SME executives’ perceptions and the information security preparedness model
PurposeInformation security has increasingly been in the headlines as data breaches continue to occur at alarming rates. This paper aims to propose an Information Security Preparedness Model that was developed to examine how SME executives’ perceptions of security importance, implementation challeng...
Saved in:
Published in | Information and computer security Vol. 29; no. 2; pp. 263 - 282 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
Bingley
Emerald Group Publishing Limited
03.08.2021
|
Subjects | |
Online Access | Get full text |
ISSN | 2056-4961 2056-497X |
DOI | 10.1108/ICS-01-2020-0014 |
Cover
Abstract | PurposeInformation security has increasingly been in the headlines as data breaches continue to occur at alarming rates. This paper aims to propose an Information Security Preparedness Model that was developed to examine how SME executives’ perceptions of security importance, implementation challenges and external influences impact their awareness and commitment to security preparedness.Design/methodology/approachFunded by the Department of Justice, a national survey of SME executives’ perceptions of information security preparedness was conducted. Using PLS-SEM, the survey responses were used to test the proposed Information Security Preparedness Model.FindingsThe results indicate that as perceptions of security importance and external influences increase, SME executives’ awareness and commitment to information security also increases. In addition, as implementation challenges increase, awareness and commitment to information security decreases. Finally, as security importance and awareness and commitment to information security increases, executives’ perception of security preparedness also increases.Research limitations/implicationsExecutive perceptions of information security were measured and not the actual level of security. Further research that examines the agreement between executive perceptions and the true state of information security within the organization is warranted.Originality/valuePrior information security studies using Roger’s (1975, 1983) Protection Motivation Theory have produced mixed results. This paper develops and tests the Information Security Preparedness Model to more fully explain SME executive’s perceptions of information security. |
---|---|
AbstractList | PurposeInformation security has increasingly been in the headlines as data breaches continue to occur at alarming rates. This paper aims to propose an Information Security Preparedness Model that was developed to examine how SME executives’ perceptions of security importance, implementation challenges and external influences impact their awareness and commitment to security preparedness.Design/methodology/approachFunded by the Department of Justice, a national survey of SME executives’ perceptions of information security preparedness was conducted. Using PLS-SEM, the survey responses were used to test the proposed Information Security Preparedness Model.FindingsThe results indicate that as perceptions of security importance and external influences increase, SME executives’ awareness and commitment to information security also increases. In addition, as implementation challenges increase, awareness and commitment to information security decreases. Finally, as security importance and awareness and commitment to information security increases, executives’ perception of security preparedness also increases.Research limitations/implicationsExecutive perceptions of information security were measured and not the actual level of security. Further research that examines the agreement between executive perceptions and the true state of information security within the organization is warranted.Originality/valuePrior information security studies using Roger’s (1975, 1983) Protection Motivation Theory have produced mixed results. This paper develops and tests the Information Security Preparedness Model to more fully explain SME executive’s perceptions of information security. |
