Information security threats and practices in small businesses

被引:31
|
作者
Keller, S [1 ]
Powell, A [1 ]
Horstmann, B [1 ]
Predmore, C [1 ]
Crawford, M [1 ]
机构
[1] So Illinois Univ, Sch Business, Edwardsville, IL USA
关键词
D O I
10.1201/1078/45099.22.2.20050301/87273.2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article focuses on how small businesses (fewer than 500 employees) are managing information security and the associated risks. Our findings indicate that the businesses interviewed for this study are taking many of the typical steps that are indicative of best security practices. However, there are also several areas of concern that could potentially leave their systems open to threats.
引用
收藏
页码:7 / 19
页数:13
相关论文
共 50 条
  • [1] Information Security and Insider Threats in Small Medical Practices
    Martin, Nancy L.
    Imboden, Thomas R.
    [J]. AMCIS 2014 PROCEEDINGS, 2014,
  • [2] Computer security threats faced by small businesses in Australia
    Hutchings, Alice
    [J]. TRENDS AND ISSUES IN CRIME AND CRIMINAL JUSTICE, 2012, (433): : 1 - 6
  • [3] SCHB 3-Security practices for small businesses
    Versic, Ronald J.
    [J]. ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 2009, 238
  • [4] Information Security Practices in Smallto-Medium Sized Businesses: A Hotspot Analysis
    Marett, Kent
    Barnett, Tim
    [J]. INFORMATION RESOURCES MANAGEMENT JOURNAL, 2019, 32 (02) : 76 - 93
  • [5] Analyzing Information Security Model for Small-Medium Sized Businesses
    Alshboul, Yazan
    Streff, Kevin
    [J]. AMCIS 2015 PROCEEDINGS, 2015,
  • [6] Information Security Threats and Information Assurance
    Yalman, Yildiray
    Yesilyurt, Murat
    [J]. TEM JOURNAL-TECHNOLOGY EDUCATION MANAGEMENT INFORMATICS, 2013, 2 (03): : 247 - 252
  • [7] Threats to Health Information Security
    Samy, Ganthan Narayana
    Ahmad, Rabiah
    Ismail, Zuraini
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 540 - 543
  • [8] Insider Threats in Information Security
    Elmrabit, Ncbrase
    Yang, Shuang-Hua
    Yang, Lili
    [J]. 2015 21ST INTERNATIONAL CONFERENCE ON AUTOMATION AND COMPUTING (ICAC), 2015, : 108 - 113
  • [9] COMPUTER THREATS AND INFORMATION SECURITY
    Tarazona T, Cesar H.
    [J]. DERECHO PENAL Y CRIMINOLOGIA, 2007, 28 (84): : 137 - 146
  • [10] A variety of information security threats
    Kovalenko, Kseniya E.
    Kovalenko, Natalia E.
    Leon Gonzalez, Jorge Luis
    [J]. REVISTA UNIVERSIDAD Y SOCIEDAD, 2019, 11 (05): : 256 - 261