网络安全研究:当前研究课题综述

Yang Lu
{"title":"网络安全研究:当前研究课题综述","authors":"Yang Lu","doi":"10.1142/S2424862218500148","DOIUrl":null,"url":null,"abstract":"This paper presents a systematic review of empirical research on cybersecurity issues. 14 empirical articles about cybersecurity, published in the two top IS journals, MISQ (12) and ISR (2), between 2008 and 2017, were selected and analyzed, classified into three categories: individual level (non-work setting), employee level (work setting), and organization level (policy/regulation environment). This paper provides a holistic picture of cybersecurity issues, for instance, fundamental theories, impressive research methods, and influencing factors. More importantly, for the first time an integrative framework was developed by R Project, which potentially text-mines end-users’ behaviors and decision-making processes toward cybersecurity under the circumstance of security breach. Some explanations of extant empirical study and potential research are addressed and discussed as well.","PeriodicalId":51835,"journal":{"name":"Journal of Industrial Integration and Management-Innovation and Entrepreneurship","volume":null,"pages":null},"PeriodicalIF":3.4000,"publicationDate":"2018-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":"{\"title\":\"Cybersecurity Research: A Review of Current Research Topics\",\"authors\":\"Yang Lu\",\"doi\":\"10.1142/S2424862218500148\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper presents a systematic review of empirical research on cybersecurity issues. 14 empirical articles about cybersecurity, published in the two top IS journals, MISQ (12) and ISR (2), between 2008 and 2017, were selected and analyzed, classified into three categories: individual level (non-work setting), employee level (work setting), and organization level (policy/regulation environment). This paper provides a holistic picture of cybersecurity issues, for instance, fundamental theories, impressive research methods, and influencing factors. More importantly, for the first time an integrative framework was developed by R Project, which potentially text-mines end-users’ behaviors and decision-making processes toward cybersecurity under the circumstance of security breach. Some explanations of extant empirical study and potential research are addressed and discussed as well.\",\"PeriodicalId\":51835,\"journal\":{\"name\":\"Journal of Industrial Integration and Management-Innovation and Entrepreneurship\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":3.4000,\"publicationDate\":\"2018-11-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"14\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Industrial Integration and Management-Innovation and Entrepreneurship\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1142/S2424862218500148\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"MANAGEMENT\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Industrial Integration and Management-Innovation and Entrepreneurship","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1142/S2424862218500148","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"MANAGEMENT","Score":null,"Total":0}
引用次数: 14

摘要

本文对网络安全问题的实证研究进行了系统回顾。对2008年至2017年间发表在两大IS期刊MISQ(12)和ISR(2)上的14篇网络安全实证文章进行了选择和分析,将其分为个人层面(非工作环境)、员工层面(工作环境)和组织层面(政策/法规环境)三类。本文从网络安全的基本理论、研究方法、影响因素等方面对网络安全问题进行了全面的介绍。更重要的是,R项目首次开发了一个综合框架,该框架可能会对终端用户在安全漏洞情况下的网络安全行为和决策过程进行文本挖掘。对现有的实证研究和潜在的研究进行了解释和讨论。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Cybersecurity Research: A Review of Current Research Topics
This paper presents a systematic review of empirical research on cybersecurity issues. 14 empirical articles about cybersecurity, published in the two top IS journals, MISQ (12) and ISR (2), between 2008 and 2017, were selected and analyzed, classified into three categories: individual level (non-work setting), employee level (work setting), and organization level (policy/regulation environment). This paper provides a holistic picture of cybersecurity issues, for instance, fundamental theories, impressive research methods, and influencing factors. More importantly, for the first time an integrative framework was developed by R Project, which potentially text-mines end-users’ behaviors and decision-making processes toward cybersecurity under the circumstance of security breach. Some explanations of extant empirical study and potential research are addressed and discussed as well.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
17.00
自引率
16.70%
发文量
31
期刊介绍: The Journal of Industrial Integration and Management: Innovation & Entrepreneurship concentrates on the technological innovation and entrepreneurship within the ongoing transition toward industrial integration and informatization. This journal strives to offer insights into challenges, issues, and solutions associated with industrial integration and informatization, providing an interdisciplinary platform for researchers, practitioners, and policymakers to engage in discussions from the perspectives of innovation and entrepreneurship. Welcoming contributions, The Journal of Industrial Integration and Management: Innovation & Entrepreneurship seeks papers addressing innovation and entrepreneurship in the context of industrial integration and informatization. The journal embraces empirical research, case study methods, and techniques derived from mathematical sciences, computer science, manufacturing engineering, and industrial integration-centric engineering management.
期刊最新文献
Breaking Barriers: The Path to Empowering Women Entrepreneurs in Saudi Arabia An ANN model to Predict Select Performance Measures for Job Scheduling System Discount or Speed?: An Analysis of Reward Offer in Exchange for No-Rush Shipping Digital transformation from planning to execution - a strategic framework based on ambidexterity and enterprise architecture & interoperability The Product's Great Journey: A Multi-triangular Agile Approach
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1