Published In
Publication Number
Page Numbers
Paper Details
A Systematic Review of Data Vulnerabilities and the Role of Advanced Security Testing Tools in Enhancing Cybersecurity, Compliance, and User Trust
Authors
Rohit Singh Raja
Abstract
Introduction: Cybersecurity has become a fundamental necessity in the digital era, where data underpins government functions, business operations, and communication. With the rise of digitalization and global expansion, organizations face increasing risks from ransomware, data breaches, and insider threats. While businesses focus on functionality, security is often overlooked, leading to vulnerabilities. Protecting data is vital to prevent damage of reputation, financial losses, and legal ramifications in this interconnected world.
Objective: To conduct systematic review on the studies involving data vulnerabilities and cybersecurity compliances.
Method: The study utilized a Systematic Literature Review (SLR) approach, integrating both qualitative and quantitative studies to explore information security behaviors (ISB) and policy compliance. It followed five stages: defining objectives, conducting a systematic search, selecting relevant studies, extracting data, and presenting results. Emphasizing theoretical frameworks like PMT and TPB, the research analyzed 514 articles from 2010-2021 to synthesize key factors influencing compliance and behavioral transitions.
Results: The results highlight diverse factors influencing Information Security Policy (ISP) compliance. Intrinsic motivations showed stronger impacts than extrinsic ones, while Protection Motivation Theory (PMT) better explained voluntary compliance. Leadership, organizational culture, and social factors significantly shaped compliance behaviors. Security awareness and training improved compliance, and past behaviors influenced intentions. Systematic reviews identified research gaps, emphasizing the multidimensional nature of ISP compliance across individual, organizational, and situational factors, showcasing varying levels of influence.
Conclusion: The study concludes that advanced security testing tools are essential for identifying and mitigating vulnerabilities, ensuring regulatory compliance, and building customer trust. By prioritizing cybersecurity investments, organizations can reduce risks and enhance information security behavior and policy compliance.
Keywords
Compliance, User Trust, Cybersecurity, Data Vulnerabilities
Citation
A Systematic Review of Data Vulnerabilities and the Role of Advanced Security Testing Tools in Enhancing Cybersecurity, Compliance, and User Trust. Rohit Singh Raja. 2024. IJIRCT, Volume 10, Issue 5. Pages 1-12. https://www.ijirct.org/viewPaper.php?paperId=2502029