{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T18:21:00Z","timestamp":1757614860642,"version":"3.44.0"},"reference-count":79,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,7,27]],"date-time":"2025-07-27T00:00:00Z","timestamp":1753574400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,27]],"date-time":"2025-07-27T00:00:00Z","timestamp":1753574400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1007\/s10207-025-01095-z","type":"journal-article","created":{"date-parts":[[2025,7,27]],"date-time":"2025-07-27T05:43:22Z","timestamp":1753595002000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Investigating the cybersecurity risks of remote work: a systematic literature review of organizational vulnerabilities and mitigation strategies"],"prefix":"10.1007","volume":"24","author":[{"given":"Mohammad","family":"Nizamuddin","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,27]]},"reference":[{"key":"1095_CR1","doi-asserted-by":"publisher","DOI":"10.1145\/3579162","author":"H Abbas","year":"2023","unstructured":"Abbas, H., Emmanuel, N., Amjad, M.F., Yaqoob, T., Atiquzzaman, M.: Security assessment and evaluation of VPNs: a comprehensive survey. ACM Comput. Surv. (2023). https:\/\/doi.org\/10.1145\/3579162","journal-title":"ACM Comput. Surv."},{"key":"1095_CR2","unstructured":"ACSC.: ASD Cyber threat report 2022\u20132023. Australian Cyber Security Center (ACSC). (2023).https:\/\/www.cyber.gov.au\/about-us\/reports-and-statistics\/asd-cyber-threat-report-july-2022-june-2023"},{"key":"1095_CR3","doi-asserted-by":"publisher","DOI":"10.3389\/fcomp.2021.563060","author":"Z Alkhalil","year":"2021","unstructured":"Alkhalil, Z., Hewage, C., Nawaf, L., Khan, I.: Phishing attacks: a recent comprehensive study and a new anatomy. Front. Comput. Sci. (2021). https:\/\/doi.org\/10.3389\/fcomp.2021.563060","journal-title":"Front. Comput. Sci."},{"key":"1095_CR4","doi-asserted-by":"publisher","DOI":"10.14569\/ijacsa.2023.0140106","author":"GN Alotibi","year":"2023","unstructured":"Alotibi, G.N., Abdulwahid, A.A.: An investigation of cybersecurity issues of remote work during the COVID-19 pandemic in Saudi Arabia. Int. J. Adv. Comput. Sci. Appl.Comput. Sci. Appl. (2023). https:\/\/doi.org\/10.14569\/ijacsa.2023.0140106","journal-title":"Int. J. Adv. Comput. Sci. Appl.Comput. Sci. Appl."},{"issue":"3","key":"1095_CR5","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.32604\/csse.2022.019938","volume":"40","author":"M Alsharif","year":"2022","unstructured":"Alsharif, M., Mishra, S., AlShehri, M.: Impact of human vulnerabilities on cybersecurity. Comput. Syst. Sci. Eng. 40(3), 1153\u20131166 (2022). https:\/\/doi.org\/10.32604\/csse.2022.019938","journal-title":"Comput. Syst. Sci. Eng."},{"key":"1095_CR6","doi-asserted-by":"publisher","DOI":"10.15405\/epsbs.2021.12.04.2","author":"L Atst\u0101ja","year":"2021","unstructured":"Atst\u0101ja, L., R\u016bt\u012btis, D., Deruma, S., Aksjo\u0146enko, E.: Cyber security risks and challenges in remote work under the covid-19 pandemic. Eur. Proc. Social Behav. Sci. (2021). https:\/\/doi.org\/10.15405\/epsbs.2021.12.04.2","journal-title":"Eur. Proc. Social Behav. Sci."},{"issue":"1","key":"1095_CR7","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/s11235-020-00733-2","volume":"76","author":"A Basit","year":"2020","unstructured":"Basit, A., Zafar, M., Liu, X., Javed, A.R., Jalil, Z., Kifayat, K.: A comprehensive survey of AI-enabled phishing attacks detection techniques. Telecommun. Syst. 76(1), 139 (2020). https:\/\/doi.org\/10.1007\/s11235-020-00733-2","journal-title":"Telecommun. Syst."