A systematic review of approaches to assessing cybersecurity awareness

被引:52
作者
Abd Rahim, Noor Hayani [1 ,2 ]
Hamid, Suraya [1 ]
Kiah, Laiha Mat [1 ]
Shamshirband, Shahaboddin [1 ]
Furnell, Steven [3 ]
机构
[1] Univ Malaya, Fac Comp Sci & Informat Technol, Kuala Lumpur, Malaysia
[2] Int Islamic Univ Malaysia, Kuliyyah Informat Commun Technol, Dept Informat Syst, Kuala Lumpur, Malaysia
[3] Univ Plymouth, Ctr Secur Commun & Network Res, Plymouth PL4 8AA, Devon, England
关键词
Cybernetics; Adaptation; INFORMATION SECURITY AWARENESS; CYBER SECURITY; PRIVACY; PERCEPTIONS; BELIEFS; CULTURE; IMPACT; USERS;
D O I
10.1108/K-12-2014-0283
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Purpose - The purpose of this paper is to survey, explore and inform researchers about the previous methodologies applied, target audience and coverage of previous assessment of cybersecurity awareness by capturing, summarizing, synthesizing and critically comment on it. It is also conducted to identify the gaps in the cybersecurity awareness assessment research which warrants the future work. Design/methodology/approach - The authors used a systematic literature review technique to search the relevant online databases by using pre-defined keywords. The authors limited the search to retrieve only English language academic articles published from 2000 to 2014. Relevant information was extracted from the retrieved articles, and the ensuing discussion centres on providing the answers to the research questions. Findings - From the online searches, 14 studies that matched the search criteria were retrieved, and the information extracted from each study includes the authors, publication year, assessment method used, target audiences, coverage of assessment and assessment goals. Originality/value - The review of the retrieved articles indicates that no previous research was conducted in the assessment of the cybersecurity awareness using a programme evaluation technique. It was also found that few studies focused on youngsters and on the issue of safeguarding personal information.
引用
收藏
页码:606 / 622
页数:17
相关论文
共 67 条
[1]   Investigation of stakeholders commitment to information security awareness programs [J].
Abawajy, Jernal H. ;
Thatcher, K. ;
Kim, Tai-hoon .
PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, :472-+
[2]  
Aïmeur E, 2011, ANN CONF PRIV SECUR, P24
[3]   A qualitative study of users' view on information security [J].
Albrechtsen, Eirik .
COMPUTERS & SECURITY, 2007, 26 (04) :276-289
[4]  
[Anonymous], 1985, Action control, DOI [DOI 10.1007/978-3-642-69746-3_2, DOI 10.1007/978-3-642-69746-32]
[5]  
[Anonymous], 2014, The World in 2014: ICT facts and figures
[6]  
[Anonymous], 2013, HDB ASIAN CRIMINOLOG, DOI DOI 10.1007/978-1-4614-5218-8
[7]  
Atkinson S, 2009, COMPUT FRAUD SECUR, P13, DOI 10.1016/S1361-3723(09)70088-0
[8]   A critical analysis of evaluation practice: the Kirkpatrick model and the principle of beneficence [J].
Bates, R .
EVALUATION AND PROGRAM PLANNING, 2004, 27 (03) :341-347
[9]  
Boyd D., 2007, Why youth (heart) social network sites: The role of networked publics in teenage social life, P119, DOI DOI 10.1162/DMAL.9780262524834.119
[10]  
Bulgurcu B, 2010, MIS QUART, V34, P523