<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type='text/xsl' href='/oai/static/oai2.xsl' ?><OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd">
  <responseDate>2026-04-15T05:22:24Z</responseDate>
  <request identifier="63dc8f1658f4cf36fc6865d1768e517b782b35c0d6056f4125d0ffa0d6492760" metadataPrefix="oai_ddi25" verb="GetRecord">https://datacatalogue.cessda.eu/oai-pmh/v0/oai</request>
  <GetRecord>
    <record>
    <header>
      <identifier>63dc8f1658f4cf36fc6865d1768e517b782b35c0d6056f4125d0ffa0d6492760</identifier>
      <datestamp>2025-10-26T03:58:05Z</datestamp>
      <setSpec>language:en</setSpec><setSpec>openaire_data</setSpec>
    </header>
      <metadata>
        <codeBook xmlns="ddi:codebook:2_5" version="2.5" xsi:schemaLocation="ddi:codebook:2_5 http://www.ddialliance.org/Specification/DDI-Codebook/2.5/XMLSchema/codebook.xsd">
    <docDscr>
      <citation>
        <titlStmt>
          <titl xml:lang="en">DDI2.5 XML CODEBOOK RECORD FOR STUDY NUMBER 9067</titl>
        </titlStmt>
        <prodStmt>
        </prodStmt>
      </citation>
    </docDscr>
  <stdyDscr>
    <citation>
      <titlStmt>
        <titl xml:lang="en">Cyber Security Longitudinal Survey: Wave 2, 2022</titl>
        <IDNo xml:lang="en" agency="UKDA">9067</IDNo><IDNo xml:lang="en" agency="DOI">10.5255/UKDA-SN-9067-1</IDNo>
      </titlStmt>
      <rspStmt>
        <AuthEnty xml:lang="en">Department for Digital, Culture, Media and Sport
        </AuthEnty>
      </rspStmt>
      <prodStmt>
        <copyright xml:lang="en">&lt;a href="https://www.nationalarchives.gov.uk/information-management/re-using-public-sector-information/uk-government-licensing-framework/crown-copyright/" target="_blank"&gt;© Crown copyright&lt;/a&gt;. The use of these data is subject to the &lt;a href="https://ukdataservice.ac.uk/app/uploads/cd137-enduserlicence.pdf" target="_blank"&gt;UK Data Service End User Licence Agreement&lt;/a&gt;. Additional restrictions may also apply.</copyright>
        <prodDate xml:lang="en"/>
        <fundAg xml:lang="en">Department for Digital, Culture, Media and Sport</fundAg>
      </prodStmt>
      <distStmt>
        <distrbtr xml:lang="en">UK Data Service</distrbtr>
        <distDate xml:lang="en" date="2023-03-23T09:15:35Z">23 March 2023</distDate>
      </distStmt>
      <verStmt>
        <version date="2023-03-23T09:15:33Z" xml:lang="en"/>
      </verStmt>
      <holdings xml:lang="en" URI="http://doi.org/10.5255/UKDA-SN-9067-1"/>
    </citation>
    <stdyInfo>
      <subject>
        <keyword xml:lang="en" vocab="ELSST" vocabURI="https://elsst.cessda.eu/id/3749705c-f811-4945-b7b7-045fa132cdd3">FRAUD</keyword><keyword xml:lang="en" vocab="ELSST" vocabURI="https://elsst.cessda.eu/id/205c56de-d9b4-4548-92b2-411873c0b417">INCOME</keyword><keyword xml:lang="en" vocab="ELSST" vocabURI="https://elsst.cessda.eu/id/00000000-0000-0000-0000-000000000000">COMPUTER SECURITY</keyword><keyword xml:lang="en" vocab="ELSST" vocabURI="https://elsst.cessda.eu/id/2c8aacb1-6585-4111-be00-9578071d2a82">INFORMATION SOURCES</keyword><keyword xml:lang="en" vocab="ELSST" vocabURI="https://elsst.cessda.eu/id/a3b3e2be-74db-4030-9e94-9063018cfe7f">INTERNET USE</keyword><keyword xml:lang="en" vocab="ELSST" vocabURI="https://elsst.cessda.eu/id/bee3f71f-4142-4c4d-82dc-fb999fd8fb6d">INTERNET ACCESS</keyword><keyword xml:lang="en" vocab="ELSST" vocabURI="https://elsst.cessda.eu/id/c6b469bb-b772-4e95-9a7d-3327726b0d0a">BUSINESS MANAGEMENT</keyword><keyword xml:lang="en" vocab="ELSST" vocabURI="https://elsst.cessda.eu/id/00000000-0000-0000-0000-000000000000">COMPUTER HACKING</keyword><keyword xml:lang="en" vocab="ELSST" vocabURI="https://elsst.cessda.eu/id/0b54b411-fa69-4ef3-9b71-8ebb66cf7b99">EMPLOYEES</keyword><keyword xml:lang="en" vocab="ELSST" vocabURI="https://elsst.cessda.eu/id/23564fd0-69fb-4e12-87fa-b3f19abae2fe">INDUSTRIAL POLICY</keyword><keyword xml:lang="en" vocab="ELSST" vocabURI="https://elsst.cessda.eu/id/b7d69a15-5887-4075-999c-240df7feacd8">COSTS</keyword><keyword xml:lang="en" vocab="ELSST" vocabURI="https://elsst.cessda.eu/id/a0291361-f2bb-4a21-b217-05156e04253e">BUSINESSES</keyword><keyword xml:lang="en" vocab="ELSST" vocabURI="https://elsst.cessda.eu/id/d426fc0f-2d29-49c6-8f34-a29e2cf3dd41">GOVERNING BOARDS (ORGANIZATIONS)</keyword><keyword xml:lang="en" vocab="ELSST" vocabURI="https://elsst.cessda.eu/id/b0eb8b5e-0864-4257-bd7f-1bfc98d17eb9">CHARITABLE ORGANIZATIONS</keyword><keyword xml:lang="en" vocab="ELSST" vocabURI="https://elsst.cessda.eu/id/108d3d82-1b10-42d2-9688-0701a6047cc0">ONLINE SERVICES</keyword><keyword xml:lang="en" vocab="ELSST" vocabURI="https://elsst.cessda.eu/id/cd6a9fd8-d594-48cb-adaa-d03f868e6314">SECURITY SYSTEMS</keyword><keyword xml:lang="en" vocab="ELSST" vocabURI="https://elsst.cessda.eu/id/a86c5927-987b-4ea8-9cea-9ec676824c86">CRIME PREVENTION</keyword>
