Exploring the Frontiers of Cybersecurity Behavior: ASystematic Review of Studies and Theories

Cybersecurity procedures and policies are prevalent countermeasures for protecting organi zations from cybercrimes and security incidents. Without considering human behaviors, implement ing these countermeasures will remain useless. Cybersecurity behavior has gained much attention in recent years. H...

وصف كامل

محفوظ في:
التفاصيل البيبلوغرافية
المؤلف الرئيسي: Almansoori, Afrah (author)
مؤلفون آخرون: Al-Emran, Mostafa (author), Shaalan, Khaled (author)
منشور في: 2023
الوصول للمادة أونلاين:https://bspace.buid.ac.ae/handle/1234/3750
الوسوم: إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
_version_ 1862980611648520192
author Almansoori, Afrah
author2 Al-Emran, Mostafa
Shaalan, Khaled
author2_role author
author
author_facet Almansoori, Afrah
Al-Emran, Mostafa
Shaalan, Khaled
author_role author
dc.creator.none.fl_str_mv Almansoori, Afrah
Al-Emran, Mostafa
Shaalan, Khaled
dc.date.none.fl_str_mv 2023
2026-01-22T09:57:14Z
dc.identifier.none.fl_str_mv https://bspace.buid.ac.ae/handle/1234/3750
dc.language.none.fl_str_mv en
dc.title.none.fl_str_mv Exploring the Frontiers of Cybersecurity Behavior: ASystematic Review of Studies and Theories
dc.type.none.fl_str_mv Article
description Cybersecurity procedures and policies are prevalent countermeasures for protecting organi zations from cybercrimes and security incidents. Without considering human behaviors, implement ing these countermeasures will remain useless. Cybersecurity behavior has gained much attention in recent years. However, a systematic review that provides extensive insights into cybersecurity behavior through different technologies and services and covers various directions in large-scale research remains lacking. Therefore, this study retrieved and analyzed 2210 articles published on cybersecurity behavior. The retrieved articles were then thoroughly examined to meet the inclusion and exclusion criteria, in which 39 studies published between 2012 and 2021 were ultimately picked for further in-depth analysis. The main findings showed that the protection motivation theory (PMT) dominated the list of theories and models examining cybersecurity behavior. Cybersecurity behavior and intention behavior counted for the highest purpose for most studies, with fewer studies focusing on cybersecurity awareness and compliance behavior. Most examined studies were conducted in individualistic contexts with limited exposure to collectivistic societies. A total of 56% of the analyzed studies focused on the organizational level, indicating that the individual level is still in its infancy stage. To address the research gaps in cybersecurity behavior at the individual level, this review proposes a number of research agendas that can be considered in future research. This review is believed to improve our understanding by revealing the full potential of cybersecurity behavior and opening the door for further research opportunities.
id budr_d75eaacb29d5ef541bc4e3d27feb282f
language_invalid_str_mv en
network_acronym_str budr
network_name_str The British University in Dubai repository
oai_identifier_str oai:bspace.buid.ac.ae:1234/3750
publishDate 2023
repository.mail.fl_str_mv
repository.name.fl_str_mv
repository_id_str
spelling Exploring the Frontiers of Cybersecurity Behavior: ASystematic Review of Studies and TheoriesAlmansoori, AfrahAl-Emran, MostafaShaalan, KhaledCybersecurity procedures and policies are prevalent countermeasures for protecting organi zations from cybercrimes and security incidents. Without considering human behaviors, implement ing these countermeasures will remain useless. Cybersecurity behavior has gained much attention in recent years. However, a systematic review that provides extensive insights into cybersecurity behavior through different technologies and services and covers various directions in large-scale research remains lacking. Therefore, this study retrieved and analyzed 2210 articles published on cybersecurity behavior. The retrieved articles were then thoroughly examined to meet the inclusion and exclusion criteria, in which 39 studies published between 2012 and 2021 were ultimately picked for further in-depth analysis. The main findings showed that the protection motivation theory (PMT) dominated the list of theories and models examining cybersecurity behavior. Cybersecurity behavior and intention behavior counted for the highest purpose for most studies, with fewer studies focusing on cybersecurity awareness and compliance behavior. Most examined studies were conducted in individualistic contexts with limited exposure to collectivistic societies. A total of 56% of the analyzed studies focused on the organizational level, indicating that the individual level is still in its infancy stage. To address the research gaps in cybersecurity behavior at the individual level, this review proposes a number of research agendas that can be considered in future research. This review is believed to improve our understanding by revealing the full potential of cybersecurity behavior and opening the door for further research opportunities.2026-01-22T09:57:14Z2023Articlehttps://bspace.buid.ac.ae/handle/1234/3750enoai:bspace.buid.ac.ae:1234/37502026-01-22T09:57:15Z
spellingShingle Exploring the Frontiers of Cybersecurity Behavior: ASystematic Review of Studies and Theories
Almansoori, Afrah
title Exploring the Frontiers of Cybersecurity Behavior: ASystematic Review of Studies and Theories
title_full Exploring the Frontiers of Cybersecurity Behavior: ASystematic Review of Studies and Theories
title_fullStr Exploring the Frontiers of Cybersecurity Behavior: ASystematic Review of Studies and Theories
title_full_unstemmed Exploring the Frontiers of Cybersecurity Behavior: ASystematic Review of Studies and Theories
title_short Exploring the Frontiers of Cybersecurity Behavior: ASystematic Review of Studies and Theories
title_sort Exploring the Frontiers of Cybersecurity Behavior: ASystematic Review of Studies and Theories
url https://bspace.buid.ac.ae/handle/1234/3750