Cybersecurity Issues and Practices in a Cloud Context: A Comparison Amongst Micro, Small and Medium Enterprises

11/10/2021
by   Ruwan Nagahawatta, et al.
0

The advancement and the proliferation of information systems among enterprises have given rise to understanding cybersecurity. Cybersecurity practices provide a set of techniques and procedures to protect the systems, networks, programs and data from attack, damage, or unauthorised access. Such cybersecurity practices vary and are applied differently to different types of enterprises. The purpose of this research is to compare the critical cybersecurity threats and practices in the cloud context among micro, small, and medium enterprises. By conducting a survey among 289 micro, small and medium-sized enterprises in Australia, this study highlights the significant differences in their cloud security practices. It also concludes that future studies that focus on cybersecurity issues and practices in the context of cloud computing should pay attention to these differences.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/12/2018

Cloud Security Architecture and Implementation - A practical approach

While cloud computing provides lower Infrastructure cost, higher agility...
research
08/23/2021

Cloud Computing Adoption: Opportunities and Challenges for Small, Medium and Micro Enterprises in South Africa

The purpose of the paper is to determine the opportunities and challenge...
research
03/07/2021

Uncovering the Benefits and Challenges of Continuous Integration Practices

In 2006, Fowler and Foemmel defined ten core Continuous Integration (CI)...
research
07/02/2021

The Implementation of an ES in a Small Firm: The case of Silk Cooperation

The introduction of cloud computing has provided opportunities for small...
research
07/02/2021

Do Small Firms Implement Enterprise Systems Differently? The Case of E-Silk Route Ventures

The cost effectiveness, ease of learning, connectedness and in-depth ana...
research
07/19/2022

Exploring the Online Micro-targeting Practices of Small, Medium, and Large Businesses

Facebook and other advertising platforms exploit users data for marketin...
research
08/05/2021

Computing and Authentication Practices in Global Oil and Gas Fields

Oil and gas fields are a critical part of our infrastructure, and vulner...

Please sign up or login with your details

Forgot password? Click here to reset