2022
DOI: 10.1007/978-3-031-12172-2_12
|View full text |Cite
|
Sign up to set email alerts
|

Systematic Review of Factors that Influence the Cybersecurity Culture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(26 citation statements)
references
References 48 publications
0
0
0
Order By: Relevance
“…The REA began with a scoping phase to 1) identify whether previous systematic reviews had been conducted on measuring CSC and 2) develop an operational definition of CSC. We found only a single published systematic review of factors influencing cybersecurity culture (Mwim & Mtsweni, 2022). However, this review used a limited set of keywords for a comprehensive search and was skewed in its representation of the global evidence base (which may relate to ease of access to studies).…”
Section: Scoping the Cybersecurity Culture Literaturementioning
confidence: 99%
See 2 more Smart Citations
“…The REA began with a scoping phase to 1) identify whether previous systematic reviews had been conducted on measuring CSC and 2) develop an operational definition of CSC. We found only a single published systematic review of factors influencing cybersecurity culture (Mwim & Mtsweni, 2022). However, this review used a limited set of keywords for a comprehensive search and was skewed in its representation of the global evidence base (which may relate to ease of access to studies).…”
Section: Scoping the Cybersecurity Culture Literaturementioning
confidence: 99%
“…We tested search syntax in several electronic bibliographic databases against a reference set of studies (harvested from Mwim & Mtsweni, 2022, see Supplementary Information) that could be considered eligible for the REA. Standard evaluation methods for information retrieval were used to assess the suitability of several databases.…”
Section: Electronic Databasementioning
confidence: 99%
See 1 more Smart Citation
“…The culmination of studies reveals that information security culture comprises various components, including beliefs, behaviors, knowledge, attitudes, awareness, intentions, and values, influenced by numerous dimensions and factors which have a big impact on the technology adoption. [19], [20], [21], [22], [23], [24], [25], [26].…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, there is a gap in existing research in the examination of specific information security culture factors which are often clustered within organizational contexts, that significantly influences the adaptation of the ZT model. These factors encompass aspects such as security awareness training, policy and procedure, change management, information security management, security behavioral, communication, compliance, organization culture [20], [27], [28], [29], [30].…”
Section: Introductionmentioning
confidence: 99%