Mind the gap: exploring perceptions of cyber security in the SME context
Saved in:
Published in | Information and computer security |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
26.06.2025
|
Online Access | Get full text |
Cover
Loading…
Author | Irons, Alastair Button, Dominic James McDonald, Sharon Ophoff, Jacques |
---|---|
Author_xml | – sequence: 1 givenname: Dominic James surname: Button fullname: Button, Dominic James – sequence: 2 givenname: Jacques surname: Ophoff fullname: Ophoff, Jacques – sequence: 3 givenname: Alastair surname: Irons fullname: Irons, Alastair – sequence: 4 givenname: Sharon surname: McDonald fullname: McDonald, Sharon |
BookMark | eNo90DFPwzAUBGALFYlSujP6Dxie7SR22FBUaKVWDAWJzbKdlxJUnMgOUvPvIYCY7pa74bsks9AFJOSaww3noG831Z6BYAJEzgAydUbmAvKCZaV6nf33gl-QZUrvAMBLXsiCz8l614aaDm9ID7a_o3jqj11sw4H2GD32Q9uFRLuG-tFhpAn9Z2yHkbbhZ7PfrajvwoCn4YqcN_aYcPmXC_LysHqu1mz79Lip7rfM81IPrM4z652yupFlbi13ngsna10XXucoMwWS28aJkpcKNYJwtddaSVR545yWckHg99fHLqWIjelj-2HjaDiYCcN8YxgQZsIwE4b8Apq6VB4 |
Cites_doi | 10.1016/j.cose.2009.12.005 10.1108/ICS-01-2020-0014 10.1080/07421222.2017.1394083 10.1016/j.comnet.2012.11.023 10.1080/23738871.2018.1550523 10.1016/S1361-3723(20)30019-1 10.1016/0022-1031(83)90023-9 10.1080/07421222.2020.1790187 10.1037/emo0000508 10.1177/1609406917733847 10.1016/j.ijhcs.2018.11.003 10.1191/1478088706qp063oa 10.63180/jcsra.thestap.2024.1.3 10.1108/ICS-01-2019-0010 |
ContentType | Journal Article |
DBID | AAYXX CITATION |
DOI | 10.1108/ICS-02-2025-0047 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 2056-497X |
ExternalDocumentID | 10_1108_ICS_02_2025_0047 |
GroupedDBID | .WU 3FY 5VS 7WY 9F- AAGBP AAKOT AAMCF AAUDR AAXBI AAYXX ABIJV ABJNI ABSDC ABYQI ACGFS ACTSA ACZKX ADBBV ADOMW ADQHX ADWNT AFNTC AFZLO AGTVX AHMHQ AILOG AJEBP ALIPV ALMA_UNASSIGNED_HOLDINGS ALSLI AODMV ARAPS AUCOK BENPR CITATION EBS ECCUG FNNZZ GEA GEI GMX GQ. H13 HCIFZ K6~ KBGRL M0O M1O M42 PQBIZ SLOBJ TEM TGG TMF TMI TMT Z11 Z12 Z21 ZYZAG |
ID | FETCH-LOGICAL-c198t-d54acb7a8f395aa1bc12b3d8d6c85e347031afb29197e8e02bdc8873e75fbb833 |
IEDL.DBID | GEI |
ISSN | 2056-4961 |
IngestDate | Thu Jul 03 08:36:59 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Language | English |
License | https://www.emerald.com/insight/site-policies |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c198t-d54acb7a8f395aa1bc12b3d8d6c85e347031afb29197e8e02bdc8873e75fbb833 |
ParticipantIDs | crossref_primary_10_1108_ICS_02_2025_0047 |
PublicationCentury | 2000 |
PublicationDate | 2025-06-26 |
PublicationDateYYYYMMDD | 2025-06-26 |
PublicationDate_xml | – month: 06 year: 2025 text: 2025-06-26 day: 26 |
PublicationDecade | 2020 |
PublicationTitle | Information and computer security |
PublicationYear | 2025 |
References | (key2025062412181776800_ref024) 2020; 2020 (key2025062412181776800_ref035) 2021; 1 (key2025062412181776800_ref044) 2019 key2025062412181776800_ref013 key2025062412181776800_ref055 (key2025062412181776800_ref026) 2017; 34 (key2025062412181776800_ref007) 2006; 3 key2025062412181776800_ref017 (key2025062412181776800_ref052) 2008; 1 (key2025062412181776800_ref028) 2017; 14 (key2025062412181776800_ref011) 2013 (key2025062412181776800_ref022) 2023 key2025062412181776800_ref053 (key2025062412181776800_ref046) 2024; 32 key2025062412181776800_ref050 (key2025062412181776800_ref002) 2021 (key2025062412181776800_ref034) 2023 (key2025062412181776800_ref032) 2020; 19 (key2025062412181776800_ref009) 2018; 3 (key2025062412181776800_ref043) 2015 (key2025062412181776800_ref023) 2016 (key2025062412181776800_ref054) 2021 key2025062412181776800_ref049 key2025062412181776800_ref047 (key2025062412181776800_ref001) 2010; 29 (key2025062412181776800_ref027) 2013 key2025062412181776800_ref048 (key2025062412181776800_ref038) 2020; 28 key2025062412181776800_ref041 key2025062412181776800_ref042 (key2025062412181776800_ref031) 2017; 16 key2025062412181776800_ref029 (key2025062412181776800_ref037) 