Roberto J. Mejias , Joshua J. Greer , Gabrila C. Greer , Morgan M. Shepherd , Raul Y. Reyes
{"title":"A model for information security vulnerability awareness","authors":"Roberto J. Mejias , Joshua J. Greer , Gabrila C. Greer , Morgan M. Shepherd , Raul Y. Reyes","doi":"10.1016/j.cose.2024.104305","DOIUrl":null,"url":null,"abstract":"<div><div>As new and evolving technologies are rapidly adopted by organizations, often without the integration of cybersecurity safeguards, information systems have become increasingly vulnerable to a range of cyber threats. Our research suggests a multi-criteria approach in analyzing possible factors that influence an awareness of information security vulnerabilities. Drawing from prior cybersecurity and vulnerability assessment research, this empirical field study develops a research model to analyze possible determinants influencing information security vulnerability awareness. Three constructs were considered to explore their association to information security vulnerability awareness: vulnerability assessment, assessment of IS security controls, and knowledge of an organization's cyber threatscape. The data analyzed was obtained via a survey questionnaire instrument. Confirmatory factor analysis and structural equation modeling were used to validate the proposed research model. Results of this analysis indicate that these three constructs and their related indicator constructs are significantly correlated with an awareness of information security vulnerability. These results provide useful insights for organizations regarding their awareness of information security vulnerability in an increasingly evolving global cyber threatscape.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"151 ","pages":"Article 104305"},"PeriodicalIF":4.8000,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Security","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0167404824006114","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
As new and evolving technologies are rapidly adopted by organizations, often without the integration of cybersecurity safeguards, information systems have become increasingly vulnerable to a range of cyber threats. Our research suggests a multi-criteria approach in analyzing possible factors that influence an awareness of information security vulnerabilities. Drawing from prior cybersecurity and vulnerability assessment research, this empirical field study develops a research model to analyze possible determinants influencing information security vulnerability awareness. Three constructs were considered to explore their association to information security vulnerability awareness: vulnerability assessment, assessment of IS security controls, and knowledge of an organization's cyber threatscape. The data analyzed was obtained via a survey questionnaire instrument. Confirmatory factor analysis and structural equation modeling were used to validate the proposed research model. Results of this analysis indicate that these three constructs and their related indicator constructs are significantly correlated with an awareness of information security vulnerability. These results provide useful insights for organizations regarding their awareness of information security vulnerability in an increasingly evolving global cyber threatscape.
期刊介绍:
Computers & Security is the most respected technical journal in the IT security field. With its high-profile editorial board and informative regular features and columns, the journal is essential reading for IT security professionals around the world.
Computers & Security provides you with a unique blend of leading edge research and sound practical management advice. It is aimed at the professional involved with computer security, audit, control and data integrity in all sectors - industry, commerce and academia. Recognized worldwide as THE primary source of reference for applied research and technical expertise it is your first step to fully secure systems.