SME executives’ perceptions and the information security preparedness model

PurposeInformation security has increasingly been in the headlines as data breaches continue to occur at alarming rates. This paper aims to propose an Information Security Preparedness Model that was developed to examine how SME executives’ perceptions of security importance, implementation challeng...

Full description

Saved in:
Bibliographic Details
Published inInformation and computer security Vol. 29; no. 2; pp. 263 - 282
Main Authors Saban, Kenneth Albert, Rau, Stephen, Wood, Charles A.
Format Journal Article
LanguageEnglish
Published Bingley Emerald Group Publishing Limited 03.08.2021
Subjects
Online AccessGet full text
ISSN2056-4961
2056-497X
DOI10.1108/ICS-01-2020-0014

Cover

Abstract PurposeInformation security has increasingly been in the headlines as data breaches continue to occur at alarming rates. This paper aims to propose an Information Security Preparedness Model that was developed to examine how SME executives’ perceptions of security importance, implementation challenges and external influences impact their awareness and commitment to security preparedness.Design/methodology/approachFunded by the Department of Justice, a national survey of SME executives’ perceptions of information security preparedness was conducted. Using PLS-SEM, the survey responses were used to test the proposed Information Security Preparedness Model.FindingsThe results indicate that as perceptions of security importance and external influences increase, SME executives’ awareness and commitment to information security also increases. In addition, as implementation challenges increase, awareness and commitment to information security decreases. Finally, as security importance and awareness and commitment to information security increases, executives’ perception of security preparedness also increases.Research limitations/implicationsExecutive perceptions of information security were measured and not the actual level of security. Further research that examines the agreement between executive perceptions and the true state of information security within the organization is warranted.Originality/valuePrior information security studies using Roger’s (1975, 1983) Protection Motivation Theory have produced mixed results. This paper develops and tests the Information Security Preparedness Model to more fully explain SME executive’s perceptions of information security.
AbstractList PurposeInformation security has increasingly been in the headlines as data breaches continue to occur at alarming rates. This paper aims to propose an Information Security Preparedness Model that was developed to examine how SME executives’ perceptions of security importance, implementation challenges and external influences impact their awareness and commitment to security preparedness.Design/methodology/approachFunded by the Department of Justice, a national survey of SME executives’ perceptions of information security preparedness was conducted. Using PLS-SEM, the survey responses were used to test the proposed Information Security Preparedness Model.FindingsThe results indicate that as perceptions of security importance and external influences increase, SME executives’ awareness and commitment to information security also increases. In addition, as implementation challenges increase, awareness and commitment to information security decreases. Finally, as security importance and awareness and commitment to information security increases, executives’ perception of security preparedness also increases.Research limitations/implicationsExecutive perceptions of information security were measured and not the actual level of security. Further research that examines the agreement between executive perceptions and the true state of information security within the organization is warranted.Originality/valuePrior information security studies using Roger’s (1975, 1983) Protection Motivation Theory have produced mixed results. This paper develops and tests the Information Security Preparedness Model to more fully explain SME executive’s perceptions of information security.
Author Wood, Charles A.
Rau, Stephen
Saban, Kenneth Albert
Author_xml – sequence: 1
  givenname: Kenneth Albert
  surname: Saban
  fullname: Saban, Kenneth Albert
– sequence: 2
  givenname: Stephen
  surname: Rau
  fullname: Rau, Stephen
– sequence: 3
  givenname: Charles A.
  surname: Wood
  fullname: Wood, Charles A.
