1
|
Almansoori A, Al-Emran M, Shaalan K. Exploring the Frontiers of Cybersecurity Behavior: A Systematic Review of Studies and Theories. APPLIED SCIENCES 2023; 13:5700. [DOI: 10.3390/app13095700] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/01/2023]
Abstract
Cybersecurity procedures and policies are prevalent countermeasures for protecting organizations from cybercrimes and security incidents. Without considering human behaviors, implementing these countermeasures will remain useless. Cybersecurity behavior has gained much attention in recent years. However, a systematic review that provides extensive insights into cybersecurity behavior through different technologies and services and covers various directions in large-scale research remains lacking. Therefore, this study retrieved and analyzed 2210 articles published on cybersecurity behavior. The retrieved articles were then thoroughly examined to meet the inclusion and exclusion criteria, in which 39 studies published between 2012 and 2021 were ultimately picked for further in-depth analysis. The main findings showed that the protection motivation theory (PMT) dominated the list of theories and models examining cybersecurity behavior. Cybersecurity behavior and intention behavior counted for the highest purpose for most studies, with fewer studies focusing on cybersecurity awareness and compliance behavior. Most examined studies were conducted in individualistic contexts with limited exposure to collectivistic societies. A total of 56% of the analyzed studies focused on the organizational level, indicating that the individual level is still in its infancy stage. To address the research gaps in cybersecurity behavior at the individual level, this review proposes a number of research agendas that can be considered in future research. This review is believed to improve our understanding by revealing the full potential of cybersecurity behavior and opening the door for further research opportunities.
Collapse
Affiliation(s)
- Afrah Almansoori
- Faculty of Engineering & IT, The British University in Dubai, Dubai P.O. Box 345015, United Arab Emirates
- General Department of Forensic Science and Criminology, Dubai Police G.H.Q., Dubai P.O. Box 1493, United Arab Emirates
| | - Mostafa Al-Emran
- Faculty of Engineering & IT, The British University in Dubai, Dubai P.O. Box 345015, United Arab Emirates
- Department of Computer Techniques Engineering, Dijlah University College, Baghdad 00964, Iraq
| | - Khaled Shaalan
- Faculty of Engineering & IT, The British University in Dubai, Dubai P.O. Box 345015, United Arab Emirates
| |
Collapse
|
2
|
Alsharida RA, Al-rimy BAS, Al-Emran M, Zainal A. A systematic review of multi perspectives on human cybersecurity behavior. TECHNOLOGY IN SOCIETY 2023; 73:102258. [DOI: 10.1016/j.techsoc.2023.102258] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/01/2023]
|
3
|
Aebissa B, Dhillon G, Meshesha M. The Direct and Indirect effect of Organizational Justice on Employee Intention to Comply with Information Security Policy: The Case of Ethiopian banks. Comput Secur 2023. [DOI: 10.1016/j.cose.2023.103248] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 04/05/2023]
|
4
|
Yousuf H, Al-Emran M, Shaalan K. Evaluating Individuals’ Cybersecurity Behavior in Mobile Payment Contactless Technologies: Extending TPB with Cybersecurity Awareness. HCI FOR CYBERSECURITY, PRIVACY AND TRUST 2023:542-554. [DOI: 10.1007/978-3-031-35822-7_35] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/01/2023]
|
5
|
Exposing the darkness within: A review of dark personality traits, models, and measures and their relationship to insider threats. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2022. [DOI: 10.1016/j.jisa.2022.103378] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
|
6
|
Wong LW, Lee VH, Tan GWH, Ooi KB, Sohal A. The role of cybersecurity and policy awareness in shifting employee compliance attitudes: Building supply chain capabilities. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT 2022. [DOI: 10.1016/j.ijinfomgt.2022.102520] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/18/2022]
|
7
|
McGowan A, Sittig S, Bourrie D, Benton R, Iyengar S. The Intersection of Persuasive System Design and Personalization in Mobile Health: Statistical Evaluation. JMIR Mhealth Uhealth 2022; 10:e40576. [PMID: 36103226 PMCID: PMC9520383 DOI: 10.2196/40576] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/27/2022] [Revised: 08/04/2022] [Accepted: 08/10/2022] [Indexed: 11/13/2022] Open
Abstract
Background
Persuasive technology is an umbrella term that encompasses software (eg, mobile apps) or hardware (eg, smartwatches) designed to influence users to perform preferable behavior once or on a long-term basis. Considering the ubiquitous nature of mobile devices across all socioeconomic groups, user behavior modification thrives under the personalized care that persuasive technology can offer. However, there is no guidance for developing personalized persuasive technologies based on the psychological characteristics of users.
Objective
This study examined the role that psychological characteristics play in interpreted mobile health (mHealth) screen perceived persuasiveness. In addition, this study aims to explore how users’ psychological characteristics drive the perceived persuasiveness of digital health technologies in an effort to assist developers and researchers of digital health technologies by creating more engaging solutions.
