Improving the behavioral pattern of information security experts in the face of cyber threats with a future research approach.
Subject Areas : Journal of Knowledge Studies
mohammad bagher Raen Abromand
1
(
Ph.D. student in Information Science and Epistemology, Islamic Azad University Research Science Unit, Tehran, Iran
)
Sedigheh Mohammad Esmaeil
2
(
Associate Professor, Department of Information Science and Epistemology, Research Sciences Unit, Islamic Azad University, Tehran, Iran
)
Dariush Matlabi
3
(
Assistant Professor, Faculty of Humanities, Islamic Azad University, Yadegar Imam Branch,Shahr-e-Rey
)
Keywords: Behavioral pattern, information security, cyber threats, future research, metacombination.,
Abstract :
Objective: Most of the research conducted in the field of information systems security has been focused on technical factors, but information security solutions in the face of cyber threats should be explained in a comprehensive and forward-looking manner so that they have the necessary efficiency against emerging threats. The current applied-developmental research, with a future research approach, after examining the indicators, deals with the improvement of the correct behavior pattern of information security experts in the face of emerging cyber threats. Method: First, in the qualitative phase, meta-composite method was used to extract indicators from research sources and questions, and in the quantitative phase, with the help of experts and the two-stage Delphi method, the indicators were validated, refined and clustered. After statistical analysis and confirmatory factor analysis, it was examined and with the help of second and third order factorial software, the components and indices of each dimension were obtained. Findings: 142 indicators were extracted from 112 sources and validated and refined with the help of experts. In the first and second stage of Delphi, 17 indicators were removed due to the low CVR/CVI and finally 125 indicators were finalized and with the help of software and class clustering, the dimensions and components of the research were explained. Then, in the survey stage, after receiving 111 responses from information security experts and checking their reliability, the appropriate behavioral pattern for the research was calculated.