Author | Wood, Charles A. Rau, Stephen Saban, Kenneth Albert |
Author_xml | – sequence: 1 givenname: Kenneth Albert surname: Saban fullname: Saban, Kenneth Albert – sequence: 2 givenname: Stephen surname: Rau fullname: Rau, Stephen – sequence: 3 givenname: Charles A. surname: Wood fullname: Wood, Charles A. |
BookMark | eNp1kMFKAzEQhoNUsNbePQY8r2aSJrs5SqlaaPFQBW8h2Z3FLe3umqRib76Gr-eTuGvFg-BphuH7Z5jvlAzqpkZCzoFdArDsaj5dJQwSzjhLGIPJERlyJlUy0enT4LdXcELGIaxZh2hQQsGQLFfLGcU3zHexesXw-f5BW_Q5trFq6kBtXdD4jLSqy8ZvbT-koYN9Ffe09dhaj0WNIdBtU-DmjByXdhNw_FNH5PFm9jC9Sxb3t_Pp9SLJBUBMhJLKaoDclc5Bwbh0PGforFQ6tQozLaBk2um0EBKLQjmbTjKts4xzISZOjMjFYW_rm5cdhmjWzc7X3UnDpUxBZCqTHcUOVO6bEDyWpvXV1vq9AWZ6b6bzZhiY3pvpvXUR9SeSV_H77ehttfk_-AX6xXRv |
CitedBy_id | crossref_primary_10_1016_j_cose_2024_103826 crossref_primary_10_1080_08874417_2022_2128937 crossref_primary_10_1109_ACCESS_2024_3373315 crossref_primary_10_1142_S021987702350027X crossref_primary_10_1080_19393555_2024_2357310 |
Cites_doi | 10.2307/249307 10.17705/1jais.00232 10.2307/25148702 10.1109/TEM.2003.817277 10.2307/249551 10.25300/MISQ/2015/39.4.5 10.1057/ejis.2009.11 10.1016/S0268-4012(02)00105-6 10.2307/25750691 10.1016/j.cose.2016.02.007 10.2308/isys-50704 10.1080/10705519909540118 10.2307/23044042 10.1108/ICS-12-2015-0048 10.2307/249690 10.25300/MISQ/2015/39.2.03 10.1287/isre.1070.0160 10.1016/B978-0-12-416550-2.50007-8 10.1016/0378-7206(91)90024-V 10.1007/s11747-014-0403-8 10.25300/MISQ/2015/39.1.06 10.1111/j.1540-5915.2012.00361.x 10.3917/sim.122.0115 10.1177/002224378101800104 10.1080/00223980.1975.9915803 10.1207/s15327906mbr0102_10 |
ContentType | Journal Article |
Copyright | Emerald Publishing Limited 2021 |
Copyright_xml | – notice: Emerald Publishing Limited 2021 |
DBID | AAYXX CITATION 0-V 0U~ 1-H 7SC 7WY 7WZ 7XB 8AO 8FD 8FE 8FG 8FI ABUWG AFKRA ALSLI ARAPS AZQEC BENPR BEZIV BGLVJ BGRYB CCPQU CNYFK DWQXO E3H F2A FYUFA F~G GNUQQ HCIFZ JQ2 K6~ K7- L.- L.0 L7M L~C L~D M0C M0N M0O M0T M1O P5Z P62 PHGZM PHGZT PJZUB PKEHL PPXIY PQBIZ PQEST PQGLB PQQKQ PQUKI PRQQA PYYUZ Q9U |
DOI | 10.1108/ICS-01-2020-0014 |
DatabaseName | CrossRef ProQuest Social Sciences Premium Collection Global News & ABI/Inform Professional Trade PRO Computer and Information Systems Abstracts ProQuest ABI/INFORM Collection ABI/INFORM Global (PDF only) ProQuest Central (purchase pre-March 2016) ProQuest Pharma Collection Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection Hospital Premium Collection ProQuest Central (Alumni) ProQuest Central UK/Ireland Social Science Premium Collection Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Central Business Premium Collection ProQuest Technology Collection (LUT) Criminology Collection ProQuest One Community College Library & information science collection. ProQuest Central Library & Information Sciences Abstracts (LISA) Library & Information Science Abstracts (LISA) Health Research Premium Collection ABI/INFORM Global (Corporate) ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection ProQuest Business Collection Computer Science Database ABI/INFORM Professional Advanced