• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

一项关于评估信息安全意识的网络安全量表的系统文献综述。

A systematic literature review of cybersecurity scales assessing information security awareness.

作者信息

Rohan Rohani, Pal Debajyoti, Hautamäki Jari, Funilkul Suree, Chutimaskul Wichian, Thapliyal Himanshu

机构信息

School of Information Technology, King Mongkut's University of Technology Thonburi, Bangkok 10140, Thailand.

Innovative Cognitive Computing Research Center (IC2), King Mongkut's University of Technology Thonburi, Bangkok 10140, Thailand.

出版信息

Heliyon. 2023 Mar 5;9(3):e14234. doi: 10.1016/j.heliyon.2023.e14234. eCollection 2023 Mar.

DOI:10.1016/j.heliyon.2023.e14234
PMID:36938452
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC10015252/
Abstract

Information Security Awareness (ISA) is a significant concept that got considerable attention recently and can assist in minimizing the risks associated with information security breaches. Several measurement scales have been developed in this regard, as measuring users' ISA is paramount. Although ISA specific scales are very important, yet what methodological rigor they use in terms of initial conceptualization of ISA, data collection and analysis during the development, and scale validation of such scales are some unknown aspects. Therefore, we provide a comprehensive review of the existing ISA specific scales to address all the above concerns. A popular method, PRISMA, is utilized, and a total of 24 articles that match with criteria of this research are included for the final in-depth analysis. Also, a holistic evaluation framework is developed containing three phases and 19 criteria. Findings revealed that most studies treat ISA as a multi-dimensional construct, and ISA researchers rarely conduct both pilot testing and pre-text evaluation while validating and refining the initial scales. Additionally, several articles did not report some of the essential elements used for checking the rigor of factor analysis, and evidence for validities of the identified scales is inadequate. Consequently, existing ISA specific scales must be improved both in terms of the methodological thoroughness of the scale development procedure and their validities. Moreover, not only justifying why the development of a new scale is necessary, but also improving the quality of the existing scales by doing multiple iterations is significant in the future. Likewise, the inclusion of all the dimensions of ISA, while generating the initial items pool is an important aspect to be considered. A thorough discussion, recommendations for future research, conclusions, and study limitations are provided.

摘要

信息安全意识(ISA)是一个最近受到广泛关注的重要概念,它有助于将与信息安全漏洞相关的风险降至最低。在这方面已经开发了几种测量量表,因为测量用户的信息安全意识至关重要。尽管特定于信息安全意识的量表非常重要,但它们在信息安全意识的初始概念化、开发过程中的数据收集和分析以及此类量表的量表验证方面所使用的方法严谨性仍是一些未知的方面。因此,我们对现有的特定于信息安全意识的量表进行了全面综述,以解决上述所有问题。我们采用了一种流行的方法——PRISMA,总共纳入了24篇符合本研究标准的文章进行最终的深入分析。此外,还开发了一个包含三个阶段和19个标准的整体评估框架。研究结果表明,大多数研究将信息安全意识视为一个多维度的结构,并且信息安全意识研究人员在验证和完善初始量表时很少同时进行预测试和文本前评估。此外,几篇文章没有报告用于检查因子分析严谨性的一些基本要素,并且所确定量表有效性的证据不足。因此,现有的特定于信息安全意识的量表必须在量表开发程序的方法彻底性及其有效性方面加以改进。此外,不仅要说明开发新量表的必要性,而且通过多次迭代提高现有量表的质量在未来也很重要。同样,在生成初始项目池时纳入信息安全意识的所有维度是一个需要考虑的重要方面。本文还提供了深入的讨论、对未来研究的建议、结论以及研究局限性。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/82d3/10015252/07e7794f55a0/gr7.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/82d3/10015252/4848742e4cd5/gr1.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/82d3/10015252/bf35ba7f07e6/gr2.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/82d3/10015252/bc55c741335c/gr3.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/82d3/10015252/d203cbf8e392/gr4.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/82d3/10015252/af351b75665b/gr5.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/82d3/10015252/0d122c00f9aa/gr6.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/82d3/10015252/07e7794f55a0/gr7.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/82d3/10015252/4848742e4cd5/gr1.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/82d3/10015252/bf35ba7f07e6/gr2.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/82d3/10015252/bc55c741335c/gr3.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/82d3/10015252/d203cbf8e392/gr4.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/82d3/10015252/af351b75665b/gr5.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/82d3/10015252/0d122c00f9aa/gr6.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/82d3/10015252/07e7794f55a0/gr7.jpg