},{"key":"1095_CR8","doi-asserted-by":"publisher","first-page":"353","DOI":"10.5325\/jinfopoli.12.2022.0010","volume":"12","author":"M Bispham","year":"2022","unstructured":"Bispham, M., Creese, S., Dutton, W.H., Esteve-Gonz\u00e1lez, P., Goldsmith, M.: An exploratory study of cybersecurity in working from home: problem or enabler? J. Inf. Policy 12, 353\u2013386 (2022). https:\/\/doi.org\/10.5325\/jinfopoli.12.2022.0010","journal-title":"J. Inf. Policy"},{"key":"1095_CR9","volume-title":"Systematic approaches to a successful literature review","author":"A Booth","year":"2012","unstructured":"Booth, A., Papaioannou, D., Sutton, A.: Systematic approaches to a successful literature review. Sage (2012)"},{"key":"1095_CR10","doi-asserted-by":"publisher","DOI":"10.48009\/4_iis_2020_234-246","author":"D Borkovich","year":"2020","unstructured":"Borkovich, D., Skovira, R.: Working from home: cybersecurity in the age of Covid-19. Issues Inf. Syst. (2020). https:\/\/doi.org\/10.48009\/4_iis_2020_234-246","journal-title":"Issues Inf. Syst."},{"issue":"10","key":"1095_CR11","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0274630","volume":"17","author":"F Braesemann","year":"2022","unstructured":"Braesemann, F., Stephany, F., Teutloff, O., K\u00e4ssi, O.: The global polarisation of remote work. PLoS ONE 17(10), e0274630 (2022). https:\/\/doi.org\/10.1371\/journal.pone.0274630","journal-title":"PLoS ONE"},{"issue":"2","key":"1095_CR12","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1191\/1478088706qp063oa","volume":"3","author":"V Braun","year":"2006","unstructured":"Braun, V., Clarke, V.: Using thematic analysis in psychology. Qual. Res. Psychol. 3(2), 77\u2013101 (2006). https:\/\/doi.org\/10.1191\/1478088706qp063oa","journal-title":"Qual. Res. Psychol."},{"issue":"2","key":"1095_CR13","first-page":"1","volume":"2","author":"F Clear","year":"2007","unstructured":"Clear, F.: SMEs, electronically-mediated working and data security: cause for concern? Int. J. Bus. Sci. Appl. Manag.Manag. 2(2), 1\u201320 (2007)","journal-title":"Int. J. Bus. Sci. Appl. Manag.Manag."},{"key":"1095_CR14","unstructured":"Cask.: Shadow IT: Understanding, managing, and mitigating risks. Cask. (2023). https:\/\/casknx.com\/resources\/shadow-it\/"},{"key":"1095_CR15","unstructured":"Chin, K.: Biggest data breaches in US history. UpGuard. (2022). https:\/\/www.upguard.com\/blog\/biggest-data-breaches-us"},{"key":"1095_CR16","unstructured":"Crossland, G., Michaelides, N., Ertan, A.: Remote working and cyber security: literature review. Research Institute for Sociotechnical Cyber Security (RISCS). (2021)"},{"issue":"6","key":"1095_CR17","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/s1361-3723(20)30063-4","volume":"2020","author":"K Curran","year":"2020","unstructured":"Curran, K.: Cyber security and the remote workforce. Comput. Fraud Secur. 2020(6), 11\u201312 (2020). https:\/\/doi.org\/10.1016\/s1361-3723(20)30063-4","journal-title":"Comput. Fraud Secur."},{"key":"1095_CR18","unstructured":"Din, A.: Most common remote work security risks and best practices. Heimdal Security Blog. (2023). https:\/\/heimdalsecurity.com\/blog\/remote-work-security\/"},{"key":"1095_CR19","unstructured":"Dowling, B., Goldstein, D., Park, M., Price, H.: Hybrid work: Making it fit with your diversity, equity, and inclusion strategy. McKinsey. (2022). https:\/\/www.mckinsey.com\/capabilities\/people-and-organizational-performance\/our-insights\/hybrid-work-making-it-fit-with-your-diversity-equity-and-inclusion-strategy"},{"key":"1095_CR20","doi-asserted-by":"publisher","unstructured":"Downer, K., Bhattacharya, M.: BYOD Security: A Study of Human Dimensions. Info. 9(1) (2022). https:\/\/doi.org\/10.3390\/informatics9010016","DOI":"10.3390\/informatics9010016"},{"key":"1095_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.22619\/ijcsa.2020.100131","volume":"5","author":"M Eiza","year":"2021","unstructured":"Eiza, M., Okeke, R.I., Dempsey, J., Ta, V.