2021; 29 (key2025062412181776800_ref004) 2019; 27 (key2025062412181776800_ref015) 2020; 23 (key2025062412181776800_ref040) 2021 key2025062412181776800_ref033 (key2025062412181776800_ref012) 2005 (key2025062412181776800_ref025) 1983; 19 (key2025062412181776800_ref021) 2013; 57 key2025062412181776800_ref030 (key2025062412181776800_ref003) 2024; 141 (key2025062412181776800_ref045) 2022; 63 (key2025062412181776800_ref039) 2020; 37 (key2025062412181776800_ref010) 2019; 19 key2025062412181776800_ref018 key2025062412181776800_ref019 (key2025062412181776800_ref006) 2019; 123 (key2025062412181776800_ref008) 2025 (key2025062412181776800_ref005) 2019 (key2025062412181776800_ref051) 2023; 64 (key2025062412181776800_ref016) 2020 key2025062412181776800_ref020 (key2025062412181776800_ref014) 2017; 15 (key2025062412181776800_ref036) 2023 |
References_xml | – ident: key2025062412181776800_ref013 – year: 2023 ident: key2025062412181776800_ref036 article-title: Unaware, unfunded and uneducated: a systematic review of SME cybersecurity – start-page: 1 year: 2021 ident: key2025062412181776800_ref040 article-title: Classifying SMEs for approaching cyber security competence and awareness – volume-title: In 2019 IEEE 24th International workshop on Computer Aided Modeling and Design of Communication Links and Networks. year: 2019 ident: key2025062412181776800_ref044 article-title: Cyber security in SMEs: the smarthome/office use case – ident: key2025062412181776800_ref017 – volume: 63 start-page: 397 issue: 2 year: 2022 ident: key2025062412181776800_ref045 article-title: It won’t happen to me: surveying SME attitudes to cyber-security publication-title: Journal of Computer Information Systems – volume: 14 issue: 3 year: 2017 ident: key2025062412181776800_ref028 article-title: Snowball sampling: a purposeful method of sampling in qualitative research publication-title: Strides in Development of Medical Education – ident: key2025062412181776800_ref055 – volume: 19 year: 2020 ident: key2025062412181776800_ref032 article-title: Intercoder reliability in qualitative research: debates and practical guidelines publication-title: International Journal of Qualitative Methods – year: 2021 ident: key2025062412181776800_ref054 article-title: Change that respects business expertise: stories as prompts for a conversation about organisation security – year: 2023 ident: key2025062412181776800_ref034 article-title: Perspective of small and medium enterprises (SMEs) and their relationship with government in overcoming cyber security challenges and barriers in Wales publication-title: Computers and Education – volume: 29 start-page: 432 issue: 4 year: 2010 ident: key2025062412181776800_ref001 article-title: Improving information security awareness and behaviour through dialogue, participation and collective reflection: an intervention study publication-title: Computers and Security doi: 10.1016/j.cose.2009.12.005 – volume: 1 start-page: 445 year: 2008 ident: key2025062412181776800_ref052 article-title: Inter- and intracoder reliability publication-title: International Encyclopaedia of Qualitative Research – volume: 29 start-page: 263 issue: 2 year: 2021 ident: key2025062412181776800_ref037 article-title: SME executives’ perceptions and the information security preparedness model publication-title: Information and Computer Security doi: 10.1108/ICS-01-2020-0014 – ident: key2025062412181776800_ref041 – volume: 23 start-page: 265 issue: 3 year: 2020 ident: key2025062412181776800_ref015 article-title: Scoping the ethical principles of cyber security fear appeals publication-title: Ethics and Information Technology – volume: 34 start-page: 1203 issue: 4 year: 2017 ident: key2025062412181776800_ref026 article-title: User motivations in protecting information security: protection motivation theory versus self-determination theory publication-title: Journal of Management Information Systems doi: 10.1080/07421222.2017.1394083 – ident: key2025062412181776800_ref049 – ident: key2025062412181776800_ref033 – year: 2021 ident: key2025062412181776800_ref002 article-title: The severity and effects of cyber-breaches in SMEs: a machine learning approach publication-title: Enterprise Information Systems – volume-title: Understanding Your Users year: 2005 ident: key2025062412181776800_ref012 – volume: 64 start-page: 1 issue: 6 year: 2023 ident: key2025062412181776800_ref051 article-title: Cyber security resilience in SMEs: a machine learning approach publication-title: Journal of Computer Information Systems – start-page: 65 year: 2016 ident: key2025062412181776800_ref023 article-title: The cyber-doom effect: the impact of fear appeals in the US cyber security debate – ident: key2025062412181776800_ref048 – volume: 57 start-page: 2206 issue: 10 year: 2013 ident: key2025062412181776800_ref021 article-title: Understanding and overcoming cyber security anti-patterns publication-title: Computer Networks doi: 10.1016/j.comnet.2012.11.023 – volume: 3 start-page: 430 issue: 3 year: 2018 ident: key2025062412181776800_ref009 article-title: UK cyber security industrial policy: an analysis of drivers, market failures and interventions publication-title: Journal of Cyber Policy doi: 10.1080/23738871.2018.1550523 – volume: 2020 start-page: 14 issue: 2 year: 2020 ident: key2025062412181776800_ref024 article-title: The business benefits of cyber security for SMEs publication-title: Computer Fraud and Security doi: 10.1016/S1361-3723(20)30019-1 – volume: 19 start-page: 469 issue: 5 year: 1983 ident: key2025062412181776800_ref025 article-title: Protection motivation and self-efficacy: a revised theory of fear appeals and attitude change publication-title: Journal of Experimental Social Psychology doi: 10.1016/0022-1031(83)90023-9 – volume: 37 start-page: 723 issue: 3 year: 2020 ident: key2025062412181776800_ref039 article-title: The effectiveness of abstract versus concrete fear appeals in information security publication-title: Journal of Management Information Systems doi: 10.1080/07421222.2020.1790187 – volume: 19 start-page: 1353 issue: 8 year: 2019 ident: key2025062412181776800_ref010 article-title: Functional divergence of two threat-induced emotions: Fear-based versus anxiety-based cyber security preferences publication-title: Emotion doi: 10.1037/emo0000508 – year: 2023 ident: key2025062412181776800_ref022 article-title: Cyber security in SMEs – drivers of cybercrime, insufficient equipment and prevention – ident: key2025062412181776800_ref030 – ident: key2025062412181776800_ref053 – ident: key2025062412181776800_ref019 – volume: 15 start-page: 191 year: 2017 ident: key2025062412181776800_ref014 article-title: Failed herd immunity: American business compliance and the United States cyber-security policy’s clash with the European Union’s general data protection act publication-title: Loyola University Chicago International Law Review – volume-title: Nature of Cyber Security year: 2019 ident: key2025062412181776800_ref005 – year: 2015 ident: key2025062412181776800_ref043 article-title: Appealing to fear: a meta-analysis of fear appeal effectiveness and theories – ident: key2025062412181776800_ref047 – ident: key2025062412181776800_ref050 – volume: 1 start-page: 24 issue: 1 year: 2021 ident: key2025062412181776800_ref035 article-title: A cyber situational awareness model to predict the implementation of cyber security controls and precautions by SMEs publication-title: Organizational Cybersecurity Journal: Practice, Process and People – volume: 141 year: 2024 ident: key2025062412181776800_ref003 article-title: Revealing the realities of cybercrime in small and medium enterprises: understanding fear and taxonomic perspective publication-title: Computers and Security – volume: 32 start-page: 45 issue: 5 year: 2024 ident: key2025062412181776800_ref046 article-title: Cybersecurity, cyber insurance