599
Views
35
CrossRef citations to date
0
Altmetric
Security, Ethics, and Legal Issues

Information Security Threats and Practices in Small Businesses

, , , &

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (9)

Obi Ogbanufe & Dan J. Kim. (2018) “Just how risky is it anyway?” The role of risk perception and trust on click-through intention. Information Systems Management 35:3, pages 182-200.
Read now
Bartlomiej Hanus & Yu “Andy” Wu. (2016) Impact of Users’ Security Awareness on Desktop Security Behavior: A Protection Motivation Theory Perspective. Information Systems Management 33:1, pages 2-16.
Read now
Jaideep Ghosh. (2009) Software Development of a Globally Distributed Multicomponent Project: A Theoretical Model and Simulations. Journal of Global Information Technology Management 12:3, pages 29-54.
Read now
Mary Sumner. (2009) Information Security Threats: A Comparative Analysis of Impact, Probability, and Preparedness. Information Systems Management 26:1, pages 2-12.
Read now
Alice M. Johnson. (2009) Business and Security Executives Views of Information Security Investment Drivers: Results from a Delphi Study. Journal of Information Privacy and Security 5:1, pages 3-27.
Read now
B. Dawn Medlin & Adriana Romaniello. (2007) An Investigative Study: Health Care Workers as Security Threat Suppliers. Journal of Information Privacy and Security 3:1, pages 30-46.
Read now
KennethJ. Knapp & WilliamR. Boulton. (2006) Cyber-Warfare Threatens Corporations: Expansion into Commercial Environments. Information Systems Management 23:2, pages 76-87.
Read now

Articles from other publishers (26)

Andrei Bonamigo, Camila Guimarães Frech & Ana Carolina Custódio Lopes. (2021) Value co-creation in the B2B context: a diagnosis of knowledge management based on multiple case studies. Journal of Business & Industrial Marketing 37:7, pages 1449-1462.
Crossref
Alladean Chidukwani, Sebastian Zander & Polychronis Koutsakis. (2022) A Survey on the Cyber Security of Small-to-Medium Businesses: Challenges, Research Focus and Recommendations. IEEE Access 10, pages 85701-85719.
Crossref
Pangondian Prederikus, Stefan Gendita Bunawan, Ford Lumban Gaol, Tokuro Matsuo & Andi Nugroho. 2022. Pervasive Computing and Social Networking. Pervasive Computing and Social Networking 721 732 .
Margareta Heidt, Jin P. Gerlach & Peter Buxmann. (2019) Investigating the Security Divide between SME and Large Companies: How SME Characteristics Influence Organizational IT Security Investments. Information Systems Frontiers 21:6, pages 1285-1305.
Crossref
Fahad Mira. (2019) A Review Paper of Malware Detection Using API Call Sequences. A Review Paper of Malware Detection Using API Call Sequences.
Saad Khan & Simon Parkinson. 2018. Guide to Vulnerability Analysis for Computer Networks and Systems. Guide to Vulnerability Analysis for Computer Networks and Systems 3 32 .
Jesse Kaukola, Jukka Ruohonen, Antti Tuomisto, Sami Hyrynsalmi & Ville Leppänen. (2017) Tightroping between APT and BCI in small enterprises. Information & Computer Security 25:3, pages 226-239.
Crossref
Sanjaya Mayadunne & Sungjune Park. (2016) An economic model to evaluate information security investment of risk-taking small and medium enterprises. International Journal of Production Economics 182, pages 519-530.
Crossref
M. Ramkumar. (2016) A modified ANP and fuzzy inference system based approach for risk assessment of in-house and third party e-procurement systems. Strategic Outsourcing: An International Journal 9:2, pages 159-188.
Crossref
Omondi John Opala, Shawon S. M. Rahman & Abdulhameed A. Alelaiwi. 2016. Web-Based Services. Web-Based Services 1283 1315 .
Sanghyun Kim, Geuna Kim & Aaron M. French. (2015) Relationships between need-pull/technology-push and information security management and the moderating role of regulatory pressure. Information Technology and Management 16:3, pages 173-192.
Crossref
Idris Gautama So, N.J. Setiadi, B. Papak & Rudy Aryanto. (2014) Action Design of Information Systems Security Governance for Bank Using COBIT 4.1 and Control Standard of ISO 27001. Advanced Materials Research 905, pages 663-668.
Crossref
Omondi John Opala, Shawon S. M. Rahman & Abdulhameed A. Alelaiwi. 2014. Handbook of Research on Architectural Trends in Service-Driven Computing. Handbook of Research on Architectural Trends in Service-Driven Computing 554 588 .
She-I Chang, Jung-Jei Su & Hsing-Jung Li. (2013) Risk Assessment Mechanism for Personal Information Operations -- Case Study by Hospital. Risk Assessment Mechanism for Personal Information Operations -- Case Study by Hospital.
Brahim Herbane. (2012) Exploring Crisis Management in UK Small‐ and Medium‐Sized Enterprises . Journal of Contingencies and Crisis Management 21:2, pages 82-95.
Crossref
Omondi John Opala & Syed M. Rahman. (2013) An exploratory analysis of the influence of information security on the adoption of cloud computing. An exploratory analysis of the influence of information security on the adoption of cloud computing.
Reyes Gonzalez, Juan Llopis & Jose Gasco. (2013) Information systems offshore outsourcing: managerial conclusions from academic research. International Entrepreneurship and Management Journal 9:2, pages 229-259.
Crossref
John McGaha. 2013. User-Driven Healthcare. User-Driven Healthcare 1236 1251 .
Peggy E. Chaudhry, Sohail S. Chaudhry, Kevin D. Clark & Darryl S. Jones. 2013. Enterprise Information Systems of the Future. Enterprise Information Systems of the Future 206 214 .
Peggy E. Chaudhry, Sohail S. Chaudhry, Ronald Reese & Darryl S. Jones. 2012. Re-conceptualizing Enterprise Information Systems. Re-conceptualizing Enterprise Information Systems 118 128 .
John McGaha. 2011. Ethical Issues and Security Monitoring Trends in Global Healthcare. Ethical Issues and Security Monitoring Trends in Global Healthcare 50 65 .
Brahim Herbane. (2010) Small business research: Time for a crisis-based view. International Small Business Journal: Researching Entrepreneurship 28:1, pages 43-64.
Crossref
Chaogai Xue & Haiwang Cao. (2008) A study on self-reconfiguration of software system based on formal representation. A study on self-reconfiguration of software system based on formal representation.
Alison Hedrick. (2007) Cyberinsurance. Cyberinsurance.
Janne Merete Hagen, Tormod Kalberg Sivertsen & Chungming Rong. (2007) Information Security Threats and Access Control Practices in Norwegian Businesses. Information Security Threats and Access Control Practices in Norwegian Businesses.
Arthur Jung‐Ting Chang & Quey‐Jen Yeh. (2006) On security preparations against possible IS threats across industries. Information Management & Computer Security 14:4, pages 343-360.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.