2023
DOI: 10.1016/j.jjimei.2023.100191
|View full text |Cite
|
Sign up to set email alerts
|

Perspective of small and medium enterprise (SME's) and their relationship with government in overcoming cybersecurity challenges and barriers in Wales

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 22 publications
0
1
0
Order By: Relevance
“…These challenges range from financial constraints to a lack of cybersecurity awareness among employees. Rawindaran et al (2023) explore the cybersecurity landscape for SMEs in Wales, highlighting the critical role of government collaboration in overcoming cybersecurity challenges. The study, which involved qualitative research with 34 SMEs, identifies significant barriers such as the high costs associated with adopting intelligent software packages and the need for skilled personnel to manage cybersecurity initiatives.…”
Section: Challenges and Barriers To Implementing Cybersecurity Measuresmentioning
confidence: 99%
“…These challenges range from financial constraints to a lack of cybersecurity awareness among employees. Rawindaran et al (2023) explore the cybersecurity landscape for SMEs in Wales, highlighting the critical role of government collaboration in overcoming cybersecurity challenges. The study, which involved qualitative research with 34 SMEs, identifies significant barriers such as the high costs associated with adopting intelligent software packages and the need for skilled personnel to manage cybersecurity initiatives.…”
Section: Challenges and Barriers To Implementing Cybersecurity Measuresmentioning
confidence: 99%
“…The findings of this study closely match with the earlier research conducted in small and mediumsized enterprises (SMEs) across developing countries. SMEs frequently operate with simpler systems, which might pose challenges in adopting rigorous cybersecurity protocols (Rawindaran et al, 2023). The absence of intricate business operations and outdated legacy systems is regarded as a favorable aspect in this scenario.…”
Section: Conclusion and Discussionmentioning
confidence: 99%