Mind the gap: exploring perceptions of cyber security in the SME context

Saved in:
Bibliographic Details
Published inInformation and computer security
Main Authors Button, Dominic James, Ophoff, Jacques, Irons, Alastair, McDonald, Sharon
Format Journal Article
LanguageEnglish
Published 26.06.2025
Online AccessGet full text

Cover

Loading…
Author Irons, Alastair
Button, Dominic James
McDonald, Sharon
Ophoff, Jacques
Author_xml – sequence: 1
  givenname: Dominic James
  surname: Button
  fullname: Button, Dominic James
– sequence: 2
  givenname: Jacques
  surname: Ophoff
  fullname: Ophoff, Jacques
– sequence: 3
  givenname: Alastair
  surname: Irons
  fullname: Irons, Alastair
– sequence: 4
  givenname: Sharon
  surname: McDonald
  fullname: McDonald, Sharon
BookMark eNo90DFPwzAUBGALFYlSujP6Dxie7SR22FBUaKVWDAWJzbKdlxJUnMgOUvPvIYCY7pa74bsks9AFJOSaww3noG831Z6BYAJEzgAydUbmAvKCZaV6nf33gl-QZUrvAMBLXsiCz8l614aaDm9ID7a_o3jqj11sw4H2GD32Q9uFRLuG-tFhpAn9Z2yHkbbhZ7PfrajvwoCn4YqcN_aYcPmXC_LysHqu1mz79Lip7rfM81IPrM4z652yupFlbi13ngsna10XXucoMwWS28aJkpcKNYJwtddaSVR545yWckHg99fHLqWIjelj-2HjaDiYCcN8YxgQZsIwE4b8Apq6VB4
Cites_doi 10.1016/j.cose.2009.12.005
10.1108/ICS-01-2020-0014
10.1080/07421222.2017.1394083
10.1016/j.comnet.2012.11.023
10.1080/23738871.2018.1550523
10.1016/S1361-3723(20)30019-1
10.1016/0022-1031(83)90023-9
10.1080/07421222.2020.1790187
10.1037/emo0000508
10.1177/1609406917733847
10.1016/j.ijhcs.2018.11.003
10.1191/1478088706qp063oa
10.63180/jcsra.thestap.2024.1.3
10.1108/ICS-01-2019-0010
ContentType Journal Article
DBID AAYXX
CITATION
DOI 10.1108/ICS-02-2025-0047
DatabaseName CrossRef
DatabaseTitle CrossRef
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 2056-497X
ExternalDocumentID 10_1108_ICS_02_2025_0047
GroupedDBID .WU
3FY
5VS
7WY
9F-
AAGBP
AAKOT
AAMCF
AAUDR
AAXBI
AAYXX
ABIJV
ABJNI
ABSDC
ABYQI
ACGFS
ACTSA
ACZKX
ADBBV
ADOMW
ADQHX
ADWNT
AFNTC
AFZLO
AGTVX
AHMHQ
AILOG
AJEBP
ALIPV
ALMA_UNASSIGNED_HOLDINGS
ALSLI
AODMV
ARAPS
AUCOK
BENPR
CITATION
EBS
ECCUG
FNNZZ
GEA
GEI
GMX
GQ.
H13
HCIFZ
K6~
KBGRL
M0O
M1O
M42
PQBIZ
SLOBJ
TEM
TGG
TMF
TMI
TMT
Z11
Z12
Z21
ZYZAG
ID FETCH-LOGICAL-c198t-d54acb7a8f395aa1bc12b3d8d6c85e347031afb29197e8e02bdc8873e75fbb833
IEDL.DBID GEI
ISSN 2056-4961
IngestDate Thu Jul 03 08:36:59 EDT 2025
IsPeerReviewed true
IsScholarly true
Language English
License https://www.emerald.com/insight/site-policies
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c198t-d54acb7a8f395aa1bc12b3d8d6c85e347031afb29197e8e02bdc8873e75fbb833
ParticipantIDs crossref_primary_10_1108_ICS_02_2025_0047
PublicationCentury 2000
PublicationDate 2025-06-26
PublicationDateYYYYMMDD 2025-06-26
PublicationDate_xml – month: 06
  year: 2025
  text: 2025-06-26
  day: 26
PublicationDecade 2020
PublicationTitle Information and computer security
PublicationYear 2025
References (key2025062412181776800_ref024) 2020; 2020
(key2025062412181776800_ref035) 2021; 1
(key2025062412181776800_ref044) 2019
key2025062412181776800_ref013
key2025062412181776800_ref055
(key2025062412181776800_ref026) 2017; 34
(key2025062412181776800_ref007) 2006; 3
key2025062412181776800_ref017
(key2025062412181776800_ref052) 2008; 1
(key2025062412181776800_ref028) 2017; 14
(key2025062412181776800_ref011) 2013
(key2025062412181776800_ref022) 2023
key2025062412181776800_ref053
(key2025062412181776800_ref046) 2024; 32
key2025062412181776800_ref050
(key2025062412181776800_ref002) 2021
(key2025062412181776800_ref034) 2023
(key2025062412181776800_ref032) 2020; 19
(key2025062412181776800_ref009) 2018; 3
(key2025062412181776800_ref043) 2015
(key2025062412181776800_ref023) 2016
(key2025062412181776800_ref054) 2021
key2025062412181776800_ref049
key2025062412181776800_ref047
(key2025062412181776800_ref001) 2010; 29
(key2025062412181776800_ref027) 2013
key2025062412181776800_ref048
(key2025062412181776800_ref038) 2020; 28
key2025062412181776800_ref041
key2025062412181776800_ref042
(key2025062412181776800_ref031) 2017; 16
key2025062412181776800_ref029
(key2025062412181776800_ref037) 2021; 29
(key2025062412181776800_ref004) 2019; 27
