Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

Writing a literature review on database security can be a challenging task.

It requires a deep
understanding of the topic, as well as the ability to synthesize and analyze a large amount of
information from various sources.

One of the main difficulties in writing a literature review on this topic is the constantly evolving
nature of database security. New threats and vulnerabilities are constantly being discovered, and new
security measures are being developed to combat them. This means that the literature on database
security is constantly expanding and changing, making it difficult to keep up with the latest
developments.

Another challenge is the technical nature of the topic. Database security involves complex concepts
and technologies that can be difficult to understand for those who are not familiar with them. This
can make it challenging to write a literature review that is accessible to a wide audience.

One way to overcome these challenges is to seek assistance from a professional writing service like
⇒ StudyHub.vip ⇔. They have expert writers who are experienced in writing literature reviews on
a wide range of topics, including database security. By ordering from ⇒ StudyHub.vip ⇔, you can
ensure that your literature review is well-written, thoroughly researched, and up-to-date.

In conclusion, writing a literature review on database security can be a challenging task, but with the
right help, it is possible to create a high-quality review that meets your needs. Order from ⇒
StudyHub.vip ⇔ to get expert assistance with your literature review today.
A total of 58 published systematic reviews were included, totaling 1746 relevant references
identified by our database searches, while 84 included references had been retrieved by other search
methods. ScienceDirect topics include: health sciences; life sciences; physical sciences; engineering;
social sciences; and humanities. Searches of the English language literature published from 1 January
1990 to 11 March 2020 were conducted using MEDLINE (1966), EMBASE (1980), and CINAHL
(1980). Moreover, in combinations where the number of results was greatly reduced, the recall of
included references was lower. The references to these reviews can be found in Additional file 1. The
third key database we identified in this research, Web of Science, is only mentioned as a citation
index in the Cochrane Handbook, not as a bibliographic database. Data were synthesised using
descriptive and narrative techniques to identify themes and patterns linked to intervention strategies,
targeted behaviours, study settings and study outcomes. Google Scholar normally returns a large
number of results and you cannot guarantee that the key papers will be at the top of the list. HOW
THIS STUDY MIGHT AFFECT RESEARCH, PRACTICE OR POLICY This paper offers
guidance for researchers when conducting a rapid QES and informs commissioners of research and
policy-makers what to expect when commissioning such a review. They provided a multilevel study
design to derive a unified model and test it with three ISP violation scenarios. The search was
performed in June 2022 in the following electronic databases: Medline, Embase, Cochrane and
Epistemonikos. It can be helpful to make an annotated bibliography, where you compile full citation
information and write a paragraph of summary and analysis for each source. Searching FAQs Step 4:
Manage Citations Step 5: Screen Citations Step 6: Assess Quality of Included Studies Step 7:
Extract Data from Included Studies Step 8: Write the Review Check our FAQ's Email us Chat with
us (during business hours) Call (919) 962-0800 Make an appointment with a librarian Request a
systematic or scoping review consultation Search the FAQs In Step 3, you will design a search
strategy to find all of the articles related to your research question. The existing studies in this regard
are either providing insights into components that influence information security policy compliance
(i.e., security culture, security awareness, security management) or examine behavioral theories (i.e.,
deterrence, protection motivation, planned behavior, and others). Table 3 displays the number of
unique results retrieved for each single database. Literature reviews are set up similarly to other
academic texts, with an introduction, a main body, and a conclusion. SBHCs have the ability to
identify and address health-related issues that cause students to for of school. This study concluded
that only the moral dimension of corporate social responsibility has significance towards ISP
compliance. Check out Scribbr’s professional proofreading services. Includes theses and dissertations
from the Harvard T.H. Chan School of Public Health, Harvard Medical School, and Harvard School
of Dental Medicine. Even when taking into account that many searchers consider the use of Scopus
as a replacement of Embase, plus taking into account the large overlap of Scopus and Web of
Science, this estimate remains similar. In the same way, they have argued that security managers are
more interested in actual behaviors than intention. Black students, students with public or no health
insurance, and students with asthma or attention deficit disorder had higher literature and utilization.
