Vis enkel innførsel

dc.contributor.authorKannelønning, Kristian Andreas
dc.contributor.authorKatsikas, Sokratis
dc.date.accessioned2023-12-28T09:40:59Z
dc.date.available2023-12-28T09:40:59Z
dc.date.created2023-05-15T13:01:23Z
dc.date.issued2023
dc.identifier.citationInformation and Computer Security. 2023, .en_US
dc.identifier.issn2056-4961
dc.identifier.urihttps://hdl.handle.net/11250/3108969
dc.description.abstractPurpose Cybersecurity attacks on critical infrastructures, businesses and nations are rising and have reached the interest of mainstream media and the public’s consciousness. Despite this increased awareness, humans are still considered the weakest link in the defense against an unknown attacker. Whatever the reason, naïve-, unintentional- or intentional behavior of a member of an organization, the result of an incident can have a considerable impact. A security policy with guidelines for best practices and rules should guide the behavior of the organization’s members. However, this is often not the case. This paper aims to provide answers to how cybersecurity-related behavior is assessed. Design/methodology/approach Research questions were formulated, and a systematic literature review (SLR) was performed by following the recommendations of the Preferred Reporting Items for Systematic Reviews and Meta-Analyses statement. The SLR initially identified 2,153 articles, and the paper reviews and reports on 26 articles. Findings The assessment of cybersecurity-related behavior can be classified into three components, namely, data collection, measurement scale and analysis. The findings show that subjective measurements from self-assessment questionnaires are the most frequently used method. Measurement scales are often composed based on existing literature and adapted by the researchers. Partial least square analysis is the most frequently used analysis technique. Even though useful insight and noteworthy findings regarding possible differences between manager and employee behavior have appeared in some publications, conclusive answers to whether such differences exist cannot be drawn. Research limitations/implications Research gaps have been identified, that indicate areas of interest for future work. These include the development and employment of methods for reducing subjectivity in the assessment of cybersecurity-related behavior. Originality/value To the best of the authors’ knowledge, this is the first SLR on how cybersecurity-related behavior can be assessed. The SLR analyzes relevant publications and identifies current practices as well as their shortcomings, and outlines gaps that future research may bridge.en_US
dc.language.isoengen_US
dc.publisherEmeralden_US
dc.rightsNavngivelse 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/deed.no*
dc.titleA systematic literature review of how cybersecurity-related behavior has been assesseden_US
dc.title.alternativeA systematic literature review of how cybersecurity-related behavior has been assesseden_US
dc.typeJournal articleen_US
dc.typePeer revieweden_US
dc.description.versionpublishedVersionen_US
dc.source.journalInformation and Computer Securityen_US
dc.identifier.doi10.1108/ICS-08-2022-0139
dc.identifier.cristin2147563
dc.relation.projectNorges forskningsråd: 323131en_US
dc.relation.projectNorges forskningsråd: 310105en_US
cristin.ispublishedtrue
cristin.fulltextoriginal
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel

Navngivelse 4.0 Internasjonal
Med mindre annet er angitt, så er denne innførselen lisensiert som Navngivelse 4.0 Internasjonal