(key2025062412181776800_ref015) 2020; 23
(key2025062412181776800_ref040) 2021
key2025062412181776800_ref033
(key2025062412181776800_ref012) 2005
(key2025062412181776800_ref025) 1983; 19
(key2025062412181776800_ref021) 2013; 57
key2025062412181776800_ref030
(key2025062412181776800_ref003) 2024; 141
(key2025062412181776800_ref045) 2022; 63
(key2025062412181776800_ref039) 2020; 37
(key2025062412181776800_ref010) 2019; 19
key2025062412181776800_ref018
key2025062412181776800_ref019
(key2025062412181776800_ref006) 2019; 123
(key2025062412181776800_ref008) 2025
(key2025062412181776800_ref005) 2019
(key2025062412181776800_ref051) 2023; 64
(key2025062412181776800_ref016) 2020
key2025062412181776800_ref020
(key2025062412181776800_ref014) 2017; 15
(key2025062412181776800_ref036) 2023
References_xml – ident: key2025062412181776800_ref013
– year: 2023
  ident: key2025062412181776800_ref036
  article-title: Unaware, unfunded and uneducated: a systematic review of SME cybersecurity
– start-page: 1
  year: 2021
  ident: key2025062412181776800_ref040
  article-title: Classifying SMEs for approaching cyber security competence and awareness
– volume-title: In 2019 IEEE 24th International workshop on Computer Aided Modeling and Design of Communication Links and Networks.
  year: 2019
  ident: key2025062412181776800_ref044
  article-title: Cyber security in SMEs: the smarthome/office use case
– ident: key2025062412181776800_ref017
– volume: 63
  start-page: 397
  issue: 2
  year: 2022
  ident: key2025062412181776800_ref045
  article-title: It won’t happen to me: surveying SME attitudes to cyber-security
  publication-title: Journal of Computer Information Systems
– volume: 14
  issue: 3
  year: 2017
  ident: key2025062412181776800_ref028
  article-title: Snowball sampling: a purposeful method of sampling in qualitative research
  publication-title: Strides in Development of Medical Education
– ident: key2025062412181776800_ref055
– volume: 19
  year: 2020
  ident: key2025062412181776800_ref032
  article-title: Intercoder reliability in qualitative research: debates and practical guidelines
  publication-title: International Journal of Qualitative Methods
– year: 2021
  ident: key2025062412181776800_ref054
  article-title: Change that respects business expertise: stories as prompts for a conversation about organisation security
– year: 2023
  ident: key2025062412181776800_ref034
  article-title: Perspective of small and medium enterprises (SMEs) and their relationship with government in overcoming cyber security challenges and barriers in Wales
  publication-title: Computers and Education
– volume: 29
  start-page: 432
  issue: 4
  year: 2010
  ident: key2025062412181776800_ref001
  article-title: Improving information security awareness and behaviour through dialogue, participation and collective reflection: an intervention study
  publication-title: Computers and Security
  doi: 10.1016/j.cose.2009.12.005
– volume: 1
  start-page: 445
  year: 2008
  ident: key2025062412181776800_ref052
  article-title: Inter- and intracoder reliability
  publication-title: International Encyclopaedia of Qualitative Research
– volume: 29
  start-page: 263
  issue: 2
  year: 2021
  ident: key2025062412181776800_ref037
  article-title: SME executives’ perceptions and the information security preparedness model
  publication-title: Information and Computer Security
  doi: 10.1108/ICS-01-2020-0014
– ident: key2025062412181776800_ref041
– volume: 23
  start-page: 265
  issue: 3
  year: 2020
  ident: key2025062412181776800_ref015
  article-title: Scoping the ethical principles of cyber security fear appeals
  publication-title: Ethics and Information Technology
– volume: 34
  start-page: 1203
  issue: 4
  year: 2017
  ident: key2025062412181776800_ref026
  article-title: User motivations in protecting information security: protection motivation theory versus self-determination theory
  publication-title: Journal of Management Information Systems
  doi: 10.1080/07421222.2017.1394083