        <topcClas xml:lang="en">Information technology</topcClas><topcClas xml:lang="en">Business/industrial management and organisation</topcClas>
      </subject>
      <abstract xml:lang="en">&lt;P&gt;Abstract copyright UK Data Service and data collection copyright owner.&lt;/P&gt;</abstract><abstract xml:lang="en">&lt;p dir="ltr"&gt;The &lt;span style="font-style: italic;"&gt;Cyber Security Longitudinal Survey&lt;/span&gt; (CSLS) helps us better understand cyber security policies and processes within medium and large businesses and high-income charities. It explores the links over time between these policies and processes and the likelihood and impact of a cyber incident.&lt;span&gt; The survey is commissioned by The Department for Digital, Culture, Media and Sport and&lt;/span&gt;&lt;span&gt; is part of the National Cyber Strategy. It aims to support the Government by providing evidence that can inform policies which help to make Britain a safer place to do business online. This is the second research year (or wave) of a three-year study and the data were collected over 2022. &lt;br&gt;&lt;/span&gt;&lt;/p&gt; &lt;p dir="ltr"&gt;&lt;span&gt;&amp;nbsp;The core objectives of the study are to:&amp;nbsp;&lt;/span&gt;&lt;/p&gt; &lt;ul&gt; &lt;li dir="ltr"&gt; &lt;p dir="ltr"&gt;&lt;span&gt;explore how and why UK organisations are changing their cyber security profile and how they implement, measure, and improve their cyber defences.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; &lt;/li&gt;&lt;li dir="ltr"&gt; &lt;p dir="ltr"&gt;&lt;span&gt;provide a more in-depth picture of larger organisations, covering topics that are lightly covered in the &lt;span style="font-style: italic;"&gt;Cyber Security Breaches Survey&lt;/span&gt; (available from the UK Data Archive under Generic Number 33549), such as corporate governance, supply chain risk management, internal and external reporting, cyber strategy, and cyber insurance.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; &lt;/li&gt;&lt;li dir="ltr"&gt; &lt;p dir="ltr"&gt;&lt;span&gt;explore the effects of actions adopted by organisations to improve their cyber security on the likelihood and impact of a cyber incident.&amp;nbsp;&lt;/span&gt;&lt;/p&gt; &lt;/li&gt;&lt;/ul&gt; &lt;p&gt;&lt;span id="x_x_x_docs-internal-guid-cd5f84d8-7fff-43a3-993e-465f58bfb245"&gt;&lt;/span&gt;&lt;/p&gt; &lt;p dir="ltr"&gt;&lt;span&gt;Further information and additional publications can be found on the &lt;/span&gt;&lt;a href="https://www.gov.uk/government/collections/cyber-security-longitudinal-survey"&gt;GOV.UK Cyber Security Longitudinal Survey&lt;/a&gt;&lt;a href="https://www.gov.uk/government/publications/cyber-security-longitudinal-survey-wave-two-results"&gt;&lt;span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt; pages.&lt;/span&gt;&lt;/p&gt; &lt;p dir="ltr"&gt;Wave 1 data from the &lt;span style="font-style: italic;"&gt;Cyber Security Longitudinal Survey&lt;/span&gt; can also be found on the UK Data Archive under Study Number 8969.&lt;/p&gt;</abstract><abstract xml:lang="en">&lt;B&gt;Main Topics&lt;/B&gt;:&lt;BR&gt;</abstract><abstract xml:lang="en">&lt;p&gt;&lt;span data-ng-show="abstractDisplay" class="" style=""&gt;The questionnaire covered the following topic areas:&lt;/span&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;span data-ng-show="abstractDisplay" class="" style=""&gt;cyber profile of organisations&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span data-ng-show="abstractDisplay" class="" style=""&gt;board involvement in cyber security&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span data-ng-show="abstractDisplay" class="" style=""&gt;current cyber security policies and processes &lt;/span&gt;&lt;span data-ng-show="abstractDisplay" class="" style=""&gt;and any improvements made over the last 12 months&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span data-ng-show="abstractDisplay" class="" style=""&gt;supplier risks&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span data-ng-show="abstractDisplay" class="" style=""&gt;influencers