Methods
An experiment was designed to evaluate how psychological characteristics (self-efficacy, health consciousness, health motivation, and the Big Five personality traits) affect the perceived persuasiveness of digital health technologies, using the persuasive system design framework. Participants (n=262) were recruited by Qualtrics International, Inc, using the web-based survey system of the XM Research Service. This experiment involved a survey-based design with a series of 25 mHealth app screens that featured the use of persuasive principles, with a focus on physical activity. Exploratory factor analysis and linear regression were used to evaluate the multifaceted needs of digital health users based on their psychological characteristics.
Results
The results imply that an individual user’s psychological characteristics (self-efficacy, health consciousness, health motivation, and extraversion) affect interpreted mHealth screen perceived persuasiveness, and combinations of persuasive principles and psychological characteristics lead to greater perceived persuasiveness. The F test (ie, ANOVA) for model 1 was significant (F9,6540=191.806; P<.001), with an adjusted R2 of 0.208, indicating that the demographic variables explained 20.8% of the variance in perceived persuasiveness. Gender was a significant predictor, with women having higher perceived persuasiveness (P=.008) relative to men. Age was a significant predictor of perceived persuasiveness with individuals aged 40 to 59 years (P<.001) and ≥60 years (P<.001). Model 2 was significant (F13,6536=341.035; P<.001), with an adjusted R2 of 0.403, indicating that the demographic variables self-efficacy, health consciousness, health motivation, and extraversion together explained 40.3% of the variance in perceived persuasiveness.
Conclusions
This study evaluates the role that psychological characteristics play in interpreted mHealth screen perceived persuasiveness. Findings indicate that self-efficacy, health consciousness, health motivation, extraversion, gender, age, and education significantly influence the perceived persuasiveness of digital health technologies. Moreover, this study showed that varying combinations of psychological characteristics and demographic variables affected the perceived persuasiveness of the primary persuasive technology category.
Collapse
Affiliation(s)
- Aleise McGowan
- School of Computing Sciences and Computer Engineering, The University of Southern Mississippi, Hattiesburg, MS, United States
| | - Scott Sittig
- University of Louisiana at Lafayette, Lafayette, LA, United States
| | - David Bourrie
- University of South Alabama, Mobile, AL, United States
| | - Ryan Benton
- University of South Alabama, Mobile, AL, United States
| | | |
Collapse
|
8
|
Yazdanmehr A, Li Y, Wang J. Does stress reduce violation intention? Insights from eustress and distress processes on employee reaction to information security policies. EUR J INFORM SYST 2022. [DOI: 10.1080/0960085x.2022.2099767] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/03/2022]
Affiliation(s)
- Adel Yazdanmehr
- Paul H. Chook Department of Information Systems and Statistics, Zicklin School of Business, Baruch College, The City University of New York
| | - Yuan Li
- Department of Accounting and Information Management, Haslam College of Business, University of Tennessee, Knoxville, TN, USA
| | - Jingguo Wang
- Department of Information Systems and Operations Management, University of Texas at Arlington College of Business Administration, Arlington, TX, USA
| |
Collapse
|
9
|
Lee CS, Kim D. Pathways to Cybersecurity Awareness and Protection Behaviors in South Korea. JOURNAL OF COMPUTER INFORMATION SYSTEMS 2022. [DOI: 10.1080/08874417.2022.2031347] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/19/2022]
Affiliation(s)
| | - Dongsim Kim
- Hanshin University, Gyeonggi-do, South Korea
| |
Collapse
|
10
|
Protective behavior in ride-sharing through the lens of protection motivation theory and usage situation theory. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT 2021. [DOI: 10.1016/j.ijinfomgt.2021.102402] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/20/2022]
|
11
|
Karim NA, Kaur J, Khalib MN. Benefit vs Cost:Examining Factors of Intention to Comply Information Security Policy. 2021 IEEE INTERNATIONAL CONFERENCE ON COMPUTING (ICOCO) 2021. [DOI: 10.1109/icoco53166.2021.9673542] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/01/2023]
Affiliation(s)
- Norisan Abd Karim
- Faculty of Computer and Mathematical Sciences Universiti Teknologi MARA,Shah Alam,Malaysia
| | - Jasber Kaur
- Faculty of Computer and Mathematical Sciences Universiti Teknologi MARA,Shah Alam,Malaysia
| | - Muhammad Naquib Khalib
- Information Technology and Record Division,Immigration Department Malaysia,Putrajaya,Malaysia
| |
Collapse
|
12
|
Daengsi T, Pornpongtechavanich P, Wuttidittachotti P. Cybersecurity Awareness Enhancement: A Study of the Effects of Age and Gender of Thai Employees Associated with Phishing Attacks. EDUCATION AND INFORMATION TECHNOLOGIES 2021; 27:4729-4752. [PMID: 34803469 PMCID: PMC8591595 DOI: 10.1007/s10639-021-10806-7] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 02/19/2021] [Accepted: 11/08/2021] [Indexed: 06/13/2023]
Abstract
Cybersecurity is crucial at present because cyber threats (e.g., phishing) have become a very common occurrence in everyday life. A literature review showed that there are no studies based on cybersecurity awareness which involved a large number of Thai users. Thus, this research focused on the cybersecurity awareness of approximately 20,000 nationwide employees in a large financial institution in Thailand. The study consisted of three phases, a first phishing attack, knowledge transfer through a mixed-approach and a second phishing attack with different content. After data validation and analysis of the results, it was found that the level of cybersecurity awareness of employees improved significantly. The number of employees who opened the phishing email decreased by 71.5%. Therefore, this approach could be applied to cybersecurity enhancement in other organizations and other sectors/industries. Also, it was found that gender played a significant role in cybersecurity awareness within the Thai cybersecurity ecosystem since Thai female employees were found to have a higher level of cybersecurity awareness than male employees. Furthermore, it was found that the different generations of Thai employees (Generations Y and X and Baby Boomers) did not affect cybersecurity awareness.
