14,766 Hits in 7.7 sec

Cyber Security Solutions for Businesses in Financial Services

Shahzeb Akhtar, Pratima Amol Sheorey, Sonali Bhattacharya, Ajith Kumar V. V.
2021 International Journal of Business Intelligence Research  
A qualitative research-based approach has been used where one-on-one interviews were conducted with 10 CIOs (chief information officers) and CISOs (chief information security officers).  ...  This paper examines the challenges that small, medium, and large businesses in the financial services industry are facing concerning data security and providing relevant tools and strategies to protect  ...  The first step was sending out interview requests to Chief Information Security Officers, Chief Information Officers and Director of Information Security in various small, medium and large business units  ... 
doi:10.4018/ijbir.20210101.oa5 fatcat:wytjze4sfjf6dceja4mcxxyzki


2005 Issues in Information Systems  
With ever-present risks of viscous attacks on the borderless Internet, end-users in small and medium-size businesses are brutally exposed to increasing number of spam, phishing, spyware, malware, viruses  ...  This Kit will enable small and medium-sized business to protect themselves from these threats in an efficient and affordable manner.  ...  In comparison, only about 2.5 per cent of malware attacks disrupt large enterprises, government agencies, etc.  ... 
doi:10.48009/2_iis_2005_310-316 fatcat:e2awcq4agnabzlxziaexnwnaji

An empirical study of ransomware attacks on organizations: an assessment of severity and salient factors affecting vulnerability

Lena Yuryna Connolly, David S Wall, Michael Lang, Bruce Oddson
2020 Journal of Cybersecurity  
Moreover, an organization's security posture influences the degree of severity of a ransomware attack.  ...  Using quantitative and qualitative data of 55 ransomware cases drawn from 50 organizations in the UK and North America, we assessed the severity of the crypto-ransomware attacks experienced and looked  ...  We would like to acknowledge the relentless commitment of police officers from UK Regional Cybercrime Units in providing data and advising on study results.  ... 
doi:10.1093/cybsec/tyaa023 fatcat:dxe6yzyf6fc37hy3ooj5c5g65m

Physical Security and Survival of Small and Medium Scale Enterprises (SMEs) in Southeast, Nigeria

Nkechi Cordelia Ojiagu, Hope Ngozi Nzewi
2019 American Journal of Industrial and Business Management  
The study explored the relationship between physical security and survival of small and medium scale enterprises (SMEs) in Southeast, Nigeria.  ...  The objectives of the study are to determine the nature of relationships that exist between fire outbreak and entrepreneurial vision, burglary attacks and delivery-time of products by SMEs in Southeast  ...  There is no single criterion for classifying a business enterprise as small and medium scale.  ... 
doi:10.4236/ajibm.2019.95085 fatcat:6fn7vmhmnngtlcz4ws2p5l5g4u


Andrei-Laurențiu Mitrofan, University POLITEHNICA of Bucharest, Bucharest, Romania, Elena-Veronica CRUCERU, Andreea BARBU, University POLITEHNICA of Bucharest, Bucharest, Romania, University POLITEHNICA of Bucharest, Bucharest, Romania
2020 Business Excellence and Management  
The objectives proposed for this research are to identify the main concerns of entrepreneurs regarding cybersecurity and to determine the main causes of cybersecurity risks in micro, small, and medium-sized  ...  The online environment brings business opportunities and connections that can help the development of small and medium companies, but it also contains many risks.  ...  The contexts that can lead to cyberattacks on Small Medium-sized Enterprises (SMEs) are diverse and multiple, making it difficult for a company to understand them all, but by knowing the basics on which  ... 
doi:10.24818/beman/2020.10.4-03 fatcat:fdrsfzjb3vfm5i44niu2uhsru4

Exploring Cybersecurity Ecosystem in the Middle East: Towards an SME Recommender System

Nadir Naveed Ahmed, Krishnadas Nanath
2021 Journal of Cyber Security and Mobility  
Enterprises must manage the cybersecurity risks so that the security and resilience of their assets may be improved. Cyber-attacks on Small and Medium Enterprises (SMEs) are rising.  ...  There is a lack of cybersecurity initiatives in SMEs, and several past attacks have exposed the weak systems.  ...  This paper explored the approaches that small and medium enterprises (SMEs) could adopt when deciding how to protect themselves against cyber-attacks after understanding their requirements.  ... 
doi:10.13052/jcsm2245-1439.1032 fatcat:xzsocmdisncgrlonzaehu26u2i

A Quantitative Approach to Information Systems Audit in Small and Medium Enterprises

2015 Informatică economică  
The current work focuses on a quantitative approach to measure the effectiveness of the IS audit functions in selected small and medium enterprises.  ...  An Information Systems (IS) Auditor performs several audit related functions in a Small and Medium Enterprise (SME) such as preparation of a written IS audit procedure, comparison of actual IS configuration  ...  It can be categorized as Large, Medium or Small depending on the limits for investment, number of employees, balance sheet and total turnover.  ... 
doi:10.12948/issn14531305/19.3.2015.08 fatcat:cy6i72y5czhv3imn4srg33vw3q

The Good, The Bad and The Missing: A Narrative Review of Cyber-security Implications for Australian Small Businesses

Tracy Tam, Asha Rao, Joanne Hall
2021 Computers & security  
We conclude that there is a gap in current research in small business cyber-security. In addition, legal and policy work are needed to help small businesses become cyber-resilient.  ...  Our research shows that some small business characteristics, such as agility, large cohort size, and piecemeal IT architecture, could allow for increased cyber-security.  ...  A series of interviews from a single study [87] shows that small scale IT users have constraints in security decision making that are not expected by technical security providers.  ... 
doi:10.1016/j.cose.2021.102385 fatcat:gsbvjzppzjec3an6x57wy4u6le

