{"id":"https://openalex.org/W3141163522","doi":"https://doi.org/10.1108/ics-01-2020-0014","title":"\u201cSME executives\u2019 perceptions and the information security preparedness model\u201d","display_name":"\u201cSME executives\u2019 perceptions and the information security preparedness model\u201d","publication_year":2021,"publication_date":"2021-03-27","ids":{"openalex":"https://openalex.org/W3141163522","doi":"https://doi.org/10.1108/ics-01-2020-0014","mag":"3141163522"},"language":"en","primary_location":{"id":"doi:10.1108/ics-01-2020-0014","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-01-2020-0014","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019317841","display_name":"Kenneth Saban","orcid":null},"institutions":[{"id":"https://openalex.org/I165102784","display_name":"Duquesne University","ror":"https://ror.org/02336z538","country_code":"US","type":"education","lineage":["https://openalex.org/I165102784"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Kenneth Albert Saban","raw_affiliation_strings":["School of Business, Duquesne University, Pittsburgh, Pennsylvania, USA"],"affiliations":[{"raw_affiliation_string":"School of Business, Duquesne University, Pittsburgh, Pennsylvania, USA","institution_ids":["https://openalex.org/I165102784"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039615661","display_name":"Stephen Rau","orcid":"https://orcid.org/0000-0003-1552-7393"},"institutions":[{"id":"https://openalex.org/I165102784","display_name":"Duquesne University","ror":"https://ror.org/02336z538","country_code":"US","type":"education","lineage":["https://openalex.org/I165102784"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Stephen Rau","raw_affiliation_strings":["Accounting and Information Systems, Duquesne University, Pittsburgh, Pennsylvania, USA"],"affiliations":[{"raw_affiliation_string":"Accounting and Information Systems, Duquesne University, Pittsburgh, Pennsylvania, USA","institution_ids":["https://openalex.org/I165102784"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058666321","display_name":"Charles Wood","orcid":"https://orcid.org/0000-0002-4256-1530"},"institutions":[{"id":"https://openalex.org/I2800752714","display_name":"Comcast (United States)","ror":"https://ror.org/00sgxyw28","country_code":"US","type":"company","lineage":["https://openalex.org/I2800752714"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Charles A. Wood","raw_affiliation_strings":["Workforce Forecasting, Comcast Corp, West Chester, Pennsylvania, USA"],"affiliations":[{"raw_affiliation_string":"Workforce Forecasting, Comcast Corp, West Chester, Pennsylvania, USA","institution_ids":["https://openalex.org/I2800752714"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5019317841"],"corresponding_institution_ids":["https://openalex.org/I165102784"],"apc_list":null,"apc_paid":null,"fwci":2.2033,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.89495405,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"29","issue":"2","first_page":"263","last_page":"282"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9836000204086304,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/preparedness","display_name":"Preparedness","score":0.8242441415786743},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.7492599487304688},{"id":"https://openalex.org/keywords/security-awareness","display_name":"Security awareness","score":0.7062252759933472},{"id":"https://openalex.org/keywords/information-security-management","display_name":"Information security management","score":0.6572157740592957},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.5714181661605835},{"id":"https://openalex.org/keywords/perception","display_name":"Perception","score":0.532873809337616},{"id":"https://openalex.org/keywords/certified-information-security-manager","display_name":"Certified Information Security Manager","score":0.5087116360664368},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.4761136472225189},{"id":"https://openalex.org/keywords/originality","display_name":"Originality","score":0.4690098464488983},{"id":"https://openalex.org/keywords/security-management","display_name":"Security management","score":0.466942697763443},{"id":"https://openalex.org/keywords/information-security-audit","display_name":"Information security audit","score":0.4535256028175354},{"id":"https://openalex.org/keywords/public-relations","display_name":"Public relations","score":0.4082624912261963},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.3681144118309021},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3348228335380554},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.2966691851615906},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.2136262059211731},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.2011960744857788},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.17811235785484314},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.16024664044380188},{"id":"https://openalex.org/keywords/management","display_name":"Management","score":0.15611937642097473},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.11979624629020691},{"id":"https://openalex.org/keywords/finance","display_name":"Finance","score":0.11366727948188782},{"id":"https://openalex.org/keywords/network-security-policy","display_name":"Network security policy","score":0.11230483651161194},{"id":"https://openalex.org/keywords/social-psychology","display_name":"Social psychology","score":0.08797746896743774}],"concepts":[{"id":"https://openalex.org/C2777042776","wikidata":"https://www.wikidata.org/wiki/Q4583103","display_name":"Preparedness","level":2,"score":0.8242441415786743},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.7492599487304688},{"id":"https://openalex.org/C2778652015","wikidata":"https://www.wikidata.org/wiki/Q7445019","display_name":"Security awareness","level":3,"score":0.7062252759933472},{"id":"https://openalex.org/C148976360","wikidata":"https://www.wikidata.org/wiki/Q1662500","display_name":"Information security