Cybersecurity Readiness in SMEs|Course hero helper

Posted: February 25th, 2023

Assignment Content

  1. In class, we learned how to write the introduction and conclusion of the Literature Review section, which includes:
    • Introduction (6 sentences on p. 10a)
    • Review of Literature (using notes on p. 13a – ONE objective summary is graded already — apply feedback)
    • Analysis of Literature (compare and contrast activity on p. 16a)
    • For this submission: You will submit your full draft of the Literature Review in a WORD document.
    •  YOU MUST CHECK YOUR SIMILARITY prior to submission here.
    • Grading: 
    • Title Page = 10 pts
    • Literature Review: Intro, Review of Literature, and Analysis of Literature WITH in-text citations and correct level headings:
    • Introduction = 15 pts
    • Review of Literature = 40 pts
    • Analysis of Literature = 20 pts
    • References page with ALL four research articles listed = 15 ptsNotes for Research Articles: Cybersecurity Readiness in SMEs

      Student Name

      Department, Institution

      turnitin
      We can write
      your paper for you
      100% original
      24/7 service
      50+ subjects

      Course Title

      Instructor Name

      Due Date

       

       

       

      Notes for Research Articles: Cybersecurity Readiness in SMEs

      W(5)H(1): New Research Article #1 (Basic Research Article): Cybersecurity Readiness in SMEs

      1. Who conducted the research?

      The study was conducted by Haiat Perozzo, Aurelio Ravarini and Fatema Zaghloul

      2. Why was the study completed (purpose / what researchers hoped to learn) ?

      The purpose of the study was to examine the preparedness of small and medium-sized enterprises in regards to dealing with cybersecurity challenges.

      3. When was data collected (not the publication year) ?

      Data was collected in 2021.

      4. Where was data collected (physical location) ?

      Data was collected in Italy

      5. How was data collected (methodology)? Cut and paste the paragraph below that describes the methodology and HIGHLIGHT the indicator words that specifically show you the methodology :

      Data was collected through use of interviews.

      “This study uses semi-structured interviews with companies belonging to the manufacturing sector, in which questions are prepared ahead of time but not strictly followed during the interview [23]. Despite the fact that semi-structured interviews have a series of pre-determined questions, they normally unfold in a way that allows interviewers to dig deeper into or discuss themes they consider as essential or require further attention” Perozzo et al. (2021).

      6. What were the findings? Cut and paste the paragraph below that describes the findings and HIGHLIGHT the sentences that specifically show you the summary of findings:

      The findings indicated that different organizations tend to have different levels of readiness in matters to do with cybersecurity.

      Company A is characterized by a total unawareness of cyber-risk. In addition to not presenting IT security tools, the company identifies itself as ‘too small’ to be a target of cybercrime. The company constitutes the stereotype of what we propose to name a dangerously unconscious organization. Company B, on the other hand, is confident in its potential in terms of computer security as it relies entirely on a third-party organization to fulfil this aspect. The model illustrates that the company does not actually possess any solidity and internal awareness. In addition, the company’s trust in the third party is such that it does not lead the client company to carry out checks on the IT security of the supplier itself. The stereotype generated by this company can be called cybersecurity–dependent on third parties. Finally, Company C, despite its medium size and its manufacturing nature, proved to be prepared for cyber-attacks. Indeed, the company has proven to be in line with the criteria defined by the CSRM model. However, it cannot be considered exempt from cybersecurity risks, having achieved only a medium level in the “availability of protection systems”. The profile generated for this type of company can be termed as realist” Perozzo et al. (2021).

      W(5)H(1): New Research Article #2 : The Impact of Cybersecurity Practices on Cyberattack Damage: The Perspective of Small Enterprises in Saudi Arabia

      1. Who conducted the research?

      The researchers who conducted the study were Fawaz AlharbiMajid AlsulamiAbdullatif AL-Solami, Yazeed Al-Otaibi, Meshaal Al-Osimi, Fahad Al-Qanor, and  Khalid Al-Otaibi

      2. Why was the study completed (purpose / what researchers hoped to learn) ?

      The purpose of the study was to gauge the impact of cybersecurity practices with respect to cybersecurity threats.