-T.: Keep calm and carry on with cybersecurity @Home: a framework for securing homeworking IT environment. Int. J. Cyber Situational Awar. 5, 1\u201325 (2021). https:\/\/doi.org\/10.22619\/ijcsa.2020.100131","journal-title":"Int. J. Cyber Situational Awar."},{"issue":"2","key":"1095_CR22","first-page":"1","volume":"13","author":"SHS Faisal","year":"2021","unstructured":"Faisal, S.H.S., Ismail, F.: Cybersecurity threats and best practices of working from home. J. Techno-Social 13(2), 1\u20135 (2021)","journal-title":"J. Techno-Social"},{"key":"1095_CR23","unstructured":"Finnell, K.: Rethinking asynchronous communication in remote work. (2022). https:\/\/www.techtarget.com\/searchunifiedcommunications\/feature\/Rethinking-asynchronous-communication-in-remote-work"},{"key":"1095_CR24","unstructured":"Fritzen, M. P.: Remote working and cyber security threats in ireland. Challenges and prospective solutions. (2021). https:\/\/norma.ncirl.ie\/5108\/"},{"key":"1095_CR25","unstructured":"George, T.: Lost and stolen devices: a gateway to data breaches and leaks. securityWeek. (2023). https:\/\/www.securityweek.com\/lost-and-stolen-devices-a-gateway-to-data-breaches-and-leaks\/"},{"issue":"1","key":"1095_CR26","doi-asserted-by":"publisher","first-page":"33","DOI":"10.5121\/ijnsa.2021.13103","volume":"13","author":"A Georgiadou","year":"2021","unstructured":"Georgiadou, A., Mouzakitis, S., Askounis, D.: Designing a cyber-security culture assessment survey targeting critical infrastructures during Covid-19 crisis. Int. J. Netw. Secur. Appl. 13(1), 33\u201350 (2021). https:\/\/doi.org\/10.5121\/ijnsa.2021.13103","journal-title":"Int. J. Netw. Secur. Appl."},{"key":"1095_CR27","doi-asserted-by":"publisher","DOI":"10.1057\/s41284-021-00286-2","author":"A Georgiadou","year":"2021","unstructured":"Georgiadou, A., Mouzakitis, S., Askounis, D.: Working from home during COVID-19 crisis: a cyber security culture assessment survey. Secur. J. (2021). https:\/\/doi.org\/10.1057\/s41284-021-00286-2","journal-title":"Secur. J."},{"key":"1095_CR28","unstructured":"Gitnux.: Remote work cybersecurity statistics and trends in 2023. (2023). https:\/\/blog.gitnux.com\/remote-work-cybersecurity-statistics\/"},{"issue":"2","key":"1095_CR29","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1111\/j.1471-1842.2009.00848.x","volume":"26","author":"MJ Grant","year":"2009","unstructured":"Grant, M.J., Booth, A.: A typology of reviews: an analysis of 14 review types and associated methodologies. Health Inf. Libr. J. 26(2), 91\u2013108 (2009). https:\/\/doi.org\/10.1111\/j.1471-1842.2009.00848.x","journal-title":"Health Inf. Libr. J."},{"key":"1095_CR30","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-7998-7705-9.ch087","author":"L Hadlington","year":"2021","unstructured":"Hadlington, L.: The \u201chuman factor\u201d in cybersecurity: exploring the accidental insider. Res. Anthol. Artif. Intell. Appl. Secur. (2021). https:\/\/doi.org\/10.4018\/978-1-7998-7705-9.ch087","journal-title":"Res. Anthol. Artif. Intell. Appl. Secur."