{"id":"https://openalex.org/W4415377188","doi":"https://doi.org/10.1093/cybsec/tyaf027","title":"How much more will it need? Determinants of risk-driven cybersecurity adoption in Swiss SMEs: a structural equation modelling approach","display_name":"How much more will it need? Determinants of risk-driven cybersecurity adoption in Swiss SMEs: a structural equation modelling approach","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4415377188","doi":"https://doi.org/10.1093/cybsec/tyaf027"},"language":"en","primary_location":{"id":"doi:10.1093/cybsec/tyaf027","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyaf027","pdf_url":null,"source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1093/cybsec/tyaf027","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070649670","display_name":"Marc K. Peter","orcid":"https://orcid.org/0000-0002-2897-0389"},"institutions":[{"id":"https://openalex.org/I153230381","display_name":"Charles Sturt University","ror":"https://ror.org/00wfvh315","country_code":"AU","type":"education","lineage":["https://openalex.org/I153230381"]},{"id":"https://openalex.org/I173439891","display_name":"HES-SO University of Applied Sciences and Arts Western Switzerland","ror":"https://ror.org/01xkakk17","country_code":"CH","type":"education","lineage":["https://openalex.org/I173439891"]},{"id":"https://openalex.org/I5388228","display_name":"University of Rochester","ror":"https://ror.org/022kthw22","country_code":"US","type":"education","lineage":["https://openalex.org/I5388228"]}],"countries":["AU","CH","US"],"is_corresponding":true,"raw_author_name":"Marc K Peter","raw_affiliation_strings":["School of Business, Charles Sturt University , Bathurst, NSW 2795 ,","School of Management, University of Applied Sciences and Arts of Western Switzerland HES-SO , 3960 Sierre, VS ,","Simon Business School, University of Rochester , Rochester, NY 14627 ,"],"raw_orcid":"https://orcid.org/0000-0002-2897-0389","affiliations":[{"raw_affiliation_string":"School of Business, Charles Sturt University , Bathurst, NSW 2795 ,","institution_ids":["https://openalex.org/I153230381"]},{"raw_affiliation_string":"School of Management, University of Applied Sciences and Arts of Western Switzerland HES-SO , 3960 Sierre, VS ,","institution_ids":["https://openalex.org/I173439891"]},{"raw_affiliation_string":"Simon Business School, University of Rochester , Rochester, NY 14627 ,","institution_ids":["https://openalex.org/I5388228"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064188339","display_name":"Khondker Mohammad Zobair","orcid":"https://orcid.org/0000-0002-4143-9680"},"institutions":[{"id":"https://openalex.org/I11701301","display_name":"Griffith University","ror":"https://ror.org/02sc3r913","country_code":"AU","type":"education","lineage":["https://openalex.org/I11701301"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Khondker Mohammad Zobair","raw_affiliation_strings":["Griffith Business School, Griffith University , Nathan, QLD 4111 ,"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Griffith Business School, Griffith University , Nathan, QLD 4111 ,","institution_ids":["https://openalex.org/I11701301"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021754303","display_name":"Johan Lindeque","orcid":"https://orcid.org/0000-0002-8303-2715"},"institutions":[{"id":"https://openalex.org/I2972652528","display_name":"FHNW University of Applied Sciences and Arts","ror":"https://ror.org/04mq2g308","country_code":"CH","type":"education","lineage":["https://openalex.org/I2972652528"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Johan P Lindeque","raw_affiliation_strings":["School of Business, University of Applied Sciences and Arts Northwestern Switzerland FHNW , 4600 Olten, SO ,"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Business, University of Applied Sciences and Arts Northwestern Switzerland FHNW , 4600 Olten, SO ,","institution_ids":["https://openalex.org/I2972652528"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5098773907","display_name":"Karin M\u00e4ndli Lerch","orcid":null},"institutions":[{"id":"https://openalex.org/I200744771","display_name":"ZHAW Zurich University of Applied Sciences","ror":null,"country_code":"CH","type":null,"lineage":["https://openalex.org/I200744771"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Karin M\u00e4ndli\u00a0Lerch","raw_affiliation_strings":["YouGov , 8048 Zurich, ZH ,"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"YouGov , 8048 Zurich, ZH ,","institution_ids":["https://openalex.org/I200744771"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011594366","display_name":"Luke Houghton","orcid":"https://orcid.org/0000-0002-7461-6591"},"institutions":[{"id":"https://openalex.org/I11701301","display_name":"Griffith University","ror":"https://ror.org/02sc3r913","country_code":"AU","type":"education","lineage":["https://openalex.org/I11701301"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Luke Houghton","raw_affiliation_strings":["Griffith Business