      3. When was data collected (not the publication year) ?

      Data was collected in the period between December, 2020 to March, 2021.

      4. Where was data collected (physical location) ?

      Data was collected in small enterprises in Saudi Arabia.

      5. How was data collected (methodology)? Cut and paste the paragraph below that describes the methodology and HIGHLIGHT the indicator words that specifically show you the methodology :

      Data was collected through use of surveys.

      “A total of 296 respondents, all of them involved in small enterprises in Saudi Arabia, responded to the survey during the period from 3 December 2020, through 18 March 2021. However, the responses of 14 participants were not included in the analysis as they were incomplete. Thus, 282 participants completed the online survey” (Alharbi et al., 2021).

      6. What were the findings? Cut and paste the paragraph below that describes the findings and HIGHLIGHT the sentences that specifically show you the summary of findings:

      The research findings showed that some organizations lost vital data during attacks but there was minimal financial damage. The period for recovery following attacks varied across organizations. The factors that had an impact on the damage were inspection team and recovery plan while loss of data was associated with cybersecurity awareness, knowledge of damage and the salaries of professionals.

      “While 20.5% of respondents stated that their organizations had lost sensitive data during the attacks, only 14.2% of the participants reported that the cybersecurity attack caused financial damage to their enterprises. The results are similar to findings from the Australian Competition and Consumer Commission (ACCC) [ 23], which indicated that 26.4% of small-sized organizations in Australia faced financial harm due to cybersecurity events . The amount of time it took SMEs in this study to restore their systems to normal functioning varied between enterprises and reached days (22.3%) or months in some cases (9.6%). This is considered a long time when compared with other enterprises, as mentioned in” (Alharbi et al., 2021).

      The results indicate that only two factors—inspection team and recovery plan—have an impact on the financial damage caused by cybersecurity attacks on small enterprises. The multiple regression analysis shows that small enterprises that have an inspection team and a recovery plan are less likely to suffer major financial damage in the event of a cybersecurity attack. This result shows the importance of having a dedicated team in place to review the procedures related to information security measures, as required by many authorities in Saudi Arabia, such as the Capital Market Authority” (Alharbi et al., 2021).

      W(5)H(1): New Research Article #3: Exploration of the Impact of Cybersecurity Awareness on Small and Medium Enterprises (SMEs) in Wales Using Intelligent Software to Combat Cybercrime.

      1. Who conducted the research?

      The study was conducted by Nisha Rawindaran, Ambikesh Jayal and Edmond Prakash

      2. Why was the study completed (purpose / what researchers hoped to learn) ?

      Rawindaran et al. (2022) looked to understand the significance of cybersecurity awareness in addressing cyber threats in SMEs.

      3. When was data collected (not the publication year) ?

      Data was collected in 2022.

      4. Where was data collected (physical location) ?

      Data was collected in Wales

      5. How was data collected (methodology)? Cut and paste the paragraph below that describes the methodology and HIGHLIGHT the indicator words that specifically show you the methodology :

      The researchers used surveys to collected data.

      “The methodology used in this paper follows positivism in the form of a quantitative approach using a survey questionnaire. It involves distribution of the survey to SMEs in Wales using convenience sampling in which data was collected from 122 sampled respondents. Qualtrics was used to create the survey and distribute it” (Rawindaran et al. 2022).

      6. What were the findings? Cut and paste the paragraph below that describes the findings and HIGHLIGHT the sentences that specifically show you the summary of findings:

      From the research it was evident that the levels of awareness were substantially low across worker populations in SMEs.