BookMark eNp1kMFKAzEQhoNUsNbePQY8r2aSJrs5SqlaaPFQBW8h2Z3FLe3umqRib76Gr-eTuGvFg-BphuH7Z5jvlAzqpkZCzoFdArDsaj5dJQwSzjhLGIPJERlyJlUy0enT4LdXcELGIaxZh2hQQsGQLFfLGcU3zHexesXw-f5BW_Q5trFq6kBtXdD4jLSqy8ZvbT-koYN9Ffe09dhaj0WNIdBtU-DmjByXdhNw_FNH5PFm9jC9Sxb3t_Pp9SLJBUBMhJLKaoDclc5Bwbh0PGforFQ6tQozLaBk2um0EBKLQjmbTjKts4xzISZOjMjFYW_rm5cdhmjWzc7X3UnDpUxBZCqTHcUOVO6bEDyWpvXV1vq9AWZ6b6bzZhiY3pvpvXUR9SeSV_H77ehttfk_-AX6xXRv
CitedBy_id crossref_primary_10_1016_j_cose_2024_103826
crossref_primary_10_1080_08874417_2022_2128937
crossref_primary_10_1109_ACCESS_2024_3373315
crossref_primary_10_1142_S021987702350027X
crossref_primary_10_1080_19393555_2024_2357310
Cites_doi 10.2307/249307
10.17705/1jais.00232
10.2307/25148702
10.1109/TEM.2003.817277
10.2307/249551
10.25300/MISQ/2015/39.4.5
10.1057/ejis.2009.11
10.1016/S0268-4012(02)00105-6
10.2307/25750691
10.1016/j.cose.2016.02.007
10.2308/isys-50704
10.1080/10705519909540118
10.2307/23044042
10.1108/ICS-12-2015-0048
10.2307/249690
10.25300/MISQ/2015/39.2.03
10.1287/isre.1070.0160
10.1016/B978-0-12-416550-2.50007-8
10.1016/0378-7206(91)90024-V
10.1007/s11747-014-0403-8
10.25300/MISQ/2015/39.1.06
10.1111/j.1540-5915.2012.00361.x
10.3917/sim.122.0115
10.1177/002224378101800104
10.1080/00223980.1975.9915803
10.1207/s15327906mbr0102_10
ContentType Journal Article
Copyright Emerald Publishing Limited 2021
Copyright_xml – notice: Emerald Publishing Limited 2021
DBID AAYXX
CITATION
0-V
0U~
1-H
7SC
7WY
7WZ
7XB
8AO
8FD
8FE
8FG
8FI
ABUWG
AFKRA
ALSLI
ARAPS
AZQEC
BENPR
BEZIV
BGLVJ
BGRYB
CCPQU
CNYFK
DWQXO
E3H
F2A
FYUFA
F~G
GNUQQ
HCIFZ
JQ2
K6~
K7-
L.-
L.0
L7M
L~C
L~D
M0C
M0N
M0O
M0T
M1O
P5Z
P62
PHGZM
PHGZT
PJZUB
PKEHL
PPXIY
PQBIZ
PQEST
PQGLB
PQQKQ
PQUKI
PRQQA
PYYUZ
Q9U
DOI 10.1108/ICS-01-2020-0014
DatabaseName CrossRef
ProQuest Social Sciences Premium Collection
Global News & ABI/Inform Professional
Trade PRO
Computer and Information Systems Abstracts
ProQuest ABI/INFORM Collection
ABI/INFORM Global (PDF only)
ProQuest Central (purchase pre-March 2016)
ProQuest Pharma Collection
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
Hospital Premium Collection
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Social Science Premium Collection
Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Central
Business Premium Collection
ProQuest Technology Collection (LUT)
Criminology Collection
ProQuest One Community College
Library & information science collection.