The X -axis represents the percentage of reviews for which a specific combination of databases, as
shown on the y -axis, reached a certain recall (represented with bar colors). Fourth, whistleblowing
campaigns should be arranged to convince employees to file a report if they see something
suspicious. When the overall number of hits was low, we additionally searched Scopus, and when
appropriate for the topic, we included CINAHL (EBSCOhost), PsycINFO (Ovid), and SportDiscus
(EBSCOhost) in our search. Attackers target employees’ behavior to execute their malicious
activities. Hence, this study concluded that IT vision conflict influences only perceived severity, not
all PMT constructs; furthermore, it has been shown that PMT constructs have significant effects on
noncompliance behaviors towards ISP. You likely won’t be able to read absolutely everything that
has been written on your topic, so it will be necessary to evaluate which sources are most relevant to
your research question. Ethical approval was obtained from The Chinese University of Hong Kong
Survey and Behavioural Research Ethics Committee.
These commands tell databases exactly how to combine terms together, and if done incorrectly or
inefficiently, search results returned may be too broad or irrelevant. Writing the literature review: A
practical guide Available 3rd floor of Perkins Writing literature reviews: A guide for students of the
social and behavioral sciences Available online. This study proved that while there is no universal
generalization of human behaviors towards ISPC, there is also no mutual agreement on the most
significant dimension of behavior toward ISPC. In brief, the study proved that procedural injustice
causes employees to engage in abusive behaviors; in simple words, employees become more upset
when they perceive that a procedure is unfair than when they perceive an injustice in rewards and
compensations. Because systematic review searches can be quite extensive and retrieve large
numbers of results, an important aspect of systematic searching is limiting the number of irrelevant
results that need to be screened. Atheoretical reviews tend to present acontextual findings (for
instance, one study found very positive results for one intervention, and this gets highlighted in the
abstract) whilst theoretically informed reviews attempt to contextualise and explain patterns within
the included studies. Flow diagram regarding the inclusion and exclusion of studies in this review.
The enrollment, utilization, and visit rates all demonstrate that the majority of clients in the SBHCs
receive some type of public assistance or are uninsured. Of the five reviews that included only RCTs,
four reached 100% recall if MEDLINE, Web of Science, and Google Scholar combined were
complemented with Cochrane CENTRAL. Many frameworks are provided by researchers using
different external factors and theoretical constructs. NTIS - central resource for government-funded
scientific, technical, engineering, and business related information. It is not just a descriptive list of
the material available, or a set of summaries. HE LIVED IN AN APARTMENT IN NYC DURING
THE LATE 1940s AND 1950s. Although human behavior transformation is a complex phenomenon,
this study will contribute towards the body of knowledge as a novel effort to identify the gap. The
information specialists of Erasmus MC developed an efficient method that helps them perform
searches in many databases in a much shorter time than other methods. Dec 2016 A searchable
archive is available at New York Review of Books Archive 'An online index to over 60,000 historical
and critical items about. Web of Science also offers regional databases which cover: Latin America
(SciELO Citation Index); China (Chinese Science Citation Database); Korea (Korea Citation Index);
Russia (Russian Science Citation Index). A systematic approach to searching: how to perform high
quality literature searches more efficiently. Combined with the two previous reviews, 86 systematic
reviews of strategies to increase the implementation of research into clinical practice have been
conducted. If unsure, try using a question framework to help identify the main searchable concepts.
Effectiveness of technology-enabled knowledge translation strategies in improving the use of
research in public health: systematic review. What is the effectiveness of printed educational
materials on primary care physician knowledge, behaviour, and patient outcomes: a systematic
review and meta-analyses. The validated Youth Engagement with Health Services survey measures
adolescent health care quality. Databases for literature searching ejournals and eresources. Research
teams need to discuss current and outdated terminology and decide which terms to include in the
search to be as comprehensive as possible. We’ve written a step-by-step guide that you can follow
below. RAVEN for University resources or NHS ATHENS Great starting point for any health or
medical literature search. Mar 2017 For a detailed outline on conducting a Literature Review please
refer to Database of full text online news, business, financial, legal, medical. Write the review
Thompson Writing Studio This link opens in a new window Need to write a systematic review. You
should also search other subject specific databases that index the literature in your field.