},{"key":"1095_CR31","unstructured":"Hamingson, N.: Communication technology and inclusion will shape the future of remote work. Business News Daily. (2020). https:\/\/www.businessnewsdaily.com\/8156-future-of-remote-work.html"},{"key":"1095_CR32","unstructured":"Harter, J. The post-pandemic workplace: the experiment continues. Gallup. (2025). https:\/\/www.gallup.com\/workplace\/657629\/post-pandemic-workplace-experiment-continues.aspx"},{"key":"1095_CR33","doi-asserted-by":"publisher","first-page":"7152","DOI":"10.1109\/access.2020.3048839","volume":"9","author":"M Hijji","year":"2021","unstructured":"Hijji, M., Alam, G.: A multivocal literature review on growing social engineering based cyber-attacks\/threats during the COVID-19 pandemic: challenges and prospective solutions. IEEE Access 9, 7152\u20137169 (2021). https:\/\/doi.org\/10.1109\/access.2020.3048839","journal-title":"IEEE Access"},{"key":"1095_CR34","unstructured":"Hill, M., Swinhoe, D. The 15 biggest data breaches of the 21st century. (2022). https:\/\/www.csoonline.com\/article\/534628\/the-biggest-data-breaches-of-the-21st-century.html"},{"issue":"4","key":"1095_CR35","doi-asserted-by":"publisher","first-page":"285","DOI":"10.3233\/EFI-180221","volume":"34","author":"QN Hong","year":"2018","unstructured":"Hong, Q.N., F\u00e0bregues, S., Bartlett, G., Boardman, F., Cargo, M., Dagenais, P., Gagnon, M.-P., Griffiths, F., Nicolau, B., O\u2019Cathain, A., Rousseau, M.-C., Vedel, I., Pluye, P.: The mixed methods appraisal tool (MMAT) version 2018 for information professionals and researchers. Educ. Inf. 34(4), 285\u2013291 (2018). https:\/\/doi.org\/10.3233\/EFI-180221","journal-title":"Educ. Inf."},{"issue":"3","key":"1095_CR36","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1111\/jep.12884","volume":"24","author":"QN Hong","year":"2018","unstructured":"Hong, Q.N., Gonzalez-Reyes, A., Pluye, P.: Improving the usefulness of a tool for appraising the quality of qualitative, quantitative and mixed methods studies, the Mixed Methods Appraisal Tool (MMAT). J. Eval. Clin. Pract. 24(3), 459\u2013467 (2018)","journal-title":"J. Eval. Clin. Pract."},{"key":"1095_CR37","doi-asserted-by":"publisher","unstructured":"Hossain Faruk, M.J., Tahora, S., Tasnim, M., Shahriar, H., Sakib, N. A review of quantum cybersecurity: threats, risks and opportunities. In: 2022 1st International conference on AI in cybersecurity (ICAIC). (2022). https:\/\/doi.org\/10.1109\/icaic53980.2022.9896970","DOI":"10.1109\/icaic53980.2022.9896970"},{"key":"1095_CR38","unstructured":"Irwin, L.: GDPR: The implications of working from home or on the road. (2020). https:\/\/www.itgovernance.eu\/blog\/en\/gdpr-the-implications-of-working-from-home-or-on-the-road"},{"issue":"1","key":"1095_CR39","doi-asserted-by":"publisher","DOI":"10.2196\/16775","volume":"22","author":"MS Jalali","year":"2020","unstructured":"Jalali, M.S., Bruckes, M., Westmattelmann, D., Schewe, G.: Why employees (still) click on phishing links: an investigation in hospitals. J. Med. Internet Res. 22(1), e16775 (2020). https:\/\/doi.org\/10.2196\/16775","journal-title":"J. Med. Internet Res."},{"key":"1095_CR40","doi-asserted-by":"publisher","unstructured":"Jason, W.N., Collins, E., Panteli, N., Blythe, J., Koppelman, B.: Remote working pre- and post-covid-19: An analysis of new threats and risks to security and privacy. (2021). https:\/\/arxiv.org\/abs\/2107.03907. https:\/\/doi.org\/10.1007\/978-3-030-78645-8_74","DOI":"10.1007\/978-3-030-78645-8_74"},{"issue":"1","key":"1095_CR41","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/j.infsof.2008.09.009","volume":"51","author":"B Kitchenham","year":"2009","unstructured":"Kitchenham, B., Brereton, O.P., Budgen, D., Turner, M., Bailey, J., Linkman, S.: Systematic literature reviews in software engineering \u2013 a systematic literature review. Inf. Softw. Technol. 