2017
DOI: 10.1093/comjnl/bxx093
|View full text |Cite
|
Sign up to set email alerts
|

Risk and the Small-Scale Cyber Security Decision Making Dialogue—a UK Case Study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 26 publications
(9 citation statements)
references
References 14 publications
0
9
0
Order By: Relevance
“…Studies with input from technical experts [17,81,82] identified different concerns compared to general small business owners [83,84,85,86]. A series of interviews from a single study [87] shows that small scale IT users have constraints in security decision making that are not expected by technical security providers. Australian small businesses in information, media and telecommunication, and professional, scientific and technical services categories made up less than 14% of all businesses, by business count, in 2019 [88].…”
Section: Business Versus It Perspectivesmentioning
confidence: 99%
“…Studies with input from technical experts [17,81,82] identified different concerns compared to general small business owners [83,84,85,86]. A series of interviews from a single study [87] shows that small scale IT users have constraints in security decision making that are not expected by technical security providers. Australian small businesses in information, media and telecommunication, and professional, scientific and technical services categories made up less than 14% of all businesses, by business count, in 2019 [88].…”
Section: Business Versus It Perspectivesmentioning
confidence: 99%
“…Smaller businesses may have fewer resources available to invest in automated security solutions, and be less likely to have a dedicated security function to manage threats [76]. For small charities also, this can include relying on volunteers having the necessary expertise [77]. Smaller organisations may also delegate security to an expert IT-security provider company [77].…”
Section: A Vulnerable User Groupsmentioning
confidence: 99%
“…For small charities also, this can include relying on volunteers having the necessary expertise [77]. Smaller organisations may also delegate security to an expert IT-security provider company [77].…”
Section: A Vulnerable User Groupsmentioning
confidence: 99%
“…While there is literature on how practitioners should conduct ISRM, there is little on how they actually perform ISRM [14]. Additionally, there is not much research on ISRM from a security-novice perspective [15]. Previous studies have, however, highlighted, for some time, concerns among organisations with limited security awareness or experience when deciding about or developing their digital services [15], [16].…”
Section: Introductionmentioning
confidence: 99%
“…Additionally, there is not much research on ISRM from a security-novice perspective [15]. Previous studies have, however, highlighted, for some time, concerns among organisations with limited security awareness or experience when deciding about or developing their digital services [15], [16]. Osborn and Simpson [15], for example, found that novice practitioners were uncertain about developing or outsourcing digital services because they felt they lacked the understanding of the consequences and limitations of the developed services or agreed contracts.…”
Section: Introductionmentioning
confidence: 99%