发展中国家的小企业如何看待数字时代的网络安全风险:印尼案例

Ratna Yudhiyati, Afrida Putritama, Diana Rahmawati
{"title":"发展中国家的小企业如何看待数字时代的网络安全风险:印尼案例","authors":"Ratna Yudhiyati, Afrida Putritama, Diana Rahmawati","doi":"10.1108/jices-03-2021-0035","DOIUrl":null,"url":null,"abstract":"\nPurpose\nThis study aims to identify and analyse the issues faced by internet-based small businesses in developing countries regarding cybersecurity and document how these businesses address the risks.\n\n\nDesign/methodology/approach\nThis study used the qualitative method. Respondents were internet-based small businesses selected by using theoretical sampling. Data were collected by using interviews and observations. The validity of the analysis was ensured by using triangulation and member checking.\n\n\nFindings\nThis study reveals that small businesses managed to identify the loss of physical and monetary assets as possible damage. However, only a few businesses identified loss of intangible assets as possible cyber risks. Most small businesses had used basic cybersecurity measures to protect data access and some primary business activities. Unfortunately, they rarely take initiatives in preventing and early detecting cyber risks.\n\n\nResearch limitations/implications\nFindings of this study cannot be generalised as it aims to obtain new insights and document unexplored findings. Thus, if this study’s findings are going to be generalised, it is necessary to conduct an additional study. Secondly, this study did not assess how far small business had fulfilled the relevant information security framework as assessment required additional research, and this study only aimed to map the current situation in small businesses.\n\n\nPractical implications\nThis study emphasised the importance of identifying valuable assets or resources when implementing cybersecurity measures. Focusing on security measures to protect identified assets from cyber risk will make the efforts more efficient and effective than using standardised cybersecurity measures. Third-party developers can also use this study to understand small businesses’ current cybersecurity implementation and their characters to design online platforms that suit these needs. Governments can also design educational activities that address small businesses’ lack of knowledge.\n\n\nOriginality/value\nMost studies which focus on small businesses and information technology (IT) usually only discuss how they use IT. This study also brings new contributions by focusing on developing countries and specifically addresses internet-based technology cyber risk faced by e-commerce businesses. The qualitative method is used as most studies in e-commerce adoption were positivistic in nature, and inductive-based studies were rarely found on the topic.\n","PeriodicalId":156416,"journal":{"name":"J. Inf. Commun. Ethics Soc.","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"What small businesses in developing country think of cybersecurity risks in the digital age: Indonesian case\",\"authors\":\"Ratna Yudhiyati, Afrida Putritama, Diana Rahmawati\",\"doi\":\"10.1108/jices-03-2021-0035\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"\\nPurpose\\nThis study aims to identify and analyse the issues faced by internet-based small businesses in developing countries regarding cybersecurity and document how these businesses address the risks.\\n\\n\\nDesign/methodology/approach\\nThis study used the qualitative method. Respondents were internet-based small businesses selected by using theoretical sampling. Data were collected by using interviews and observations. The validity of the analysis was ensured by using triangulation and member checking.\\n\\n\\nFindings\\nThis study reveals that small businesses managed to identify the loss of physical and monetary assets as possible damage. However, only a few businesses identified loss of intangible assets as possible cyber risks. Most small businesses had used basic cybersecurity measures to protect data access and some primary business activities. Unfortunately, they rarely take initiatives in preventing and early detecting cyber risks.\\n\\n\\nResearch limitations/implications\\nFindings of this study cannot be generalised as it aims to obtain new insights and document unexplored findings. Thus, if this study’s findings are going to be generalised, it is necessary to conduct an additional study. Secondly, this study did not assess how far small business had fulfilled the relevant information security framework as assessment required additional research, and this study only aimed to map the current situation in small businesses.\\n\\n\\nPractical implications\\nThis study emphasised the importance of identifying valuable assets or resources when implementing cybersecurity measures. Focusing on security measures to protect identified assets from cyber risk will make the efforts more efficient and effective than using standardised cybersecurity measures. Third-party developers can also use this study to understand small businesses’ current cybersecurity implementation and their characters to design online platforms that suit these needs. Governments can also design educational activities that address small businesses’ lack of knowledge.\\n\\n\\nOriginality/value\\nMost studies which focus on small businesses and information technology (IT) usually only discuss how they use IT. This study also brings new contributions by focusing on developing countries and specifically addresses internet-based technology cyber risk faced by e-commerce businesses. The qualitative method is used as most studies in e-commerce adoption were positivistic in nature, and inductive-based studies were rarely found on the topic.\\n\",\"PeriodicalId\":156416,\"journal\":{\"name\":\"J. Inf. Commun. Ethics Soc.\",\"volume\":\"31 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-08-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"J. Inf. Commun. Ethics Soc.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1108/jices-03-2021-0035\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"J. Inf. Commun. Ethics Soc.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1108/jices-03-2021-0035","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