School, Griffith University , Nathan, QLD 4111 ,"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Griffith Business School, Griffith University , Nathan, QLD 4111 ,","institution_ids":["https://openalex.org/I11701301"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5070649670"],"corresponding_institution_ids":["https://openalex.org/I153230381","https://openalex.org/I173439891","https://openalex.org/I5388228"],"apc_list":{"value":1864,"currency":"USD","value_usd":1864},"apc_paid":{"value":1864,"currency":"USD","value_usd":1864},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.42317247,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"11","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9890000224113464,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9890000224113464,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11891","display_name":"Big Data and Business Intelligence","score":0.9435999989509583,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9277999997138977,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cybercrime","display_name":"Cybercrime","score":0.8220000267028809},{"id":"https://openalex.org/keywords/structural-equation-modeling","display_name":"Structural equation modeling","score":0.7526999711990356},{"id":"https://openalex.org/keywords/institutionalisation","display_name":"Institutionalisation","score":0.5460000038146973},{"id":"https://openalex.org/keywords/conceptual-model","display_name":"Conceptual model","score":0.5310999751091003},{"id":"https://openalex.org/keywords/variance","display_name":"Variance (accounting)","score":0.4966000020503998},{"id":"https://openalex.org/keywords/conceptual-framework","display_name":"Conceptual framework","score":0.4262999892234802}],"concepts":[{"id":"https://openalex.org/C2779390178","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cybercrime","level":3,"score":0.8220000267028809},{"id":"https://openalex.org/C71104824","wikidata":"https://www.wikidata.org/wiki/Q1476639","display_name":"Structural equation modeling","level":2,"score":0.7526999711990356},{"id":"https://openalex.org/C164429055","wikidata":"https://www.wikidata.org/wiki/Q2070165","display_name":"Institutionalisation","level":2,"score":0.5460000038146973},{"id":"https://openalex.org/C13606891","wikidata":"https://www.wikidata.org/wiki/Q2623243","display_name":"Conceptual model","level":2,"score":0.5310999751091003},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.5094000101089478},{"id":"https://openalex.org/C196083921","wikidata":"https://www.wikidata.org/wiki/Q7915758","display_name":"Variance (accounting)","level":2,"score":0.4966000020503998},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4722000062465668},{"id":"https://openalex.org/C14224292","wikidata":"https://www.wikidata.org/wiki/Q13600188","display_name":"Conceptual framework","level":2,"score":0.4262999892234802},{"id":"https://openalex.org/C2776035688","wikidata":"https://www.wikidata.org/wiki/Q1606558","display_name":"Affect (linguistics)","level":2,"score":0.3522999882698059},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.3352000117301941},{"id":"https://openalex.org/C89785696","wikidata":"https://www.wikidata.org/wiki/Q2290753","display_name":"Theory of planned behavior","level":3,"score":0.29339998960494995},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.2906000018119812},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.2854999899864197},{"id":"https://openalex.org/C2778568292","wikidata":"https://www.wikidata.org/wiki/Q7727275","display_name":"The Conceptual Framework","level":3,"score":0.2793999910354614},{"id":"https://openalex.org/C60643870","wikidata":"https://www.wikidata.org/wiki/Q1949683","display_name":"Deterrence theory","level":2,"score":0.27160000801086426},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.27149999141693115},{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.2669999897480011},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.2590999901294708},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.25690001249313354}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1093/cybsec/tyaf027","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyaf027","pdf_url":null,"source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:pure.atira.dk:publications/9686a1bc-63e8-4a69-9f01-15879df6ecc1","is_oa":true,"landing_page_url":"https://researchoutput.csu.edu.au/en/publications/9686a1bc-63e8-4a69-9f01-15879df6ecc1","pdf_url":null,"source":{"id":"https://openalex.org/S7407055442","display_name":"Charles Sturt University Research Output (CRO)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Peter, M K, Zobair, K M, Lindeque, J P, M\u00e4ndli Lerch, K & Houghton, L 2025, 'How much more will it need? Determinants of risk-driven cybersecurity adoption in Swiss SMEs : A structural equation modelling approach', Journal of Cybersecurity, vol. 11, no. 1, tyaf027, pp. 