ProQuest Central
Library & Information Sciences Abstracts (LISA)
Library & Information Science Abstracts (LISA)
Health Research Premium Collection
ABI/INFORM Global (Corporate)
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
ProQuest Business Collection
Computer Science Database
ABI/INFORM Professional Advanced
ABI/INFORM Professional Standard
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
ABI/INFORM Global (OCUL)
Computing Database
ProQuest Criminal Justice
Healthcare Administration Database
Library Science Database
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic (New)
ProQuest Health & Medical Research Collection
ProQuest One Academic Middle East (New)
ProQuest One Health & Nursing
ProQuest One Business (OCUL)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest One Social Sciences
ABI/INFORM Collection China
ProQuest Central Basic
DatabaseTitle CrossRef
Computer Science Database
ProQuest Central Student
Library and Information Science Abstracts (LISA)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
SciTech Premium Collection
Trade PRO
ABI/INFORM Complete
Global News & ABI/Inform Professional
ProQuest One Applied & Life Sciences
Health Research Premium Collection
Health & Medical Research Collection
Library & Information Science Collection
ProQuest Central (New)
Advanced Technologies & Aerospace Collection
Business Premium Collection
Social Science Premium Collection
ABI/INFORM Global
ProQuest One Academic Eastern Edition
ProQuest Hospital Collection
ProQuest Technology Collection
ProQuest Business Collection
Criminology Collection
ProQuest Social Sciences Premium Collection
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest One Academic (New)
ABI/INFORM Global (Corporate)
ProQuest One Business
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest One Academic Middle East (New)
ProQuest Central (Alumni Edition)
ProQuest One Community College
ProQuest One Health & Nursing
ProQuest Pharma Collection
ProQuest Central
ABI/INFORM Professional Advanced
ProQuest Library Science
ProQuest Criminal Justice
ABI/INFORM Professional Standard
ProQuest Central Korea
Advanced Technologies Database with Aerospace
ProQuest Computing
ProQuest One Social Sciences
ProQuest Central Basic
ProQuest Health Management
ABI/INFORM China
ProQuest SciTech Collection
Computer and Information Systems Abstracts Professional
Advanced Technologies & Aerospace Database
DatabaseTitleList Computer Science Database
Database_xml – sequence: 1
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
Library & Information Science
Business
EISSN 2056-497X
EndPage 282
ExternalDocumentID 10_1108_ICS_01_2020_0014
GeographicLocations United States--US
GeographicLocations_xml – name: United States--US
GroupedDBID .WU
0-V
3FY
5VS
7WY
8AO
8FE
8FG
8FI
8FW
9F-
AAGBP
AAKOT
AAMCF
AAUDR
AAXBI
AAYXX
ABIJV
ABJNI
ABSDC
ABUWG
ABXQL
ABYQI
ACGFS
ACTSA
ACZKX
ADBBV
ADOMW
ADQHX
ADWNT
AFKRA
AFNTC
AFZLO
AGTVX
AHMHQ
AILOG
AJEBP
ALIPV
ALMA_UNASSIGNED_HOLDINGS
ALSLI
AODMV
AQUVI
ARALO
ARAPS
AUCOK
AZQEC
BENPR
BEZIV
BGLVJ
BGRYB
BPHCQ
BVXVI
CCPQU
CITATION
CNYFK
DWQXO
EBS
ECCUG
FNNZZ
FYUFA
GEA
GEI
GMX
GNUQQ
GQ.
H13
HCIFZ
K6V
K6~
K7-
KBGRL
M0C
M0O
M0T
M1O
M42
P62
PHGZM
PHGZT
PJZUB
PPXIY
PQBIZ
PQGLB
PQQKQ
PROAC
PRQQA
SCAQC
SDURG
SLOBJ
TEM
TGG
TMF
TMI
TMT
UKHRP
Z11
Z12
Z21
ZYZAG
.DC
0U~
1-H
29I
4.4
5GY
70U
77K
7SC
7XB
8FD
8R4
8R5
9E0
AAPSD
ABEAN
ACGFO
AEBZA
AEDOK
AEMMR
AETHF
AFNZV
AIAFM
AJFKA
APPLU
ATGMP
CS3
DU5
E3H
F2A
GEB
GEC
GMM
GMN
J1Y
JI-
JL0
JQ2
L.-
L.0
L7M
L~C
L~D
M0N
P2P
PKEHL
PQEST
PQUKI
Q2X
Q3A
Q9U
RWL
TAE
TDQ
TET
TMD
TMK
TMX
Z22
ID FETCH-LOGICAL-c311t-3656a911cbfbb1d025b2c0eba5697a6e8931f09b97d35edd6ba748998822334b3
IEDL.DBID 8FG
ISSN 2056-4961
IngestDate Mon Jun 30 14:37:56 EDT 2025
Thu Jul 31 00:43:11 EDT 2025
Thu Apr 24 23:09:18 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 2
