全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

A Review of Cybersecurity Challenges in Small Business: The Imperative for a Future Governance Framework

DOI: 10.4236/jis.2024.151003, PP. 24-39

Keywords: Entrepreneurship, Cybersecurity, Small and Medium Businesses, Data Breach, Hacking, Security

Full-Text   Cite this paper   Add to My Lib

Abstract:

Technological shiftscoupled with infrastructure, techniques, and applications for big datahave created many new opportunities, business models, and industry expansion that benefit entrepreneurs. At the same time, however, entrepreneurs are often unprepared for cybersecurity needsand the policymakers, industry, and nonprofit groups that support them also face technological and knowledge constraints in keeping up with their needs. To improve the ability of entrepreneurship research to understand, identify, and ultimately help address cybersecurity challenges, we conduct a literature review on the state of cybersecurity. The research highlights the necessity for additional investigation to aid small businesses in securing their confidential data and client information from cyber threats, thereby preventing the potential shutdown of the business.

References

[1]  Haltiwanger, J., Jarmin, R.S., Miranda, J. (2013) Who Creates Jobs? Small versus Large versus Young. Review of Economics and Statistics, 95, 347-361.
https://doi.org/10.1162/REST_a_00288
[2]  Cameron, A. (2021) Think Small—Small Business, That Is. What Is Considered a Small Business?
https://smallbusiness.patriotsoftware.com/what-is-considered-small-business-classification-size/
[3]  U.S. Small Business Administration (2021) 2021 Small Business Profile.
https://advocacy.sba.gov/wp-content/uploads/2021/08/2021-Small-Business-Profiles-For-The-States.pdf
[4]  U.S. Bureau of Labor Statistics (2022).
https://www.bls.gov/
[5]  KATHERINE GUSTAFSON (2020) What Percentage of Businesses Fail and How to Improve Your Chances of Success.
https://www.lendingtree.com/business/small/failure-rate/#:%E2%88%BC:text=According%20to%20data%20from%20the,%2C%20roughly%2050%25%20have%20faltered
[6]  (2020) Yelp, Business Listing Review.
https://business.yelp.com/
[7]  Tariq, N. (2018) Impact of Cyberattacks on Financial Institutions. Journal of Internet Banking and Commerce, 23, 1-11.
[8]  McShane, M. and Nguyen, T. (2020) Time-Varying Effects of Cyberattacks on Firm Value. The Geneva Papers on Risk and Insurance-Issues and Practice, 45, 580-615.
https://doi.org/10.1057/s41288-020-00170-x
[9]  Green, J. (2015) Staying Ahead of Cyber-Attacks. Network Security, 2015, 13-16.
https://doi.org/10.1016/S1353-4858(15)30007-6
[10]  Wolf, F., Aviv, A.J. and Kuber, R. (2021) Security Obstacles and Motivations for Small Businesses from a CISO’s Perspective. 30th USENIX Security Symposium (USENIX Security 21), 11-13 August 2021, 1199-1216.
[11]  (2022) Cost of a Data Breach 2022.
https://www.ibm.com/reports/data-breach?utmcontent=SRCWW&p1=Search&p4=43700072379268628&p5=p&gclid=CjwKCAiAh9qdBhAOEiwAvxIokwvOeUHHL6ooYQv8MPXRv8Z0x3sJEy4gc7lXmJmknB8itcQ2NX1bhoCuqoQAvDBwE&gclsrc=aw.ds
[12]  National Cyber Security Alliance (2021).
https://staysafeonline.org/
[13]  CISCO, National Center for the Middle Market (2018) Cyberthreats and Solutions for Small and Midsize Businesses.
https://www.vistage.com/wp-content/uploads/2018/04/Cybersecurity-Research-Note.pdf
[14]  (2021) 2021 Verizon Data Breach Investigations Report.
https://www.verizon.com/business/en-gb/resources/2022-data-breach-investigations-report-dbir.pdf
[15]  Paulsen, C. (2016) Cybersecuring Small Businesses. Computer, 49, 92-97.
https://doi.org/10.1109/MC.2016.223