Collapse
Affiliation(s)
- Therdpong Daengsi
- Department of Sustainable Industrial Management Engineering, Faculty of Engineering, Rajamangala University of Technology Phra Nakhon (North Bangkok Center), Bangkok, Thailand
| | - Phisit Pornpongtechavanich
- Department of Information Technology, Faculty of Industry and Technology, Rajamangala University of Technology Rattanakosin (Wang Klai Kangwon Campus), Hua Hin, Prachuap Khiri Khan, Thailand
| | - Pongpisit Wuttidittachotti
- Department of Data Communication and Networking, Faculty of Information Technology and Digital Innovation, King Mongkut’s University of Technology North Bangkok, Bangkok, Thailand
| |
Collapse
|
13
|
Hu S, Hsu C, Zhou Z. The impact of SETA event attributes on employees’ security-related Intentions: An event system theory perspective. Comput Secur 2021. [DOI: 10.1016/j.cose.2021.102404] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/20/2022]
|
14
|
Nifakos S, Chandramouli K, Nikolaou CK, Papachristou P, Koch S, Panaousis E, Bonacina S. Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review. SENSORS 2021; 21:s21155119. [PMID: 34372354 PMCID: PMC8348467 DOI: 10.3390/s21155119] [Citation(s) in RCA: 26] [Impact Index Per Article: 6.5] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 06/29/2021] [Revised: 07/15/2021] [Accepted: 07/16/2021] [Indexed: 01/05/2023]
Abstract
Background: Cybersecurity is increasingly becoming a prominent concern among healthcare providers in adopting digital technologies for improving the quality of care delivered to patients. The recent reports on cyber attacks, such as ransomware and WannaCry, have brought to life the destructive nature of such attacks upon healthcare. In complement to cyberattacks, which have been targeted against the vulnerabilities of information technology (IT) infrastructures, a new form of cyber attack aims to exploit human vulnerabilities; such attacks are categorised as social engineering attacks. Following an increase in the frequency and ingenuity of attacks launched against hospitals and clinical environments with the intention of causing service disruption, there is a strong need to study the level of awareness programmes and training activities offered to the staff by healthcare organisations. Objective: The objective of this systematic review is to identify commonly encountered factors that cybersecurity postures of a healthcare organisation, resulting from the ignorance of cyber threat to healthcare. The systematic review aims to consolidate the current literature being reported upon human behaviour resulting in security gaps that mitigate the cyber defence strategy adopted by healthcare organisations. Additionally, the paper also reviews the organisational risk assessment methodology implemented and the policies being adopted to strengthen cybersecurity. Methods: The topic of cybersecurity within healthcare and the clinical environment has attracted the interest of several researchers, resulting in a broad range of literature. The inclusion criteria for the articles in the review stem from the scope of the five research questions identified. To this end, we conducted seven search queries across three repositories, namely (i) PubMed®/MED-LINE; (ii) Cumulative Index to Nursing and Allied Health Literature (CINAHL); and (iii) Web of Science (WoS), using key words related to cybersecurity awareness, training, organisation risk assessment methodologies, policies and recommendations adopted as counter measures within health care. These were restricted to around the last 12 years. Results: A total of 70 articles were selected to be included in the review, which addresses the complexity of cybersecurity measures adopted within the healthcare and clinical environments. The articles included in the review highlight the evolving nature of cybersecurity threats stemming from exploiting IT infrastructures to more advanced attacks launched with the intent of exploiting human vulnerability. A steady increase in the literature on the threat of phishing attacks evidences the growing threat of social engineering attacks. As a countermeasure, through the review, we identified articles that provide methodologies resulting from case studies to promote cybersecurity awareness among stakeholders. The articles included highlight the need to adopt cyber hygiene practices among healthcare professionals while accessing social media platforms, which forms an ideal test bed for the attackers to gain insight into the life of healthcare professionals. Additionally, the review also includes articles that present strategies adopted by healthcare organisations in countering the impact of social engineering attacks. The evaluation of the cybersecurity risk assessment of an organisation is another key area of study reported in the literature that recommends the organisation of European and international standards in countering social engineering attacks. Lastly, the review includes articles reporting on national case studies with an overview of the economic and societal impact of service disruptions encountered due to cyberattacks. Discussion: One of the limitations of the review is the subjective ranking of the authors associated to the relevance of literature to each of the research questions identified. We also acknowledge the limited amount of literature that focuses on human factors of cybersecurity in health care in general; therefore, the search queries were formulated using well-established cybersecurity related topics categorised according to the threats, risk assessment and organisational strategies reported in the literature.