– ident: key2025062412181776800_ref049
– ident: key2025062412181776800_ref033
– year: 2021
  ident: key2025062412181776800_ref002
  article-title: The severity and effects of cyber-breaches in SMEs: a machine learning approach
  publication-title: Enterprise Information Systems
– volume-title: Understanding Your Users
  year: 2005
  ident: key2025062412181776800_ref012
– volume: 64
  start-page: 1
  issue: 6
  year: 2023
  ident: key2025062412181776800_ref051
  article-title: Cyber security resilience in SMEs: a machine learning approach
  publication-title: Journal of Computer Information Systems
– start-page: 65
  year: 2016
  ident: key2025062412181776800_ref023
  article-title: The cyber-doom effect: the impact of fear appeals in the US cyber security debate
– ident: key2025062412181776800_ref048
– volume: 57
  start-page: 2206
  issue: 10
  year: 2013
  ident: key2025062412181776800_ref021
  article-title: Understanding and overcoming cyber security anti-patterns
  publication-title: Computer Networks
  doi: 10.1016/j.comnet.2012.11.023
– volume: 3
  start-page: 430
  issue: 3
  year: 2018
  ident: key2025062412181776800_ref009
  article-title: UK cyber security industrial policy: an analysis of drivers, market failures and interventions
  publication-title: Journal of Cyber Policy
  doi: 10.1080/23738871.2018.1550523
– volume: 2020
  start-page: 14
  issue: 2
  year: 2020
  ident: key2025062412181776800_ref024
  article-title: The business benefits of cyber security for SMEs
  publication-title: Computer Fraud and Security
  doi: 10.1016/S1361-3723(20)30019-1
– volume: 19
  start-page: 469
  issue: 5
  year: 1983
  ident: key2025062412181776800_ref025
  article-title: Protection motivation and self-efficacy: a revised theory of fear appeals and attitude change
  publication-title: Journal of Experimental Social Psychology
  doi: 10.1016/0022-1031(83)90023-9
– volume: 37
  start-page: 723
  issue: 3
  year: 2020
  ident: key2025062412181776800_ref039
  article-title: The effectiveness of abstract versus concrete fear appeals in information security
  publication-title: Journal of Management Information Systems
  doi: 10.1080/07421222.2020.1790187
– volume: 19
  start-page: 1353
  issue: 8
  year: 2019
  ident: key2025062412181776800_ref010
  article-title: Functional divergence of two threat-induced emotions: Fear-based versus anxiety-based cyber security preferences
  publication-title: Emotion
  doi: 10.1037/emo0000508
– year: 2023
  ident: key2025062412181776800_ref022
  article-title: Cyber security in SMEs – drivers of cybercrime, insufficient equipment and prevention
– ident: key2025062412181776800_ref030
– ident: key2025062412181776800_ref053
– ident: key2025062412181776800_ref019
– volume: 15
  start-page: 191
  year: 2017
  ident: key2025062412181776800_ref014
  article-title: Failed herd immunity: American business compliance and the United States cyber-security policy’s clash with the European Union’s general data protection act
  publication-title: Loyola University Chicago International Law Review
– volume-title: Nature of Cyber Security
  year: 2019
  ident: key2025062412181776800_ref005
– year: 2015
  ident: key2025062412181776800_ref043
  article-title: Appealing to fear: a meta-analysis of fear appeal effectiveness and theories
– ident: key2025062412181776800_ref047
– ident: key2025062412181776800_ref050
– volume: 1
  start-page: 24
  issue: 1
  year: 2021
  ident: key2025062412181776800_ref035
  article-title: A cyber situational awareness model to predict the implementation of cyber security controls and precautions by SMEs
  publication-title: Organizational Cybersecurity Journal: Practice, Process and People
– volume: 141
  year: 2024
  ident: key2025062412181776800_ref003
  article-title: Revealing the realities of cybercrime in small and medium enterprises: understanding fear and taxonomic perspective
  publication-title: Computers and Security
– volume: 32
  start-page: 45
  issue: 5
  year: 2024
  ident: key2025062412181776800_ref046