ABI/INFORM Professional Standard Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional ABI/INFORM Global (OCUL) Computing Database ProQuest Criminal Justice Healthcare Administration Database Library Science Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic (New) ProQuest Health & Medical Research Collection ProQuest One Academic Middle East (New) ProQuest One Health & Nursing ProQuest One Business (OCUL) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest One Social Sciences ABI/INFORM Collection China ProQuest Central Basic |
DatabaseTitle | CrossRef Computer Science Database ProQuest Central Student Library and Information Science Abstracts (LISA) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts SciTech Premium Collection Trade PRO ABI/INFORM Complete Global News & ABI/Inform Professional ProQuest One Applied & Life Sciences Health Research Premium Collection Health & Medical Research Collection Library & Information Science Collection ProQuest Central (New) Advanced Technologies & Aerospace Collection Business Premium Collection Social Science Premium Collection ABI/INFORM Global ProQuest One Academic Eastern Edition ProQuest Hospital Collection ProQuest Technology Collection ProQuest Business Collection Criminology Collection ProQuest Social Sciences Premium Collection ProQuest One Academic UKI Edition ProQuest One Academic ProQuest One Academic (New) ABI/INFORM Global (Corporate) ProQuest One Business Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) ProQuest Central (Alumni Edition) ProQuest One Community College ProQuest One Health & Nursing ProQuest Pharma Collection ProQuest Central ABI/INFORM Professional Advanced ProQuest Library Science ProQuest Criminal Justice ABI/INFORM Professional Standard ProQuest Central Korea Advanced Technologies Database with Aerospace ProQuest Computing ProQuest One Social Sciences ProQuest Central Basic ProQuest Health Management ABI/INFORM China ProQuest SciTech Collection Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database |
DatabaseTitleList | Computer Science Database |
Database_xml | – sequence: 1 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science Library & Information Science Business |
EISSN | 2056-497X |
EndPage | 282 |
ExternalDocumentID | 10_1108_ICS_01_2020_0014 |
GeographicLocations | United States--US |
GeographicLocations_xml | – name: United States--US |
GroupedDBID | .WU 0-V 3FY 5VS 7WY 8AO 8FE 8FG 8FI 8FW 9F- AAGBP AAKOT AAMCF AAUDR AAXBI AAYXX ABIJV ABJNI ABSDC ABUWG ABXQL ABYQI ACGFS ACTSA ACZKX ADBBV ADOMW ADQHX ADWNT AFKRA AFNTC AFZLO AGTVX AHMHQ AILOG AJEBP ALIPV ALMA_UNASSIGNED_HOLDINGS ALSLI AODMV AQUVI ARALO ARAPS AUCOK AZQEC BENPR BEZIV BGLVJ BGRYB BPHCQ BVXVI CCPQU CITATION CNYFK DWQXO EBS ECCUG FNNZZ FYUFA GEA GEI GMX GNUQQ GQ. H13 HCIFZ K6V K6~ K7- KBGRL M0C M0O M0T M1O M42 P62 PHGZM PHGZT PJZUB PPXIY PQBIZ PQGLB PQQKQ PROAC PRQQA SCAQC SDURG SLOBJ TEM TGG TMF TMI TMT UKHRP Z11 Z12 Z21 ZYZAG .DC 0U~ 1-H 29I 4.4 5GY 70U 77K 7SC 7XB 8FD 8R4 8R5 9E0 AAPSD ABEAN ACGFO AEBZA AEDOK AEMMR AETHF AFNZV AIAFM AJFKA APPLU ATGMP CS3 DU5 E3H F2A GEB GEC GMM GMN J1Y JI- JL0 JQ2 L.- L.0 L7M L~C L~D M0N P2P PKEHL PQEST PQUKI Q2X Q3A Q9U RWL TAE TDQ TET TMD TMK TMX Z22 |
ID | FETCH-LOGICAL-c311t-3656a911cbfbb1d025b2c0eba5697a6e8931f09b97d35edd6ba748998822334b3 |
IEDL.DBID | 8FG |
ISSN | 2056-4961 |
IngestDate | Mon Jun 30 14:37:56 EDT 2025 Thu Jul 31 00:43:11 EDT 2025 Thu Apr 24 23:09:18 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 2 |
Language | English |