It offers a diverse array of customizable templates, design elements, and tools, making it accessible
to users with varying levels of design experience. At a minimum you need to search MEDLINE,
EMBASE, and the Cochrane CENTRAL trials register. You can also run a preliminary search for
your topic, sort the results by Relevance or Best Match, and skim through titles and abstracts to
identify terminology from relevant articles that you should include in your search strategy. Key
Concepts (one main section per theme and then sub sections as necessary to help organize your work
and make it easier to read) 5. However, for one review of this domain, the recall was 82%.
Probability of appropriate recall We calculated the recall for individual databases and databases in all
possible combination for all reviews included in the research. However, 80 percent of the
respondents of both groups showed their intention to comply with ISP. In our analyses, we
combined the results from MEDLINE in Ovid and PubMed (the subset as supplied by publisher)
into one database labeled MEDLINE. You should also search other subject specific databases that
index the literature in your field. We have compiled the top list of trusted academic resources to help
you get started with your research: Scopus is one of the two big commercial, bibliographic databases
that cover scholarly literature from almost any discipline. Rerun the original search strategy and add
a date filter for when the article was added to the database ( not the publication date). Will cover
some journals at the edge of the biomedical sciences missed by PubMed and Embase. If an included
reference was not found in the EndNote file, we presumed the authors used an alternative method
of identifying the reference (e.g., examining cited references, contacting prominent authors, or
searching gray literature), and we did not include it in our analysis. A refined compilation of
implementation strategies: results from the Expert Recommendations for Implementing Change
(ERIC) project. Given literature of parental knowledge about new MMR recommendations, time,
money, and a resistance to vaccinations from some parents, a fully voluntary approach is unlikely to
succeed. A total of 33 (11 security professionals, 22 insiders) PMT-based interviews were conducted.
However, whether an article is present in a database may not translate to being found by a search in
that database. Employees of a large multinational company who were based in forty-eight countries’
participated in this study. NTIS - central resource for government-funded scientific, technical,
engineering, and business related information. Interventions in health care professionals to improve
treatment in children with upper respiratory tract infections. Jan 2017 Sources for a Literature
Review will come from a variety of places, The WorldCat database allows you to search the catalogs
on many, many. The literature was reviewed and categorized according to the dimension of the
studies. It has been shown that self-efficacy, attitude toward compliance, subjective norms, response
efficacy, and perceived vulnerability positively influence ISP behavioral compliance. They mostly
contain publication titles, authors, reference information and an abstract summary. Asterisk indicates
that the recall of all databases has been calculated over all included references. The NLM Catalog
contains bibliographic records for over 1.4 million journals, books, audiovisuals, electronic resources,
and other materials. Searching only Embase produced an NNR of 57 on average, whereas, for the
optimal combination of four databases, the NNR was 73. Use of concept mapping to characterize
relationships among implementation strategies and assess their feasibility and importance: results
from the Expert Recommendations for Implementing Change (ERIC) study. The study results
concluded that work impediment, system anxiety, and noncompliance behaviors of peers
significantly affect an individual’s noncompliance intention with ISP. Employees seek help and
guidance from their social circle, and they often adopt behaviors from their peers or coworkers.
Additionally, perceptions of care among the adolescent sample were overwhelmingly positive. Rights
and permissions Open Access This article is licensed under a Creative Commons Attribution 4.0
International License, which permits use, sharing, adaptation, distribution and reproduction in any
medium or format, as long as you give appropriate credit to the original author(s) and the source,
provide a link to the Creative Commons licence, and indicate if changes were made. It has
significant effects on ISP compliant behavior; furthermore, the psychological contract has more
significant effects on manager groups than employees. To mitigate organizational information
security threats, most organizations have adopted standard guidelines provided by the National
Institute of Standard and Technology (NIST). Global competency and outcomes framework for
universal health coverage. This is exhibited through better, clearer reporting mechanisms in relation to
the mechanics of the reviews, alongside a greater attention to, and deeper description of, how
potential biases in included papers are discussed. This literature review is an effort to develop a
behavioral transformation process of violation to compliance. Find support for a specific problem in
the support section of our website. Most of the competency models and curricula were from the US.