[16]  Luo, Y. (2022) A General Framework of Digitization Risks in International Business. Journal of International Business Studies, 53, 344-361.
https://doi.org/10.1057/s41267-021-00448-9
[17]  Kshetri, N. (2005) Pattern of Global Cyber War and Crime: A Conceptual Framework. Journal of International Management, 11, 541-562.
https://doi.org/10.1016/j.intman.2005.09.009
[18]  Hudakova, M., Gabrysova, M., Petrakova, Z., Buganova, K. and Krajcik, V. (2021) The Perception of Market and Economic Risks by Owners and Managers of Enterprises in the V4 Countries. Journal of Competitiveness, 13, 60-77.
https://doi.org/10.7441/joc.2021.04.04
[19]  Alahmari, A. and Duncan, B. (2020) Cybersecurity Risk Management in Small and Mediumsized Enterprises: A Systematic Review of Recent Evidence. 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), Dublin, 15-19 June 2020, 1-5.
https://doi.org/10.1109/CyberSA49311.2020.9139638
[20]  The Small Business Administration (2021).
https://www.cnbc.com/2017/01/17/small-business-owners-pay-over-83000-dollars-in-regulatory-costs-in-first-year.html
[21]  (2022) Types of Cyberattacks That Threaten Businesses, Part I: Malware and Ransomware.
https://online.eou.edu/resources/article/types-of-cyberattacks-that-threaten-businesses-part-i/
[22]  Lawal, M., Sultan, A.B.M. and Shakiru, A.O. (2016) Systematic Literature Review on SQL Injection Attack. International Journal of Soft Computing, 11, 26-35.
[23]  Prasad, K.M., Reddy, A.R.M. and Rao, K.V. (2014) DoS and DDoS Attacks: Defense, Detection and Traceback Mechanisms—A Survey. Global Journal of Computer Science and Technology, 14, 15-32.
[24]  Yuryna Connolly, L., Wall, D.S., Lang, M. and Oddson, B. (2020) An Empirical Study of Ransomware Attacks on Organizations: An Assessment of Severity and Salient Factors Affecting Vulnerability. Journal of Cybersecurity, 6, tyaa023.
https://doi.org/10.1093/cybsec/tyaa023
[25]  Morgan, S. (2020) Global Ransomware Damage Costs Predicted To Exceed $5 Billion in 2017.
https://cybersecurityventures.com/ransomware-damage-report-2017-5-billion/
[26]  Hughes, L.A. and DeLone, G.J. (2007) Viruses, Worms, and Trojan Horses: Serious Crimes, Nuisance, or Both? Social Science Computer Review, 25, 78-98.
https://doi.org/10.1177/0894439306292346
[27]  Kaur, J. (2019) Taxonomy of Malware: Virus, Worms and Trojan. International Journal of Research and Analytical Reviews, 6, 192-196.
[28]  Raineri, E.M. and Resig, J. (2020) Evaluating Self-Efficacy Pertaining to Cybersecurity for Small Businesses. Journal of Applied Business & Economics, 22, 13-23.
https://doi.org/10.33423/jabe.v22i12.3876
[29]  Khonji, M., Iraqi, Y. and Jones, A. (2013) Phishing Detection: A Literature Survey. IEEE Communications Surveys & Tutorials, 15, 2091-2121.
https://doi.org/10.1109/SURV.2013.032213.00009
[30]  Iuga, C., Nurse, J.R. and Erola, A. (2016) Baiting the Hook: Factors Impacting Susceptibility to Phishing Attacks. Human-Centric Computing and Information Sciences, 6, Article No. 8.
https://doi.org/10.1186/s13673-016-0065-2
[31]  Tranfield, D., Denyer, D. and Smart, P. (2003) Towards a Methodology for Developing Evidence-Informed Management Knowledge by Means of Systematic Review. British Journal of Management, 14, 207-222.
https://doi.org/10.1111/1467-8551.00375
[32]  Terjesen, S., Hessels, J. and Li, D. (2016) Comparative International Entrepreneurship: A Review and Research Agenda. Journal of management, 42, 299-344.
https://doi.org/10.1177/0149206313486259
[33]  Ireland, R.D., Reutzel, C.R. and Webb, J.W. (2005) Entrepreneurship Research in AMJ: What Has Been Published, and What Might the Future Hold? Academy of Management Briarcliff Manor, NY.
