| Literature DB >> 35935743 |
Shahriar Akter1, Mohammad Rajib Uddin2, Shahriar Sajib3, Wai Jin Thomas Lee1, Katina Michael4, Mohammad Alamgir Hossain5.
Abstract
Data breaches have become a formidable challenge for business operations in the twenty-first century. The emergence of big data in the ever-growing digital economy has created the necessity to secure critical organizational information. The lack of cybersecurity awareness exposes organizations to potential cyber threats. Thus, this research aims to identify the various dimensions of cybersecurity awareness capabilities. Drawing on the dynamic capabilities framework, the findings of the study show personnel (knowledge, attitude and learning), management (training, culture and strategic orientation) and infrastructure capabilities (technology and data governance) as thematic dimensions to tackle cybersecurity awareness challenges.Entities:
Year: 2022 PMID: 35935743 PMCID: PMC9345286 DOI: 10.1007/s10479-022-04844-8
Source DB: PubMed Journal: Ann Oper Res ISSN: 0254-5330 Impact factor: 4.820
Seminal studies on Cybersecurity Awareness Capabilities (CSAC)
| Study | Study type | Key findings on Cybersecurity Awareness Capabilities |
|---|---|---|
| Zwiling et al. ( | Empirical | The study aims to investigate knowledge and behavior on CSA regarding protection tools that are conducted in four countries, including Turkey, Poland, Slovenia and Israel. The study finds that cybersecurity knowledge is related to CSA despite differences in gender and geographical location. Further, the study reveals a significant difference of CSA knowledge and behavior across countries. The authors suggest that protective tools for cybersecurity management play an important role in creating awareness |
| Fabisiak & Hyla (2020) | Empirical | The study finds that Polish medical professionals lack mandatory knowledge about cybersecurity and need more training in this field. The authors reported difficulty in acquiring a large amount of data through surveys within the context of empirical enquiry |
| Bauer et al. ( | Empirical | Through analyzing efforts of information security managers’ in designing effective information security programs, the authors investigate how users perceive information security programs that lead to changes in behavior in maintaining information security compliance within the banking sector. The study finds that a comprehensive design strategy seems to be more effective among the bank’s employees for increasing cybersecurity awareness. The authors note that informants may convey biased information influenced by social desirability |
| Janabi & Shourbaji (2016) | Empirical | The empirical study reveals that the study participants, which include academic staff, university students and employees of universities, lack necessary knowledge and awareness regarding the implications of cybersecurity in their daily life. The authors suggest further research applying robust theoretical models and frameworks |
| Ahmad et al. ( | Empirical | Based on the data collected from mainstream schools (excluding private schools, international schools and special education), the study indicates that the level of knowledge on cybersecurity awareness among parents to protect their children from cybersecurity threats is moderate |
| Barth et al. ( | Empirical | The study tests the privacy paradox and finds that users are more concerned about ratings and the price of a desired application, than they are about privacy and security, when downloading and installing an app on their devices |
| Kraus et al. ( | Empirical | The study is conducted on job seekers and students and finds that security and privacy actions on the devices of smartphone users are influenced by intrinsic motivation by nonessential psychological needs, such as the need for security along with other needs |
| Shanfari et al. (2020) | Empirical | The study finds a significant impact of six independent variables that may affect human components in adopting CSA, considered in the empirical context of Oman’s public sector employees |
| David et al. ( | Empirical | The authors find that human beliefs, consisting of resource belief, usefulness belief, and reciprocity belief, have a positive correlation for gaining specialist knowledge in cybersecurity |
| Bavel et al. ( | Empirical | The study applies protection motivation theory to investigate changes of user’s online security behavior through providing notifications during online shopping. The findings suggest that factors such as awareness of cybersecurity measures, risk attitude, age, and country have an impact on appropriate protective behavioral response |
| Tschakert and Ngamsuriyaroj ( | Empirical | The authors find the impact of classroom training with respect to phishing emails and reducing vulnerability among the participants to be insignificant when compared with users who do not receive any training whatsoever. The authors recommend further investigation on the usefulness of the measures, and suggest that educating participants about the study may itself sensitize participants toward phishing and cybersecurity learnings |
| Schneider et al. ( | Empirical | Based on a literature review and in-depth interviews with cybersecurity experts and senior managers, this study offers a managerial information security awareness guideline that is proven based on outcomes. To assess a practicable managerial information security awareness program, the authors recommend targeting senior managers in their specific and desired environment |
| Holdworth & Apeh (2017) | Empirical | The study finds that to be successful, industry requirements for designing and implementing structured programs and training for establishing cybersecurity awareness among hospitality industry employees, needs to involve three stages of artefact evaluation. The authors suggest that a greater number of interactive elements are necessary for the programs |
| Zuopeng & Zhang (2019) | Empirical | Through reviewing online content such as blogs of corporate websites, the study provides actionable guidelines for the successful implementation of cybersecurity training and awareness programs within an organization |
Fig. 1Microfoundations of data-driven cybersecurity awareness capability