Cybersecurity governance: A scoping review




Cybersecurity, Cyber Environment, Governance, Scoping Review Research


Purpose: Security measures have become increasingly important due to the expansion of the cyber environments. National and international entities are exposing themselves to cybersecurity risks, and they are growing in number every day.

Theoretical Framework: With a comprehensive cybersecurity plan, threats can be eliminated. Implementing this plan is possible by involving all stakeholders in the management processes because the idea of management is insufficient. To ensure cybersecurity, this study highlights the significance of cybersecurity and cybergovernance in the digital world.

Design: The study findings and recommendations for cybersecurity governance were reviewed. A scoping review research model was used for this purpose.

Findings:A basic and documentary research model related to research philosophy were developed for the application technique. The scope of the research includes publications from Scopus. Studies from the last ten years were downloaded using the selected keywords.

Originality: The results show that despite research that has led to local cybersecurity governance solutions in several countries, a comprehensive governance framework has not yet been established. Instead, there is a hidden conflict over control of this region, not its governance.”


Download data is not yet available.


Abbas, A. F., Jusoh, A., Mas, A., Alsharif, A. H., & Ali, J. (2022). Bibliometrix analysis of information sharing in social media. Cogent Business & Management, 9(1).

Abbas, A. F., Jusoh, A., Masod, A., Ali, J., Ahmed, H., & E, A. R. H. (2021). A Bibliometric Analysis of Publications on Social Media Influencers Using Vosviewer. Journal of Theoretical and Applied Information Technology, 99(23), 5662–5676.

Adam, I., Jusoh, A., & Streimikiene, D. (2019). Scoping research on sustainability performance from manufacturing industry sector. Problems and Perspectives in Management, 17(2).

Al-sartawi, A. M. A. M. (2020). Information technology governance and cybersecurity at the board level. Int. J. Critical Infrastructures, 16(2), 150–161.

Ali, J., Jusoh, A., & Abbas, A. F. (2021). Thirty- Eight Years of ‘ Wellbeing ’ Research : Bibliometric Analysis of Open Access Documents . Studies of Applied Economics, October, 1–11.

Aslay, F. (2017). Siber Attack Methods and Current Situation Analysis of Turkey’s Ciber Safety. International Journal of Multidisciplinary Studies and Innovative Technologies, 1(1), 24–28.

Auffret, J., Kelley, D., & Warweg, P. (2017). Cybersecurity Leadership : Competencies , Governance , and Technologies for Industrial Control Systems. Journal of Interconnection Networks, 17(1), 1–20.

Bakanlı˘gı. (2013). National Cyber Security Strategy and 2013–2014 Action Plan. Information Technologies and Communication Authority.

Barnes, S. J., & Pressey, A. D. (2011). Who needs cyberspace? Examining drivers of needs in Second Life. Internet Research, 21(3), 236–254.

Blazevic, V., Wiertz, C., Cotte, J., De Ruyter, K., & Keeling, D. I. (2014). GOSIP in cyberspace: Conceptualization and scale development for general online social interaction propensity. Journal of Interactive Marketing, 28(2), 87–100.

Bodeau, D. (2012). Cyber security governance: A component of MITRE’s cyber prep methodology. Washington: MITRE Corporation., September.

Boerman, D. (2020). Reporting on Cybersecurity Performance. University of Twente.

Boyes, H. (2015). Cybersecurity and Cyber-Resilient Supply Chains. Technology Innovation Management Review, 5(4), 28–34.

Calderaro, A., & Craig, A. J. S. (2020). Transnational governance of cybersecurity : policy challenges and global inequalities in cyber capacity building. Third World Quarterly, 0(0), 1–22.

Carr, M., & Lesniewska, F. (2020). Internet of Things , cybersecurity and governing wicked problems : learning from climate change governance. International Relations, 34(3), 391 –412.

Colquhoun, H. L., Levac, D., Brien, K. K. O., Straus, S., Tricco, A. C., Perrier, L., Kastner, M., & Moher, D. (2014). Scoping reviews : time for clarity in definition , methods , and reporting. Journal of Clinical Epidemiology, 67(12), 1291–1294.

Cope, S., Leishman, F., & Starie, P. (1997). Globalization , new public management and the Futures of police management. Intl Jnl Public Sec Management, 10(6), 444–460.

Çözümler, P. (2019). Siber Güvenlik ve Savunma: Problemler ve Çözümler (Vol. 06520).

