2017
DOI: 10.1108/ics-07-2016-0047
|View full text |Cite
|
Sign up to set email alerts
|

Tightroping between APT and BCI in small enterprises

Abstract: Purpose The contemporary internet provisions increasingly sophisticated security attacks. Besides underlining the advanced nature of these attacks, the concept of an advanced persistent threat (APT) catalyzes the important perspective of longitudinal persistence; attacks are not only carefully planned and targeted but the subsequent exploitation period covers long periods of time. If an APT successfully realizes into such exploitation, information assets may be continuously monitored for harvesting business-cr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 34 publications
0
2
0
Order By: Relevance
“…E-commerce plays more important role in serving as the fundamental platform for all business transactions and non-business interactions between all parties of interests (Hua, 2016). Software-as-service (SaaS) business models among the most popular cloud technologies support the operation of small business (Kaukola et al, 2017).…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…E-commerce plays more important role in serving as the fundamental platform for all business transactions and non-business interactions between all parties of interests (Hua, 2016). Software-as-service (SaaS) business models among the most popular cloud technologies support the operation of small business (Kaukola et al, 2017).…”
Section: Literature Reviewmentioning
confidence: 99%
“…It makes even the worst when more news on fraud befall micro-size enterprises and makes business become bankrupt. According to Kaukola et al (2017), the turbulence of internet provisions is vulnerable to glitches of security attacks.…”
Section: Introductionmentioning
confidence: 99%