IDEAS home Printed from https://ideas.repec.org/a/eee/teinso/v76y2024ics0160791x24000186.html
   My bibliography  Save this article

Search engine optimization poisoning: A cybersecurity threat analysis and mitigation strategies for small and medium-sized enterprises

Author

Listed:
  • Le, Tran Duc
  • Le-Dinh, Thang
  • Uwizeyemungu, Sylvestre

Abstract

This study investigates the emerging cybersecurity threat of search engine optimization (SEO) poisoning and its impact on small and medium-sized enterprises’ (SMEs) digital marketing efforts. Through a comprehensive analysis of SEO poisoning techniques employed by attackers, the study reveals the significant risks and consequences for SMEs, including reputational damage, financial losses, and disrupted operations. To address these threats, the study proposes tailored mitigation strategies aligned with the principles of the NIST Cybersecurity Framework while considering the resource constraints facing SMEs. The mitigation recommendations encompass technical measures such as website security audits and employee training alongside non-technical initiatives to foster a culture of cybersecurity awareness. Additionally, the study offers several discussions that elucidate the multifaceted challenges posed by SEO poisoning in the SME context from both internal and external perspectives. These contributions will empower SMEs and digital marketers to implement proactive safeguards against SEO poisoning risks and preserve their online presence. The study underscores the need for continued vigilance and adaptive security to combat the evolving tactics of cyber adversaries in the digital marketing domain.

