2018
DOI: 10.1080/10919392.2018.1484598
|View full text |Cite
|
Sign up to set email alerts
|

Exploring SME cybersecurity practices in developing countries

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

4
72
2

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 106 publications
(78 citation statements)
references
References 22 publications
4
72
2
Order By: Relevance
“…Especially, SMEs can utilize their resources more effectively and improve the savings by adaptation to the internet and the same information and communication technologies (Sener et al 2014). With the internet, institutions can create international bonds with new vendors to lower the costs, with new customers to enhance the sales, and receive the privilege of declining communication costs, thereby having an efficient and quick transaction procedure (Kabanda and Kent 2018).…”
Section: The Challenge Of Information Communication Technologymentioning
confidence: 99%
“…Especially, SMEs can utilize their resources more effectively and improve the savings by adaptation to the internet and the same information and communication technologies (Sener et al 2014). With the internet, institutions can create international bonds with new vendors to lower the costs, with new customers to enhance the sales, and receive the privilege of declining communication costs, thereby having an efficient and quick transaction procedure (Kabanda and Kent 2018).…”
Section: The Challenge Of Information Communication Technologymentioning
confidence: 99%
“…Therefore, in that respect there are different views about the credibility of the concept and subjective norm. Nevertheless, the majority of researchers proved that subjective norm has an inverse relationship with the information security non-compliant behavior and hence it grooms the compliance nature (Cheng et al 2013;Kabanda, Tanner, and Kent 2018;Seyal and Turner 2013).…”
Section: Subjective Normsmentioning
confidence: 99%
“…Management support In this study, management support is defined as the perception of the employees regarding their managers' support and understanding of importance of the information security. In an organization, if the information security is important, then the management should visibly implement the policy guidelines and enable the employees with adequate training so that management acts as a huge support for their staff (Al Hogail, Mirza, and Bakry 2015;Gadzama et al 2014;Kabanda, Tanner, and Kent 2018). A well-defined process of secure communication with relevant education, reminders and refresher courses increase employee's feelings of responsibility and ownership in decisions about security and ultimately lead to a more positive attitude about security throughout the whole organization (Greene and D'Arcy 2010; Humaidi and Balakrishnan 2015).…”
Section: Work Environmentmentioning
confidence: 99%
See 1 more Smart Citation
“…Organizations use advanced access control systems to allow context-specific access to information assets and information (Gostojić et al 2012;Kabanda, Tanner, and Kent 2018). The implementation of access control policies necessitates back-and-forth communication with central servers.…”
Section: Introductionmentioning
confidence: 99%