Basic cyber hygiene: Does it work?
A number of security certifications for small-and medium-size enterprises have been
proposed, but how effective are these schemes? We evaluated the effectiveness of Cyber …
proposed, but how effective are these schemes? We evaluated the effectiveness of Cyber …
One size does not fit all: exploring the cybersecurity perspectives and engagement preferences of UK-Based small businesses
M Wilson, S McDonald - Information Security Journal: A Global …, 2025 - Taylor & Francis
This study examines the cybersecurity needs of UK-based Small and Medium-sized
Enterprises (SMEs) via thematic interviews grounded in the Health Belief Model with ten …
Enterprises (SMEs) via thematic interviews grounded in the Health Belief Model with ten …
Pragmatic security: modelling it security management responsibilities for SME archetypes
S Parkin, A Fielder, A Ashby - Proceedings of the 8th ACM CCS …, 2016 - dl.acm.org
Here we model the indirect costs of deploying security controls in small-to-medium
enterprises (SMEs) to manage cyber threats. SMEs may not have the in-house skills and …
enterprises (SMEs) to manage cyber threats. SMEs may not have the in-house skills and …
Evaluating the impact of government Cyber Security initiatives in the UK
AT Odebade, E Benkhelifa - arxiv preprint arxiv:2303.13943, 2023 - arxiv.org
Cyber security initiatives provide immense opportunities for governments to educate, train,
create awareness, and promote cyber hygiene among businesses and the general public …
create awareness, and promote cyber hygiene among businesses and the general public …
A viewpoint on management practices for cybersecurity in industry 4.0 environment
NU Zia, VK Owusu - ECCWS 2020 20th European Conference on …, 2020 - books.google.com
Industry 4.0 is characterized by the smart business developments, application of cyber-
physical systems, internet of things (IOTs), excessive use of big data, etc. In other words, it is …
physical systems, internet of things (IOTs), excessive use of big data, etc. In other words, it is …
SME Cybersecurity Misconceptions: A Guide for Decision Makers
M Wilson, S McDonald - Cybersecurity for Decision Makers, 2023 - taylorfrancis.com
In this chapter, we explore small and medium-sized enterprises'(SMEs') attitudes to
cybersecurity adoption in the United Kingdom through a survey of 85 small businesses. The …
cybersecurity adoption in the United Kingdom through a survey of 85 small businesses. The …
A Lot Less Likely Than I Thought: Introducing Evidence-Based Security Risk Assessment for Healthcare Software
Security and privacy are particularly important for health applications and health-related
devices. So, it is vital that health software developers, especially in small to medium …
devices. So, it is vital that health software developers, especially in small to medium …
Work in Progress: Evaluation of Security Standards through a Cyber Range using Hackers' Tactics, Techniques and Procedures
We present a framework for the creation of a cyber range to test the effectiveness of security
standards, policies and frameworks. These assets guide organisations on how to protect …
standards, policies and frameworks. These assets guide organisations on how to protect …
Shellshock vulnerability exploitation and mitigation: a demonstration
R Shetty, KKR Choo, R Kaufman - … and Techniques in Cyber Security and …, 2018 - Springer
This paper presents a step-by-step demonstration for the exploitation of CVE-2014-6271,
affecting the 'Bourne Again Shell'(Bash). By design, Bash cannot be accessed via a web …
affecting the 'Bourne Again Shell'(Bash). By design, Bash cannot be accessed via a web …
A System for Cost-Efficient Cybersecurity Planning, Compliance, and Investment Prioritization
B Shaqiri - 2023 - zora.uzh.ch
While the digital era provides many advantages, it also comes with significant risks related to
cybersecurity. Organizations must be proactive in reducing the risks involved with …
cybersecurity. Organizations must be proactive in reducing the risks involved with …