SMEs Confidentiality Issues and Adoption of Good Cybersecurity Practices

07/16/2020
by   Alireza Shojaifar, et al.
0

Small and medium-sized enterprises (SME) are considered more vulnerable to cyber-attacks. However, and based on SMEs characteristics, they do not adopt good cybersecurity practices. To address the SMEs security adoption problem, we are designing a do-it-yourself (DIY) security assessment and capability improvement method, CYSEC. In the first validation of CYSEC, we conducted a multi-case study in four SMEs. We observed that confidentiality concerns could influence users decisions to provide CYSEC with relevant and accurate security information. The lack of precise information may impact our DIY assessment method to provide accurate recommendations. In this paper, we explore the importance of dynamic consent and its effect on SMEs trust perception and sharing information. We discuss the lack of trust perception may be addressed by applying dynamic consent. Finally, we describe the results of three interviews with SMEs and present how the new way of communication in CYSEC can help us to understand better SMEs attitudes towards sharing information.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/13/2020

SMEs Confidentiality Concerns for Security Information Sharing

Small and medium sized enterprises are considered an essential part of t...
research
07/15/2020

Automating the Communication of Cybersecurity Knowledge: Multi-Case Study

Cybersecurity is essential for the protection of companies against cyber...
research
01/19/2022

Defining Security Requirements with the Common Criteria: Applications, Adoptions, and Challenges

Advances of emerging Information and Communications Technology (ICT) tec...
research
06/24/2020

Less is More: Exploiting Social Trust to Increase the Effectiveness of a Deception Attack

Cyber attacks such as phishing, IRS scams, etc., still are successful in...
research
07/16/2020

Elicitation of SME Requirements for Cybersecurity Solutions by Studying Adherence to Recommendations

Small and medium-sized enterprises (SME) have become the weak spot of ou...
research
05/17/2021

Confidence Assertions in Cyber-Security for an Information-Sharing Environment

Information sharing is vital in resisting cyberattacks, and the volume a...
research
07/23/2022

Will You Trust This TLS Certificate? Perceptions of People Working in IT (Extended Version)

Flawed TLS certificates are not uncommon on the Internet. While they sig...

Please sign up or login with your details

Forgot password? Click here to reset