  article-title: Cybersecurity, cyber insurance and small-to-medium-sized enterprises: a systematic review
  publication-title: Information and Computer Security
– volume: 16
  start-page: 1
  issue: 1
  year: 2017
  ident: key2025062412181776800_ref031
  article-title: Thematic analysis: striving to meet the trustworthiness criteria
  publication-title: International Journal of Qualitative Methods
  doi: 10.1177/1609406917733847
– volume: 123
  start-page: 29
  year: 2019
  ident: key2025062412181776800_ref006
  article-title: Using protection motivation theory in the design of nudges to improve online security behaviour
  publication-title: International Journal of Human-Computer Studies
  doi: 10.1016/j.ijhcs.2018.11.003
– volume: 3
  start-page: 77
  issue: 2
  year: 2006
  ident: key2025062412181776800_ref007
  article-title: Using thematic analysis in psychology
  publication-title: Qualitative Research in Psychology
  doi: 10.1191/1478088706qp063oa
– volume-title: Successful Qualitative Research: A Practical Guide for Beginners
  year: 2013
  ident: key2025062412181776800_ref011
– ident: key2025062412181776800_ref018
– volume: 27
  start-page: 303
  issue: 3
  year: 2019
  ident: key2025062412181776800_ref004
  article-title: Developing cyber security education and awareness programmes for small and medium-sized enterprises (SMEs)
  publication-title: Information and Computer Security
– ident: key2025062412181776800_ref020
  doi: 10.63180/jcsra.thestap.2024.1.3
– volume-title: Qualitative Research in Business and Management
  year: 2013
  ident: key2025062412181776800_ref027
– start-page: 21
  year: 2020
  ident: key2025062412181776800_ref016
  article-title: Act now to solve the cyber skills gap: the UK government is attempting to address the lack of skills in the cyber security space - but should it be doing more?
  publication-title: Computer Weekly
– volume: 28
  start-page: 467
  issue: 3
  year: 2020
  ident: key2025062412181776800_ref038
  article-title: It is not my job: exploring the disconnect between corporate security policies and actual security practices in SMEs
  publication-title: Information and Computer Security
  doi: 10.1108/ICS-01-2019-0010
– ident: key2025062412181776800_ref029
– ident: key2025062412181776800_ref042
– start-page: 101
  volume-title: Human Aspects of Information Security and Assurance
  year: 2025
  ident: key2025062412181776800_ref008
  article-title: Probably put some sort of fear in’: investigating the role of heuristics in cyber awareness messaging for small to medium-sized enterprises
SSID ssj0001916361
Score 2.374596
SecondaryResourceType online_first
SourceID crossref
SourceType Index Database
Title Mind the gap: exploring perceptions of cyber security in the SME context
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1JT8JAFJ4gXryIa1zJHLx4KLSdpVNvhIBoAhckQS7NbFWiFiIlUX-9My2jxHgx8T4zmb55eVvf9z0ALrBmOo0V9xTRzMOcIY-lBHvIgjYVC6JIWnByf0B7I3w7JuMKGDgsTNFWWZZjCjs9zRY2SW3axm1jhb8IB-z0mpv2sAAX24mslvWwaSvWzcf85XnDaDqJHPTXVVxMJIQKAtXQeH0PxzRw_y1_OWzNT605nG4NzNxVyz6Tp8YyFw358YPF8f--ZQdsr2JT2CqVaRdUdLYHam7uA1yZgX3Q65tEHprIET7w-RXUro0Pzr-7ZOAshfJdmG2L1YQ8OM2KPcN-BxZ3e8sPwKjbuWv3vNVEBk8GMcvNg2IuRcRZimLCeSBkEAqkmKKSEY2wJcPnqQjjII6MEvihUNJYMaQjkgrBEDoE1WyW6SMAaapCGlmLwnwsIszNSZQrrKmSviboGFw6-SfzkngjKRIWnyVGWIkfJlZYiRXWyR_WnoKtUsjUC-kZqOavS31u4opc1At1qYPNyf2kdf0JgIDJVQ
linkProvider Emerald
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Mind+the+gap%3A+exploring+perceptions+of+cyber+security+in+the+SME+context&rft.jtitle=Information+and+computer+security&rft.au=Button%2C+Dominic+James&rft.au=Ophoff%2C+Jacques&rft.au=Irons%2C+Alastair&rft.au=McDonald%2C+Sharon&rft.date=2025-06-26&rft.issn=2056-4961&rft.eissn=2056-497X&rft_id=info:doi/10.1108%2FICS-02-2025-0047&rft.externalDBID=n%2Fa&rft.externalDocID=10_1108_ICS_02_2025_0047
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2056-4961&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2056-4961&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2056-4961&client=summon