Citations (16)
Keep up to date with the latest research on this topic with citation updates for this article.
Read on this site (2)
Bilge Yigit Ozkan & Marco Spruit. (2023) Adaptable Security Maturity Assessment and Standardization for Digital SMEs. Journal of Computer Information Systems 63:4, pages 965-987.
Read now
Read now
Queen A. Aigbefo, Yvette Blount & Mauricio Marrone. (2022) The influence of hardiness and habit on security behaviour intention. Behaviour & Information Technology 41:6, pages 1151-1170.
Read now
Read now
Articles from other publishers (14)
Ana Pirca & Harjinder Singh Lallie. (2023) An Empirical Evaluation of the Effectiveness of Attack Graphs and MITRE ATT&CK Matrices in aiding Cyber Attack Perception Amongst Decision-Makers. Computers & Security, pages 103254.
Crossref
Crossref
Adnan Bin Amanat Ali, Ramesh Kumar Ayyasamy, Rehan Akbar, Vasaki Ap Ponnusamy & Lim Ean Heng. (2022) Cybersecurity Infrastructure adoption Model for Malware Mitigation in Small Medium Enterprises (SME). Cybersecurity Infrastructure adoption Model for Malware Mitigation in Small Medium Enterprises (SME).
Debora Irene Christine & Mamello Thinyane. 2022. Digital Transformation for Sustainability. Digital Transformation for Sustainability
573
597
.
Alireza Shojaifar & Heini Järvinen. (2021) Classifying SMEs for Approaching Cybersecurity Competence and Awareness. Classifying SMEs for Approaching Cybersecurity Competence and Awareness.
Max van Haastrecht, Injy Sarhan, Alireza Shojaifar, Louis Baumgartner, Wissam Mallouli & Marco Spruit. (2021) A Threat-Based Cybersecurity Risk Assessment Approach Addressing SME Needs. A Threat-Based Cybersecurity Risk Assessment Approach Addressing SME Needs.
Max van Haastrecht, Bilge Yigit Ozkan, Matthieu Brinkhuis & Marco Spruit. (2021) Respite for SMEs: A Systematic Review of Socio-Technical Cybersecurity Metrics. Applied Sciences 11:15, pages 6909.
Crossref
Crossref
Bilge Yigit Ozkan & Marco Spruit. 2020. Research Anthology on Artificial Intelligence Applications in Security. Research Anthology on Artificial Intelligence Applications in Security
1252
1278
.
Bilge Yigit Ozkan & Marco Spruit. 2020. Human Aspects of Information Security and Assurance. Human Aspects of Information Security and Assurance
161
174
.
Bilge Yigit Ozkan, Marco Spruit, Roland Wondolleck & Verónica Burriel Coll. (2019) Modelling adaptive information security for SMEs in a cluster. Journal of Intellectual Capital 21:2, pages 235-256.
Crossref
Crossref
Fatimah Alghamdi, Nermin Hamza & Moutasm Tamimi. (2019) Factors that Influence the Adoption of Information Security on Requirement Phase for Custom-Made Software at SMEs. Factors that Influence the Adoption of Information Security on Requirement Phase for Custom-Made Software at SMEs.
Bilge Yigit Ozkan & Marco Spruit. 2019. Information and Operational Technology Security Systems. Information and Operational Technology Security Systems
49
60
.
Osamah M. Al-Matari, Iman M.A. Helal, Sherif A. Mazen & Sherif Elhennawy. (2018) Cybersecurity Tools for IS Auditing. Cybersecurity Tools for IS Auditing.
Paméla Baillette & Yves Barlette. (2018) BYOD-related innovations and organizational change for entrepreneurs and their employees in SMEs. Journal of Organizational Change Management 31:4, pages 839-851.
Crossref
Crossref
Yves Barlette, Katherine Gundolf & Annabelle Jaouen. (2017) CEOs’ information security behavior in SMEs: Does ownership matter?. Systèmes d'information & management Volume 22:3, pages 7-45.
Crossref
Crossref