Are Small Medium Enterprises Cyber Aware?

被引:0
作者
Forouzan, Homan [1 ]
Hosseinian-Far, Amin [1 ]
Sarwar, Dilshad [1 ]
机构
[1] Univ Northampton, Dept Business Syst & Operat, Northampton NN1 5PH, England
来源
CYBERSECURITY IN THE AGE OF SMART SOCIETIES, 2022 | 2023年
关键词
Cybercrime; Cyber; Crime; Conceptual framework; Design science research; Small and medium sized enterprises; DESIGN SCIENCE RESEARCH;
D O I
10.1007/978-3-031-20160-8_20
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Technology has become a pivotal point in our society, this dependency is becoming increasingly more critical on a daily basis. This ranges from people to businesses and on a larger scale government organisations who are now increasingly focusing on becomingmore cyber resilient. This paper intends to provide an overview as to why a comprehensive knowledge management framework is necessity for SMEs on tackling cyber and cyber-enabled crimes. The paper explores new sources of data to reliably understand the importance as to why such a framework is required. This type of system can pave the way for SME's to devise their cyber strategy and to be able to respond efficiently to cyber-related incidents. One of the cyber weakness and vulnerabilities for the SME's are through their interactivity and or engagement with their suppliers and customers. Namely the interactions which take place via their respective internet sites, email communications, ports (using external devices, USB, CD drive, SD cards etc..) or the router (The use of their WIFI systems). The benefits of this framework model will be primarily to educate SME's in becoming more cyber resilient and provide them with the knowledge, awareness and techniques to identify weaknesses and vulnerabilities in their computer networks, devices and internet usage.
引用
收藏
页码:385 / 397
页数:13
相关论文
共 17 条
[1]  
Attaran M., 2019, Journal of Small Business and Entrepreneurship, V31, P495, DOI [10.1080/08276331.2018.1466850, DOI 10.1080/08276331.2018.1466850]
[2]  
Forouzan H., 2018, Advanced Sciences and Technologies for Security Applications, P307, DOI [DOI 10.1007/978-3-319-97181-015, 10.1007/978-3-319-97181-0_15, DOI 10.1007/978-3-319-97181-0_15]
[3]  
FSB, 2018, CYB RES PROT SMALL F
[4]   Towards a strategic framework for design research [J].
Fulcher, AJ ;
Hills, P .
JOURNAL OF ENGINEERING DESIGN, 1996, 7 (02) :183-193
[5]   Cyber security: Small firms under fire [J].
1600, Institution of Engineering and Technology, United States (08) :80-83
[6]   Design science in Information Systems research [J].
Hevner, AR ;
March, ST ;
Park, J ;
Ram, S .
MIS QUARTERLY, 2004, 28 (01) :75-105
[7]  
MontasariR, 2021, COMPREHENSIVE DIGITA
[8]  
Okamoto T, 2017, PRIORITIES SMARTPHON
[9]   A design science research methodology for Information Systems Research [J].
Peffers, Ken ;
Tuunanen, Tuure ;
Rothenberger, Marcus A. ;
Chatterjee, Samir .
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2007, 24 (03) :45-77
[10]   Design science research genres: introduction to the special issue on exemplars and criteria for applicable design science research [J].
Peffers, Ken ;
Tuunanen, Tuure ;
Niehaves, Bjoern .
EUROPEAN JOURNAL OF INFORMATION SYSTEMS, 2018, 27 (02) :129-139