management","level":5,"score":0.6572157740592957},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.5714181661605835},{"id":"https://openalex.org/C26760741","wikidata":"https://www.wikidata.org/wiki/Q160402","display_name":"Perception","level":2,"score":0.532873809337616},{"id":"https://openalex.org/C180823521","wikidata":"https://www.wikidata.org/wiki/Q1662502","display_name":"Certified Information Security Manager","level":5,"score":0.5087116360664368},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.4761136472225189},{"id":"https://openalex.org/C2776950860","wikidata":"https://www.wikidata.org/wiki/Q2914681","display_name":"Originality","level":3,"score":0.4690098464488983},{"id":"https://openalex.org/C83163435","wikidata":"https://www.wikidata.org/wiki/Q3954104","display_name":"Security management","level":2,"score":0.466942697763443},{"id":"https://openalex.org/C39358052","wikidata":"https://www.wikidata.org/wiki/Q2578632","display_name":"Information security audit","level":5,"score":0.4535256028175354},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.4082624912261963},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.3681144118309021},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3348228335380554},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.2966691851615906},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.2136262059211731},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.2011960744857788},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.17811235785484314},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.16024664044380188},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.15611937642097473},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.11979624629020691},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.11366727948188782},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.11230483651161194},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.08797746896743774},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C11012388","wikidata":"https://www.wikidata.org/wiki/Q170658","display_name":"Creativity","level":2,"score":0.0},{"id":"https://openalex.org/C169760540","wikidata":"https://www.wikidata.org/wiki/Q207011","display_name":"Neuroscience","level":1,"score":0.0},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/ics-01-2020-0014","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-01-2020-0014","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5899999737739563}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W129912261","https://openalex.org/W169042837","https://openalex.org/W324885528","https://openalex.org/W1484252823","https://openalex.org/W1499012572","https://openalex.org/W1527741802","https://openalex.org/W1565838829","https://openalex.org/W1566168400","https://openalex.org/W1863383349","https://openalex.org/W1903013269","https://openalex.org/W1987258130","https://openalex.org/W2016324762","https://openalex.org/W2020989719","https://openalex.org/W2055847123","https://openalex.org/W2071666535","https://openalex.org/W2081430061","https://openalex.org/W2099647042","https://openalex.org/W2105846236","https://openalex.org/W2105992541","https://openalex.org/W2119587968","https://openalex.org/W2133097426","https://openalex.org/W2151845630","https://openalex.org/W2153784392","https://openalex.org/W2303383920","https://openalex.org/W2474818065","https://openalex.org/W2517222954","https://openalex.org/W2769580135","https://openalex.org/W2801387997","https://openalex.org/W3123458587","https://openalex.org/W3129692209","https://openalex.org/W4235678817"],"related_works":["https://openalex.org/W4310892428","https://openalex.org/W2777401565","https://openalex.org/W2584162156","https://openalex.org/W23579156","https://openalex.org/W2166222264","https://openalex.org/W2966027630","https://openalex.org/W1011453537","https://openalex.org/W3141163522","https://openalex.org/W10189584","https://openalex.org/W1807507413"],"abstract_inverted_index":{"Purpose":[0],"Information":[1,24,84,203],"security":[2,38,51,69,96,109,123,127,135,140,150,175,184],"has":[3],"increasingly":[4],"been":[5],"in":[6],"the":[7,56,75,82,155,164,170,177,202],"headlines":[8],"as":[9,93,114,126],"data":[10],"breaches":[11],"continue":[12],"to":[13,21,31,50,80,107,121,133,207],"occur":[14],"at":[15],"alarming":[16],"rates.":[17],"This":[18,197],"paper":[19,198],"aims":[20],"propose":[22],"an":[23],"Security":[25,85,204],"Preparedness":[26,86,205],"Model":[27,206],"that":[28,92,162],"was":[29,71],"developed":[30],"examine":[32],"how":[33],"SME":[34,64,102,211],"executives\u2019":[35,65,103,137],"perceptions":[36,66,94,147,168,213],"of":[37,58,63,67,95,139,148,158,173,214],"importance,":[39],"implementation":[40,115],"challenges":[41,116],"and":[42,48,98,105,119,129,131,153,169,200],"external":[43,99],"influences":[44,100],"impact":[45],"their":[46],"awareness":[47,104,118,130],"commitment":[49,106,120,132],"preparedness.":[52],"Design/methodology/approach":[53],"Funded":[54],"by":[55],"Department":[57],"Justice,":[59],"a":[60],"national":[61],"survey":[62,76],"information":[68,108,122,134,149,174,183,215],"preparedness":[70,141],"conducted.":[72],"Using":[73],"PLS-SEM,":[74],"responses":[77],"were":[78,151],"used":[79],"test":[81],"proposed":[83],"Model.":[87],"Findings":[88],"The":[89],"results":[90],"indicate":[91],"importance":[97,128],"increase,":[101,117],"also":[110,142],"increases.":[111,143],"In":[112],"addition,":[113],"decreases.":[124],"Finally,":[125],"increases,":[136],"perception":[138],"Research":[144],"limitations/implications":[145],"Executive":[146],"measured":[152],"not":[154],"actual":[156],"level":[157],"security.":[159,216],"Further":[160],"research":[161],"examines":[163],"agreement":[165],"between":[166],"executive":[167],"true":[171],"state":[172],"within":[176],"organization":[178],"is":[179],"warranted.":[180],"Originality/value":[181],"Prior":[182],"studies":[185],"using":[186],"Roger\u2019s":[187],"(1975,":[188],"1983)":[189],"Protection":[190],"Motivation":[191],"Theory":[192],"have":[193],"produced":[194],"mixed":[195],"results.":[196],"develops":[199],"tests":[201],"more":[208],"fully":[209],"explain":[210],"executive\u2019s":[212]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
