Effective Information Security Strategies for Small Business

被引:5
|
作者
Bryan, Lisa Lee [1 ]
机构
[1] Colorado State Univ Global, Aurora, CO 80011 USA
来源
关键词
Delone Mclean; Small Business Security; Information Security System; Security Incidents; SYSTEMS SUCCESS; MCLEAN MODEL; SAMPLE-SIZE; DELONE;
D O I
10.5281/zenodo.3760328
中图分类号
DF [法律]; D9 [法律];
学科分类号
0301 ;
摘要
The purpose of this quantitative ex-post facto study was to evaluate a small business information security system composed of a computer-use policy, information security training, and virus and malware protection. The DeLone and McLean Updated Success Model provided the foundation for the small business information security system model and constructs measured in the survey. The population consisted of small businesses with less than 100 employees and independent (non-franchise) in North Carolina, South Carolina, Georgia, Florida, Alabama, and Tennessee. The model contained four relationships incorporated into four research questions and four hypotheses including four null hypotheses. Each of the three components indicated a positive relationship with the variable of positive use experience. Recommendations include small businesses using the small business information security system as a comprehensive system to protect their business from security incidents. Information technology consultants should implement this comprehensive security system for small business clients to prevent security incidents.
引用
收藏
页码:341 / 360
页数:20
相关论文
共 50 条
  • [1] Effective Methods to Monitor IT Infrastructure Security for Small Business
    Teymourlouei, Haydar
    Harris, Vareva E.
    2019 6TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI 2019), 2019, : 7 - 13
  • [2] Methodology of Information Security as a Measure of Protection Small Business
    Bustamante Maldonado, Giovanny
    Osorio Cano, Jorge Andres
    CUADERNO ACTIVA, 2014, (06): : 71 - 77
  • [3] From information security to ... business security?
    von Solms, B
    von Solms, R
    COMPUTERS & SECURITY, 2005, 24 (04) : 271 - 273
  • [4] The Security of Information Systems in Business
    Beldjilali, Tarik
    INNOVATION AND KNOWLEDGE MANAGEMENT IN TWIN TRACK ECONOMIES: CHALLENGES & SOLUTIONS, VOLS 1-3, 2009, : 893 - 899
  • [5] Access to information for small business managers: Examination of some strategies and values
    Bouthillier, F
    CANADIAN JOURNAL OF INFORMATION AND LIBRARY SCIENCE-REVUE CANADIENNE DES SCIENCES DE L INFORMATION ET DE BIBLIOTHECONOMIE, 2003, 27 (03): : 5 - 23
  • [6] Enterprise information security strategies
    Anderson, Evan E.
    Choobineh, Joobin
    COMPUTERS & SECURITY, 2008, 27 (1-2) : 22 - 29
  • [7] Internet information security strategies
    2001, Radio i svyaz'
  • [8] Effective Management in Small Business
    Freedman, Harry S.
    HARVARD BUSINESS REVIEW, 1952, 30 (02) : 81 - 94
  • [9] STRATEGIES FOR SMALL BUSINESS TRAINING
    BENSIMON, H
    TRAINING & DEVELOPMENT, 1992, 46 (06): : 12 - 12
  • [10] Strategic values of information security in business
    Parker, Donn B.
    Computers and Security, 1997, 16 (07): : 572 - 582