Information security threats and practices in small businesses

被引:31
|
作者
Keller, S [1 ]
Powell, A [1 ]
Horstmann, B [1 ]
Predmore, C [1 ]
Crawford, M [1 ]
机构
[1] So Illinois Univ, Sch Business, Edwardsville, IL USA
关键词
D O I
10.1201/1078/45099.22.2.20050301/87273.2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article focuses on how small businesses (fewer than 500 employees) are managing information security and the associated risks. Our findings indicate that the businesses interviewed for this study are taking many of the typical steps that are indicative of best security practices. However, there are also several areas of concern that could potentially leave their systems open to threats.
引用
收藏
页码:7 / 19
页数:13
相关论文
共 50 条
  • [31] Information Security: New Threats or Familiar Problems?
    Kessler, Gary C.
    [J]. COMPUTER, 2012, 45 (02) : 59 - 65
  • [32] Preparing for Cyber Threats with Information Security Policies
    Ilvonen, Ilona
    Virtanen, Pasi
    [J]. INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2013, 3 (04) : 22 - 31
  • [33] In defense of the realm: understanding the threats to information security
    Whitman, ME
    [J]. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2004, 24 (01) : 43 - 57
  • [34] Information security threats to mobile service development
    Savola, Reijo
    Ahonen, Pasi
    Roning, Juha
    [J]. 2007 4TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2007, : 145 - +
  • [35] External and internal threats of information security of Russia
    Sarichev, N. V.
    Melnitchenko, D. V.
    [J]. ROSSIYSKIY PSIKHOLOGICHESKIY ZHURNAL, 2010, 7 (5-6): : 92 - 97
  • [36] Ukraine's Security Threats in Information Space
    Nikolaevich, Bratina Dmitry
    [J]. SRAVNITELNAYA POLITIKA-COMPARATIVE POLITICS, 2014, 5 (04): : 67 - 71
  • [37] Threats to Information Security - Public Health Implications
    Gordon, William J.
    Fairhall, Adam
    Landman, Adam
    [J]. NEW ENGLAND JOURNAL OF MEDICINE, 2017, 377 (08): : 707 - 709
  • [38] Security threats categories in healthcare information systems
    Samy, Ganthan Narayana
    Ahmad, Rabiah
    Ismail, Zuraini
    [J]. HEALTH INFORMATICS JOURNAL, 2010, 16 (03) : 201 - 209
  • [39] REASEARCH FOR THREATS AND SECURITY IN RFID INFORMATION SYSTEM
    Wang, Zhaoshun
    Chen, Hongsong
    Huang, Xiaoli
    [J]. CIICT 2008: PROCEEDINGS OF CHINA-IRELAND INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATIONS TECHNOLOGIES 2008, 2008, : 288 - 291
  • [40] Mitigating Threats of Small Vessels to Maritime Security
    Trischitta, Patrick R.
    Salloum, Hady
    Bunin, Barry
    Orton, Philip
    [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY, 2012, : 654 - 659