and small-to-medium-sized enterprises: a systematic review publication-title: Information and Computer Security – volume: 16 start-page: 1 issue: 1 year: 2017 ident: key2025062412181776800_ref031 article-title: Thematic analysis: striving to meet the trustworthiness criteria publication-title: International Journal of Qualitative Methods doi: 10.1177/1609406917733847 – volume: 123 start-page: 29 year: 2019 ident: key2025062412181776800_ref006 article-title: Using protection motivation theory in the design of nudges to improve online security behaviour publication-title: International Journal of Human-Computer Studies doi: 10.1016/j.ijhcs.2018.11.003 – volume: 3 start-page: 77 issue: 2 year: 2006 ident: key2025062412181776800_ref007 article-title: Using thematic analysis in psychology publication-title: Qualitative Research in Psychology doi: 10.1191/1478088706qp063oa – volume-title: Successful Qualitative Research: A Practical Guide for Beginners year: 2013 ident: key2025062412181776800_ref011 – ident: key2025062412181776800_ref018 – volume: 27 start-page: 303 issue: 3 year: 2019 ident: key2025062412181776800_ref004 article-title: Developing cyber security education and awareness programmes for small and medium-sized enterprises (SMEs) publication-title: Information and Computer Security – ident: key2025062412181776800_ref020 doi: 10.63180/jcsra.thestap.2024.1.3 – volume-title: Qualitative Research in Business and Management year: 2013 ident: key2025062412181776800_ref027 – start-page: 21 year: 2020 ident: key2025062412181776800_ref016 article-title: Act now to solve the cyber skills gap: the UK government is attempting to address the lack of skills in the cyber security space - but should it be doing more? publication-title: Computer Weekly – volume: 28 start-page: 467 issue: 3 year: 2020 ident: key2025062412181776800_ref038 article-title: It is not my job: exploring the disconnect between corporate security policies and actual security practices in SMEs publication-title: Information and Computer Security doi: 10.1108/ICS-01-2019-0010 – ident: key2025062412181776800_ref029 – ident: key2025062412181776800_ref042 – start-page: 101 volume-title: Human Aspects of Information Security and Assurance year: 2025 ident: key2025062412181776800_ref008 article-title: Probably put some sort of fear in’: investigating the role of heuristics in cyber awareness messaging for small to medium-sized enterprises |
SSID | ssj0001916361 |
Score | 2.374596 |
SecondaryResourceType | online_first |
SourceID | crossref |
SourceType | Index Database |
Title | Mind the gap: exploring perceptions of cyber security in the SME context |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1JT8JAFJ4gXryIa1zJHLx4KLSdpVNvhIBoAhckQS7NbFWiFiIlUX-9My2jxHgx8T4zmb55eVvf9z0ALrBmOo0V9xTRzMOcIY-lBHvIgjYVC6JIWnByf0B7I3w7JuMKGDgsTNFWWZZjCjs9zRY2SW3axm1jhb8IB-z0mpv2sAAX24mslvWwaSvWzcf85XnDaDqJHPTXVVxMJIQKAtXQeH0PxzRw_y1_OWzNT605nG4NzNxVyz6Tp8YyFw358YPF8f--ZQdsr2JT2CqVaRdUdLYHam7uA1yZgX3Q65tEHprIET7w-RXUro0Pzr-7ZOAshfJdmG2L1YQ8OM2KPcN-BxZ3e8sPwKjbuWv3vNVEBk8GMcvNg2IuRcRZimLCeSBkEAqkmKKSEY2wJcPnqQjjII6MEvihUNJYMaQjkgrBEDoE1WyW6SMAaapCGlmLwnwsIszNSZQrrKmSviboGFw6-SfzkngjKRIWnyVGWIkfJlZYiRXWyR_WnoKtUsjUC-kZqOavS31u4opc1At1qYPNyf2kdf0JgIDJVQ |
linkProvider | Emerald |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Mind+the+gap%3A+exploring+perceptions+of+cyber+security+in+the+SME+context&rft.jtitle=Information+and+computer+security&rft.au=Button%2C+Dominic+James&rft.au=Ophoff%2C+Jacques&rft.au=Irons%2C+Alastair&rft.au=McDonald%2C+Sharon&rft.date=2025-06-26&rft.issn=2056-4961&rft.eissn=2056-497X&rft_id=info:doi/10.1108%2FICS-02-2025-0047&rft.externalDBID=n%2Fa&rft.externalDocID=10_1108_ICS_02_2025_0047 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2056-4961&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2056-4961&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2056-4961&client=summon |