Language English
License https://www.emerald.com/insight/site-policies
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c311t-3656a911cbfbb1d025b2c0eba5697a6e8931f09b97d35edd6ba748998822334b3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 2557138685
PQPubID 31135
PageCount 20
ParticipantIDs proquest_journals_2557138685
crossref_primary_10_1108_ICS_01_2020_0014
crossref_citationtrail_10_1108_ICS_01_2020_0014
PublicationCentury 2000
PublicationDate 20210803
PublicationDateYYYYMMDD 2021-08-03
PublicationDate_xml – month: 08
  year: 2021
  text: 20210803
  day: 03
PublicationDecade 2020
PublicationPlace Bingley
PublicationPlace_xml – name: Bingley
PublicationTitle Information and computer security
PublicationYear 2021
Publisher Emerald Group Publishing Limited
Publisher_xml – name: Emerald Group Publishing Limited
References (key2021080202131917300_ref017) 2009; 20
Ponemon Institute (key2021080202131917300_ref042) 2019
(key2021080202131917300_ref027) 2015; 43
(key2021080202131917300_ref026) 2014
(key2021080202131917300_ref039) 2015
(key2021080202131917300_ref051) 1998; 22
CISCO (key2021080202131917300_ref011) 2017
(key2021080202131917300_ref019) 2018
(key2021080202131917300_ref003) 2012; 17
(key2021080202131917300_ref050) 1990; 14
(key2021080202131917300_ref012) 1969
(key2021080202131917300_ref048) 1992
(key2021080202131917300_ref006) 2016; 59
(key2021080202131917300_ref014) 2014; 28
(key2021080202131917300_ref034) 2003; 23
(key2021080202131917300_ref025) 2018
(key2021080202131917300_ref035) 2005; 29
Wall Street Journal (key2021080202131917300_ref053) 2018
(key2021080202131917300_ref028) 1999; 6
(key2021080202131917300_ref037) 2010; 11
(key2021080202131917300_ref055) 1980
Ponemon Institute (key2021080202131917300_ref041) 2018
U.S. Congress (key2021080202131917300_ref052) 2017
(key2021080202131917300_ref031) 2010; 34
(key2021080202131917300_ref056) 2015
Information Technology and Innovation Foundation (ITIF) (key2021080202131917300_ref030) 2018
(key2021080202131917300_ref008) 2018
(key2021080202131917300_ref046) 1983
(key2021080202131917300_ref005) 1989; 4
(key2021080202131917300_ref021) 2003; 50
(key2021080202131917300_ref020) 1981; 18
(key2021080202131917300_ref002) 2008
(key2021080202131917300_ref024) 1991; 20
Stimulustech.com (key2021080202131917300_ref049) 2018
(key2021080202131917300_ref010) 1995; 19
(key2021080202131917300_ref004) 2017; 22
McCann Investigations LLC (key2021080202131917300_ref038) 2015
(key2021080202131917300_ref054) 2017
CSID (key2021080202131917300_ref015) 2016
(key2021080202131917300_ref001) 2017
(key2021080202131917300_ref040) 2015; 39
(key2021080202131917300_ref032) 2015; 39
(key2021080202131917300_ref047) 2011
(key2021080202131917300_ref022) 2011; 35
(key2021080202131917300_ref007) 2014
PricewaterhouseCoopers (key2021080202131917300_ref044) 2018
(key2021080202131917300_ref023) 2003
(key2021080202131917300_ref057) 1966; 1
(key2021080202131917300_ref036) 2009; 18
PricewaterhouseCoopers (key2021080202131917300_ref043) 2016
(key2021080202131917300_ref029) 2012; 43
(key2021080202131917300_ref013) 1988
(key2021080202131917300_ref045) 1975; 91
(key2021080202131917300_ref016) 2016; 24
(key2021080202131917300_ref009) 2015; 39
(key2021080202131917300_ref018) 2010
(key2021080202131917300_ref033) 1982
References_xml – year: 2017
  ident: key2021080202131917300_ref052
  article-title: Bill H.R.2015
– volume: 14
  start-page: 45
  issue: 1
  year: 1990
  ident: key2021080202131917300_ref050
  article-title: Discovering and disciplining computer abuse in organizations: a field study
  publication-title: MIS Quarterly
  doi: 10.2307/249307
– year: 2018
  ident: key2021080202131917300_ref025
  article-title: 10 Cybersecurity myths revealed! is your small business at risk?