Culver, C. A. (2022). Manipulating Remittances: Strengthening Autocratic Regimes with Currency Overvaluation and Remittance Flows. Remittances Review, 7(1), 21-47.

Fierro, P., Aroca, P., & Navia, P. (2020). How people access the internet and the democratic divide: Evidence from the Chilean region of Valparaiso 2017, 2018 and 2019. Technology in Society, 101432.

Hitt. (2005). Management. Prentice Hall Inc.

Hoffmann, R., Napiórkowski, J., Protasowicki, T., & Stanik, J. (2020). Risk based approach in scope of cybersecurity threats and requirements. Procedia Manufacturing, 44(2019), 655–662.

ISO. (2015). Iso/iec 38500:2015 information technology | governance of it for the organization.

Levac, D., Colquhoun, H., & Brien, K. K. O. (2010). Scoping studies : advancing the methodology. Implementation Science, 5(1), 1–9.

Macnish, K., & Ham, J. Van Der. (2020). Technology in Society Ethics in cybersecurity research and practice. Technology in Society, 63(December 2019), 101382.

Mueller, M. (2017). Is Cybersecurity Eating Internet Governance ? Causes and Consequences of Alternative Framings. Digital Policy, Regulation and Governance, 19(6), 415–428.

NATO. (2020). Warsaw Summit Communiqué. North Atlantic Treaty Organization. cps/en/natohq/official_texts_13316

Peng, S. (2018). “ Private ” Cybersecurity Standards ? Cyberspace Governance , Multistakeholderism , and the ( Ir ) relevance of the TBT Regime. Cornell International Law Journal, 51(2).

Pernice, I. (2018). Global cybersecurity governance : A constitutionalist analysis. Global Constitutionalism, 7(1), 112–141.

Rahman, T., Rohan, R., Pal, D., & Kanthamanon, P. (2021). Human Factors in Cybersecurity : A Scoping Review Human Factors in Cybersecurity : A Scoping Review. IAIT, July.

Sahi, A. M., Khalid, H., Abbas, A. F., & Khatib, S. F. A. (2021a). The Evolving Research of Customer Adoption of Digital Payment : Learning from Content and Statistical Analysis of the Literature. J. Open Innov. Technol. Mark. Complex, 1–25.

Sahi, A. M., Khalid, H., Abbas, A. F., & Khatib, S. F. A. (2021b). The evolving research of customer adoption of digital payment: Learning from content and statistical analysis of the literature. Journal of Open Innovation: Technology, Market, and Complexity, 7(4), 1–25.

Sava¸S., & Topalo˘glu, N. (2019). Data analysis through social media according to the classified crime. Turkish Journal of Electrical Engineering and Computer Sciences, 27(1), 407–420.

Savas, S., & Karata, S. (2022). Cyber governance studies in ensuring cybersecurity: an overview of cybersecurity governance. Int. Cybersecur. Law Rev, 3, 7–34.

Shackelford, S. J., Sulmeyer, M., Deckard, A. N. C., Buchanan, B., & Micic, B. (2017). From Russia with Love: Understanding the Russian Cyber Threat to U.S. Critical Infrastructure and What to Do about It. Nebraska Law Review, 96(2).

Shackleford, S., & Craig, A. (2014). Beyond the New ’ Digital Divide ’: Analyzing the Evolving Role of National Governments in Internet Governance and Enhancing Cybersecurity. World Conference on International Telecommunication, 119(290).

Statista. (2020). Spending on cybersecurity worldwide from 2017 to 2020. Statista.

Swinton, S., & Hedges, S. (2020). Cybersecurity Governance, Part 1: 5. Fundamental Challenges. 2019/07/cybersecurity-governance-part-1-5-fundamental-challenges.html

Terlizzi, M. A., Meirelles, F. D. S., & Alexandra, M. (2017). Behavior of Brazilian Banks Employees on Facebook and the Cybersecurity Governance. Journal of Applied Security Research, 12(2), 224–252.

Tessian. (2021). The psychology of human error. human-error/

Wolff, J. (2016). What we talk about when we talk about cybersecurity : security in internet governance debates. INTERNET POLICY REVIEW, 5(3), 1–13.

Xu, Z., Ge, Z., Wang, X., & Skare, M. (2021). Technological Forecasting & Social Change Bibliometric analysis of technology adoption literature published from 1997 to 2020. Technological Forecasting & Social Change, 170(March), 120896.




How to Cite

Albalas, T., Modjtahedi, A., & Abdi, R. (2022). Cybersecurity governance: A scoping review. International Journal of Professional Business Review, 7(4), e0629.