License | https://www.emerald.com/insight/site-policies |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c311t-3656a911cbfbb1d025b2c0eba5697a6e8931f09b97d35edd6ba748998822334b3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
PQID | 2557138685 |
PQPubID | 31135 |
PageCount | 20 |
ParticipantIDs | proquest_journals_2557138685 crossref_primary_10_1108_ICS_01_2020_0014 crossref_citationtrail_10_1108_ICS_01_2020_0014 |
PublicationCentury | 2000 |
PublicationDate | 20210803 |
PublicationDateYYYYMMDD | 2021-08-03 |
PublicationDate_xml | – month: 08 year: 2021 text: 20210803 day: 03 |
PublicationDecade | 2020 |
PublicationPlace | Bingley |
PublicationPlace_xml | – name: Bingley |
PublicationTitle | Information and computer security |
PublicationYear | 2021 |
Publisher | Emerald Group Publishing Limited |
Publisher_xml | – name: Emerald Group Publishing Limited |
References | (key2021080202131917300_ref017) 2009; 20 Ponemon Institute (key2021080202131917300_ref042) 2019 (key2021080202131917300_ref027) 2015; 43 (key2021080202131917300_ref026) 2014 (key2021080202131917300_ref039) 2015 (key2021080202131917300_ref051) 1998; 22 CISCO (key2021080202131917300_ref011) 2017 (key2021080202131917300_ref019) 2018 (key2021080202131917300_ref003) 2012; 17 (key2021080202131917300_ref050) 1990; 14 (key2021080202131917300_ref012) 1969 (key2021080202131917300_ref048) 1992 (key2021080202131917300_ref006) 2016; 59 (key2021080202131917300_ref014) 2014; 28 (key2021080202131917300_ref034) 2003; 23 (key2021080202131917300_ref025) 2018 (key2021080202131917300_ref035) 2005; 29 Wall Street Journal (key2021080202131917300_ref053) 2018 (key2021080202131917300_ref028) 1999; 6 (key2021080202131917300_ref037) 2010; 11 (key2021080202131917300_ref055) 1980 Ponemon Institute (key2021080202131917300_ref041) 2018 U.S. Congress (key2021080202131917300_ref052) 2017 (key2021080202131917300_ref031) 2010; 34 (key2021080202131917300_ref056) 2015 Information Technology and Innovation Foundation (ITIF) (key2021080202131917300_ref030) 2018 (key2021080202131917300_ref008) 2018 (key2021080202131917300_ref046) 1983 (key2021080202131917300_ref005) 1989; 4 (key2021080202131917300_ref021) 2003; 50 (key2021080202131917300_ref020) 1981; 18 (key2021080202131917300_ref002) 2008 (key2021080202131917300_ref024) 1991; 20 Stimulustech.com (key2021080202131917300_ref049) 2018 (key2021080202131917300_ref010) 1995; 19 (key2021080202131917300_ref004) 2017; 22 McCann Investigations LLC (key2021080202131917300_ref038) 2015 (key2021080202131917300_ref054) 2017 CSID (key2021080202131917300_ref015) 2016 (key2021080202131917300_ref001) 2017 (key2021080202131917300_ref040) 2015; 39 (key2021080202131917300_ref032) 2015; 39 (key2021080202131917300_ref047) 2011 (key2021080202131917300_ref022) 2011; 35 (key2021080202131917300_ref007) 2014 PricewaterhouseCoopers (key2021080202131917300_ref044) 2018 (key2021080202131917300_ref023) 2003 (key2021080202131917300_ref057) 1966; 1 (key2021080202131917300_ref036) 2009; 18 PricewaterhouseCoopers (key2021080202131917300_ref043) 2016 (key2021080202131917300_ref029) 2012; 43 (key2021080202131917300_ref013) 1988 (key2021080202131917300_ref045) 1975; 91 (key2021080202131917300_ref016) 2016; 24 (key2021080202131917300_ref009) 2015; 39 (key2021080202131917300_ref018) 2010 (key2021080202131917300_ref033) 1982 |
