{"id":"https://openalex.org/W2619896645","doi":"https://doi.org/10.1108/ics-07-2016-0047","title":"Tightroping between APT and BCI in small enterprises","display_name":"Tightroping between APT and BCI in small enterprises","publication_year":2017,"publication_date":"2017-05-24","ids":{"openalex":"https://openalex.org/W2619896645","doi":"https://doi.org/10.1108/ics-07-2016-0047","mag":"2619896645"},"language":"en","primary_location":{"id":"doi:10.1108/ics-07-2016-0047","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-07-2016-0047","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014642671","display_name":"Jesse Kaukola","orcid":null},"institutions":[{"id":"https://openalex.org/I155660961","display_name":"University of Turku","ror":"https://ror.org/05vghhr25","country_code":"FI","type":"education","lineage":["https://openalex.org/I155660961"]}],"countries":["FI"],"is_corresponding":true,"raw_author_name":"Jesse Kaukola","raw_affiliation_strings":["Department of Management and Entrepreneurship, University of Turku, Turku, Finland"],"affiliations":[{"raw_affiliation_string":"Department of Management and Entrepreneurship, University of Turku, Turku, Finland","institution_ids":["https://openalex.org/I155660961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045061250","display_name":"Jukka Ruohonen","orcid":"https://orcid.org/0000-0001-5147-3084"},"institutions":[{"id":"https://openalex.org/I155660961","display_name":"University of Turku","ror":"https://ror.org/05vghhr25","country_code":"FI","type":"education","lineage":["https://openalex.org/I155660961"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Jukka Ruohonen","raw_affiliation_strings":["Department of Information Technology, University of Turku, Turku, Finland"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, University of Turku, Turku, Finland","institution_ids":["https://openalex.org/I155660961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073929472","display_name":"Antti Tuomisto","orcid":"https://orcid.org/0000-0002-8640-940X"},"institutions":[{"id":"https://openalex.org/I155660961","display_name":"University of Turku","ror":"https://ror.org/05vghhr25","country_code":"FI","type":"education","lineage":["https://openalex.org/I155660961"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Antti Tuomisto","raw_affiliation_strings":["Department of Management and Entrepreneurship, University of Turku, Turku, Finland"],"affiliations":[{"raw_affiliation_string":"Department of Management and Entrepreneurship, University of Turku, Turku, Finland","institution_ids":["https://openalex.org/I155660961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006523717","display_name":"Sami Hyrynsalmi","orcid":"https://orcid.org/0000-0002-5073-3750"},"institutions":[{"id":"https://openalex.org/I155660961","display_name":"University of Turku","ror":"https://ror.org/05vghhr25","country_code":"FI","type":"education","lineage":["https://openalex.org/I155660961"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Sami Hyrynsalmi","raw_affiliation_strings":["Department of Information Technology, University of Turku, Turku, Finland"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, University of Turku, Turku, Finland","institution_ids":["https://openalex.org/I155660961"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029023235","display_name":"Ville Lepp\u00e4nen","orcid":"https://orcid.org/0000-0001-5296-677X"},"institutions":[{"id":"https://openalex.org/I155660961","display_name":"University of Turku","ror":"https://ror.org/05vghhr25","country_code":"FI","type":"education","lineage":["https://openalex.org/I155660961"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Ville Lepp\u00e4nen","raw_affiliation_strings":["Department of Information Technology, University of Turku, Turku, Finland"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, University of Turku, Turku, Finland","institution_ids":["https://openalex.org/I155660961"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5014642671"],"corresponding_institution_ids":["https://openalex.org/I155660961"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.0732024,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":93},"biblio":{"volume":"25","issue":"3","first_page":"226","last_page":"239"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9915000200271606,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9866999983787537,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mindset","display_name":"Mindset","score":0.89111328125},{"id":"https://openalex.org/keywords/originality","display_name":"Originality","score":0.6513063311576843},{"id":"https://openalex.org/keywords/relevance","display_name":"Relevance (law)","score":0.6480333805084229},{"id":"https://openalex.org/keywords/value","display_name":"Value (mathematics)","score":0.49826717376708984},{"id":"https://openalex.org/keywords/perspective","display_name":"Perspective (graphical)","score":0.4419933557510376},{"id":"https://openalex.org/keywords/perception","display_name":"Perception","score":0.43497639894485474},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.430880606174469},{"id":"https://openalex.org/keywords/marketing","display_name":"Marketing","score":0.37320053577423096},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.3508194088935852},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.3364366590976715},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.30267462134361267},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.2880595624446869},{"id":"https://openalex.org/keywords/qualitative-research","display_name":"Qualitative research","score":0.24438536167144775},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.1920049786567688},{"id":"https://openalex.org/keywords/social-science","display_name":"Social science","score":0.09998556971549988}],"concepts":[{"id":"https://openalex.org/C2778491294","wikidata":"https://www.wikidata.org/wiki/Q1339824","display_name":"Mindset","level":2,"score":0.89111328125},{"id":"https://openalex.org/C2776950860","wikidata":"https://www.wikidata.org/wiki/Q2914681","display_name":"Originality","level":3,"score":0.6513063311576843},{"id":"https://openalex.org/C158154518","wikidata":"https://www.wikidata.org/wiki/Q7310970","display_name":"Relevance (law)","level":2,"score":0.6480333805084229},{"id":"https://openalex.org/C2776291640","wikidata":"https://www.wikidata.org/wiki/Q2912517","display_name":"Value (mathematics)","level":2,"score":0.49826717376708984},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.4419933557510376},{"id":"https://openalex.org/C26760741","wikidata":"https://www.wikidata.org/wiki/Q160402","display_name":"Perception","level":2,"score":0.43497639894485474},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.430880606174469},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.37320053577423096},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.3508194088935852},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.3364366590976715},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.30267462134361267},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.2880595624446869},{"id":"https://openalex.org/C190248442","wikidata":"https://www.wikidata.org/wiki/Q839486","display_name":"Qualitative research","level":2,"score":0.24438536167144775},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.1920049786567688},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.09998556971549988},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C169760540","wikidata":"https://www.wikidata.org/wiki/Q207011","display_name":"Neuroscience","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/ics-07-2016-0047","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-07-2016-0047","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.44999998807907104,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W44295252","https://openalex.org/W627627279","https://openalex.org/W1109422923","https://openalex.org/W1582097881","https://openalex.org/W1595738880","https://openalex.org/W1604115074","https://openalex.org/W1624696364","https://openalex.org/W1965808486","https://openalex.org/W1969256207","https://openalex.org/W1982847337","https://openalex.org/W1983238775","https://openalex.org/W1985432882","https://openalex.org/W1987209193","https://openalex.org/W1988588408","https://openalex.org/W1990028190","https://openalex.org/W2002857354","https://openalex.org/W2010062879","https://openalex.org/W2034141334","https://openalex.org/W2038067445","https://openalex.org/W2054901972","https://openalex.org/W2055237573","https://openalex.org/W2056554492","https://openalex.org/W2072395157","https://openalex.org/W2085373733","https://openalex.org/W2092114289","https://openalex.org/W2093668291","https://openalex.org/W2109026747","https://openalex.org/W2112786950","https://openalex.org/W2125743507","https://openalex.org/W2128561619","https://openalex.org/W2142439156","https://openalex.org/W2145780580","https://openalex.org/W2158600487","https://openalex.org/W2169209514","https://openalex.org/W2217650322","https://openalex.org/W2286435041","https://openalex.org/W2544387082"],"related_works":["https://openalex.org/W2593155302","https://openalex.org/W2041415459","https://openalex.org/W4281773849","https://openalex.org/W2072812638","https://openalex.org/W3126095231","https://openalex.org/W2908046332","https://openalex.org/W4386786145","https://openalex.org/W3009062738","https://openalex.org/W4232834483","https://openalex.org/W3192666801"],"abstract_inverted_index":{"Purpose":[0],"The":[1,96,112,183,210],"contemporary":[2],"internet":[3],"provisions":[4],"increasingly":[5],"sophisticated":[6],"security":[7,75,91,133],"attacks.":[8],"Besides":[9],"underlining":[10],"the":[11,17,26,41,74,85,90,131,137,148,158,162,171,191,198,229],"advanced":[12,21],"nature":[13],"of":[14,19,29,48,76,103,161,203],"these":[15],"attacks,":[16],"concept":[18],"an":[20,51],"persistent":[22],"threat":[23],"(APT)":[24],"catalyzes":[25],"important":[27],"perspective":[28],"longitudinal":[30],"persistence;":[31],"attacks":[32],"are":[33,71,98],"not":[34],"only":[35],"carefully":[36],"planned":[37],"and":[38,79,208,215,227],"targeted":[39],"but":[40,164],"subsequent":[42],"exploitation":[43],"period":[44],"covers":[45],"long":[46],"periods":[47],"time.":[49],"If":[50],"APT":[52,143,207],"successfully":[53],"realizes":[54],"into":[55],"such":[56],"exploitation,":[57],"information":[58,67],"assets":[59],"may":[60],"be":[61,187],"continuously":[62],"monitored":[63],"for":[64,73,219],"harvesting":[65],"business-critical":[66],"(BCI).":[68],"These":[69],"threats":[70],"relevant":[72],"small":[77,108,204],"enterprises,":[78],"this":[80],"study":[81,195,226],"aims":[82],"to":[83,153,170,179,189,200,225],"examine":[84],"qualitative":[86],"factors":[87],"that":[88,120,135,173],"shape":[89,136],"mindsets":[92,214],"among":[93,140,147,197],"these.":[94],"Design/methodology/approach":[95],"data":[97,175],"collected":[99],"with":[100],"semi-structured":[101],"interviews":[102],"six":[104],"enterprises":[105,205],"in":[106],"a":[107,117,165],"regional":[109],"market":[110],"segment.":[111],"analysis":[113],"is":[114,128,144,176,196],"based":[115],"on":[116,130],"fourfold":[118],"taxonomy":[119],"delivers":[121],"three":[122],"mindset":[123],"profiles,":[124],"while":[125],"particular":[126],"emphasis":[127],"placed":[129],"subjective":[132],"notions":[134],"typical":[138],"strategizing":[139],"enterprises.":[141],"Findings":[142],"poorly":[145],"understood":[146],"observed":[149],"segment,":[150],"which":[151],"tends":[152],"often":[154,177],"also":[155],"explicitly":[156],"downplay":[157],"strategic":[159],"relevance":[160],"concept,":[163],"more":[166],"pressing":[167],"challenge":[168],"relates":[169],"observation":[172],"business":[174],"perceived":[178],"have":[180],"no":[181],"value.":[182],"delivered":[184],"results":[185,211],"can":[186],"used":[188],"improve":[190,228],"situation.":[192,230],"Originality/value":[193],"This":[194],"firsts":[199],"explore":[201],"perceptions":[202],"toward":[206],"BCI.":[209],"reveal":[212],"problematic":[213],"offers":[216],"new":[217],"avenues":[218],"practitioners":[220],"as":[221,223],"well":[222],"academics":[224]},"counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