Suggested Citation

  • Le, Tran Duc & Le-Dinh, Thang & Uwizeyemungu, Sylvestre, 2024. "Search engine optimization poisoning: A cybersecurity threat analysis and mitigation strategies for small and medium-sized enterprises," Technology in Society, Elsevier, vol. 76(C).
  • Handle: RePEc:eee:teinso:v:76:y:2024:i:c:s0160791x24000186
    DOI: 10.1016/j.techsoc.2024.102470
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0160791X24000186
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.techsoc.2024.102470?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Stella Tomasi & Xiaolin Li, 2015. "Influences of Search Engine Optimization on Performance of SMEs: A Qualitative Perceptive," Journal of Electronic Commerce in Organizations (JECO), IGI Global, vol. 13(1), pages 27-49, January.
    2. Kamiya, Shinichi & Kang, Jun-Koo & Kim, Jungmin & Milidonis, Andreas & Stulz, René M., 2021. "Risk management, firm reputation, and the impact of successful cyberattacks on target firms," Journal of Financial Economics, Elsevier, vol. 139(3), pages 719-749.
    3. Abraham, Sherly & Chengalur-Smith, InduShobha, 2010. "An overview of social engineering malware: Trends, tactics, and implications," Technology in Society, Elsevier, vol. 32(3), pages 183-196.
    4. Christos Ziakis & Maro Vlachopoulou & Theodosios Kyrkoudis & Makrina Karagkiozidou, 2019. "Important Factors for Improving Google Search Rank," Future Internet, MDPI, vol. 11(2), pages 1-12, January.
    5. Yves Barlette & Katherine Gundolf & Annabelle Jaouen, 2017. "CEOs’ information security behavior in SMEs: Does ownership matter?," Post-Print hal-02000435, HAL.
    6. John William Walker, 2021. "Data Security for the SME," International Journal of Cyber Forensics and Advanced Threat Investigations, Concept Tech Publishing, vol. 1(1-3), pages 47-52.
    7. Alsharida, Rawan A. & Al-rimy, Bander Ali Saleh & Al-Emran, Mostafa & Zainal, Anazida, 2023. "A systematic review of multi perspectives on human cybersecurity behavior," Technology in Society, Elsevier, vol. 73(C).
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Chris Florakis & Christodoulos Louca & Roni Michaely & Michael Weber, 2020. "Cybersecurity Risk," Working Papers 2020-178, Becker Friedman Institute for Research In Economics.
    2. Daniel Celeny & Loic Mar'echal & Evgueni Rousselot & Alain Mermoud & Mathias Humbert, 2024. "Prioritizing Investments in Cybersecurity: Empirical Evidence from an Event Study on the Determinants of Cyberattack Costs," Papers 2402.04773, arXiv.org.
    3. Naci Akdemir & Serkan Yenal, 2021. "How Phishers Exploit the Coronavirus Pandemic: A Content Analysis of COVID-19 Themed Phishing Emails," SAGE Open, , vol. 11(3), pages 21582440211, July.
    4. Hayes, Darren R. & Cappa, Francesco, 2018. "Open-source intelligence for risk assessment," Business Horizons, Elsevier, vol. 61(5), pages 689-697.
    5. Agbodoh-Falschau, Kouassi Raymond & Ravaonorohanta, Bako Harinivo, 2023. "Investigating the influence of governance determinants on reporting cybersecurity incidents to police: Evidence from Canadian organizations’ perspectives," Technology in Society, Elsevier, vol. 74(C).
    6. Asad Hussain & Sunila Fatima Ahmad & Mishal Tanveer & Ansa Sameen Iqbal, 2022. "Computer Malware Classification, Factors, and Detection Techniques: A Systematic Literature Review (SLR)," International Journal of Innovations in Science & Technology, 50sea, vol. 4(3), pages 899-918, August.
    7. Jing Chen & Elaine Henry & Xi Jiang, 2023. "Is Cybersecurity Risk Factor Disclosure Informative? Evidence from Disclosures Following a Data Breach," Journal of Business Ethics, Springer, vol. 187(1), pages 199-224, September.
    8. Daniel Celeny & Loic Mar'echal, 2024. "Cyber risk and the cross-section of stock returns," Papers 2402.04775, arXiv.org, revised Mar 2024.
    9. Milunovich, George & Lee, Seung Ah, 2022. "Measuring the impact of digital exchange cyberattacks on Bitcoin Returns," Economics Letters, Elsevier, vol. 221(C).
    10. Artur Strzelecki, 2020. "Google Medical Update: Why Is the Search Engine Decreasing Visibility of Health and Medical Information Websites?," IJERPH, MDPI, vol. 17(4), pages 1-13, February.
    11. Zängerle, Daniel & Schiereck, Dirk, 2022. "Modelling and predicting enterprise‑level cyber risks in the context of sparse data availability," Publications of Darmstadt Technical University, Institute for Business Studies (BWL) 136276, Darmstadt Technical University, Department of Business Administration, Economics and Law, Institute for Business Studies (BWL).
    12. Nguyen, Phan Dinh & Tran, Lobel Trong Thuy & Baker, John, 2021. "Driving university brand value through social media," Technology in Society, Elsevier, vol. 65(C).
    13. Aldasoro, Iñaki & Gambacorta, Leonardo & Giudici, Paolo & Leach, Thomas, 2022. "The drivers of cyber risk," Journal of Financial Stability, Elsevier, vol. 60(C).
    14. Alessandro Fedele & Cristian Roner, 2022. "Dangerous games: A literature review on cybersecurity investments," Journal of Economic Surveys, Wiley Blackwell, vol. 36(1), pages 157-187, February.
    15. Mohammad Ashraful Ferdous Chowdhury & Mohammad Abdullah & Nurun Nowshin Chowdhury Nazia & Debarshi Roy, 2023. "The nonlinear and threshold effects of IT investment on the banking sector of Bangladesh," Economic Change and Restructuring, Springer, vol. 56(6), pages 4253-4283, December.
    16. Corbet, Shaen & Goodell, John W., 2022. "The reputational contagion effects of ransomware attacks," Finance Research Letters, Elsevier, vol. 47(PB).
    17. Wu, Xi & Wang, Yudong & Tong, Xinle, 2021. "Cash holdings and oil price uncertainty exposures," Energy Economics, Elsevier, vol. 99(C).
    18. Andreas Veglis & Dimitrios Giomelakis, 2019. "Search Engine Optimization," Future Internet, MDPI, vol. 12(1), pages 1-2, December.
    19. Toni Ahnert & Michael Brolley & David Cimon & Ryan Riordan, 2022. "Cyber Risk and Security Investment," Staff Working Papers 22-32, Bank of Canada.
    20. Akey, Pat & Grégoire, Vincent & Martineau, Charles, 2022. "Price revelation from insider trading: Evidence from hacked earnings news," Journal of Financial Economics, Elsevier, vol. 143(3), pages 1162-1184.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:teinso:v:76:y:2024:i:c:s0160791x24000186. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/technology-in-society .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.