Implementation of Cybersecurity Situation Awareness Model in Saudi SMEs

被引:0
|
作者
Almoaigel, Monerah Faisal [1 ]
Abuabid, Ali [1 ]
机构
[1] Saudi Elect Univ, Coll Comp & Informat, Informa Technol Dept, Riyadh, Saudi Arabia
关键词
Cyber situation awareness; cybersecurity control and precaution; Saudi; SMEs;
D O I
10.14569/IJACSA.2023.01411110
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Small and Medium-sized Enterprises (SMEs) are witnessing rapid growth in technology and innovation. However, this growth is accompanied by increased cybersecurity threats, which pose significant challenges for SMEs. Cyber threats are becoming more complex and sophisticated, with SMEs becoming prime targets due to their weaker cybersecurity defenses. Hence, there exists a rich literature on critical challenges facing SMEs. Existing literature on these challenges addresses many research issues (e.g., finance, technology adoption, and management) associated with SMEs. However, one critical issue that has so far received no rigorous attention is cybersecurity situation awareness for research in the SME context. Thus, this study used a quantitative approach aiming to empirically test a model of cybersecurity situational awareness that can support SMEs in Saudi Arabia to implement cybersecurity measures and precautions with efficacy. An online survey of 350 participants was conducted to collect the research data. The study identified a significant positive relationship between Cyber Situational Awareness (Csa) and Implementation of Cybersecurity Controls (Icsc), suggesting that enhancing awareness can contribute to better control implementation. The study identified a significant positive relationship between Cyber Situational Awareness (Csa) and Implementation of Cybersecurity Controls (Icsc), suggesting that enhancing awareness can contribute to better control implementation. Finally, the paper provides several interesting findings and outlines future research directions.
引用
收藏
页码:1082 / 1092
页数:11
相关论文
共 50 条
  • [31] A Game Theory Model for Situation Awareness and Management
    Rahmes, Mark
    Wilder, Kathy
    Fox, Kevin
    Pemble, Rick
    2013 IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2013, : 909 - 913
  • [32] A Trust-Based Situation Awareness Model
    Aydogan, Reyhan
    Sharpanskykh, Alexei
    Lo, Julia
    MULTI-AGENT SYSTEMS (EUMAS 2014), 2015, 8953 : 19 - 34
  • [33] A Computational Model of Situation Awareness for MOUT Simulations
    Ting, Shang-Ping
    Zhou, Suiping
    Hu, Nan
    2010 INTERNATIONAL CONFERENCE ON CYBERWORLDS (CW 2010), 2010, : 142 - 149
  • [34] Relating Wiener's cybernetics aspects and a situation awareness model implementation for information security risk management
    Anjaria, Kushal
    Mishra, Arun
    KYBERNETES, 2018, 47 (01) : 58 - 79
  • [35] Organizational Cybersecurity Systems and Sustainable Business Performance of Small and Medium Enterprises (SMEs) in Saudi Arabia: The Mediating and Moderating Role of Cybersecurity Resilience and Organizational Culture
    Al-Somali, Sabah Abdullah
    Saqr, Raneem Rashad
    Asiri, Arwa Mohammed
    Al-Somali, Najat Abdullah
    SUSTAINABILITY, 2024, 16 (05)
  • [36] Cybersecurity Awareness Model with Methods: Analytical Hierarchy Process and Structural Equation Model
    Gardenia, Y.
    Gani, Alcianno Ghobadi
    EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS, 2025, 12 (01):
  • [37] Exploration of the Impact of Cybersecurity Awareness on Small and Medium Enterprises (SMEs) in Wales Using Intelligent Software to Combat Cybercrime
    Rawindaran, Nisha
    Jayal, Ambikesh
    Prakash, Edmond
    COMPUTERS, 2022, 11 (12)
  • [38] Cybersecurity Situational Awareness Taxonomy
    Evesti, Antti
    Kanstren, Teemu
    Frantti, Tapio
    2017 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBER SA), 2017,
  • [39] How to increase cybersecurity awareness
    Nachin, Nipon
    Tangmanee, Chatpong
    Piromsopa, Krerk
    ISACA Journal, 2019, 2 : 45 - 50
  • [40] A Survey of Architecture and Implementation Method on Cyber Security Situation Awareness Analysis
    Li Y.
    Wang C.-Z.
    Huang G.-Q.
    Zhao X.
    Zhang B.
    Li Y.-C.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2019, 47 (04): : 927 - 945