– year: 2015
  ident: key2021080202131917300_ref039
  article-title: OPM director Katherine Archuleta resigns after massive personnel data breach
  publication-title: Wall Street Journal
– volume: 11
  start-page: 394
  issue: 7
  year: 2010
  ident: key2021080202131917300_ref037
  article-title: Understanding security behaviors in personal computer usage: a threat avoidance perspective
  publication-title: Journal of the Association for Information Systems
  doi: 10.17705/1jais.00232
– year: 2015
  ident: key2021080202131917300_ref038
  article-title: Awareness of cyber-security for small business
– volume: 29
  start-page: 607
  year: 2005
  ident: key2021080202131917300_ref035
  article-title: Zones of tolerance: alternative scales for measuring information systems service quality
  publication-title: MIS Quarterly
  doi: 10.2307/25148702
– year: 2018
  ident: key2021080202131917300_ref053
  article-title: Chinese hackers breach US Navy contractors
– volume: 22
  start-page: 7
  year: 2017
  ident: key2021080202131917300_ref004
  article-title: CEO’s information security behavior in SMEs: does ownership matter
  publication-title: Systems Information ET Management
– year: 2018
  ident: key2021080202131917300_ref030
  article-title: Preparing small business for cybersecurity success
– volume: 50
  start-page: 307
  issue: 3
  year: 2003
  ident: key2021080202131917300_ref021
  article-title: Inexperience and experience with online stores: the importance of TAM and trust
  publication-title: IEEE Transactions on Engineering Management
  doi: 10.1109/TEM.2003.817277
– volume: 22
  start-page: 441
  issue: 4
  year: 1998
  ident: key2021080202131917300_ref051
  article-title: Coping with systems risk: security planning models for management decision making
  publication-title: MIS Quarterly
  doi: 10.2307/249551
– volume-title: Systems under Indirect Observation: Causality, Structure, Prediction
  year: 1982
  ident: key2021080202131917300_ref033
– volume: 39
  start-page: 837
  issue: 4
  year: 2015
  ident: key2021080202131917300_ref009
  article-title: What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors
  publication-title: MIS Quarterly
  doi: 10.25300/MISQ/2015/39.4.5
– year: 2018
  ident: key2021080202131917300_ref044
  article-title: Strengthening digital society against cyber shocks
– start-page: 23
  volume-title: In Handbook of Partial Least Squares
  year: 2010
  ident: key2021080202131917300_ref018
  article-title: Latent variables and indices: Herman Wold’s basic design and partial least squares
– volume: 18
  start-page: 177
  issue: 2
  year: 2009
  ident: key2021080202131917300_ref036
  article-title: Threat or coping appraisal: determinants of SMB executives’ decision to adopt anti-malware software
  publication-title: European Journal of Information Systems
  doi: 10.1057/ejis.2009.11
– volume: 23
  start-page: 139
  issue: 2
  year: 2003
  ident: key2021080202131917300_ref034
  article-title: An integrative study of information systems security effectiveness
  publication-title: International Journal of Information Management
  doi: 10.1016/S0268-4012(02)00105-6
– volume: 34
  start-page: 549
  year: 2010
  ident: key2021080202131917300_ref031
  article-title: Fear appeals and information security behaviors: an empirical study
  publication-title: MIS Quarterly
  doi: 10.2307/25750691
– volume: 59
  start-page: 9
  year: 2016
  ident: key2021080202131917300_ref006
  article-title: Information system security commitment: a study of external influences on senior management
  publication-title: Computers and Security
  doi: 10.1016/j.cose.2016.02.007
– volume: 28
  start-page: 209
  issue: 1
  year: 2014
  ident: key2021080202131917300_ref014
  article-title: Understanding compliance with bring your own device policies utilizing protection motivation theory: bridging the intention-behavior gap
  publication-title: Journal of Information Systems
  doi: 10.2308/isys-50704
– volume: 6
  start-page: 1
  issue: 1
  year: 1999
  ident: key2021080202131917300_ref028
  article-title: Cutoff criteria for fit indexes in covariance structure analysis: conventional criteria versus new alternatives
  publication-title: Structural Equation Modeling: A Multidisciplinary Journal
  doi: 10.1080/10705519909540118
– volume: 35
  start-page: iii
  year: 2011
  ident: key2021080202131917300_ref022
  article-title: An update and extension to SEM guidelines for administrative and social science research
  publication-title: MIS Quarterly
  doi: 10.2307/23044042
– year: 2018
  ident: key2021080202131917300_ref008
  article-title: 3 Small business cybersecurity myths busted
– year: 2015
  ident: key2021080202131917300_ref056
  article-title: The need for greater focus on the cybersecurity challenges facing small and midsize businesses
– year: 2016
  ident: key2021080202131917300_ref015
  article-title: Survey small business security