References_xml | – year: 2017 ident: key2021080202131917300_ref052 article-title: Bill H.R.2015 – volume: 14 start-page: 45 issue: 1 year: 1990 ident: key2021080202131917300_ref050 article-title: Discovering and disciplining computer abuse in organizations: a field study publication-title: MIS Quarterly doi: 10.2307/249307 – year: 2018 ident: key2021080202131917300_ref025 article-title: 10 Cybersecurity myths revealed! is your small business at risk? – year: 2015 ident: key2021080202131917300_ref039 article-title: OPM director Katherine Archuleta resigns after massive personnel data breach publication-title: Wall Street Journal – volume: 11 start-page: 394 issue: 7 year: 2010 ident: key2021080202131917300_ref037 article-title: Understanding security behaviors in personal computer usage: a threat avoidance perspective publication-title: Journal of the Association for Information Systems doi: 10.17705/1jais.00232 – year: 2015 ident: key2021080202131917300_ref038 article-title: Awareness of cyber-security for small business – volume: 29 start-page: 607 year: 2005 ident: key2021080202131917300_ref035 article-title: Zones of tolerance: alternative scales for measuring information systems service quality publication-title: MIS Quarterly doi: 10.2307/25148702 – year: 2018 ident: key2021080202131917300_ref053 article-title: Chinese hackers breach US Navy contractors – volume: 22 start-page: 7 year: 2017 ident: key2021080202131917300_ref004 article-title: CEO’s information security behavior in SMEs: does ownership matter publication-title: Systems Information ET Management – year: 2018 ident: key2021080202131917300_ref030 article-title: Preparing small business for cybersecurity success – volume: 50 start-page: 307 issue: 3 year: 2003 ident: key2021080202131917300_ref021 article-title: Inexperience and experience with online stores: the importance of TAM and trust publication-title: IEEE Transactions on Engineering Management doi: 10.1109/TEM.2003.817277 – volume: 22 start-page: 441 issue: 4 year: 1998 ident: key2021080202131917300_ref051 article-title: Coping with systems risk: security planning models for management decision making publication-title: MIS Quarterly doi: 10.2307/249551 – volume-title: Systems under Indirect Observation: Causality, Structure, Prediction year: 1982 ident: key2021080202131917300_ref033 – volume: 39 start-page: 837 issue: 4 year: 2015 ident: key2021080202131917300_ref009 article-title: What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors publication-title: MIS Quarterly doi: 10.25300/MISQ/2015/39.4.5 – year: 2018 ident: key2021080202131917300_ref044 article-title: Strengthening digital society against cyber shocks – start-page: 23 volume-title: In Handbook of Partial Least Squares year: 2010 ident: key2021080202131917300_ref018 article-title: Latent variables and indices: Herman Wold’s basic design and partial least squares – volume: 18 start-page: 177 issue: 2 year: 2009 ident: key2021080202131917300_ref036 article-title: Threat or coping appraisal: determinants of SMB executives’ decision to adopt anti-malware software publication-title: European Journal of Information Systems doi: 10.1057/ejis.2009.11 – volume: 23 start-page: 139 issue: 2 year: 2003 ident: key2021080202131917300_ref034 article-title: An integrative study of information systems security effectiveness publication-title: International Journal of Information Management doi: 10.1016/S0268-4012(02)00105-6 – volume: 34 start-page: 549 year: 2010 ident: key2021080202131917300_ref031 article-title: Fear appeals and information security behaviors: an empirical study publication-title: MIS Quarterly doi: 10.2307/25750691 – volume: 59 start-page: 9 year: 2016 ident: key2021080202131917300_ref006 article-title: Information system security commitment: a study of external influences on senior management publication-title: Computers and Security doi: 10.1016/j.cose.2016.02.007 – volume: 28 start-page: 209 