相似文献

1
A systematic literature review of cybersecurity scales assessing information security awareness.一项关于评估信息安全意识的网络安全量表的系统文献综述。
Heliyon. 2023 Mar 5;9(3):e14234. doi: 10.1016/j.heliyon.2023.e14234. eCollection 2023 Mar.
2
Folic acid supplementation and malaria susceptibility and severity among people taking antifolate antimalarial drugs in endemic areas.在流行地区,服用抗叶酸抗疟药物的人群中,叶酸补充剂与疟疾易感性和严重程度的关系。
Cochrane Database Syst Rev. 2022 Feb 1;2(2022):CD014217. doi: 10.1002/14651858.CD014217.
3
A systematic mapping study on gamification within information security awareness programs.
Heliyon. 2024 Sep 26;10(19):e38474. doi: 10.1016/j.heliyon.2024.e38474. eCollection 2024 Oct 15.
4
Psychometric properties of self-report concussion scales and checklists.自我报告脑震荡量表和清单的心理计量特性。
J Athl Train. 2012 Mar-Apr;47(2):221-3. doi: 10.4085/1062-6050-47.2.221.
5
Beyond the black stump: rapid reviews of health research issues affecting regional, rural and remote Australia.超越黑木树:影响澳大利亚地区、农村和偏远地区的健康研究问题的快速综述。
Med J Aust. 2020 Dec;213 Suppl 11:S3-S32.e1. doi: 10.5694/mja2.50881.
6
The Effectiveness of Integrated Care Pathways for Adults and Children in Health Care Settings: A Systematic Review.综合护理路径在医疗环境中对成人和儿童的有效性:一项系统评价。
JBI Libr Syst Rev. 2009;7(3):80-129. doi: 10.11124/01938924-200907030-00001.
7
Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review.人为因素对医疗机构网络安全的影响:系统综述。
Sensors (Basel). 2021 Jul 28;21(15):5119. doi: 10.3390/s21155119.
8
The future of Cochrane Neonatal.考克兰新生儿协作网的未来。
Early Hum Dev. 2020 Nov;150:105191. doi: 10.1016/j.earlhumdev.2020.105191. Epub 2020 Sep 12.
9
Can Cyberloafing and Internet Addiction Affect Organizational Information Security?网络闲逛和网瘾会影响组织信息安全吗?
Cyberpsychol Behav Soc Netw. 2017 Sep;20(9):567-571. doi: 10.1089/cyber.2017.0239. Epub 2017 Sep 5.
10
Impaired self-awareness after traumatic brain injury: a systematic review. Part 1: Assessment, clinical aspects and recovery.颅脑创伤后自知力受损:系统评价。第 1 部分:评估、临床方面和恢复。
Ann Phys Rehabil Med. 2021 Sep;64(5):101468. doi: 10.1016/j.rehab.2020.101468. Epub 2021 Jul 16.

本文引用的文献

1
Remapping cybersecurity competences in a small nation state.在一个小的民族国家重新规划网络安全能力。
Heliyon. 2023 Jan 10;9(1):e12808. doi: 10.1016/j.heliyon.2023.e12808. eCollection 2023 Jan.
2
An ontology-driven framework for knowledge representation of digital extortion attacks.一种用于数字敲诈攻击知识表示的本体驱动框架。
Comput Human Behav. 2023 Feb;139:107520. doi: 10.1016/j.chb.2022.107520. Epub 2022 Oct 13.
3
Awareness of electronic crimes related to E-learning among students at the University of Jordan.约旦大学学生对与电子学习相关的电子犯罪的认知。
Heliyon. 2022 Oct 4;8(10):e10897. doi: 10.1016/j.heliyon.2022.e10897. eCollection 2022 Oct.
4
Factor Retention in Exploratory Factor Analysis With Missing Data.缺失数据下探索性因子分析中的因子保留
Educ Psychol Meas. 2022 Jun;82(3):444-464. doi: 10.1177/00131644211022031. Epub 2021 Jun 11.
5
Measuring the level of cyber-security awareness for cybercrime in Saudi Arabia.衡量沙特阿拉伯网络犯罪方面的网络安全意识水平。
Heliyon. 2021 Jan 25;7(1):e06016. doi: 10.1016/j.heliyon.2021.e06016. eCollection 2021 Jan.
6
Scale development: ten main limitations and recommendations to improve future research practices.量表开发:提高未来研究实践的十个主要局限性及建议
Psicol Reflex Crit. 2017 Jan 25;30(1):3. doi: 10.1186/s41155-016-0057-1.
7
Best Practices for Developing and Validating Scales for Health, Social, and Behavioral Research: A Primer.健康、社会和行为研究量表开发与验证的最佳实践:入门指南。
Front Public Health. 2018 Jun 11;6:149. doi: 10.3389/fpubh.2018.00149. eCollection 2018.
8
Human factors in cybersecurity; examining the link between Internet addiction, impulsivity, attitudes towards cybersecurity, and risky cybersecurity behaviours.网络安全中的人为因素;研究网络成瘾、冲动性、对网络安全的态度与危险的网络安全行为之间的联系。
Heliyon. 2017 Jul 5;3(7):e00346. doi: 10.1016/j.heliyon.2017.e00346. eCollection 2017 Jul.
9
Using structural equation modeling to detect response shift in performance and health-related quality of life scores of multiple sclerosis patients.使用结构方程模型检测多发性硬化症患者的绩效和健康相关生活质量评分中的反应转移。
Qual Life Res. 2011 Dec;20(10):1527-40. doi: 10.1007/s11136-010-9844-9. Epub 2011 Jan 19.
10
The PRISMA statement for reporting systematic reviews and meta-analyses of studies that evaluate health care interventions: explanation and elaboration.用于报告评估卫生保健干预措施的研究的系统评价和荟萃分析的PRISMA声明:解释与详述
J Clin Epidemiol. 2009 Oct;62(10):e1-34. doi: 10.1016/j.jclinepi.2009.06.006. Epub 2009 Jul 23.