IDEAS home Printed from https://ideas.repec.org/a/eee/ininma/v31y2011i4p360-365.html
   My bibliography  Save this article

Factors influencing information security management in small- and medium-sized enterprises: A case study from Turkey

Author

Listed:
  • Yeniman Yildirim, Ebru
  • Akalp, Gizem
  • Aytac, Serpil
  • Bayram, Nuran

Abstract

The aims of the study were to examine enterprise information security in small and medium-sized enterprises (SMEs) in Bursa, Turkey and to compare the results with similar data gathered from different countries. This study was conducted through questionnaires consisting of 49 questions grouped into 9 sections. The questionnaires were delivered to 97 SMEs in Bursa, Turkey. The companies have been operating for 15.93±11.67 (2–54) years. The number of PCs in the companies and their years of use were in the ranges of 53.51±64.88 (2–240) and 12.47±6.32 (1–30) years, respectively. According to the findings of this study, it can be speculated that when Communications and Operations Management and security policy improve, other security parameters in the companies, such as Organizational, Personnel and Physical and Environmental Securities improve as well. In addition, the results have shown that Turkish companies do not attach as much importance to information technology security as their counterpart companies from different countries do.

Suggested Citation

  • Yeniman Yildirim, Ebru & Akalp, Gizem & Aytac, Serpil & Bayram, Nuran, 2011. "Factors influencing information security management in small- and medium-sized enterprises: A case study from Turkey," International Journal of Information Management, Elsevier, vol. 31(4), pages 360-365.
  • Handle: RePEc:eee:ininma:v:31:y:2011:i:4:p:360-365
    DOI: 10.1016/j.ijinfomgt.2010.10.006
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0268401210001520
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ijinfomgt.2010.10.006?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Soomro, Zahoor Ahmed & Shah, Mahmood Hussain & Ahmed, Javed, 2016. "Information security management needs more holistic approach: A literature review," International Journal of Information Management, Elsevier, vol. 36(2), pages 215-225.
    2. Silva, Maisa Mendonça & de Gusmão, Ana Paula Henriques & Poleto, Thiago & Silva, Lúcio Camara e & Costa, Ana Paula Cabral Seixas, 2014. "A multidimensional approach to information security risk management using FMEA and fuzzy theory," International Journal of Information Management, Elsevier, vol. 34(6), pages 733-740.
    3. Baillette, Paméla & Barlette, Yves & Leclercq-Vandelannoitte, Aurélie, 2018. "Bring your own device in organizations: Extending the reversed IT adoption logic to security paradoxes for CEOs and end users," International Journal of Information Management, Elsevier, vol. 43(C), pages 76-84.
    4. Grant, Kevin & Edgar, David & Sukumar, Arun & Meyer, Martin, 2014. "‘Risky business’: Perceptions of e-business risk by UK small and medium sized enterprises (SMEs)," International Journal of Information Management, Elsevier, vol. 34(2), pages 99-122.
    5. Gaurav, Akshat & Gupta, Brij B. & Panigrahi, Prabin Kumar, 2022. "A novel approach for DDoS attacks detection in COVID-19 scenario for small entrepreneurs," Technological Forecasting and Social Change, Elsevier, vol. 177(C).

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:ininma:v:31:y:2011:i:4:p:360-365. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/international-journal-of-information-management .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.