51(1), 7\u201315 (2009)","journal-title":"Inf. Softw. Technol."},{"key":"1095_CR42","unstructured":"Koski, T.: Increase in remote work: effects on phishing. (2021). https:\/\/jyx.jyu.fi\/handle\/123456789\/76341"},{"key":"1095_CR43","unstructured":"Li, A.: An analysis of the recent ransomware families. (2021). https:\/\/www.cs.purdue.edu\/homes\/li3944\/blog\/Project%20report_Adrian%20Li.pdf"},{"key":"1095_CR44","doi-asserted-by":"publisher","first-page":"e1000100","DOI":"10.1371\/journal.pmed.1000100","volume":"6","author":"A Liberati","year":"2009","unstructured":"Liberati, A., Altman, D.G., Tetzlaff, J., Mulrow, C., G\u00f8tzsche, P.C., John-Clarke, M., Kleijnen, J., Moher, D.: The PRISMA statement for reporting systematic reviews and meta-analyses of studies that evaluate health care interventions: explanation and elaboration. PLoS Med. Med. 6, e1000100 (2009). https:\/\/doi.org\/10.1371\/journal.pmed.1000100","journal-title":"PLoS Med. Med."},{"key":"1095_CR45","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/j.procs.2022.03.023","volume":"201","author":"S Lindroos","year":"2022","unstructured":"Lindroos, S., Hakkala, A., Virtanen, S.: The COVID-19 pandemic and remote working did not improve WLAN security. Procedia Comput. Sci. 201, 158\u2013165 (2022). https:\/\/doi.org\/10.1016\/j.procs.2022.03.023","journal-title":"Procedia Comput. Sci."},{"issue":"1","key":"1095_CR46","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1177\/2632084320947559","volume":"1","author":"HA Long","year":"2020","unstructured":"Long, H.A., French, D.P., Brooks, J.M.: Optimising the value of the Critical Appraisal Skills Programme (CASP) tool for quality appraisal in qualitative evidence synthesis. Res. Methods Med. Health Sci. 1(1), 31\u201342 (2020). https:\/\/doi.org\/10.1177\/2632084320947559","journal-title":"Res. Methods Med. Health Sci."},{"key":"1095_CR47","unstructured":"Malwarebytes: 20 percent of organizations experienced breach due to remote worker, Labs report reveals. Malwarebytes Labs. Malwarebytes. (2020). https:\/\/www.malwarebytes.com\/blog\/news\/2020\/08\/20-percent-of-organizations-experienced-breach-due-to-remote-worker-labs-report-reveals"},{"key":"1095_CR48","unstructured":"McLeary, J.: 2023 State of cyber defense: the false-positive of trust. Kroll. (2023). https:\/\/www.kroll.com\/en\/insights\/publications\/cyber\/2023-state-cyber-defense"},{"key":"1095_CR49","doi-asserted-by":"publisher","first-page":"b2535","DOI":"10.1136\/bmj.b2535","volume":"339","author":"D Moher","year":"2009","unstructured":"Moher, D., Liberati, A., Tetzlaff, J.: Preferred reporting items for systematic reviews and meta-analyses: the PRISMA statement. BMJ 339, b2535\u2013b2535 (2009). https:\/\/doi.org\/10.1136\/bmj.b2535","journal-title":"BMJ"},{"key":"1095_CR50","unstructured":"Muhammad, Z.: Remote work caused data breaches for 62% of organizations. (2023). https:\/\/www.digitalinformationworld.com\/2023\/03\/remote-work-caused-data-breaches-for-62.html"},{"issue":"1","key":"1095_CR51","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1097\/xeb.0000000000000152","volume":"17","author":"Z Munn","year":"2018","unstructured":"Munn, Z., Aromataris, E., Tufanaru, C., Stern, C., Porritt, K., Farrow, J., Lockwood, C., Stephenson, M., Moola, S., Lizarondo, L., McArthur, A., Peters, M., Pearson, A., Jordan, Z.: The development of software to support multiple systematic review types. Int. J. Evid.