2023
DOI: 10.1016/j.cose.2023.103309
|View full text |Cite
|
Sign up to set email alerts
|

Learning from cyber security incidents: A systematic review and future research agenda

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(8 citation statements)
references
References 60 publications
0
8
0
Order By: Relevance
“…They can lead to a variety of consequences, such as a loss of data confidentiality, reputational damage, financial losses, loss of customer confidence, legal or regulatory sanctions, and disruption of normal business operations. To minimize the risk of information security incidents, organizations implement various security measures, such as securing information systems, applying security policies, training personnel, monitoring network activity, encrypting data, and many others (Tøndel, 2014;Patterson et al, 2023).…”
Section: Literature Review and Theoretical Basismentioning
confidence: 99%
“…They can lead to a variety of consequences, such as a loss of data confidentiality, reputational damage, financial losses, loss of customer confidence, legal or regulatory sanctions, and disruption of normal business operations. To minimize the risk of information security incidents, organizations implement various security measures, such as securing information systems, applying security policies, training personnel, monitoring network activity, encrypting data, and many others (Tøndel, 2014;Patterson et al, 2023).…”
Section: Literature Review and Theoretical Basismentioning
confidence: 99%
“…Apart from the abovementioned literature, few studies have used OL loops to report various cybersecurity incidents. For instance, a recent research study [17] used the double learning approach from the OL theory proposed by Argyris and Schon [20,21]. The study has reported various cybersecurity incidents based on the OL theoretical lens.…”
Section: Cybersecurity and Organisational Learningmentioning
confidence: 99%
“…The research paper aims to examine counterstrategies adopted and implemented in HERS exclusively in Australia to mitigate cybersecurity challenges amidst major crises using the Organizational Learning (OL) theory. Prior studies have used the Organisational Learning (OL) theory to explore cybersecurity incidents [8,[17][18][19]. For instance, a recent research study [17] has used the double-loop learning approach from OL theory proposed by Argyris and Schon [20,21].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Cyberattacks and slow internet speeds can delay incident response times, allowing security breaches to persist for extended periods and leading to more significant damage to an organization’s reputation, finances, and intellectual property. Therefore, the problems of cyberattacks and slow internet speeds are of the utmost importance to businesses and organizations, and effective solutions must be found to address them [ 17 ]. Various solutions are available to address the issue of cyberattacks and slow internet speeds, including upgrading hardware and software, optimizing network configurations, and deploying SDN and VNFs [ 18 ].…”
Section: Introductionmentioning
confidence: 99%