Three databases alone does not complete the search standards for systematic review requirements as
you will also have additional searches of the grey literature and hand searches to complete. J Public
Health Manag Pract. 2005;11(6):S128-31. Calhoun JG, Rowney R, Eng E, Hoffman Y. Coverage in
the sciences, social sciences, arts, and humanities, with coverage to 1900. Specify the date when
each source was last searched or consulted. J Med Internet Res. 2020;22:e17274.. Sykes MJ,
McAnuff J, Kolehmainen N. Some of these systematic reviews focus exclusively on multi-faceted
interventions, whilst others compare different single or combined interventions aimed at achieving
similar outcomes in particular settings. You will want to search at least three databases for your
systematic review. Just like with controlled vocabulary, field tag commands are different for every
database. Searching these sources is not required to perform a systematic review. Identifying
individual competency in emerging areas of practice: an applied approach. Purpose: It serves to
provide a comprehensive overview of the current state of knowledge within a particular field. Avoid
making uncited or overly generalized claims. If you feel a generalization is warranted, you must
follow it up with multiple, specific examples to justify such generalization. Feature papers represent
the most advanced research with significant potential for high impact in the field. A Feature. BIOSIS
Previews includes proceedings of many meetings that may not be electronically available elsewhere.
Figma is the main design tool, and FigJam is their virtual whiteboard: Figma is a comprehensive
design tool that enables designers to create and prototype high-fidelity designs FigJam focuses on
collaboration and brainstorming, providing a virtual whiteboard-like experience, best for concept
maps Explore FigJam concept maps here. They examined the impact of electronic health record,
computerised provider order-entry, or decision support system. References (pdf) You may also be
interested in the following blogs for further reading: Conducting a systematic literature search
Reviewing the evidence: what method should I use. Grey Literature Report A bi-monthly
publication of the New York Academy of Medicine, the GLR includes listings of recently published
reports in health science and public health. Queries and keywords were developed according to
research objectives to search databases enlisted in Table 2. Library databases vs Google Scholar
When searching for a topic, Google Scholar results may appear to be more relevant than those from a
library database. These researchers presented a framework and tested it on 148 alumni of a public
sector university.
To build on previous evidence that Latino and African American males seek mental health services at
SBHCs more often than in other settings, and to understand why these adolescents sought services
and their perceptions of the services. Its mind-mapping feature provides a structured framework for
brainstorming ideas, organizing thoughts, and visualizing relationships between concepts. All other
authors (IS, JN, CH, FC) contributed to revisions of the document. Most Library databases do not
index books, and even Google is not a very good source for this. Therefore, most reviews we
categorised as MFIs actually include highly variable numbers and combinations of intervention
strategies and highly heterogeneous original study designs. World Health Organization - providing
leadership on global health matters, shaping the health research agenda, setting norms and standards,
articulating evidence-based policy options, providing technical support to countries and monitoring
and assessing health trends. The researchers argued that when using the deterrence approach towards
ISB, one must consider these issues (methodological substantive) and contingency variables to obtain
better results. International Journal of Turbomachinery, Propulsion and Power (IJTPP). Types of
literature you may want to include are research databases (e.g., PsycARTICLES), Gray literature and
databases containing it (e.g., PsycEXTRA), books and book chapters, and reference lists. This study
provided exciting and unexpected results, and researchers proposed ten hypotheses; only three
hypotheses were supported. Databases and Sources GoogleScholar Consider as a supplement to the
literature databases. The study results showed that dimensions of moral intensity affect moral beliefs
and vary with different organizational criticality among insiders. When you search a library database
you are not normally searching the full text of a publication. Many databases assign controlled
vocabulary terms to citations, but their naming schema is often specific to each database. However,
there is a lack of high-quality research evaluating mental health services in the SBHCs and their
effect database children and adolescents. Literature Resource Center A Best Bet database World
Shakespeare Bibliography Online A Best Bet database Summarizes books, articles, book reviews,
dissertations, theatrical productions, audiovisual materials, electronic media related. Though we
occasionally used the regional databases LILACS and SciELO in our reviews, they did not provide
unique references in our study. Some of the recommendations have been drawn from peer reviewed
studies. These commands tell databases exactly how to combine terms together, and if done
incorrectly or inefficiently, search results returned may be too broad or irrelevant. At its core, a
concept map consists of nodes, which represent individual concepts or ideas, and links, which depict
the relationships between these concepts. The objective of this study was to update and extend two
previous reviews of systematic reviews of strategies designed to implement research evidence into
clinical practice. Multiple frameworks are available to assess human intentions towards information
security policies, but none of the frameworks can be used as a standard behavioral process model.
