineers on the other side. The review also identified 55 factors (and their underlying theories) that impact behavioral com-pliance with a majority of them focusing on individuals. Our results also list nineteen policies and com-pliance challenges they address. No distinction is found between open-source and proprietary software among the reviewed studies. The most mentioned policies are security education, training, and awareness (SETA), compliance automation, and organizational climate. The evolving topics in the field are: theory of workarounds, compliance and privacy by design, policy as code, security stress, and home-office users.Implications: The review provides 9 recommendations, comprising practical implications for decision makers, theoretical implications for future research, and potential enhancement of the underlying the-ories.(c) 2022 The Author(s). Published by Elsevier Ltd. This is an open access article under the CC BY license ( http://creativecommons.org/licenses/by/4.0/ )
引用
收藏
页数:23
相关论文
共 132 条
[1]   THE THEORY OF PLANNED BEHAVIOR [J].
AJZEN, I .
ORGANIZATIONAL BEHAVIOR AND HUMAN DECISION PROCESSES, 1991, 50 (02) :179-211
[2]   Reasoned Action in the Service of Goal Pursuit [J].
Ajzen, Icek ;
Kruglanski, Arie W. .
PSYCHOLOGICAL REVIEW, 2019, 126 (05) :774-786
[3]   SOCIAL-LEARNING AND DEVIANT-BEHAVIOR - SPECIFIC TEST OF A GENERAL-THEORY [J].
AKERS, RL ;
KROHN, MD ;
LANZAKADUCE, L ;
RADOSEVICH, M .
AMERICAN SOCIOLOGICAL REVIEW, 1979, 44 (04) :636-655
[4]   Theory-Based Model and Prediction Analysis of Information Security Compliance Behavior in the Saudi Healthcare Sector [J].
Alanazi, Sultan T. ;
Anbar, Mohammed ;
A. Ebad, Shouki ;
Karuppayah, Shankar ;
Al-Ani, Hadeer A. .
SYMMETRY-BASEL, 2020, 12 (09)
[5]   Information Security Behavior and Information Security Policy Compliance: A Systematic Literature Review for Identifying the Transformation Process from Noncompliance to Compliance [J].
Ali, Rao Faizan ;
Dominic, P. D. D. ;
Ali, Syed Emad Azhar ;
Rehman, Mobashar ;
Sohail, Abid .
APPLIED SCIENCES-BASEL, 2021, 11 (08)
[6]   Organizational Governance, Social Bonds and Information Security Policy Compliance: A Perspective towards Oil and Gas Employees [J].
Ali, Rao Faizan ;
Dominic, P. D. D. ;
Ali, Kashif .
SUSTAINABILITY, 2020, 12 (20) :1-27
[7]  
Alter S., 2014, BUSINESS ANAL INF SY
[8]  
Alter S, 2015, AMCIS 2015 PROCEEDINGS
[9]  
Alter S, 2013, J ASSOC INF SYST, V14, P72
[10]   Privacy Compliance via Model Transformations [J].
Antignac, Thibaud ;
Scandariato, Riccardo ;
Schneider, Gerardo .
2018 3RD IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2018), 2018, :120-126