issue: 1 year: 2014 ident: key2021080202131917300_ref014 article-title: Understanding compliance with bring your own device policies utilizing protection motivation theory: bridging the intention-behavior gap publication-title: Journal of Information Systems doi: 10.2308/isys-50704 – volume: 6 start-page: 1 issue: 1 year: 1999 ident: key2021080202131917300_ref028 article-title: Cutoff criteria for fit indexes in covariance structure analysis: conventional criteria versus new alternatives publication-title: Structural Equation Modeling: A Multidisciplinary Journal doi: 10.1080/10705519909540118 – volume: 35 start-page: iii year: 2011 ident: key2021080202131917300_ref022 article-title: An update and extension to SEM guidelines for administrative and social science research publication-title: MIS Quarterly doi: 10.2307/23044042 – year: 2018 ident: key2021080202131917300_ref008 article-title: 3 Small business cybersecurity myths busted – year: 2015 ident: key2021080202131917300_ref056 article-title: The need for greater focus on the cybersecurity challenges facing small and midsize businesses – year: 2016 ident: key2021080202131917300_ref015 article-title: Survey small business security – volume-title: Secrets and Lies: Digital Security in a Networked World year: 2011 ident: key2021080202131917300_ref047 – start-page: 153 volume-title: Social Psychophysiology: A Sourcebook year: 1983 ident: key2021080202131917300_ref046 article-title: Cognitive and psychological processes in fear-based attitude change: a revised theory of protection motivation – volume: 24 start-page: 139 issue: 2 year: 2016 ident: key2021080202131917300_ref016 article-title: Comparing the information security culture of employees who had read the information security policy and those who had not publication-title: Information and Computer Security doi: 10.1108/ICS-12-2015-0048 – volume-title: Statistical Power Analysis for the Behavioral Sciences year: 1988 ident: key2021080202131917300_ref013 – year: 2017 ident: key2021080202131917300_ref011 article-title: Cybersecurity management program – year: 2018 ident: key2021080202131917300_ref041 article-title: 2018 State of cybersecurity in small and medium size businesses – volume: 19 start-page: 237 issue: 2 year: 1995 ident: key2021080202131917300_ref010 article-title: On the use, usefulness, and ease of use of structural equation modeling in MIS research: a note of caution publication-title: MIS Quarterly doi: 10.2307/249690 – volume-title: Target CEO Fired-Can You Be Fired If Your Company is Hacked year: 2014 ident: key2021080202131917300_ref007 – volume: 39 start-page: 317 issue: 2 year: 2015 ident: key2021080202131917300_ref040 article-title: Disaster experience and hospital information systems: an examination of perceived information assurance, risk, resilience, and HIS usefulness publication-title: MIS Quarterly doi: 10.25300/MISQ/2015/39.2.03 – volume-title: Statistical Power Analysis for the Behavioral Sciences year: 1969 ident: key2021080202131917300_ref012 – volume: 4 start-page: 44 issue: 4 year: 1989 ident: key2021080202131917300_ref005 article-title: A short-from measure of user information satisfaction: a psychometric evaluation and notes on use publication-title: Journal of Management Information Systems – volume: 20 start-page: 79 issue: 1 year: 2009 ident: key2021080202131917300_ref017 article-title: User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach publication-title: Information Systems Research doi: 10.1287/isre.1070.0160 – year: 2017 ident: key2021080202131917300_ref001 article-title: Cybersecurity