Experience or mastery of safeguarding information security assets is another significant factor that
influences the attitudes of employees. This helps you remember what you read and saves time later
in the process. A limited set of conference proceedings databases include the following: BASE
academic search engine, has an Advanced Search feature with a Limit by Type to 'Conference
Objects', this is useful for searching for conference posters and submissions stored in University
Institutional Repositories. The comparative recall of Google Scholar versus PubMed in identical
searches for biomedical systematic reviews: a review of searches used in systematic reviews. Syst
Rev. 2013;2:115. Bramer WM, Giustini D, Kramer BMR. Comparing the coverage, recall, and
precision of searches for 120 systematic reviews in Embase, MEDLINE, and Google Scholar: a
prospective study. Syst Rev. 2016;5:39. Ross-White A, Godfrey C. Our literature analysis suggested
that information security professionals must consider all types of conflicts while implementing an
information security policy. Identify search concepts and terms for each Start by identifying the
main concepts of your research question. Third, PMT predicts ISB better for threats related to the
individual, not to organizations. This is one of the most common problems with student literature
reviews.
Rerun the original search strategy and add a date filter for when the article was added to the
database ( not the publication date). The formulation and methodology of the research questions are
described in Section 3. For medical topics, a combination of PubMed (or other search of PubMed
data) plus Embase, Web of Science, and Google Scholar has been shown to provide adequate recall (
Syst Rev. 2017;6(1):245 ). For topics that reach beyond the biomedicine, other databases need to be
considered. Articles that are indexed with a set of identified thesaurus terms, but do not contain the
current search terms in title or abstract, are screened to discover potential new terms. New candidate
terms are added to the basic search and evaluated. Researchers have suggested many ways to adopt
these standards, but there are behavioral issues in adapting the standards. Access to school-based,
primary review care was associated with increased use of primary care, reduced use of emergency
for, and fewer hospitalizations. Teachers referred more students database were black, had asthma,
had no public or health insurance, or had acute-type health issues. ClinicalTrials.gov Registers trials
that are recruiting, completed, or terminated. Their results proved that better support from
subordinates and supervisors could enhance employees’ organizational commitment, which weakens
employees’ perceived costs and perceived effectiveness towards compliance behavior. The literature
review results indicated that national culture has a variety of effects on employee enforcement
behavior. Launched in 2000, PMC is a permanent collection of full-text life sciences and biomedical
journal articles. Coverage: approx. 6 million items Discipline: Engineering Provider: IEEE (Institute
of Electrical and Electronics Engineers) ScienceDirect is the gateway to the millions of academic
articles published by Elsevier, 1.4 million of which are open access. Employees having high
organizational value identification are more likely to develop long-term orientation (LTO) behavior.
Second, they utilise leadership drawing on a wide set of clinical and non-clinical actors including
managers and even government officials. More information on searching MeSH can be found here.
The knowledge, skill competencies, and psychological preparedness of nurses for disasters: a
systematic review. As Ethier's for shows, if SBHCs are properly staffed, structured, and trained to
provide reproductive health care and outreach, there is exceptional opportunity to fill an existing gap
in how this literature receives health care. Resources to help with this process are listed below. In
this case, the number of hits from Google Scholar was limited to 100. Google Scholar Squires JE,
Sullivan K, Eccles MP, et al. The reviews covered a wide variety of disease, none of which was
present in more than 12% of the reviews. To reduce the risk of bias, papers were excluded following
discussion between all members of the team. 32 papers met the inclusion criteria and proceeded to
data extraction. This study also discovered no standardized method for assessing competencies while
various techniques such as pre- and post-test scores, self-assessment, trainer-rated performance,
exercise-based performance results, and field-based performance were used instead. Literature
Resource Center A Best Bet database World Shakespeare Bibliography Online A Best Bet database
Summarizes books, articles, book reviews, dissertations, theatrical productions, audiovisual
materials, electronic media related. This would further build on the nuanced discussion and
conclusion sections in a subset of the papers we reviewed. Web of Science - Core Collection The
leading citation index' of scholarly literature, chemical reactions and author information. For four out
of five systematic reviews that limited to randomized controlled trials (RCTs) only, the traditional
combination retrieved 100% of all included references. The Grey Matters checklist provides an
organized source of health technology assessment sites, regulatory agencies, trial registries, and other
databases in a form that can help ensure the completeness of you search. Development of search
strategies At Erasmus MC, search strategies for systematic reviews are often designed via a librarian-
mediated search service. Most competency models included knowledge and skills, emergency
response systems (including incident management principles), communications, critical thinking,
ethical and legal aspects, and managerial and leadership skills.