-Based Healthc. 17(1), 1 (2018). https:\/\/doi.org\/10.1097\/xeb.0000000000000152","journal-title":"Int. J. Evid.-Based Healthc."},{"issue":"10","key":"1095_CR52","first-page":"1","volume":"18","author":"Z Munn","year":"2020","unstructured":"Munn, Z., Barker, T.H., Moola, S., Tufanaru, C., Stern, C., McArthur, A., Stephenson, M., Aromataris, E.: Methodological quality of case series studies. JBI Database Syst. Rev. Implement. Rep. 18(10), 1 (2020)","journal-title":"JBI Database Syst. Rev. Implement. Rep."},{"key":"1095_CR53","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-021-02929-z","author":"U Narayanan","year":"2021","unstructured":"Narayanan, U., Paul, V., Joseph, S.: Decentralized blockchain based authentication for secure data sharing in Cloud-IoT. J. Ambient. Intell. Humaniz. Comput. (2021). https:\/\/doi.org\/10.1007\/s12652-021-02929-z","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"1095_CR54","unstructured":"Nicoletti, P.: Remote work security statistics in 2022. CyberTalk. (2022). https:\/\/www.cybertalk.org\/2022\/03\/31\/remote-work-security-statistics-in-2022\/"},{"key":"1095_CR55","doi-asserted-by":"publisher","unstructured":"Nurse, J.R.C., Williams, N., Collins, E., Panteli, N., Blythe, J., Koppelman, B.: Remote working pre- and post-COVID-19: An analysis of new threats and risks to security and privacy. In: Stephanidis, C., Antona, M., Ntoa, S. (eds) HCI International 2021 - Posters. HCII 2021. Communications in Computer and Information Science, vol. 1421, pp. 583\u2013590 (2021). https:\/\/doi.org\/10.1007\/978-3-030-78645-8_74","DOI":"10.1007\/978-3-030-78645-8_74"},{"key":"1095_CR56","doi-asserted-by":"publisher","first-page":"103266","DOI":"10.1016\/j.cose.2023.103266","volume":"130","author":"JK Nwankpa","year":"2023","unstructured":"Nwankpa, J.K., Datta, P.: Remote vigilance: the roles of cyber awareness and cybersecurity policies among remote workers. Comput. Secur. 130, 103266\u2013103266 (2023). https:\/\/doi.org\/10.1016\/j.cose.2023.103266","journal-title":"Comput. Secur."},{"key":"1095_CR57","doi-asserted-by":"publisher","unstructured":"Petticrew, M., Roberts, H.: Systematic Reviews in the Social Sciences (M. Petticrew & H. Roberts, Eds.). Blackwell Publishing Ltd. (2006). https:\/\/doi.org\/10.1002\/9780470754887","DOI":"10.1002\/9780470754887"},{"key":"1095_CR58","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58465-8_10","author":"C Pidel","year":"2020","unstructured":"Pidel, C., Ackermann, P.: Collaboration in virtual and augmented reality: a systematic overview. Lect. Notes Comput. Sci.Comput. Sci. (2020). https:\/\/doi.org\/10.1007\/978-3-030-58465-8_10","journal-title":"Lect. Notes Comput. Sci.Comput. Sci."},{"key":"1095_CR59","unstructured":"Quyen, N.V.: Hands-on training for mitigating web application. (2023). https:\/\/dspace02.jaist.ac.jp\/dspace\/bitstream\/10119\/18734\/5\/paper.pdf"},{"issue":"7","key":"1095_CR60","doi-asserted-by":"publisher","first-page":"5952","DOI":"10.3390\/su15075952","volume":"15","author":"C Radu","year":"2023","unstructured":"Radu, C., Deaconu, A., Kis, I.