TY - JOUR AB - Purpose– The aim of this paper is to survey existing information security culture research to scrutinise the kind of knowledge that has been developed and the way in which this knowledge has been brought about. Design/methodology/approach– Results are based on a literature review of information security culture research published between 2000 and 2013 (December). Findings– This paper can conclude that existing research has focused on a broad set of research topics, but with limited depth. It is striking that the effects of different information security cultures have not been part of that focus. Moreover, existing research has used a small repertoire of research methods, a repertoire that is more limited than in information systems research in general. Furthermore, an extensive part of the research is descriptive, philosophical or theoretical – lacking a structured use of empirical data – which means that it is quite immature. Research limitations/implications– Findings call for future research that: addresses the effects of different information security cultures; addresses the identified research topics with greater depth; focuses more on generating theories or testing theories to increase the maturity of this subfield of information security research; and uses a broader set of research methods. It would be particularly interesting to see future studies that use intervening or ethnographic approaches because, to date, these have been completely lacking in existing research. Practical implications– Findings show that existing research is, to a large extent, descriptive, philosophical or theoretical. Hence, it is difficult for practitioners to adopt these research results, such as frameworks for cultivating or assessment tools, which have not been empirically validated. Originality/value– Few state-of-the-art reviews have sought to assess the maturity of existing research on information security culture. Findings on types of research methods used in information security culture research extend beyond the existing knowledge base, which allows for a critical discussion about existing research in this sub-discipline of information security. VL - 23 IS - 3 SN - 2056-4961 DO - 10.1108/ICS-05-2014-0033 UR - https://doi.org/10.1108/ICS-05-2014-0033 AU - Karlsson Fredrik AU - Åström Joachim AU - Karlsson Martin PY - 2015 Y1 - 2015/01/01 TI - Information security culture – state-of-the-art review between 2000 and 2013 T2 - Information & Computer Security PB - Emerald Group Publishing Limited SP - 246 EP - 285 Y2 - 2024/05/13 ER -