Cybersecurity Issues and Practices in a Cloud Context: A Comparison Amongst Micro, Small and Medium Enterprises

11/10/2021
by   Ruwan Nagahawatta, et al.
0

The advancement and the proliferation of information systems among enterprises have given rise to understanding cybersecurity. Cybersecurity practices provide a set of techniques and procedures to protect the systems, networks, programs and data from attack, damage, or unauthorised access. Such cybersecurity practices vary and are applied differently to different types of enterprises. The purpose of this research is to compare the critical cybersecurity threats and practices in the cloud context among micro, small, and medium enterprises. By conducting a survey among 289 micro, small and medium-sized enterprises in Australia, this study highlights the significant differences in their cloud security practices. It also concludes that future studies that focus on cybersecurity issues and practices in the context of cloud computing should pay attention to these differences.

READ FULL TEXT
POST COMMENT

Comments

There are no comments yet.

Authors

page 1

page 2

page 3

page 4

08/12/2018

Cloud Security Architecture and Implementation - A practical approach

While cloud computing provides lower Infrastructure cost, higher agility...
08/23/2021

Cloud Computing Adoption: Opportunities and Challenges for Small, Medium and Micro Enterprises in South Africa

The purpose of the paper is to determine the opportunities and challenge...
07/02/2021

The Implementation of an ES in a Small Firm: The case of Silk Cooperation

The introduction of cloud computing has provided opportunities for small...
08/19/2021

On the Future of Cloud Engineering

Ever since the commercial offerings of the Cloud started appearing in 20...
07/02/2021

Do Small Firms Implement Enterprise Systems Differently? The Case of E-Silk Route Ventures

The cost effectiveness, ease of learning, connectedness and in-depth ana...
06/15/2021

Best Practices for Notification Studies for Security and Privacy Issues on the Internet

Researchers help operators of vulnerable and non-compliant internet serv...
08/05/2021

Computing and Authentication Practices in Global Oil and Gas Fields

Oil and gas fields are a critical part of our infrastructure, and vulner...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.