IAD Index of Academic Documents
  • Home Page
  • About
    • About Izmir Academy Association
    • About IAD Index
    • IAD Team
    • IAD Logos and Links
    • Policies
    • Contact
  • Submit A Journal
  • Submit A Conference
  • Submit Paper/Book
    • Submit a Preprint
    • Submit a Book
  • Contact
  • International Journal of Information Security Science
  • Volume:9 Issue:1
  • Scale development/adaptation studies conducted within the scope of cyber threats and information sec...

Scale development/adaptation studies conducted within the scope of cyber threats and information security issues

Authors : Yunus GEÇER, Recep BENZER
Pages : 64-75
View : 55 | Download : 13
Publication Date : 2020-03-01
Article Type : Research Paper
Abstract :In this study, it was aimed to review nationally and internationally published articles on issues such as “cyber threats, information security, adverse cyber behavior, cyber-human values and their sub-domains†between 2010 and 2018. A one-shot survey model, one of the general survey models, was utilized. Within the scope of the study, all scale development and adaptation articles in the relevant field that were indexed in the Web of Science and TR Index between 2010 and 2018 and that were accessible full-text constituted the research population of the study. As a result of the study, it was seen that the number of scale studies carried out nationally was quantitatively twice as many as the number of those carried out internationally. In international publications, based on the reviews, it was observed that there were more publications in science journals, especially in engineering journals. According to the distribution of subjects, the most studied subject of the field in all publications was “adverse cyber behaviors.†This was followed by the “information security†topics. The least addressed subjects were “cyber-human values.†All the findings obtained in the other subjects investigated in this study are presented in the discussion and conclusion sections.
Keywords : Information security, Cyber security, Awareness, Perception, Risk

ORIGINAL ARTICLE URL

* There may have been changes in the journal, article,conference, book, preprint etc. informations. Therefore, it would be appropriate to follow the information on the official page of the source. The information here is shared for informational purposes. IAD is not responsible for incorrect or missing information.


Index of Academic Documents
İzmir Academy Association
CopyRight © 2023-2026