Cybersecurity governance: A scoping review

Authors

DOI:

https://doi.org/10.26668/businessreview/2022.v7i4.e629

Keywords:

Cybersecurity, Cyber Environment, Governance, Scoping Review Research

Abstract

Purpose: Security measures have become increasingly important due to the expansion of the cyber environments. National and international entities are exposing themselves to cybersecurity risks, and they are growing in number every day.

Theoretical Framework: With a comprehensive cybersecurity plan, threats can be eliminated. Implementing this plan is possible by involving all stakeholders in the management processes because the idea of management is insufficient. To ensure cybersecurity, this study highlights the significance of cybersecurity and cybergovernance in the digital world.

Design: The study findings and recommendations for cybersecurity governance were reviewed. A scoping review research model was used for this purpose.

Findings:A basic and documentary research model related to research philosophy were developed for the application technique. The scope of the research includes publications from Scopus. Studies from the last ten years were downloaded using the selected keywords.

Originality: The results show that despite research that has led to local cybersecurity governance solutions in several countries, a comprehensive governance framework has not yet been established. Instead, there is a hidden conflict over control of this region, not its governance.”

Downloads

Download data is not yet available.

References

Abbas, A. F., Jusoh, A., Mas, A., Alsharif, A. H., & Ali, J. (2022). Bibliometrix analysis of information sharing in social media. Cogent Business & Management, 9(1). https://doi.org/10.1080/23311975.2021.2016556

Abbas, A. F., Jusoh, A., Masod, A., Ali, J., Ahmed, H., & E, A. R. H. (2021). A Bibliometric Analysis of Publications on Social Media Influencers Using Vosviewer. Journal of Theoretical and Applied Information Technology, 99(23), 5662–5676.

Adam, I., Jusoh, A., & Streimikiene, D. (2019). Scoping research on sustainability performance from manufacturing industry sector. Problems and Perspectives in Management, 17(2). https://doi.org/10.21511/ppm.17(2).2019.10

Al-sartawi, A. M. A. M. (2020). Information technology governance and cybersecurity at the board level. Int. J. Critical Infrastructures, 16(2), 150–161.

Ali, J., Jusoh, A., & Abbas, A. F. (2021). Thirty- Eight Years of ‘ Wellbeing ’ Research : Bibliometric Analysis of Open Access Documents . Studies of Applied Economics, October, 1–11. https://doi.org/10.25115/eea.v39i10.5412

Aslay, F. (2017). Siber Attack Methods and Current Situation Analysis of Turkey’s Ciber Safety. International Journal of Multidisciplinary Studies and Innovative Technologies, 1(1), 24–28.

Auffret, J., Kelley, D., & Warweg, P. (2017). Cybersecurity Leadership : Competencies , Governance , and Technologies for Industrial Control Systems. Journal of Interconnection Networks, 17(1), 1–20. https://doi.org/10.1142/S0219265917400011

Bakanlı˘gı. (2013). National Cyber Security Strategy and 2013–2014 Action Plan. Information Technologies and Communication Authority.

Barnes, S. J., & Pressey, A. D. (2011). Who needs cyberspace? Examining drivers of needs in Second Life. Internet Research, 21(3), 236–254. https://doi.org/10.1108/10662241111139291

Blazevic, V., Wiertz, C., Cotte, J., De Ruyter, K., & Keeling, D. I. (2014). GOSIP in cyberspace: Conceptualization and scale development for general online social interaction propensity. Journal of Interactive Marketing, 28(2), 87–100. https://doi.org/10.1016/j.intmar.2013.09.003

Bodeau, D. (2012). Cyber security governance: A component of MITRE’s cyber prep methodology. Washington: MITRE Corporation., September.

Boerman, D. (2020). Reporting on Cybersecurity Performance. University of Twente.

Boyes, H. (2015). Cybersecurity and Cyber-Resilient Supply Chains. Technology Innovation Management Review, 5(4), 28–34. https://doi.org/10.22215/timreview888

Calderaro, A., & Craig, A. J. S. (2020). Transnational governance of cybersecurity : policy challenges and global inequalities in cyber capacity building. Third World Quarterly, 0(0), 1–22. https://doi.org/10.1080/01436597.2020.1729729

Carr, M., & Lesniewska, F. (2020). Internet of Things , cybersecurity and governing wicked problems : learning from climate change governance. International Relations, 34(3), 391 –412. https://doi.org/10.1177/0047117820948247

Colquhoun, H. L., Levac, D., Brien, K. K. O., Straus, S., Tricco, A. C., Perrier, L., Kastner, M., & Moher, D. (2014). Scoping reviews : time for clarity in definition , methods , and reporting. Journal of Clinical Epidemiology, 67(12), 1291–1294. https://doi.org/10.1016/j.jclinepi.2014.03.013

Cope, S., Leishman, F., & Starie, P. (1997). Globalization , new public management and the Futures of police management. Intl Jnl Public Sec Management, 10(6), 444–460.

Çözümler, P. (2019). Siber Güvenlik ve Savunma: Problemler ve Çözümler (Vol. 06520).

Culver, C. A. (2022). Manipulating Remittances: Strengthening Autocratic Regimes with Currency Overvaluation and Remittance Flows. Remittances Review, 7(1), 21-47.