Collapse
Affiliation(s)
- Sokratis Nifakos
- Department of Learning, Informatics, Management and Ethics, Karolinska Institutet, 171 77 Solna, Sweden; (P.P.); (S.K.); (S.B.)
- Correspondence: ; Tel.: +46-73-7121-475
| | - Krishna Chandramouli
- School of Electronic Engineering and Computer Science, Queen Mary University of London, London E1 4NS, UK;
| | | | - Panagiotis Papachristou
- Department of Learning, Informatics, Management and Ethics, Karolinska Institutet, 171 77 Solna, Sweden; (P.P.); (S.K.); (S.B.)
| | - Sabine Koch
- Department of Learning, Informatics, Management and Ethics, Karolinska Institutet, 171 77 Solna, Sweden; (P.P.); (S.K.); (S.B.)
| | - Emmanouil Panaousis
- School of Computing and Mathematical Sciences, University of Greenwich, London SE10 9LS, UK;
| | - Stefano Bonacina
- Department of Learning, Informatics, Management and Ethics, Karolinska Institutet, 171 77 Solna, Sweden; (P.P.); (S.K.); (S.B.)
| |
Collapse
|
15
|
Hu S, Hsu C, Zhou Z. Security Education, Training, and Awareness Programs: Literature Review. JOURNAL OF COMPUTER INFORMATION SYSTEMS 2021. [DOI: 10.1080/08874417.2021.1913671] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
|
16
|
Liu C, Wang N, Liang H. Motivating information security policy compliance: The critical role of supervisor-subordinate guanxi and organizational commitment. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT 2020. [DOI: 10.1016/j.ijinfomgt.2020.102152] [Citation(s) in RCA: 15] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/24/2022]
|
17
|
Barlette Y, Jaouen A, Baillette P. Bring Your Own Device (BYOD) as reversed IT adoption: Insights into managers' coping strategies. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT 2020; 56:102212. [PMID: 32934432 PMCID: PMC7484736 DOI: 10.1016/j.ijinfomgt.2020.102212] [Citation(s) in RCA: 11] [Impact Index Per Article: 2.2] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/28/2020] [Revised: 08/04/2020] [Accepted: 08/04/2020] [Indexed: 11/01/2022]
Abstract
The adoption of Bring Your Own Device (BYOD), initiated by employees, refers to the provision and use of personal mobile devices and applications for both private and business purposes. This bottom-up phenomenon, not initiated by managers, corresponds to a reversed IT adoption logic that simultaneously entails business opportunities and threats. Managers are thus confronted with this unchosen BYOD usage by employees and consequently adopt different coping strategies. This research aims to investigate the adaptation strategies embraced by managers to cope with the BYOD phenomenon. To this end, we operationalized the coping model of user adaptation (CMUA) in the organizational decision-making context to conduct a survey addressing 337 top managers. Our main results indicate that the impact of the CMUA constructs varies according to the period (pre- or post-implementation). The coping strategies differ between those who have already implemented measures to regulate BYOD usage and those who have not. We contribute to theory by integrating the perception of BYOD-related opportunities and threats and by shedding light on the decisional processes in the adoption of coping strategies. The managerial contributions of this research correspond to the improved protection of corporate information and the maximization of BYOD-related benefits.
Collapse
Affiliation(s)
- Yves Barlette
- Montpellier Business School, 2300 Avenue des Moulins, 34185, Montpellier cedex 4, France
| | - Annabelle Jaouen
- Montpellier Business School, 2300 Avenue des Moulins, 34185, Montpellier cedex 4, France
| | - Paméla Baillette
- University of Bordeaux, IRGO Research Center, 35 Avenue Abadie, CS51412, 33072, Bordeaux cedex, France
| |
Collapse
|