Cybersecurity Issues and Practices in a Cloud Context: A Comparison Amongst Micro, Small and Medium Enterprises

The advancement and the proliferation of information systems among enterprises have given rise to understanding cybersecurity. Cybersecurity practices provide a set of techniques and procedures to protect the systems, networks, programs and data from attack, damage, or unauthorised access. Such cybersecurity practices vary and are applied differently to different types of enterprises. The purpose of this research is to compare the critical cybersecurity threats and practices in the cloud context among micro, small, and medium enterprises. By conducting a survey among 289 micro, small and mediumsized enterprises in Australia, this study highlights the significant differences in their cloud security practices. It also concludes that future studies that focus on cybersecurity issues and practices in the context of cloud computing should pay attention to these differences.

[1]  Darshana Sedera,et al.  Does it get better over time? A longitudinal assessment of enterprise system user performance , 2019, Inf. Technol. People.

[2]  Sander Greenland,et al.  Inferential Statistics as Descriptive Statistics: There Is No Replication Crisis if We Don’t Expect Replication , 2018, The American Statistician.

[3]  William Yeoh,et al.  Factors That Influence Adoption of Cloud Computing: An Empirical Study of Australian SMEs , 2018, Australas. J. Inf. Syst..

[4]  Arumugam Seetharaman,et al.  The usage and adoption of cloud computing by small and medium businesses , 2013, Int. J. Inf. Manag..

[5]  Wendy S. W. Wong,et al.  Strelka: accurate somatic small-variant calling from sequenced tumor-normal sample pairs , 2012, Bioinform..

[6]  Antonio Brogi,et al.  Cloud Container Technologies: A State-of-the-Art Review , 2019, IEEE Transactions on Cloud Computing.

[7]  Bharat Bhushan,et al.  Information Security threats and attacks with conceivable counteraction , 2019, 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT).

[8]  Tiago Oliveira,et al.  Assessing the determinants of cloud computing adoption: An analysis of the manufacturing and services sectors , 2014, Inf. Manag..

[9]  Tom Gibson,et al.  Defining SMEs : A Less Imperfect Way of Defining Small and Medium Enterprises in Developing Countries Summary : , 2008 .

[10]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[11]  Joseph F. Hair,et al.  Partial least squares structural equation modeling (PLS-SEM): An emerging tool in business research , 2014 .

[13]  Todd-Malmlov April , 1872, The Hospital.

[14]  William Yeoh,et al.  A Study of Cyber Security Issues in Sri Lanka , 2020, Int. J. Cyber Warf. Terror..

[15]  Eileen Doherty,et al.  Migrating to the cloud: Examining the drivers and barriers to adoption of cloud computing by SMEs in Ireland: an exploratory study , 2015 .

[16]  Torsten Eymann,et al.  Should We Stay or Should We Go? Analyzing Continuance of Cloud Enterprise Systems , 2018, J. Inf. Technol. Theory Appl..

[17]  M. Fleischer,et al.  processes of technological innovation , 1990 .

[18]  Seung-Kuk Paik Supply Management in Small and Medium-Sized Enterprises: Role of SME Size , 2011 .

[19]  Sanjay Kumar Madria,et al.  QoS guaranteeing robust scheduling in attack resilient cloud integrated cyber physical system , 2017, Future Gener. Comput. Syst..

[20]  A. Tiwari,et al.  Review of cybersecurity issues in industrial critical infrastructure: manufacturing in perspective , 2017 .

[21]  Arash Asiaei,et al.  A multifaceted framework for adoption of cloud computing in Malaysian SMEs , 2019, Journal of Science and Technology Policy Management.

[22]  Peter Buxmann,et al.  Investigating the Security Divide between SME and Large Companies: How SME Characteristics Influence Organizational IT Security Investments , 2019, Information Systems Frontiers.

[23]  Paul Benjamin Lowry,et al.  security and privacy research lies , 2017 .

[24]  James J. Jiang,et al.  Rethinking the role of security in client satisfaction with Software-as-a-Service (SaaS) providers , 2015, Decis. Support Syst..

[25]  Elaine Aspinwall,et al.  Characterizing knowledge management in the small business environment , 2004, J. Knowl. Manag..

[26]  A. Ključnikov,et al.  Risk Perception Differences between Micro-, Small and Medium Enterprises , 2015 .

[27]  Eduardo B. Fernández,et al.  An analysis of security issues for cloud computing , 2013, Journal of Internet Services and Applications.

[28]  Manal M. Yunis,et al.  Factors Influencing SMEs’ Adoption of Cloud Computing Services in Lebanon: An Empirical Analysis Using TOE and Contextual Theory , 2020, IEEE Access.

[29]  Scott Salzman,et al.  Security Concerns Influencing the Adoption of Cloud Computing of SMEs: A Literature Review , 2021, AMCIS.

[30]  Darshana Sedera,et al.  Enterprise System Lifecycle-wide Innovation , 2020, ArXiv.

[31]  Kenneth L. Kraemer,et al.  The Process of Innovation Assimilation by Firms in Different Countries: A Technology Diffusion Perspective on E-Business , 2006, Manag. Sci..

[32]  Rajkumar Buyya,et al.  Next generation cloud computing: New trends and research directions , 2017, Future Gener. Comput. Syst..

[33]  Darshana Sedera,et al.  Moving from Evaluation to Trial: How do SMEs Start Adopting Cloud ERP? , 2015, Australas. J. Inf. Syst..

[34]  Anastasia Papazafeiropoulou,et al.  An evaluation framework for Health Information Systems: human, organization and technology-fit factors (HOT-fit) , 2008, Int. J. Medical Informatics.

[35]  H. Gupta,et al.  Identifying enablers of technological innovation for Indian MSMEs using best–worst multi criteria decision making method , 2016 .

[36]  Robert J. McQueen,et al.  Size matters: the impact of combinations of ICT assets on the performance of Chilean micro, small and medium enterprises , 2020, Inf. Technol. Dev..

[37]  Rennie Naidoo,et al.  Modeling the adoption of cloud computing to assess South African SMEs: An integrated perspective , 2019, ICICIS.

[38]  Mikko T. Siponen,et al.  Toward a Unified Model of Information Security Policy Compliance , 2018, MIS Q..

[39]  Marco Spruit,et al.  Organizational Characteristics Influencing SME Information Security Maturity , 2016, J. Comput. Inf. Syst..

[40]  Darshana Sedera,et al.  Does Size Matter? The Implications of Firm Size on Enterprise Systems Success , 2016, Australas. J. Inf. Syst..

[41]  Yolanda Polo Redondo,et al.  Importance of company size in long‐term orientation of supply function: an empirical research , 2007 .