Enemy at the gate: threats to information security
Communications of the ACM - Program compaction
Effective Anti-Spam Strategies in Companies: An International Study
HICSS '06 Proceedings of the 39th Annual Hawaii International Conference on System Sciences - Volume 06
Threats and countermeasures for information system security: A cross-industry study
Information and Management
Information Security Cultures of Four Professions: A Comparative Study
HICSS '08 Proceedings of the Proceedings of the 41st Annual Hawaii International Conference on System Sciences
Exploring the Suitability of IS Security Management Standards for SMEs
HICSS '08 Proceedings of the Proceedings of the 41st Annual Hawaii International Conference on System Sciences
Systems Theory Model for Information Security
HICSS '08 Proceedings of the Proceedings of the 41st Annual Hawaii International Conference on System Sciences
Building ISMS through the reuse of knowledge
TrustBus'10 Proceedings of the 7th international conference on Trust, privacy and security in digital business
Analyzing information security awareness through networks of association
TrustBus'10 Proceedings of the 7th international conference on Trust, privacy and security in digital business
Hi-index | 0.00 |
Despite the availability of numerous techniques for information security management and implementation, still many small-to-medium sized enterprises (SME) lack a holistic IT security infrastructure. There have been proposed various reasons for this, ranging from lacking security awareness to the complexity of solutions. However, it remains an open issue how an IT security infrastructure suitable for SME should be designed. This paper presents a research model describing the dependencies between security threats, requirements, and the related framework components. It also accounts for the adoption of security solutions in SME and the impact of human and technical factors. The model allows to quantitatively study the influences on security requirements and the adoption of the respective technologies. This is partially demonstrated by an empirical study conducted among south german SME. The obtained results reveal the current security technology adoption by SME and emphasize the need for an appropriate IT security infrastructure framework.