2017
DOI: 10.1016/j.cose.2017.05.001
|View full text |Cite
|
Sign up to set email alerts
|

On small-scale IT users' system architectures and cyber security: A UK case study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(12 citation statements)
references
References 30 publications
0
11
0
Order By: Relevance
“…The inability to gather data from diverse small businesses is a significant barrier to cyber-security research [16,57,58,59,22]. Consistently low response rates to broad-based voluntary surveys highlight the difficulty in obtaining a comprehensive sample.…”
Section: The Elusive Cohortmentioning
confidence: 99%
See 1 more Smart Citation
“…The inability to gather data from diverse small businesses is a significant barrier to cyber-security research [16,57,58,59,22]. Consistently low response rates to broad-based voluntary surveys highlight the difficulty in obtaining a comprehensive sample.…”
Section: The Elusive Cohortmentioning
confidence: 99%
“…Valli et al [16] survey Western Australian SMEs and call for cyber-security education for SMEs, while Dojkovki et al [17,18,19] highlight the influence of Australian culture on SME cyber-security. Internationally, reviews of SME cyber-security (albeit with different size definitions) emphasise ineffective security management practices [20] and differences between SMEs and large corporations [21,22]. Other research offers global insights into culture [23], strategies [24], policies [25] and specific technologies [26].…”
Section: Introductionmentioning
confidence: 99%
“…Several barriers can be extrapolated from the literature that the U.K. SMEs need to face when trying to achieve positive cybersecurity postures [27,7,2,23]. These barriers include: lack of time or financial resource; lack of understanding the risks or threats; lack of incentives to undertake standards or change behaviours; lack of pressure for cyber security within their supply chain or via consumers; lack of compliance drivers; lack of trust in experts or quality of information (including a single source); lack of expertise within the business; and unclear or confusing legislation requirements.…”
Section: Information Availability and Its Dispersion To Smesmentioning
confidence: 99%
“…Kaušpadien_ e, Ramanauskait_ e and Cenys (Kaušpadien_ e et al, 2019) assessed existing information security frameworks to evaluate their suitability for small and medium enterprises (SMEs) and defined which criteria are the most relevant for SMEs. Several studies focused on identifying what SMEs had done regarding cybersecurity risks and decisions (Yildirim et al, 2011;Osborn and Simpson, 2017;Berry and Berry, 2018).…”
Section: Introductionmentioning
confidence: 99%