– volume-title: Secrets and Lies: Digital Security in a Networked World
  year: 2011
  ident: key2021080202131917300_ref047
– start-page: 153
  volume-title: Social Psychophysiology: A Sourcebook
  year: 1983
  ident: key2021080202131917300_ref046
  article-title: Cognitive and psychological processes in fear-based attitude change: a revised theory of protection motivation
– volume: 24
  start-page: 139
  issue: 2
  year: 2016
  ident: key2021080202131917300_ref016
  article-title: Comparing the information security culture of employees who had read the information security policy and those who had not
  publication-title: Information and Computer Security
  doi: 10.1108/ICS-12-2015-0048
– volume-title: Statistical Power Analysis for the Behavioral Sciences
  year: 1988
  ident: key2021080202131917300_ref013
– year: 2017
  ident: key2021080202131917300_ref011
  article-title: Cybersecurity management program
– year: 2018
  ident: key2021080202131917300_ref041
  article-title: 2018 State of cybersecurity in small and medium size businesses
– volume: 19
  start-page: 237
  issue: 2
  year: 1995
  ident: key2021080202131917300_ref010
  article-title: On the use, usefulness, and ease of use of structural equation modeling in MIS research: a note of caution
  publication-title: MIS Quarterly
  doi: 10.2307/249690
– volume-title: Target CEO Fired-Can You Be Fired If Your Company is Hacked
  year: 2014
  ident: key2021080202131917300_ref007
– volume: 39
  start-page: 317
  issue: 2
  year: 2015
  ident: key2021080202131917300_ref040
  article-title: Disaster experience and hospital information systems: an examination of perceived information assurance, risk, resilience, and HIS usefulness
  publication-title: MIS Quarterly
  doi: 10.25300/MISQ/2015/39.2.03
– volume-title: Statistical Power Analysis for the Behavioral Sciences
  year: 1969
  ident: key2021080202131917300_ref012
– volume: 4
  start-page: 44
  issue: 4
  year: 1989
  ident: key2021080202131917300_ref005
  article-title: A short-from measure of user information satisfaction: a psychometric evaluation and notes on use
  publication-title: Journal of Management Information Systems
– volume: 20
  start-page: 79
  issue: 1
  year: 2009
  ident: key2021080202131917300_ref017
  article-title: User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach
  publication-title: Information Systems Research
  doi: 10.1287/isre.1070.0160
– year: 2017
  ident: key2021080202131917300_ref001
  article-title: Cybersecurity for small business: exposing the top 8 myths
– volume-title: Applied Multivariate Statistics for the Social Sciences
  year: 1992
  ident: key2021080202131917300_ref048
– start-page: 47
  volume-title: Evaluation of Econometric Models
  year: 1980
  ident: key2021080202131917300_ref055
  article-title: Model construction and evaluation when theoretical knowledge is scarce
  doi: 10.1016/B978-0-12-416550-2.50007-8
– year: 2018
  ident: key2021080202131917300_ref019
  article-title: Three pillars of cyber security
– year: 2019
  ident: key2021080202131917300_ref042
  article-title: The cyber resilient organization
– year: 2018
  ident: key2021080202131917300_ref049
  article-title: 5 Myths small business owners believe about cyber security
– volume: 20
  start-page: 13
  issue: 1
  year: 1991
  ident: key2021080202131917300_ref024
  article-title: Security concerns of system users: a study of perceptions of the adequacy of security measures
  publication-title: Information and Management
  doi: 10.1016/0378-7206(91)90024-V
– volume-title: A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM)
  year: 2014
  ident: key2021080202131917300_ref026
– volume: 43
  start-page: 115
  issue: 1
  year: 2015
  ident: key2021080202131917300_ref027
  article-title: A new criterion for assessing discriminant validity in variance-based structural equation modeling
  publication-title: Journal of the Academy of Marketing Science
  doi: 10.1007/s11747-014-0403-8
– volume: 39
  start-page: 113
  issue: 1
  year: 2015
  ident: key2021080202131917300_ref032
  article-title: An enhanced fear appeal rhetorical framework: leveraging threats to the human asset through sanctioning rhetoric
  publication-title: MIS Quarterly
  doi: 10.25300/MISQ/2015/39.1.06
– year: 2016
  ident: key2021080202131917300_ref043
  article-title: Adjusting the lens on economic crime: preparation brings opportunity back into focus
– volume: 43
  start-page: 615
  issue: 4
  year: 2012
  ident: key2021080202131917300_ref029
  article-title: Managing employee compliance with information security policies: the critical role of top management and organizational culture
  publication-title: Decision Sciences
  doi: 10.1111/j.1540-5915.2012.00361.x
– volume: 17
  start-page: 115
  issue: 2
  year: 2012
  ident: key2021080202131917300_ref003
  article-title: Implication et action des dirigeants: Quelles pistes pour améliorer la sécurité de l'information en PME?