for small business: exposing the top 8 myths – volume-title: Applied Multivariate Statistics for the Social Sciences year: 1992 ident: key2021080202131917300_ref048 – start-page: 47 volume-title: Evaluation of Econometric Models year: 1980 ident: key2021080202131917300_ref055 article-title: Model construction and evaluation when theoretical knowledge is scarce doi: 10.1016/B978-0-12-416550-2.50007-8 – year: 2018 ident: key2021080202131917300_ref019 article-title: Three pillars of cyber security – year: 2019 ident: key2021080202131917300_ref042 article-title: The cyber resilient organization – year: 2018 ident: key2021080202131917300_ref049 article-title: 5 Myths small business owners believe about cyber security – volume: 20 start-page: 13 issue: 1 year: 1991 ident: key2021080202131917300_ref024 article-title: Security concerns of system users: a study of perceptions of the adequacy of security measures publication-title: Information and Management doi: 10.1016/0378-7206(91)90024-V – volume-title: A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM) year: 2014 ident: key2021080202131917300_ref026 – volume: 43 start-page: 115 issue: 1 year: 2015 ident: key2021080202131917300_ref027 article-title: A new criterion for assessing discriminant validity in variance-based structural equation modeling publication-title: Journal of the Academy of Marketing Science doi: 10.1007/s11747-014-0403-8 – volume: 39 start-page: 113 issue: 1 year: 2015 ident: key2021080202131917300_ref032 article-title: An enhanced fear appeal rhetorical framework: leveraging threats to the human asset through sanctioning rhetoric publication-title: MIS Quarterly doi: 10.25300/MISQ/2015/39.1.06 – year: 2016 ident: key2021080202131917300_ref043 article-title: Adjusting the lens on economic crime: preparation brings opportunity back into focus – volume: 43 start-page: 615 issue: 4 year: 2012 ident: key2021080202131917300_ref029 article-title: Managing employee compliance with information security policies: the critical role of top management and organizational culture publication-title: Decision Sciences doi: 10.1111/j.1540-5915.2012.00361.x – volume: 17 start-page: 115 issue: 2 year: 2012 ident: key2021080202131917300_ref003 article-title: Implication et action des dirigeants: Quelles pistes pour améliorer la sécurité de l'information en PME? publication-title: Systèmes D'information and Management doi: 10.3917/sim.122.0115 – volume: 18 start-page: 39 issue: 1 year: 1981 ident: key2021080202131917300_ref020 article-title: Structural equation models with unobservable variables and measurement errors publication-title: Journal of Marketing Research doi: 10.1177/002224378101800104 – year: 2017 ident: key2021080202131917300_ref054 article-title: Equifax CEO Richard Smith who oversaw breach to collect $90 million – volume: 91 start-page: 93 issue: 1 year: 1975 ident: key2021080202131917300_ref045 article-title: A protection motivation theory of fear appeals and attitude change publication-title: The Journal of Psychology doi: 10.1080/00223980.1975.9915803 – volume-title: SPSS for Windows Step by Step: A Simple Guide and Reference year: 2003 ident: key2021080202131917300_ref023 – volume-title: Statistical and Methodological Myths and Urban Legends: Doctrine, Verity and Fable in the Organizational and Social Sciences year: 2008 ident: key2021080202131917300_ref002 article-title: Four common misconceptions in exploratory factor analysis – volume: 1 start-page: 245 issue: 2 year: 1966 ident: key2021080202131917300_ref057 article-title: The screen test for the number of factors publication-title: Multivariate Behavioral Research doi: 10.1207/s15327906mbr0102_10 |
