Redirigiendo al acceso original de articulo en 20 segundos...
Inicio  /  Applied Sciences  /  Vol: 13 Par: 9 (2023)  /  Artículo
ARTÍCULO
TITULO

Exploring the Frontiers of Cybersecurity Behavior: A Systematic Review of Studies and Theories

Afrah Almansoori    
Mostafa Al-Emran and Khaled Shaalan    

Resumen

Cybersecurity procedures and policies are prevalent countermeasures for protecting organizations from cybercrimes and security incidents. Without considering human behaviors, implementing these countermeasures will remain useless. Cybersecurity behavior has gained much attention in recent years. However, a systematic review that provides extensive insights into cybersecurity behavior through different technologies and services and covers various directions in large-scale research remains lacking. Therefore, this study retrieved and analyzed 2210 articles published on cybersecurity behavior. The retrieved articles were then thoroughly examined to meet the inclusion and exclusion criteria, in which 39 studies published between 2012 and 2021 were ultimately picked for further in-depth analysis. The main findings showed that the protection motivation theory (PMT) dominated the list of theories and models examining cybersecurity behavior. Cybersecurity behavior and intention behavior counted for the highest purpose for most studies, with fewer studies focusing on cybersecurity awareness and compliance behavior. Most examined studies were conducted in individualistic contexts with limited exposure to collectivistic societies. A total of 56% of the analyzed studies focused on the organizational level, indicating that the individual level is still in its infancy stage. To address the research gaps in cybersecurity behavior at the individual level, this review proposes a number of research agendas that can be considered in future research. This review is believed to improve our understanding by revealing the full potential of cybersecurity behavior and opening the door for further research opportunities.

 Artículos similares

       
 
Siti Noorsuriani Maon,Naffisah Mohd Hassan,Noorain Mohamad Yunus,Sri Fatiany Syed Abdul Kader Jailani,Erne Suzila Kassim     Pág. pp. 73 - 84
Digital technologies have become powerful tools in today society in many aspects. However, without proper knowledge and guidance, youth is   being challenged with potential hazards of cybercrimes. Hence, the purpose of this study was to compare... ver más

 
Serhii Yevseiev,Oleksandr Milov,Stanislav Milevskyi,Oleksandr Voitko,Maksym Kasianenko,Yevgen Melenti,Serhii Pohasii,Hrygorii Stepanov,Oleksandr Turinskyi,Serhii Faraon     Pág. 15 - 29
A game-theoretic approach is presented, which claims to be a universal method for solving most problems in the field of cybersecurity. As arguments to confirm the superiority of game theory, mathematical validity and provability of the optimality of deci... ver más

 
Llanos Tobarra, Antonio Robles-Gómez, Rafael Pastor, Roberto Hernández, Andrés Duque and Jesús Cano    
Presently, the ever-increasing use of new technologies helps people to acquire additional skills for developing an applied critical thinking in many contexts of our society. When it comes to education, and more particularly in any Engineering subject, pr... ver más
Revista: Applied Sciences

 
Oleksandr Milov,Serhii Yevseiev,Volodymyr Aleksiyev,Polina Berdnik,Oleksandr Voitko,Valentyn Dyptan,Yevheniia Ivanchenko,Maxim Pavlenko,Anatolii Salii,Serhiy Yarovyy     Pág. 46 - 57
The results of modeling and analysis of scenarios of the behavior of interacting agents in conditions of cyber conflict are presented. General approaches to the development of a scenario of the behavior of antagonistic agents are presented. The definitio... ver más

 
Oleksandr Milov,Serhii Yevseiev,Yevheniia Ivanchenko,Stanislav Milevskyi,Oleksandr Nesterov,Oleksandr Puchkov,Anatolii Salii,Oleksandr Timochko,Vitalii Tiurin,?leksandr Yarovyi     Pág. 6 - 19
The results of the development of the model of the antagonistic agents behavior in a cyber conflict are presented. It is shown that the resulting model can be used to analyze investment processes in security systems, taking into account the assumption th... ver más