  publication-title: Systèmes D'information and Management
  doi: 10.3917/sim.122.0115
– volume: 18
  start-page: 39
  issue: 1
  year: 1981
  ident: key2021080202131917300_ref020
  article-title: Structural equation models with unobservable variables and measurement errors
  publication-title: Journal of Marketing Research
  doi: 10.1177/002224378101800104
– year: 2017
  ident: key2021080202131917300_ref054
  article-title: Equifax CEO Richard Smith who oversaw breach to collect $90 million
– volume: 91
  start-page: 93
  issue: 1
  year: 1975
  ident: key2021080202131917300_ref045
  article-title: A protection motivation theory of fear appeals and attitude change
  publication-title: The Journal of Psychology
  doi: 10.1080/00223980.1975.9915803
– volume-title: SPSS for Windows Step by Step: A Simple Guide and Reference
  year: 2003
  ident: key2021080202131917300_ref023
– volume-title: Statistical and Methodological Myths and Urban Legends: Doctrine, Verity and Fable in the Organizational and Social Sciences
  year: 2008
  ident: key2021080202131917300_ref002
  article-title: Four common misconceptions in exploratory factor analysis
– volume: 1
  start-page: 245
  issue: 2
  year: 1966
  ident: key2021080202131917300_ref057
  article-title: The screen test for the number of factors
  publication-title: Multivariate Behavioral Research
  doi: 10.1207/s15327906mbr0102_10
SSID ssj0001916361
ssj0004345
Score 2.3414786
Snippet PurposeInformation security has increasingly been in the headlines as data breaches continue to occur at alarming rates. This paper aims to propose an...
SourceID proquest
crossref
SourceType Aggregation Database
Enrichment Source
Index Database
StartPage 263
SubjectTerms Cybersecurity
Data integrity
Employee attitude
Employees
Executives
Influence
Network security
Perceptions
Security
Security management
Self-efficacy
Small & medium sized enterprises-SME
Small business
Threats
SummonAdditionalLinks – databaseName: Emerald Complete Journals
  dbid: GEI
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1NS8MwGA5zJy_OT5xOycGLh65t0mbNUcbGFLbLHOxWmo-hOLuxdiCe_Bv-PX-Jb9J2MhFB8NJDaUObvH3zvOmT50HoiisOkaKlIxWRTqAZdSJCJRy01U_nwnodDkdsMAnupuG0hkbVXhhLqyyWY2yefkwzU6S6hrgNWXgjOGDca267Y1MME1MBGajvmhVr9yF_nu9ApIes2vpbrbgAEqJWQJXArO8EnPnVf8sfGtuep7bTtJ17-g20qJ66oJw8tde5aMvXb4KO__da-2ivhKn4poirA1TT6SFqVBYQuMwIR2g4HvawftFybdJm9vH2jpdfVBmcpAoDwsSlPKs5ibPSMQ8vV9rS302yxdaR5xhN-r377sApHRocSX0_dyigwQTSpRQzIXwF-EkQ6WmRhIx3EqYBDPkzjwveUTTUSjGRGLUbDrCeUBoIeoLq6SLVpwgzHgjGuUi4FEESzKJEEqIAvkrGQi50E7nVeMSylC83Lhrz2JYxXhRDv8WeH5t-M0y9oImuN3csC-mOX65tVUMclx9xFkO1BSV8xKLw7A9NnaNdYngvhlZCW6ier9b6AoBLLi5tPH4C0tPn8Q