Fierro, P., Aroca, P., & Navia, P. (2020). How people access the internet and the democratic divide: Evidence from the Chilean region of Valparaiso 2017, 2018 and 2019. Technology in Society, 101432. https://doi.org/10.1016/j.techsoc.2020.101432

Hitt. (2005). Management. Prentice Hall Inc.

Hoffmann, R., Napiórkowski, J., Protasowicki, T., & Stanik, J. (2020). Risk based approach in scope of cybersecurity threats and requirements. Procedia Manufacturing, 44(2019), 655–662. https://doi.org/10.1016/j.promfg.2020.02.243

ISO. (2015). Iso/iec 38500:2015 information technology | governance of it for the organization.

Levac, D., Colquhoun, H., & Brien, K. K. O. (2010). Scoping studies : advancing the methodology. Implementation Science, 5(1), 1–9.

Macnish, K., & Ham, J. Van Der. (2020). Technology in Society Ethics in cybersecurity research and practice. Technology in Society, 63(December 2019), 101382. https://doi.org/10.1016/j.techsoc.2020.101382

Mueller, M. (2017). Is Cybersecurity Eating Internet Governance ? Causes and Consequences of Alternative Framings. Digital Policy, Regulation and Governance, 19(6), 415–428.

NATO. (2020). Warsaw Summit Communiqué. North Atlantic Treaty Organization. https://www.nato.int/ cps/en/natohq/official_texts_13316

Peng, S. (2018). “ Private ” Cybersecurity Standards ? Cyberspace Governance , Multistakeholderism , and the ( Ir ) relevance of the TBT Regime. Cornell International Law Journal, 51(2).

Pernice, I. (2018). Global cybersecurity governance : A constitutionalist analysis. Global Constitutionalism, 7(1), 112–141. https://doi.org/10.1017/S2045381718000023

Rahman, T., Rohan, R., Pal, D., & Kanthamanon, P. (2021). Human Factors in Cybersecurity : A Scoping Review Human Factors in Cybersecurity : A Scoping Review. IAIT, July. https://doi.org/10.1145/3468784.3468789

Sahi, A. M., Khalid, H., Abbas, A. F., & Khatib, S. F. A. (2021a). The Evolving Research of Customer Adoption of Digital Payment : Learning from Content and Statistical Analysis of the Literature. J. Open Innov. Technol. Mark. Complex, 1–25.

Sahi, A. M., Khalid, H., Abbas, A. F., & Khatib, S. F. A. (2021b). The evolving research of customer adoption of digital payment: Learning from content and statistical analysis of the literature. Journal of Open Innovation: Technology, Market, and Complexity, 7(4), 1–25. https://doi.org/10.3390/joitmc7040230

Sava¸S., & Topalo˘glu, N. (2019). Data analysis through social media according to the classified crime. Turkish Journal of Electrical Engineering and Computer Sciences, 27(1), 407–420. https://doi.org/10.3906/elk-1712-17

Savas, S., & Karata, S. (2022). Cyber governance studies in ensuring cybersecurity: an overview of cybersecurity governance. Int. Cybersecur. Law Rev, 3, 7–34.

Shackelford, S. J., Sulmeyer, M., Deckard, A. N. C., Buchanan, B., & Micic, B. (2017). From Russia with Love: Understanding the Russian Cyber Threat to U.S. Critical Infrastructure and What to Do about It. Nebraska Law Review, 96(2).

Shackleford, S., & Craig, A. (2014). Beyond the New ’ Digital Divide ’: Analyzing the Evolving Role of National Governments in Internet Governance and Enhancing Cybersecurity. World Conference on International Telecommunication, 119(290).

Statista. (2020). Spending on cybersecurity worldwide from 2017 to 2020. Statista.

Swinton, S., & Hedges, S. (2020). Cybersecurity Governance, Part 1: 5. Fundamental Challenges. https://insights.sei.cmu.edu/insider-threat/ 2019/07/cybersecurity-governance-part-1-5-fundamental-challenges.html

Terlizzi, M. A., Meirelles, F. D. S., & Alexandra, M. (2017). Behavior of Brazilian Banks Employees on Facebook and the Cybersecurity Governance. Journal of Applied Security Research, 12(2), 224–252. https://doi.org/10.1080/19361610.2017.1277886

Tessian. (2021). The psychology of human error. https://www.tessian.com/research/the-psychology-of- human-error/

Wolff, J. (2016). What we talk about when we talk about cybersecurity : security in internet governance debates. INTERNET POLICY REVIEW, 5(3), 1–13. https://doi.org/10.14763/2016.3.430

Xu, Z., Ge, Z., Wang, X., & Skare, M. (2021). Technological Forecasting & Social Change Bibliometric analysis of technology adoption literature published from 1997 to 2020. Technological Forecasting & Social Change, 170(March), 120896. https://doi.org/10.1016/j.techfore.2021.120896

Downloads

Published

2022-11-11

How to Cite

Albalas, T., Modjtahedi, A., & Abdi, R. (2022). Cybersecurity governance: A scoping review. International Journal of Professional Business Review, 7(4), e0629. https://doi.org/10.26668/businessreview/2022.v7i4.e629