{"id":"https://openalex.org/W4388937242","doi":"https://doi.org/10.1109/icccnt56998.2023.10307363","title":"Cyber Security Implementation Issues in Small to Medium-sized Enterprises (SMEs) and their Potential Solutions: A Comprehensive Analysis","display_name":"Cyber Security Implementation Issues in Small to Medium-sized Enterprises (SMEs) and their Potential Solutions: A Comprehensive Analysis","publication_year":2023,"publication_date":"2023-07-06","ids":{"openalex":"https://openalex.org/W4388937242","doi":"https://doi.org/10.1109/icccnt56998.2023.10307363"},"language":"en","primary_location":{"id":"doi:10.1109/icccnt56998.2023.10307363","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt56998.2023.10307363","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5093323982","display_name":"Saral Kandpal","orcid":null},"institutions":[{"id":"https://openalex.org/I60054993","display_name":"Graphic Era University","ror":"https://ror.org/03wqgqd89","country_code":"IN","type":"education","lineage":["https://openalex.org/I60054993"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Saral Kandpal","raw_affiliation_strings":["Graphic Era Hill University,Department of CSE,Bhimtal,India","Department of CSE, Graphic Era Hill University, Bhimtal, India"],"affiliations":[{"raw_affiliation_string":"Graphic Era Hill University,Department of CSE,Bhimtal,India","institution_ids":["https://openalex.org/I60054993"]},{"raw_affiliation_string":"Department of CSE, Graphic Era Hill University, Bhimtal, India","institution_ids":["https://openalex.org/I60054993"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100816803","display_name":"Sachin Bhatt","orcid":"https://orcid.org/0009-0008-3470-9890"},"institutions":[{"id":"https://openalex.org/I60054993","display_name":"Graphic Era University","ror":"https://ror.org/03wqgqd89","country_code":"IN","type":"education","lineage":["https://openalex.org/I60054993"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sachin Bhatt","raw_affiliation_strings":["Graphic Era Hill University,Department of CSE,Bhimtal,India","Department of CSE, Graphic Era Hill University, Bhimtal, India"],"affiliations":[{"raw_affiliation_string":"Graphic Era Hill University,Department of CSE,Bhimtal,India","institution_ids":["https://openalex.org/I60054993"]},{"raw_affiliation_string":"Department of CSE, Graphic Era Hill University, Bhimtal, India","institution_ids":["https://openalex.org/I60054993"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073381048","display_name":"Lalit Mohan","orcid":"https://orcid.org/0009-0005-4362-2218"},"institutions":[{"id":"https://openalex.org/I60054993","display_name":"Graphic Era University","ror":"https://ror.org/03wqgqd89","country_code":"IN","type":"education","lineage":["https://openalex.org/I60054993"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Lalit Mohan","raw_affiliation_strings":["Graphic Era Hill University,Department of CSE,Bhimtal,India","Department of CSE, Graphic Era Hill University, Bhimtal, India"],"affiliations":[{"raw_affiliation_string":"Graphic Era Hill University,Department of CSE,Bhimtal,India","institution_ids":["https://openalex.org/I60054993"]},{"raw_affiliation_string":"Department of CSE, Graphic Era Hill University, Bhimtal, India","institution_ids":["https://openalex.org/I60054993"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5093323983","display_name":"Amit Singh Patwal","orcid":null},"institutions":[{"id":"https://openalex.org/I140352217","display_name":"Uka Tarsadia University","ror":"https://ror.org/059xgrv47","country_code":"IN","type":"education","lineage":["https://openalex.org/I140352217"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Amit Patwal","raw_affiliation_strings":["Uka Tarsadia University,Department of CSE,Gujarat,India","Department of CSE, Uka Tarsadia University, Gujarat, India"],"affiliations":[{"raw_affiliation_string":"Uka Tarsadia University,Department of CSE,Gujarat,India","institution_ids":["https://openalex.org/I140352217"]},{"raw_affiliation_string":"Department of CSE, Uka Tarsadia University, Gujarat, India","institution_ids":["https://openalex.org/I140352217"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031475130","display_name":"Pushpendra Kumar","orcid":"https://orcid.org/0000-0002-7755-2837"},"institutions":[{"id":"https://openalex.org/I140352217","display_name":"Uka Tarsadia University","ror":"https://ror.org/059xgrv47","country_code":"IN","type":"education","lineage":["https://openalex.org/I140352217"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Pushpendra Kumar","raw_affiliation_strings":["Uka Tarsadia University,Department of Computer Science,Gujarat,India","Department of Computer Science, Uka Tarsadia University, Gujarat, India"],"affiliations":[{"raw_affiliation_string":"Uka Tarsadia University,Department of Computer Science,Gujarat,India","institution_ids":["https://openalex.org/I140352217"]},{"raw_affiliation_string":"Department of Computer Science, Uka Tarsadia University, Gujarat, India","institution_ids":["https://openalex.org/I140352217"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5093323982"],"corresponding_institution_ids":["https://openalex.org/I60054993"],"apc_list":null,"apc_paid":null,"fwci":2.2973,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.90848607,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9890000224113464,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9887999892234802,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.7404295802116394},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.6296876668930054},{"id":"https://openalex.org/keywords/mindset","display_name":"Mindset","score":0.6118997931480408},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.597904622554779},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.49478572607040405},{"id":"https://openalex.org/keywords/small-and-medium-sized-enterprises","display_name":"Small