-A., Jansen, A., Mi\u0219u, S.I.: New ways to perform: employees\u2019 perspective on remote work and psychological security in the post-pandemic era. Sustainability 15(7), 5952 (2023). https:\/\/doi.org\/10.3390\/su15075952","journal-title":"Sustainability"},{"key":"1095_CR61","unstructured":"Rakha, N. A.: Ensuring cyber-security in remote workforce: Legal implications and international best practices. Int. J. Law Policy. (2023). https:\/\/irshadjournals.com\/index.php\/ijlp\/article\/download\/43\/30"},{"key":"1095_CR62","doi-asserted-by":"publisher","DOI":"10.1186\/s13643-020-01542-z","author":"ML Rethlefsen","year":"2021","unstructured":"Rethlefsen, M.L., Kirtley, S., Waffenschmidt, S., Ayala, A.P., Moher, D., Page, M.J., Koffel, J.B.: PRISMA-S: an extension to the PRISMA statement for reporting literature searches in systematic reviews. Syst. Rev. (2021). https:\/\/doi.org\/10.1186\/s13643-020-01542-z","journal-title":"Syst. Rev."},{"key":"1095_CR63","unstructured":"Sandamali, A.A.D.: Effective information security policies for efficient remote working: Software professionals\u2019 perspective. (2019). http:\/\/dl.lib.uom.lk\/handle\/123\/16362"},{"issue":"1","key":"1095_CR64","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1016\/j.socscimed.2006.08.041","volume":"64","author":"M Sandelowski","year":"2007","unstructured":"Sandelowski, M., Voils, C.I., Barroso, J.: Comparability work and the management of difference in research synthesis studies. Soc Sci Med 64(1), 236\u2013247 (2007). https:\/\/doi.org\/10.1016\/j.socscimed.2006.08.041","journal-title":"Soc Sci Med"},{"key":"1095_CR65","doi-asserted-by":"publisher","unstructured":"Santos, R. de S., Grillo, W., Cabral, D., de Castro, C., Albuquerque, N., Fran\u00e7a, C. Post-pandemic hybrid work in software companies: findings from an industrial case study. (2024). https:\/\/doi.org\/10.48550\/arXiv.2401.08922","DOI":"10.48550\/arXiv.2401.08922"},{"key":"1095_CR66","doi-asserted-by":"publisher","unstructured":"Sebastian, G.:A descriptive study on cybersecurity challenges of working from home during COVID-19 pandemic and a proposed 8 step WFH cyber-attack mitigation plan. Communications of the IBIMA, 1\u20137. (2021). https:\/\/doi.org\/10.5171\/2021.589235","DOI":"10.5171\/2021.589235"},{"key":"1095_CR67","doi-asserted-by":"publisher","unstructured":"Senapati, S., Bharathi, S.V.: An Empirical study on the information security threats due to remote working environments. In: International conference on information science and applications (ICISA), 19\u201337. (2024). https:\/\/doi.org\/10.1007\/978-981-99-6984-5_2","DOI":"10.1007\/978-981-99-6984-5_2"},{"key":"1095_CR68","doi-asserted-by":"publisher","DOI":"10.3389\/frma.2023.1268045","author":"N Shaheen","year":"2023","unstructured":"Shaheen, N., Shaheen, A., Ramadan, A., Hefnawy, M.T., Ramadan, A., Ibrahim, I., Hassanein, M., Ashour, M.E., Flouty, O.: Appraising systematic reviews: a comprehensive guide to ensuring validity and reliability. Front. Res. Metr. Analy. (2023). https:\/\/doi.org\/10.3389\/frma.2023.1268045","journal-title":"Front. Res. Metr. Analy."},{"key":"1095_CR69","unstructured":"Sirineni, G.: Council Post: remote work has led to a cybercrime boom\u2014here\u2019s how to stop it. Forbes. (2022). https:\/\/www.forbes.com\/sites\/forbesbusinesscouncil\/2022\/03\/07\/remote-work-has-led-to-a-cybercrime-boom-heres-how-to-stop-it\/?sh=74f52a8c2f6a"},{"key":"1095_CR70","unstructured":"Sjouwerman, S.: Data breach costs increase by $1 million when remote workers are involved. (2022). https:\/\/blog.knowbe4.com\/data-breach-costs-increase-by-1-million-when-remote-workers-are-involved"},{"key":"1095_CR71","unstructured":"Specops: Survey reveals the UK business sectors most lacking