  priority: 102
  providerName: Emerald
Title SME executives’ perceptions and the information security preparedness model
URI https://www.proquest.com/docview/2557138685
Volume 29
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LSwMxEA7agngRrYrVtuQggoelu8luujlJLX0otIq1UHtZNo-CIG3tAzz6N_x7_hInadbqpZccdjcsTCYz3yQz8yF0yRUHTdHSk4pIL9SMejGhEgZt-6dzYbkOuz3WGYT3w2joDtwWLq0ys4nWUKupNGfkVYC-EE_FLI5uZu-eYY0yt6uOQmMX5QPwNEbP41Z7UxdJLUkxASfvhZwF2TWlH1fvGn0TSBMTPZkw4b9b-m-VratpHaIDhxFxfb2oR2hHTwpoL0tRL6CyKzbAV9hVExnpYrdNj1G3321i_aHlytiyxffnF55t8ldwOlEYYB9-_TN34Wjs8GyubU66-RO2NDknaNBqPjc6nqNN8CQNgqVHAaKlYMOkGAsRKAA1gkhfizRivJYyDQglGPtc8JqikVaKidS0oOGAtQmloaCnKDeZTvQZwoyHgnEuUi5FmIbjOJWEKMCUkrGIC11E1UxqiXQ9xQ21xVtiYws_TkDOiR8kRs4mfS4souvfGbN1P40t35ayhUjczlokGz043_76Au0Tk39i0jtoCeWW85UuA4BYiorVkgrK3zZ7j08VWyAOYzd4gGejl1G9_QOdEMiB
linkProvider ProQuest
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3NTttAEB7RILVcEKVU_HcPgMTBir273ngPFSoQlACJED8SN9f7E6lSFUISBNz6GrwED8WTdMZZN-XCjYsv9trSzOzMN96Z-QC2tNNoKd5G1nEbSa9ElHFh8eLL-enalFyHna5qXcnj6_R6Bp6rXhgqq6x8Yumo3Y2lf-R1hL6YT2UqS_cGtxGxRtHpakWhMTGLE_94jynb6Hv7EPW7zflR8_KgFQVWgciKJBlHAhFMgVvcmp4xicOYb7iNvSlSpRuF8hjAk16sjW44kXrnlCloQotGKMqFkEbgez_ArKSO1hrM7je7Z-fTTkxR0iJzhBWR1CqpDkbjrN4-uKDUnVO-RonJ60D4Og6Uwe1oAeYDKmU_Jmb0GWZ8fxE-VkXxi7AR2hvYDgv9S6RPFhzDF-hcdJrMP3h7R95z9PLniQ2mFTOs6DuGQJP9-m_tKBDnscHQl1Xw9CVWEvMswdW7iPQr1Po3fb8MTGlplNam0NbIQvaywnLuEMVapVJt_ArUK6nlNkwxJzKN33mZzcRZjnLO4yQnOVPBnlyB3X8rBpMJHm88u14pIg97eZRPLW_17dvf4FPrsnOan7a7J2swx6n6hYpLxDrUxsM7v4HwZWw2g80w-PneZvoX8JUBFw
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=SME+executives%E2%80%99+perceptions+and+the+information+security+preparedness+model&rft.jtitle=Information+management+%26+computer+security&rft.au=Saban%2C+Kenneth+Albert&rft.au=Rau%2C+Stephen&rft.au=Wood%2C+Charles+A&rft.date=2021-08-03&rft.pub=Emerald+Group+Publishing+Limited&rft.issn=2056-4961&rft.eissn=2056-497X&rft.volume=29&rft.issue=2&rft.spage=263&rft.epage=282&rft_id=info:doi/10.1108%2FICS-01-2020-0014
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2056-4961&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2056-4961&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2056-4961&client=summon