https://doi.org/10.5465/amj.2005.17843937
[34]  Keupp, M.M. and Gassmann, O. (2009) The Past and the Future of International Entrepreneurship: A Review and Suggestions for Developing the Field. Journal of Management, 35, 600-633.
https://doi.org/10.1177/0149206308330558
[35]  August, T., Dao, D. and Niculescu, M.F. (2022) Economics of Ransomware: Risk Interdependence and Large-Scale Attacks. Management Science, 68, 8979-9002.
https://doi.org/10.1287/mnsc.2022.4300
[36]  Say, G. and Vasudeva, G. (2020) Learning from Digital Failures? The Effectiveness of Firms’ Divestiture and Management Turnover Responses to Data Breaches. Strategy Science, 5, 117-142.
https://doi.org/10.1287/stsc.2020.0106
[37]  D’Arcy, J., Adjerid, I., Angst, C.M. and Glavas, A. (2020) Too Good to Be True: Firm Social Performance and the Risk of Data Breach. Information Systems Research, 31, 1200-1223.
https://doi.org/10.1287/isre.2020.0939
[38]  (2022) 35 Alarming Small Business Cybersecurity Statistics for 2023.
https://www.strongdm.com/blog/small-business-cyber-security-statistics#small-business-cybersecurity-overview
[39]  (2021) Diving Back into SMB Breaches.
https://www.verizon.com/business/resources/reports/dbir/2021/smb-data-breaches-deep-dive/
[40]  (2021) 51% of Small Business Admit to Leaving Customer Data Unsecure.
https://digital.com/51-of-small-business-admit-to-leaving-customer-data-unsecure/
[41]  Aguilar, L. (2015) The Need for Greater Focus on the Cybersecurity Challenges Facing Small and Midsize Businesses.
https://www.sec.gov/news/statement/cybersecurity-challenges-small-midsize-businesses
[42]  Morgan, S. (2020) Cybercrime to Cost the World $10.5 Trillion Annually by 2025.
https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/
[43]  Shepherd, M. (2023) 30 Surprising Small Business Cyber Security Statistics.
https://www.fundera.com/resources/small-business-cyber-security-statistics
[44]  (2021) Cost of a Data Breach Report 2021.
https://www.dataendure.com/wp-content/uploads/2021_Cost_of_a_Data_Breach_-2.pdf
[45]  Mclean, M. (2023) 2023 Must-Know Cyber Attack Statistics and Trends.
https://www.embroker.com/blog/cyber-attack-statistics/
[46]  (2022) Number of Data Breaches in the United States from 2013 to 2019, by Industry.
https://www.statista.com/statistics/273572/number-of-data-breaches-in-the-united-states-by-business/
[47]  Pfleeger, S.L. (2009) Useful Cybersecurity Metrics. IT Professional Magazine, 11, 38-45.
https://doi.org/10.1109/MITP.2009.63
[48]  Osborn, E. (2015) Business versus Technology: Sources of the Perceived Lack of Cyber Security in SMES.
https://ora.ox.ac.uk/objects/uuid:4363144b-5667-4fdd-8cd3-b8e35436107e/download_file?file_format=application%2Fpdf&safe_filename=01-15.pdf&type_of_work=Working+paper
[49]  (2023) Check Point Press Releases.
https://tinyurl.com/ye8d95ee
https://www.checkpoint.com/press-releases/check-point-software-releases-its-2023-security-report-highlighting-rise-in-cyberattacks-and-disruptive-malware/
[50]  James, N. (2023) 160 Cybersecurity Statistics 2023—The Ultimate List of Stats and Trends.
https://www.getastra.com/blog/security-audit/cyber-security-statistics/
[51]  McAdam, M., Crowley, C. and Harrison, R.T (2022). Digital Girl: Cyberfeminism and the Emancipatory Potential of Digital Entrepreneurship in Emerging Economies. Small Business Economics, 55, 349-362.
https://doi.org/10.1007/s11187-019-00301-2
[52]  Goud, N. (2022) More than Half of Businesses Are Not Prepared for Cyber Attacks.
https://www.cybersecurity-insiders.com/more-than-half-of-businesses-are-not-prepared-for-cyber-attacks/

Full-Text

Contact Us

[email protected]

QQ:3279437679

WhatsApp +8615387084133