SSID | ssj0001916361 ssj0004345 |
Score | 2.3414786 |
Snippet | PurposeInformation security has increasingly been in the headlines as data breaches continue to occur at alarming rates. This paper aims to propose an... |
SourceID | proquest crossref |
SourceType | Aggregation Database Enrichment Source Index Database |
StartPage | 263 |
SubjectTerms | Cybersecurity Data integrity Employee attitude Employees Executives Influence Network security Perceptions Security Security management Self-efficacy Small & medium sized enterprises-SME Small business Threats |
SummonAdditionalLinks | – databaseName: Emerald Complete Journals dbid: GEI link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1NS8MwGA5zJy_OT5xOycGLh65t0mbNUcbGFLbLHOxWmo-hOLuxdiCe_Bv-PX-Jb9J2MhFB8NJDaUObvH3zvOmT50HoiisOkaKlIxWRTqAZdSJCJRy01U_nwnodDkdsMAnupuG0hkbVXhhLqyyWY2yefkwzU6S6hrgNWXgjOGDca267Y1MME1MBGajvmhVr9yF_nu9ApIes2vpbrbgAEqJWQJXArO8EnPnVf8sfGtuep7bTtJ17-g20qJ66oJw8tde5aMvXb4KO__da-2ivhKn4poirA1TT6SFqVBYQuMwIR2g4HvawftFybdJm9vH2jpdfVBmcpAoDwsSlPKs5ibPSMQ8vV9rS302yxdaR5xhN-r377sApHRocSX0_dyigwQTSpRQzIXwF-EkQ6WmRhIx3EqYBDPkzjwveUTTUSjGRGLUbDrCeUBoIeoLq6SLVpwgzHgjGuUi4FEESzKJEEqIAvkrGQi50E7nVeMSylC83Lhrz2JYxXhRDv8WeH5t-M0y9oImuN3csC-mOX65tVUMclx9xFkO1BSV8xKLw7A9NnaNdYngvhlZCW6ier9b6AoBLLi5tPH4C0tPn8Q priority: 102 providerName: Emerald |
Title | SME executives’ perceptions and the information security preparedness model |
URI | https://www.proquest.com/docview/2557138685 |
Volume | 29 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LSwMxEA7agngRrYrVtuQggoelu8luujlJLX0otIq1UHtZNo-CIG3tAzz6N_x7_hInadbqpZccdjcsTCYz3yQz8yF0yRUHTdHSk4pIL9SMejGhEgZt-6dzYbkOuz3WGYT3w2joDtwWLq0ys4nWUKupNGfkVYC-EE_FLI5uZu-eYY0yt6uOQmMX5QPwNEbP41Z7UxdJLUkxASfvhZwF2TWlH1fvGn0TSBMTPZkw4b9b-m-VratpHaIDhxFxfb2oR2hHTwpoL0tRL6CyKzbAV9hVExnpYrdNj1G3321i_aHlytiyxffnF55t8ldwOlEYYB9-_TN34Wjs8GyubU66-RO2NDknaNBqPjc6nqNN8CQNgqVHAaKlYMOkGAsRKAA1gkhfizRivJYyDQglGPtc8JqikVaKidS0oOGAtQmloaCnKDeZTvQZwoyHgnEuUi5FmIbjOJWEKMCUkrGIC11E1UxqiXQ9xQ21xVtiYws_TkDOiR8kRs4mfS4souvfGbN1P40t35ayhUjczlokGz043_76Au0Tk39i0jtoCeWW85UuA4BYiorVkgrK3zZ7j08VWyAOYzd4gGejl1G9_QOdEMiB |
linkProvider | ProQuest |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3NTttAEB7RILVcEKVU_HcPgMTBir273ngPFSoQlACJED8SN9f7E6lSFUISBNz6GrwED8WTdMZZN-XCjYsv9trSzOzMN96Z-QC2tNNoKd5G1nEbSa9ElHFh8eLL-enalFyHna5qXcnj6_R6Bp6rXhgqq6x8Yumo3Y2lf-R1hL6YT2UqS_cGtxGxRtHpakWhMTGLE_94jynb6Hv7EPW7zflR8_KgFQVWgciKJBlHAhFMgVvcmp4xicOYb7iNvSlSpRuF8hjAk16sjW44kXrnlCloQotGKMqFkEbgez_ArKSO1hrM7je7Z-fTTkxR0iJzhBWR1CqpDkbjrN4-uKDUnVO-RonJ60D4Og6Uwe1oAeYDKmU_Jmb0GWZ8fxE-VkXxi7AR2hvYDgv9S6RPFhzDF-hcdJrMP3h7R95z9PLniQ2mFTOs6DuGQJP9-m_tKBDnscHQl1Xw9CVWEvMswdW7iPQr1Po3fb8MTGlplNam0NbIQvaywnLuEMVapVJt_ArUK6nlNkwxJzKN33mZzcRZjnLO4yQnOVPBnlyB3X8rBpMJHm88u14pIg97eZRPLW_17dvf4FPrsnOan7a7J2swx6n6hYpLxDrUxsM7v4HwZWw2g80w-PneZvoX8JUBFw |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=SME+executives%E2%80%99+perceptions+and+the+information+security+preparedness+model&rft.jtitle=Information+management+%26+computer+security&rft.au=Saban%2C+Kenneth+Albert&rft.au=Rau%2C+Stephen&rft.au=Wood%2C+Charles+A&rft.date=2021-08-03&rft.pub=Emerald+Group+Publishing+Limited&rft.issn=2056-4961&rft.eissn=2056-497X&rft.volume=29&rft.issue=2&rft.spage=263&rft.epage=282&rft_id=info:doi/10.1108%2FICS-01-2020-0014 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2056-4961&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2056-4961&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2056-4961&client=summon |