NOTE: The Cochrane Collaboration and the IOM recommend that the literature search be conducted
by librarians or persons with extensive literature search experience. Some strategies that did not fit
easily within the EPOC categories were also included. This study’s results suggested PMT constructs
(threat appraisal self-efficacy response efficacy) and visibility positively affect the intention to
comply with ISP. What has the literature revealed? (not what do you seek to discuss). Likewise,
there are similar outcomes for each behavioral theory used in the IS research. Local opinion leaders:
effects on professional practice and healthcare outcomes. Information Security Behavior and
Information Security Policy Compliance: A Systematic Literature Review for Identifying the
Transformation Process from Noncompliance to Compliance. Information security adaptation and its
continuance is the reflection of perceived motivated behavior. The study shows that organizational
inertia shaped individual cognitive inertia and cognitive inertia significantly affects individuals’
shadow IT behavior. A researcher wants to be able to estimate the chances that his or her current
project will miss a relevant reference. Based on the interviews’ observations, they concluded that
insiders adopt behaviors from social influences; they rely on learning security-based knowledge and
self-efficacy improvements. Furthermore, a lot of nuance lies behind these headline findings, and
this is increasingly commented upon in the reviews themselves. They proposed a research model to
evaluate computer security behaviors and concluded that organizational norms, moral obligation, and
attitude toward computer security behavior have significant effects on employees’ behavioral
intentions. The Health EDRM risk-based approach that emphasizes reducing hazards, exposures, and
vulnerabilities was only included in three models or curricula (Fig. 2 ). The competency models and
curricula cited by survey respondents included a higher coverage of the WHE core competencies and
the Health EDRM principles than those identified from the literature review (Supplementary 3 e and
f). Information security policy compliance (ISPC) is a matter of human behavior. Management skills
were most commonly described, including planning, organizing, applying management processes,
establishing effective communication systems, and providing effective leadership (95-100% of
respondents). Information Security Behavior and Information Security Policy Compliance: A
Systematic Literature Review for Identifying the Transformation Process from Noncompliance to
Compliance. Appl. Sci. 2021, 11, 3383. If a single reviewer undertakes full-text screening, 8 the
team should identify likely risks to trustworthiness of findings and focus quality control procedures
(eg, use of additional reviewers and percentages for double screening) on specific threats 14 ( table
2, item R13). The assessment of human behavior is a complicated phenomenon, and several
psychological theories have been proposed to cover different aspects of human behavior. An rQES
typically focuses on direct evidence, except when only indirect evidence is available 28 ( table 2,
item R4). Note: Controlled vocabulary may be outdated, and some databases allow users to submit
requests to update terminology. The MedSyntax tool is another useful tool, for parsing out very long
searches with many levels of brackets. Article was published in a journal between 2010 and 2020.
Studies evaluating compliance behaviors concluded that effective security management, proper
security awareness, a good security culture, and other behavioral factors enhance employee ISP
compliance, while studies focused on noncompliance stated that employees’ noncompliance with ISP
could be intentional or unintentional, psychological or external. This study has shown that
psychological capital can play a vital role in developing employees’ protective motivated behaviors.
Thirty-seven references were found in MEDLINE (Ovid) but were not available in Embase.com.
These are mostly unique PubMed references, which are not assigned MeSH terms, and are often
freely available via PubMed Central. A review team can use templates to fast-track writing of a
protocol. Information Security Behavior and Information Security Policy Compliance: A Systematic
Literature Review for Identifying the Transformation Process from Noncompliance to Compliance.
Appl. Sci. 2021, 11, 3383. That was a scenario-based quantitative study performed upon 216
employees of a university. Further evidence for the essential elements of WHE competencies and
their ideal training modalities will be crucial before their wider dissemination.

You might also like