      “The respondents who gave these explanations identified that the support from their IT team was enough for them to not need to understand machine learning and relied on those companies to look after the SME needs, whilst others said that they were not sure if their software license had expired, only used simple anti-virus, or were run by third-party organizations such as a university. The above questions led to the SME being asked of the challenges of using machine learning in cyber security packages as shown in Figure 8. Nearly 72% stated that it was due to just being unaware, 10% stated that these challenges were due to barriers to technical expertise whilst 8% said it was due to the excessive cost of implementation and use” (Rawindaran et al., 2022).

      W(5)H(1): New Research Article #4: Assessing SMEs’ cybersecurity organizational readiness: Findings from an Italian survey

      1. Who conducted the research?

      The study was conducted by Martina Neri, Federico Niccolini and Rosario Pugliese.

      2. Why was the study completed (purpose / what researchers hoped to learn) ?

      The purpose of the research was to gauge the level of preparedness of SMEs in dealing with cyber threats.

      3. When was data collected (not the publication year) ?

      Data was collected between December 2020 and February 2021

      4. Where was data collected (physical location) ?

      The study was conducted in Italy.

      5. How was data collected (methodology)? Cut and paste the paragraph below that describes the methodology and HIGHLIGHT the indicator words that specifically show you the methodology :

      The research used survey administration to collect data.

      “We conducted the assessment both quantitatively and qualitatively to obtain more detailed and meaningful information about SMEs’ organizational cybersecurity readiness. The quantitative assessment consists of a survey structured into four sections. Each section investigates fundamental features with which to assess and improve organizational readiness within the cyber domain” (Neri et al., 2022).

      6. What were the findings? Cut and paste the paragraph below that describes the findings and HIGHLIGHT the sentences that specifically show you the summary of findings:

      The findings indicated that SMEs in Italy feature both strengths and weaknesses in regards to cybersecurity

      “Our overall assessment suggests that Italian SMEs demonstrate certain strengths but also reveal some weaknesses. These SMEs appear to be aware of critical information’s value. In addition, SMEs detected threats from both inside and outside the organization. Decision-makers are concerned with day-to-day activities; consequently, their long-term planning is limited. Their lack of a cybersecurity budget also confirms this. This lack of a dedicated cybersecurity budget prevents SMEs from taking the required proactive steps to prevent cyber-attacks, which could be due to a lack of awareness and a tendency to focus on corporate activities’ more operational aspects. As previously observed, small businesses are less likely to consider themselves targets of cybercriminals” (Neri et al., 2022).

       

       

       

       

       

       

       

       

       

       

       

       

      References

      Alharbi, F., Alsulami, M., Al-Solami, A., Al-Otaibi, Y., Al-Osimi, M., Al-Qanor, F., & Al-Otaibi, K. (2021). The impact of cybersecurity practices on cyberattack damage: The perspective of small enterprises in Saudi Arabia. Sensors, 21(20), 6901. 10.3390/s21206901

      Neri, M., Niccolini, F., & Pugliese, R. Assessing SMEs’ cybersecurity organizational readiness: Findings from an Italian survey. Online Journal of Applied Knowledge Management https://www.researchgate.net/publication/363741932_Assessing_SMEs’_cybersecurity_organizational_readiness_Findings_from_an_Italian_survey

      Perozzo, H., Ravarini, A., & Zaghloul, F. (2021). Assessing Cybersecurity Readiness within SMEs: Proposal of a Socio-Technical based Model.  Proceedings. https://ceur-ws.org/Vol-3239/paper3.pdf

      Rawindaran, N., Jayal, A., & Prakash, E. (2022). Exploration of the Impact of Cybersecurity Awareness on Small and Medium Enterprises (SMEs) in Wales Using Intelligent Software to Combat Cybercrime.  Computers11(12), 174. https://doi.org/10.3390/ computers11120174

SOLUTION

Company B is aware of the risks of cybercrime and has implemented some security measures, but its employees have not received any specific training on how to deal with these risks. Company C is the most prepared in cybersecurity terms, having implemented specific policies and procedures for dealing with cyber threats, as well as providing training to its employees to recognize and prevent cyber risks.” Perozzo et al. (2021).

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00