Present status and problem confrontation of Dyke vegetable production at freshwater ghers of Bagerhat district in Bangladesh

Jafrin Akter, Mohammad Bashir Ahmed, Md Abdul Mannan, Md Matiul Islam, Asit Baran Mondal
2019 Research in Agriculture, Livestock and Fisheries  
86.9%) of the respondents had medium to large sized Dykes, and thus the respondents could bring their Dyke area under vegetables cultivation instead of keeping fallow year after year.  ...  The gher owners who have large sized Dyke in ghers continued production due to high quantity of cumulative profit.  ...  The amount of small and medium size Dyke area in ghers reduces compared to large Dyke area due to low production, which is not profitably sufficient to continue gher farming in small to medium scale.  ... 
doi:10.3329/ralf.v6i1.41387 fatcat:jn4sptzbiffvvazumlp3rvyqa4

Crime reporting practices among traders at Alaba International Market, Lagos

Johnson Ayodele
2018 Temida  
These were complemented by qualitative data collected through In-depth Interviews and Focus Group Discussions with purposively selected participants. The data were analyzed.  ...  Therefore, the aim of the current study is to examine the influence of business crimes reporting practices among traders on the development of the Alaba International Market, the traders and national economy  ...  For example, a wide-ranging survey of small and medium-sized businesses in Dublin city has estimated that crimes against business cost them 1.83 billion euro annually (Paul, 2016) .  ... 
doi:10.2298/tem1801131a fatcat:ffa6u2cs2bcevhqzvuw7i4daeq

Factors Affecting Information Security Focused on SME and Agricultural Enterprises

V. Bolek, A. Látečková, A. Romanová, F. Korček
2016 Agris on-line Papers in Economics and Informatics  
The ICT in small and medium-sized enterprises (SME) and agricultural enterprises is the source of several advantages as well as the risks resulting from information security violation and security incidents  ...  Furthermore, the paper provides results of a survey focusing on identification and evaluation of the effects of internal and external factors affecting existence of risks in information security in Slovak  ...  Acknowledgements The knowledge presented in the paper was obtained as a result of the Grant VEGA 1/0489/15, Increasing the efficiency of decision making by managers with the support of information systems  ... 
doi:10.7160/aol.2016.080404 fatcat:nk4ecikgznbqhhvtmec6joq7yi

The Use of Digital Technology Platforms in the Context of Cybersecurity in the Industrial Sector

Krzysztof Bartczak
2021 Foundations of Management  
This study discusses the use of digital technology platforms (DTPs) in the context of cyber-security in the industrial sector, with a focus on digital industry (industrial) platforms (DIPs).  ...  The subsequent section of the study is based on results of the author's own survey which collected information from a total of 120 companies operating in Poland, which were granted subsidies under the  ...  One hundred and twenty interviews were conducted, 49 enterprises refused to participate in the study, 2 enterprises declared that they did not implement any platforms, and the interviews were not completed  ... 
doi:10.2478/fman-2021-0009 fatcat:durdkscvbffg5ja7la5ouaptv4

Factors That Influence Adoption of Cloud Computing: An Empirical Study of Australian SMEs

Ishan Senarathna, Carla Wilkin, Matthew Warren, William Yeoh, Scott Salzman
2018 Australasian Journal of Information Systems  
It provides Small and Medium-sized Enterprises (SMEs) with opportunities to become as technologically advanced as their larger counterparts, without significant financial outlays.  ...  Cloud computing is a recent computing paradigm enabling organizations to have access to sophisticated computing services via the Internet on a fee-for-service basis.  ...  Context: Small and Medium-Sized Enterprises (SMEs) Given no universal definition of SMEs, as this study was conducted in Australia, we adopted the ABS' definition i.e., SMEs employ less than 200 people  ... 
doi:10.3127/ajis.v22i0.1603 fatcat:feehp6gqcvelpiy4alvwixwhfq

Under the Corporate Radar: Examining Insider Business Cybercrime Victimization through an Application of Routine Activities Theory

Matthew L. Williams, Michael Levi, Pete Burnap, R.V. Gundur
2018 Deviant Behavior  
Cybercrime is recognized as one of the top threats to UK economic security. On a daily basis, the computer networks of businesses suffer security breaches.  ...  , using routine activities and guardianship measures as predictors.  ...  Company directors were typically interviewed in micro and small businesses, while IT and security managers were typically interviewed in medium-sized and large-sized businesses.  ... 
doi:10.1080/01639625.2018.1461786 fatcat:em5mu4krdngp3cuhatxwd6dlty

A Framework for ERP Systems in SME Based on Cloud Computing Technology

Ahmed A. Al-Johani, Ahmed E. Youssef
2013 International Journal on Cloud Computing Services and Architecture  
Present Enterprise Resource Planning (ERP) offers expensive models which are hard to implement in Small and Medium Enterprises (SME) due to budget limitations.  ...  Finally, the feasibility and efficiency of the proposed framework is tested through the study of the ERP system in "Awal" Company.  ...  His final report showed that cost and security are major concerns for enterprises, especially, the large ones.  ... 
doi:10.5121/ijccsa.2013.3301 fatcat:pzoorkapbrhm5cnmtrdy2avw7a
« Previous Showing results 1 — 15 out of 14,766 results