in cyber security training. (2020). https:\/\/specopssoft.com\/blog\/uk-business-sectors-lacking-cyber-security-training\/"},{"key":"1095_CR72","unstructured":"Suciu, P.: Security remains a real concern with real-time communication tools. (2023). https:\/\/www.forbes.com\/sites\/petersuciu\/2023\/11\/29\/security-remains-a-real-concern-with-real-time-communication-tools\/?sh=1823fd4615c9"},{"key":"1095_CR73","doi-asserted-by":"publisher","unstructured":"Tahlyan, D., Mahmassani, H., Stathopoulos, A., Said, M., Shaheen, S., Walker, J., Johnson, B.: In-Person, hybrid or remote? Employers\u2019 perspectives on the future of work post-pandemic. (2024). https:\/\/doi.org\/10.48550\/arXiv.2402.18459","DOI":"10.48550\/arXiv.2402.18459"},{"key":"1095_CR74","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.118401","author":"M Thankappan","year":"2022","unstructured":"Thankappan, M., Rif\u00e0-Pous, H., Garrigues, C.: Multi-channel man-in-the-middle attacks against protected Wi-fi networks: a state of the art review. Expert Syst. Appl. (2022). https:\/\/doi.org\/10.1016\/j.eswa.2022.118401","journal-title":"Expert Syst. Appl."},{"issue":"1","key":"1095_CR75","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1471-2288-8-45","volume":"8","author":"J Thomas","year":"2008","unstructured":"Thomas, J., Harden, A.: Methods for the thematic synthesis of qualitative research in systematic reviews. BMC Med. Res. Methodol.Methodol. 8(1), 1\u201310 (2008). https:\/\/doi.org\/10.1186\/1471-2288-8-45","journal-title":"BMC Med. Res. Methodol.Methodol."},{"key":"1095_CR76","doi-asserted-by":"publisher","first-page":"394","DOI":"10.34190\/iccws.18.1.973","volume":"18","author":"S Treacy","year":"2023","unstructured":"Treacy, S., Sabu, A., Bond, T., O\u2019Sullivan, J., Sullivan, J., Sylvester, P.: Organizational cybersecurity post the pandemic: an exploration of remote working risks and mitigation strategies. Int. Conf. Cyber Warfare Secur. 18, 394\u2013401 (2023). https:\/\/doi.org\/10.34190\/iccws.18.1.973","journal-title":"Int. Conf. Cyber Warfare Secur."},{"key":"1095_CR77","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-020-00443-1","author":"S Venkatesha","year":"2021","unstructured":"Venkatesha, S., Reddy, K.R., Chandavarkar, B.R.: Social engineering attacks during the COVID-19 pandemic. SN Comput. Sci. (2021). https:\/\/doi.org\/10.1007\/s42979-020-00443-1","journal-title":"SN Comput. Sci."},{"key":"1095_CR78","unstructured":"Walters, P.: How Does Remote Work Affect CCPA Compliance? (2021). https:\/\/www.truevault.com\/blog\/how-does-remote-work-affect-ccpa-compliance"},{"key":"1095_CR79","unstructured":"Yoachimik, O., Pacheco, J.: DDoS threat report for 2023 Q2. (2023). https:\/\/blog.cloudflare.com\/ddos-threat-report-2023-q2"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01095-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01095-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01095-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,5]],"date-time":"2025-09-05T11:33:39Z","timestamp":1757072019000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01095-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,27]]},"references-count":79,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["1095"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01095-z","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2025,7,27]]},"assertion":[{"value":"30 June 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 July 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"187"}}