1-13. https://doi.org/10.1093/cybsec/tyaf027","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"doi:10.1093/cybsec/tyaf027","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyaf027","pdf_url":null,"source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":77,"referenced_works":["https://openalex.org/W103880451","https://openalex.org/W1587359306","https://openalex.org/W1608836379","https://openalex.org/W1774460361","https://openalex.org/W1863383349","https://openalex.org/W1925416780","https://openalex.org/W2000380427","https://openalex.org/W2024419606","https://openalex.org/W2044833080","https://openalex.org/W2060010505","https://openalex.org/W2061521072","https://openalex.org/W2074646350","https://openalex.org/W2081430061","https://openalex.org/W2090704724","https://openalex.org/W2090806069","https://openalex.org/W2099007243","https://openalex.org/W2119401948","https://openalex.org/W2119486295","https://openalex.org/W2139013959","https://openalex.org/W2154453017","https://openalex.org/W2171905348","https://openalex.org/W2271788777","https://openalex.org/W2352931766","https://openalex.org/W2481769138","https://openalex.org/W2503241677","https://openalex.org/W2507205631","https://openalex.org/W2519450298","https://openalex.org/W2528032239","https://openalex.org/W2565717183","https://openalex.org/W2623703952","https://openalex.org/W2765407302","https://openalex.org/W2766071937","https://openalex.org/W2775407390","https://openalex.org/W2785494784","https://openalex.org/W2884960840","https://openalex.org/W2887318809","https://openalex.org/W2894764867","https://openalex.org/W2899391106","https://openalex.org/W2905811773","https://openalex.org/W2911613900","https://openalex.org/W2912800036","https://openalex.org/W2917807496","https://openalex.org/W2921697258","https://openalex.org/W2943925803","https://openalex.org/W2945049087","https://openalex.org/W2947644262","https://openalex.org/W2978346165","https://openalex.org/W2995576379","https://openalex.org/W3003418927","https://openalex.org/W3022249433","https://openalex.org/W3047568045","https://openalex.org/W3049241740","https://openalex.org/W3082344493","https://openalex.org/W3101205514","https://openalex.org/W3122877168","https://openalex.org/W3141163522","https://openalex.org/W3142330556","https://openalex.org/W3145117320","https://openalex.org/W3185939950","https://openalex.org/W3186712761","https://openalex.org/W3198999966","https://openalex.org/W3202582446","https://openalex.org/W3210383951","https://openalex.org/W3214083186","https://openalex.org/W4229001507","https://openalex.org/W4235678817","https://openalex.org/W4238347293","https://openalex.org/W4252277511","https://openalex.org/W4285522221","https://openalex.org/W4292808503","https://openalex.org/W4294307841","https://openalex.org/W4308732633","https://openalex.org/W4316042120","https://openalex.org/W4320477471","https://openalex.org/W4324057293","https://openalex.org/W4383223060","https://openalex.org/W4383896719"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"The":[1],"rapid":[2],"escalation":[3],"of":[4,57,61,124,139,145],"cybercrime":[5],"has":[6],"become":[7],"a":[8,100],"global":[9],"cybersecurity":[10,40,72,79,120,140],"concern,":[11],"one":[12],"that":[13,64,111],"requires":[14],"enacting":[15],"safety":[16],"precautions":[17],"and":[18,27,69,85,93,142,159],"urgent":[19],"attention":[20],"from":[21],"managers,":[22],"industry":[23],"partners,":[24],"governments,":[25],"experts,":[26],"the":[28,55,94,125,143],"international":[29],"research":[30,89],"community.":[31],"Consequently,":[32],"this":[33],"study":[34],"aimed":[35],"to":[36,116],"investigate":[37],"managers\u2019":[38,137],"risk-driven":[39,71],"adoption":[41,73,141],"determinants":[42,63],"within":[43],"SMEs":[44,155],"in":[45,75,128,156],"Switzerland":[46],"using":[47,99],"an":[48],"extended":[49],"protection":[50],"motivation":[51],"theory.":[52],"It":[53,108],"explores":[54],"significance":[56],"four":[58,112],"broad":[59],"categories":[60],"potential":[62],"significantly":[65,114],"affect":[66],"behavioural":[67,129],"intentions":[68],"influence":[70],"intention":[74],"SMEs:":[76],"managerial":[77],"perceived":[78],"efficacy,":[80,82],"response":[81],"implementation":[83],"expectancy,":[84],"preparedness.":[86],"A":[87],"conceptual":[88],"model":[90],"was":[91,109],"formulated,":[92],"ensuing":[95],"hypotheses":[96],"were":[97],"tested":[98],"partial":[101],"least":[102],"squares":[103],"structural":[104],"equation":[105],"modelling":[106],"approach.":[107],"shown":[110],"predictors":[113],"contribute":[115],"managers":[117],"adopting":[118],"protective":[119],"measures,":[121],"explaining":[122],"40%":[123],"variance":[126],"(R2)":[127],"intention.":[130],"These":[131],"findings":[132],"highlight":[133],"novel":[134],"insights":[135],"into":[136],"acceptance":[138],"institutionalization":[144],"favourable":[146],"policy":[147],"guidelines":[148],"as":[149],"early":[150],"guidance":[151],"for":[152],"expanding":[153],"prosperous":[154],"developed":[157],"economies":[158],"beyond.":[160]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-21T00:00:00"}