摘要

本研究旨在识别和分析发展中国家基于互联网的小企业在网络安全方面面临的问题,并记录这些企业如何应对风险。设计/方法/方法本研究采用定性方法。受访者采用理论抽样的方法选择基于互联网的小型企业。数据收集采用访谈和观察。通过三角剖分和构件校核,保证了分析的有效性。研究结果这项研究表明,小型企业设法将实物和货币资产的损失视为可能的损害。然而,只有少数企业将无形资产损失视为可能的网络风险。大多数小企业使用基本的网络安全措施来保护数据访问和一些主要业务活动。不幸的是,他们很少主动预防和早期发现网络风险。研究的局限性/意义本研究的结果不能概括,因为它旨在获得新的见解和记录未探索的发现。因此,如果这项研究的发现要推广,有必要进行额外的研究。其次,本研究没有评估小企业在多大程度上履行了相关的信息安全框架,因为评估需要额外的研究,本研究仅旨在描绘小企业的现状。实际意义本研究强调了在实施网络安全措施时识别有价值资产或资源的重要性。将重点放在保护已识别资产免受网络风险的安全措施上,将比使用标准化的网络安全措施更加高效和有效。第三方开发者也可以利用这项研究来了解小企业目前的网络安全实施情况及其特点,从而设计出适合这些需求的在线平台。政府还可以设计教育活动,解决小企业缺乏知识的问题。大多数关注小企业和信息技术(IT)的研究通常只讨论他们如何使用IT。本研究还带来了新的贡献,它将重点放在发展中国家,并具体解决了电子商务企业面临的基于互联网的技术网络风险。由于大多数关于电子商务采用的研究本质上是实证的,基于归纳的研究很少,因此采用定性方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
What small businesses in developing country think of cybersecurity risks in the digital age: Indonesian case
Purpose This study aims to identify and analyse the issues faced by internet-based small businesses in developing countries regarding cybersecurity and document how these businesses address the risks. Design/methodology/approach This study used the qualitative method. Respondents were internet-based small businesses selected by using theoretical sampling. Data were collected by using interviews and observations. The validity of the analysis was ensured by using triangulation and member checking. Findings This study reveals that small businesses managed to identify the loss of physical and monetary assets as possible damage. However, only a few businesses identified loss of intangible assets as possible cyber risks. Most small businesses had used basic cybersecurity measures to protect data access and some primary business activities. Unfortunately, they rarely take initiatives in preventing and early detecting cyber risks. Research limitations/implications Findings of this study cannot be generalised as it aims to obtain new insights and document unexplored findings. Thus, if this study’s findings are going to be generalised, it is necessary to conduct an additional study. Secondly, this study did not assess how far small business had fulfilled the relevant information security framework as assessment required additional research, and this study only aimed to map the current situation in small businesses. Practical implications This study emphasised the importance of identifying valuable assets or resources when implementing cybersecurity measures. Focusing on security measures to protect identified assets from cyber risk will make the efforts more efficient and effective than using standardised cybersecurity measures. Third-party developers can also use this study to understand small businesses’ current cybersecurity implementation and their characters to design online platforms that suit these needs. Governments can also design educational activities that address small businesses’ lack of knowledge. Originality/value Most studies which focus on small businesses and information technology (IT) usually only discuss how they use IT. This study also brings new contributions by focusing on developing countries and specifically addresses internet-based technology cyber risk faced by e-commerce businesses. The qualitative method is used as most studies in e-commerce adoption were positivistic in nature, and inductive-based studies were rarely found on the topic.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信