{"id":"https://openalex.org/W3191598069","doi":"https://doi.org/10.1080/08874417.2021.1954563","title":"The Security-as-a-Service Market for Small and Medium Enterprises","display_name":"The Security-as-a-Service Market for Small and Medium Enterprises","publication_year":2021,"publication_date":"2021-08-02","ids":{"openalex":"https://openalex.org/W3191598069","doi":"https://doi.org/10.1080/08874417.2021.1954563","mag":"3191598069"},"language":"en","primary_location":{"id":"doi:10.1080/08874417.2021.1954563","is_oa":false,"landing_page_url":"https://doi.org/10.1080/08874417.2021.1954563","pdf_url":null,"source":{"id":"https://openalex.org/S83133229","display_name":"Journal of Computer Information Systems","issn_l":"0887-4417","issn":["0887-4417","2380-2057"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Information Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003390178","display_name":"Derek L. Nazareth","orcid":null},"institutions":[{"id":"https://openalex.org/I43579087","display_name":"University of Wisconsin\u2013Milwaukee","ror":"https://ror.org/031q21x57","country_code":"US","type":"education","lineage":["https://openalex.org/I43579087"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Derek L. Nazareth","raw_affiliation_strings":["University of Wisconsin-Milwaukee, Milwaukee, Wisconsin, USA"],"affiliations":[{"raw_affiliation_string":"University of Wisconsin-Milwaukee, Milwaukee, Wisconsin, USA","institution_ids":["https://openalex.org/I43579087"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100723050","display_name":"Jae Choi","orcid":"https://orcid.org/0000-0002-8353-8863"},"institutions":[{"id":"https://openalex.org/I4780363","display_name":"Pittsburg State University","ror":"https://ror.org/04hteea03","country_code":"US","type":"education","lineage":["https://openalex.org/I4780363"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jae Choi","raw_affiliation_strings":["Pittsburg State University, Pittsburg, Kansas, USA"],"affiliations":[{"raw_affiliation_string":"Pittsburg State University, Pittsburg, Kansas, USA","institution_ids":["https://openalex.org/I4780363"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083294553","display_name":"Thomas Ngo-Ye","orcid":"https://orcid.org/0000-0002-5753-4324"},"institutions":[{"id":"https://openalex.org/I145611464","display_name":"Alabama State University","ror":"https://ror.org/01eedy375","country_code":"US","type":"education","lineage":["https://openalex.org/I145611464"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Thomas L. Ngo-Ye","raw_affiliation_strings":["Alabama State University, Montgomery, Alabama, USA"],"affiliations":[{"raw_affiliation_string":"Alabama State University, Montgomery, Alabama, USA","institution_ids":["https://openalex.org/I145611464"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5083294553"],"corresponding_institution_ids":["https://openalex.org/I145611464"],"apc_list":null,"apc_paid":null,"fwci":2.3427,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.92465906,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":97},"biblio":{"volume":"62","issue":"5","first_page":"954","last_page":"964"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10068","display_name":"Technology Adoption and User Behaviour","score":0.9670000076293945,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10068","display_name":"Technology Adoption and User Behaviour","score":0.9670000076293945,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9634000062942505,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.953000009059906,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.6987063884735107},{"id":"https://openalex.org/keywords/service-provider","display_name":"Service provider","score":0.6883487701416016},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5910212397575378},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4704408049583435},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.43876758217811584},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.4264475703239441},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.41577839851379395},{"id":"https://openalex.org/keywords/marketing","display_name":"Marketing","score":0.3713648319244385},{"id":"https://openalex.org/keywords/industrial-organization","display_name":"Industrial organization","score":0.3677273988723755},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35464760661125183},{"id":"https://openalex.org/keywords/commerce","display_name":"Commerce","score":0.34075939655303955},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.33800992369651794},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.3337631821632385},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.13440945744514465}],"concepts":[{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.6987063884735107},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.6883487701416016},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5910212397575378},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4704408049583435},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.43876758217811584},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.4264475703239441},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.41577839851379395},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.3713648319244385},{"id":"https://openalex.org/C40700","wikidata":"https://www.wikidata.org/wiki/Q1411783","display_name":"Industrial organization","level":1,"score":0.3677273988723755},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35464760661125183},{"id":"https://openalex.org/C54750564","wikidata":"https://www.wikidata.org/wiki/Q26643","display_name":"Commerce","level":1,"score":0.34075939655303955},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.33800992369651794},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.3337631821632385},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.13440945744514465},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1080/08874417.2021.1954563","is_oa":false,"landing_page_url":"https://doi.org/10.1080/08874417.2021.1954563","pdf_url":null,"source":{"id":"https://openalex.org/S83133229","display_name":"Journal of Computer Information Systems","issn_l":"0887-4417","issn":["0887-4417","2380-2057"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Information Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.49000000953674316,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W142055954","https://openalex.org/W1783916992","https://openalex.org/W1984955803","https://openalex.org/W2018383256","https://openalex.org/W2046297431","https://openalex.org/W2050909151","https://openalex.org/W2068414390","https://openalex.org/W2097664607","https://openalex.org/W2131383896","https://openalex.org/W2141821750","https://openalex.org/W2354747749","https://openalex.org/W2605968929","https://openalex.org/W2987189969","https://openalex.org/W3045612696","https://openalex.org/W3151685851"],"related_works":["https://openalex.org/W2931996793","https://openalex.org/W4205234238","https://openalex.org/W2788934790","https://openalex.org/W3167767780","https://openalex.org/W3148880067","https://openalex.org/W4205923274","https://openalex.org/W3043682580","https://openalex.org/W2941559775","https://openalex.org/W3142266060","https://openalex.org/W2811164835"],"abstract_inverted_index":{"As":[0],"small":[1],"and":[2,43,74,90,97],"medium":[3],"enterprises":[4],"move":[5],"toward":[6],"cloud":[7],"computing":[8],"for":[9,94],"their":[10,17],"IT":[11],"operations,":[12],"they":[13],"discover":[14],"that":[15,81],"securing":[16],"information":[18],"assets":[19],"is":[20,40],"a":[21,32,57],"challenge.":[22],"A":[23],"new":[24],"set":[25],"of":[26,71],"providers":[27,49,96],"offering":[28],"fee-based":[29],"security":[30,75],"as":[31],"service":[33],"(SECaaS)":[34],"has":[35],"emerged.":[36],"The":[37,78],"SECaaS":[38,66,72,95],"market":[39,67],"still":[41],"nascent,":[42],"important":[44,92],"questions":[45],"remain":[46],"if":[47],"these":[48],"are":[50,83],"to":[51,61],"be":[52],"successful.":[53],"This":[54],"research":[55],"uses":[56],"system":[58],"dynamics":[59],"approach":[60],"shed":[62],"light":[63],"on":[64],"the":[65,69],"in":[68],"context":[70],"costs,":[73],"threat":[76,88],"conditions.":[77],"results":[79],"indicate":[80],"consumers":[82],"price":[84],"sensitive":[85],"but":[86],"not":[87],"sensitive,":[89],"have":[91],"implications":[93],"consumers.":[98]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