of changes in policies and processes&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span data-ng-show="abstractDisplay" class="" style=""&gt;use and forms of cyber insurance&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span data-ng-show="abstractDisplay" class="" style=""&gt;use of information or guidance from the National Cyber Security Centre (NCSC) to inform approach to cyber security&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span data-ng-show="abstractDisplay" class="" style=""&gt;cyber security incident &lt;/span&gt;&lt;span data-ng-show="abstractDisplay" class="" style=""&gt;prevalence, impact and &lt;/span&gt;&lt;span data-ng-show="abstractDisplay" class="" style=""&gt;costs&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span data-ng-show="abstractDisplay" class="" style=""&gt;cyber security incident management&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;</abstract>
      <sumDscr>
        <collDate xml:lang="en" event="single">April 2022 - June 2022</collDate><collDate xml:lang="en" date="2022-04-08T06:00:00Z" event="start">08 April 2022</collDate><collDate xml:lang="en" date="2022-06-28T06:00:00Z" event="end">28 June 2022</collDate>
        <nation xml:lang="en">United Kingdom</nation>
        <anlyUnit xml:lang="en">Institutions/organisations<concept/></anlyUnit><anlyUnit xml:lang="en">National<concept/></anlyUnit>
        <universe xml:lang="en" clusion="I">Medium (defined as 50-249 employees) and large (defined as 250+ employees) businesses and large charities (defined as a turnover of at least £1 million) in the UK. The main sampling frame is the Inter-Departmental Business Register, supplied by the ONS. See documentation for further details.</universe>
        <dataKind xml:lang="en">Numeric</dataKind>
      </sumDscr>
    </stdyInfo>
    <method>
      <dataColl>
        <timeMeth xml:lang="en">Longitudinal/panel/cohort<concept/></timeMeth>
        <sampProc xml:lang="en">Multi-stage stratified random sample<concept/></sampProc>
        <collMode xml:lang="en">Self-administered questionnaire: Web-based (CAWI)<concept/></collMode><collMode xml:lang="en">Telephone interview: Computer-assisted (CATI)<concept/></collMode>
      </dataColl>
    </method>
    <dataAccs>
      <useStmt>
        <restrctn xml:lang="en">&lt;p&gt;The Data Collection is available to UK Data Service registered users subject to the &lt;a href="https://ukdataservice.ac.uk/app/uploads/cd137-enduserlicence.pdf" target="_blank"&gt;End User Licence Agreement&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;Commercial use of the data requires approval from the data owner or their nominee. The UK Data Service will contact you.&lt;/p&gt;</restrctn>
        <conditions xml:lang="en">See &lt;restrctn&gt;</conditions>
      </useStmt>
    </dataAccs>
    <othrStdyMat>
      <relMat xml:lang="en">
        <citation>
          <titlStmt>
            <titl xml:lang="en"/>
            <IDNo xml:lang="en">https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/1123091/Technical_Report_-_Cyber_Security_Longitudinal_Survey_-_wave_two_accessible.pdf</IDNo>
          </titlStmt>
        </citation>
      </relMat>
      <relPubl xml:lang="en">
        Cyber Security Longitudinal Survey Wave 2 Results
        <citation>
          <titlStmt>
            <titl xml:lang="en"></titl>
            <IDNo xml:lang="en" agency="URL">https://www.gov.uk/government/publications/cyber-security-longitudinal-survey-wave-two-results</IDNo>
          </titlStmt>
          <distStmt>
            <distDate xml:lang="en"/>
          </distStmt>
          <holdings xml:lang="en" URI="https://www.gov.uk/government/publications/cyber-security-longitudinal-survey-wave-two-results"/>
        </citation>
      </relPubl>
    </othrStdyMat>
  </stdyDscr>
  <fileDscr>
  </fileDscr>
</codeBook>
      </metadata>
      <about>
        <provenance xmlns="http://www.openarchives.org/OAI/2.0/provenance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/provenance http://www.openarchives.org/OAI/2.0/provenance.xsd">
    <originDescription harvestDate="2025-10-26T03:58:04Z" altered="true">
      <baseURL>https://oai.ukdataservice.ac.uk:8443/oai/provider</baseURL>
      <identifier>9067</identifier>
      <datestamp>2024-11-29T07:25:46Z</datestamp>
      <metadataNamespace>ddi:codebook:2_5</metadataNamespace>
    </originDescription>
</provenance>
      </about>
    </record>
  </GetRecord>
</OAI-PMH>