and medium-sized enterprises","score":0.4817643165588379},{"id":"https://openalex.org/keywords/mistake","display_name":"Mistake","score":0.45883339643478394},{"id":"https://openalex.org/keywords/cyber-space","display_name":"Cyber Space","score":0.41434726119041443},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.2883835434913635},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.1992688775062561},{"id":"https://openalex.org/keywords/finance","display_name":"Finance","score":0.11532604694366455}],"concepts":[{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.7404295802116394},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.6296876668930054},{"id":"https://openalex.org/C2778491294","wikidata":"https://www.wikidata.org/wiki/Q1339824","display_name":"Mindset","level":2,"score":0.6118997931480408},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.597904622554779},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.49478572607040405},{"id":"https://openalex.org/C48879800","wikidata":"https://www.wikidata.org/wiki/Q622439","display_name":"Small and medium-sized enterprises","level":2,"score":0.4817643165588379},{"id":"https://openalex.org/C2777179996","wikidata":"https://www.wikidata.org/wiki/Q911222","display_name":"Mistake","level":2,"score":0.45883339643478394},{"id":"https://openalex.org/C2909575446","wikidata":"https://www.wikidata.org/wiki/Q204606","display_name":"Cyber Space","level":3,"score":0.41434726119041443},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.2883835434913635},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.1992688775062561},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.11532604694366455},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccnt56998.2023.10307363","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt56998.2023.10307363","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W2140008645","https://openalex.org/W2534257498","https://openalex.org/W2562489859","https://openalex.org/W2754938188","https://openalex.org/W2769580135","https://openalex.org/W2790176050","https://openalex.org/W2810245067","https://openalex.org/W2917673314","https://openalex.org/W2943049594","https://openalex.org/W2962960280","https://openalex.org/W2966426133","https://openalex.org/W2979644663","https://openalex.org/W3004686848","https://openalex.org/W3006459657","https://openalex.org/W3042970060","https://openalex.org/W3043710124","https://openalex.org/W3088753493","https://openalex.org/W3127454219"],"related_works":["https://openalex.org/W4318499246","https://openalex.org/W3005543248","https://openalex.org/W611119698","https://openalex.org/W2594007975","https://openalex.org/W3172254239","https://openalex.org/W4285325633","https://openalex.org/W2509341578","https://openalex.org/W4385561494","https://openalex.org/W81507009","https://openalex.org/W4320802206"],"abstract_inverted_index":{"As":[0,51],"the":[1,9,62,65,90,122,125,163,179,185,188],"tech":[2],"industry":[3],"is":[4,21,81,130,144],"advancing":[5],"day":[6],"by":[7,193],"day,":[8],"digital":[10],"data":[11,113],"they":[12,152,197],"store,":[13],"their":[14],"dependency":[15],"on":[16,57],"technology":[17,58],"and":[18,32,35,59,104,106,115,148,157,176,195,204],"other":[19],"resources":[20,156],"also":[22,39,73],"enlarging.":[23],"Although":[24],"large":[25,42,85],"businesses":[26],"account":[27],"for":[28,69,137],"returning":[29],"high":[30],"returns":[31],"turnover,":[33],"Small":[34],"Medium-sized":[36],"Enterprises":[37],"(SMEs)":[38],"have":[40],"a":[41,146,149,173],"market":[43],"share":[44],"in":[45],"this":[46,143,169],"evolving":[47],"era":[48],"of":[49,108,124,162,166],"technology.":[50],"these":[52,70,128],"SMEs":[53,93,129,133,159,194],"are":[54,72,94,134,153],"becoming":[55],"dependent":[56],"moving":[60],"towards":[61,84],"cyber":[63,66,79,102,117,189,201],"space,":[64],"security":[67,80,118,190,202],"risks":[68],"companies":[71],"increasing.":[74],"In":[75,120],"current":[76],"scenario,":[77],"providing":[78],"more":[82],"inclined":[83],"businesses,":[86],"but":[87],"what":[88],"about":[89,178],"SMEs?":[91],"Today,":[92],"not":[95],"well":[96],"prepared":[97],"to":[98],"defend":[99,205],"themselves":[100,206],"from":[101],"threats":[103,203],"attacks,":[105],"some":[107],"them":[109],"can't":[110],"even":[111],"detect":[112],"breaches":[114],"manage":[116],"risks.":[119],"addition,":[121],"mindset":[123],"people":[126],"within":[127],"like":[131],"\"We":[132],"too":[135],"small":[136],"any":[138],"cyber-attack":[139],"or":[140],"threat\".":[141],"But":[142],"just":[145],"myth":[147],"mistake.":[150],"Since":[151],"small,":[154],"lack":[155],"capital,":[158],"become":[160],"one":[161],"prime":[164],"targets":[165],"hackers.":[167],"Therefore,":[168],"review":[170,175],"paper":[171],"gives":[172],"literature":[174],"insights":[177],"research":[180],"conducted":[181],"so":[182],"far":[183],"around":[184],"world":[186],"regarding":[187],"problems":[191],"faced":[192],"how":[196],"can":[198],"cope":[199],"with":[200],"against":[207],"malicious":[208],"cyber-attacks.":[209]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
