IDEAS home Printed from https://ideas.repec.org/a/eee/bushor/v63y2020i4p531-540.html
   My bibliography  Save this article

Calculated risk? A cybersecurity evaluation tool for SMEs

Author

Listed:
  • Benz, Michael
  • Chatterjee, Dave

Abstract

Small and medium-sized enterprises (SMEs) are among the least mature and most vulnerable in terms of their cybersecurity risk and resilience. In this article, we describe a methodology developed using the National Institute of Standards and Technology’s (NIST) Cybersecurity Framework (CSF) as a starting point. The NIST CSF does not meet all the needs of the SME IT leader, but it offers a solid foundation for a useful evaluation and recommendation methodology. We propose an SME cybersecurity evaluation tool (CET) that consists of a 35-question online survey to be completed by IT leaders to self-rate their maturity within the five NIST framework categories: identify, protect, detect, respond, and recover. We outline this approach to cybersecurity risk management before discussing its effectiveness and implications for practitioners.

Suggested Citation

  • Benz, Michael & Chatterjee, Dave, 2020. "Calculated risk? A cybersecurity evaluation tool for SMEs," Business Horizons, Elsevier, vol. 63(4), pages 531-540.
  • Handle: RePEc:eee:bushor:v:63:y:2020:i:4:p:531-540
    DOI: 10.1016/j.bushor.2020.03.010
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0007681320300392
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.bushor.2020.03.010?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Hooper, Val & McKissack, Jeremy, 2016. "The emerging role of the CISO," Business Horizons, Elsevier, vol. 59(6), pages 585-591.
    2. Abraham, Chon & Chatterjee, Dave & Sims, Ronald R., 2019. "Muddling through cybersecurity: Insights from the U.S. healthcare industry," Business Horizons, Elsevier, vol. 62(4), pages 539-548.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Idiano D’Adamo & Rocío González-Sánchez & Maria Sonia Medina-Salgado & Davide Settembre-Blundo, 2021. "E-Commerce Calls for Cyber-Security and Sustainability: How European Citizens Look for a Trusted Online Environment," Sustainability, MDPI, vol. 13(12), pages 1-17, June.
    2. Meghisan-Toma Georgeta-Madalina & Nicula Vasile Cosmin, 2020. "ICT Security Measures for the Companies within European Union Member States – Perspectives in COVID-19 Context," Proceedings of the International Conference on Business Excellence, Sciendo, vol. 14(1), pages 362-370, July.
    3. You-Shyang Chen & Jerome Chih-Lung Chou & Yu-Sheng Lin & Ying-Hsun Hung & Xuan-Han Chen, 2023. "Identification of SMEs in the Critical Factors of an IS Backup System Using a Three-Stage Advanced Hybrid MDM–AHP Model," Sustainability, MDPI, vol. 15(4), pages 1-29, February.
    4. Falch, Morten & Olesen, Henning & Skouby, Knud Erik & Tadayoni, Reza & Williams, Idongesit, 2022. "Cybersecurity in SMEs in the Baltic Sea Region," 31st European Regional ITS Conference, Gothenburg 2022: Reining in Digital Platforms? Challenging monopolies, promoting competition and developing regulatory regimes 265624, International Telecommunications Society (ITS).
    5. Tahereh Hasani & Norman O’Reilly & Ali Dehghantanha & Davar Rezania & Nadège Levallet, 2023. "Evaluating the adoption of cybersecurity and its influence on organizational performance," SN Business & Economics, Springer, vol. 3(5), pages 1-38, May.
    6. Wei Yu & Huiqin Huang & Xinyan Kong & Keying Zhu, 2023. "Can Digital Inclusive Finance Improve the Financial Performance of SMEs?," Sustainability, MDPI, vol. 15(3), pages 1-16, January.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Hayes, Darren R. & Cappa, Francesco, 2018. "Open-source intelligence for risk assessment," Business Horizons, Elsevier, vol. 61(5), pages 689-697.
    2. Meghisan-Toma Georgeta-Madalina & Nicula Vasile Cosmin, 2020. "ICT Security Measures for the Companies within European Union Member States – Perspectives in COVID-19 Context," Proceedings of the International Conference on Business Excellence, Sciendo, vol. 14(1), pages 362-370, July.
    3. Camélia Radu & Nadia Smaili, 2022. "Board Gender Diversity and Corporate Response to Cyber Risk: Evidence from Cybersecurity Related Disclosure," Journal of Business Ethics, Springer, vol. 177(2), pages 351-374, May.
    4. Ravi, Akash, 2022. "Evaluating the Need for C-level Executives to Drive Quality Initiatives in Technology Companies," OSF Preprints 2nwkr, Center for Open Science.
    5. Abraham, Chon & Chatterjee, Dave & Sims, Ronald R., 2019. "Muddling through cybersecurity: Insights from the U.S. healthcare industry," Business Horizons, Elsevier, vol. 62(4), pages 539-548.
    6. Turlough Guerin, 2022. "Questions that board directors should be asking about emerging governance issues and risk: a practitioner’s view and implications for the extractive industries," Mineral Economics, Springer;Raw Materials Group (RMG);Luleå University of Technology, vol. 35(2), pages 221-237, June.
    7. Lee, In, 2021. "Cybersecurity: Risk management framework and investment cost analysis," Business Horizons, Elsevier, vol. 64(5), pages 659-671.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:bushor:v:63:y:2020:i:4:p:531-540. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: http://www.elsevier.com/locate/bushor .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.