{"id":"https://openalex.org/W4402594258","doi":"https://doi.org/10.1109/sds60720.2024.00016","title":"Navigating the Digital Landscape: Enhancing Small and Medium Business\u2019s Security through Asset Management and Data Classification","display_name":"Navigating the Digital Landscape: Enhancing Small and Medium Business\u2019s Security through Asset Management and Data Classification","publication_year":2024,"publication_date":"2024-05-30","ids":{"openalex":"https://openalex.org/W4402594258","doi":"https://doi.org/10.1109/sds60720.2024.00016"},"language":"en","primary_location":{"id":"doi:10.1109/sds60720.2024.00016","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/sds60720.2024.00016","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 11th IEEE Swiss Conference on Data Science (SDS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113387256","display_name":"Siddharth Dua","orcid":null},"institutions":[{"id":"https://openalex.org/I131564278","display_name":"Concordia University of Edmonton","ror":"https://ror.org/04013rx15","country_code":"CA","type":"education","lineage":["https://openalex.org/I131564278"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Siddharth Dua","raw_affiliation_strings":["Concordia University of Edmonton,Information Systems Security and Assurance Management (ISSAM) Department,Edmonton,Canada"],"affiliations":[{"raw_affiliation_string":"Concordia University of Edmonton,Information Systems Security and Assurance Management (ISSAM) Department,Edmonton,Canada","institution_ids":["https://openalex.org/I131564278"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101400243","display_name":"Pooja Shah","orcid":"https://orcid.org/0000-0002-6853-3546"},"institutions":[{"id":"https://openalex.org/I131564278","display_name":"Concordia University of Edmonton","ror":"https://ror.org/04013rx15","country_code":"CA","type":"education","lineage":["https://openalex.org/I131564278"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Pooja Shah","raw_affiliation_strings":["Concordia University of Edmonton,Information Systems Security and Assurance Management (ISSAM) Department,Edmonton,Canada"],"affiliations":[{"raw_affiliation_string":"Concordia University of Edmonton,Information Systems Security and Assurance Management (ISSAM) Department,Edmonton,Canada","institution_ids":["https://openalex.org/I131564278"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079845675","display_name":"Eslam G. AbdAllah","orcid":"https://orcid.org/0000-0001-7669-3016"},"institutions":[{"id":"https://openalex.org/I131564278","display_name":"Concordia University of Edmonton","ror":"https://ror.org/04013rx15","country_code":"CA","type":"education","lineage":["https://openalex.org/I131564278"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Eslam G. AbdAllah","raw_affiliation_strings":["Concordia University of Edmonton,Information Systems Security and Assurance Management (ISSAM) Department,Edmonton,Canada"],"affiliations":[{"raw_affiliation_string":"Concordia University of Edmonton,Information Systems Security and Assurance Management (ISSAM) Department,Edmonton,Canada","institution_ids":["https://openalex.org/I131564278"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5113387256"],"corresponding_institution_ids":["https://openalex.org/I131564278"],"apc_list":null,"apc_paid":null,"fwci":0.5569,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.7453604,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"55","last_page":"61"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11891","display_name":"Big Data and Business Intelligence","score":0.7120000123977661,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11891","display_name":"Big Data and Business Intelligence","score":0.7120000123977661,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/asset","display_name":"Asset (computer security)","score":0.6258050799369812},{"id":"https://openalex.org/keywords/digital-asset-management","display_name":"Digital asset management","score":0.6156259775161743},{"id":"https://openalex.org/keywords/asset-management","display_name":"Asset management","score":0.5295965075492859},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.49134889245033264},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.47147583961486816},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.4398011565208435},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.32202962040901184},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.28439682722091675},{"id":"https://openalex.org/keywords/finance","display_name":"Finance","score":0.125643789768219}],"concepts":[{"id":"https://openalex.org/C76178495","wikidata":"https://www.wikidata.org/wiki/Q4808784","display_name":"Asset (computer security)","level":2,"score":0.6258050799369812},{"id":"https://openalex.org/C177679114","wikidata":"https://www.wikidata.org/wiki/Q1224694","display_name":"Digital asset management","level":4,"score":0.6156259775161743},{"id":"https://openalex.org/C2776517139","wikidata":"https://www.wikidata.org/wiki/Q873442","display_name":"Asset management","level":2,"score":0.5295965075492859},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.49134889245033264},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.47147583961486816},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.4398011565208435},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.32202962040901184},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28439682722091675},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.125643789768219},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.0},{"id":"https://openalex.org/C183582576","wikidata":"https://www.wikidata.org/wiki/Q184783","display_name":"Market liquidity","level":2,"score":0.0},{"id":"https://openalex.org/C103144560","wikidata":"https://www.wikidata.org/wiki/Q2670999","display_name":"Investment strategy","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/sds60720.2024.00016","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/sds60720.2024.00016","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 11th IEEE Swiss Conference on Data Science (SDS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320322675","display_name":"Mitacs","ror":"https://ror.org/00cjrc276"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":1,"referenced_works":["https://openalex.org/W2985776815"],"related_works":["https://openalex.org/W2049254057","https://openalex.org/W2031147647","https://openalex.org/W1983650012","https://openalex.org/W1971065801","https://openalex.org/W2405716368","https://openalex.org/W239645738","https://openalex.org/W2384042486","https://openalex.org/W3009911173","https://openalex.org/W2377548646","https://openalex.org/W4387459160"],"abstract_inverted_index":{"Small":[0],"and":[1,11,36,69,97,105,170,188,196,212,217,231],"Medium":[2],"Enterprises":[3],"(SMEs)":[4],"account":[5],"for":[6,143,186],"90%":[7],"of":[8,41,124,145,184,215],"businesses":[9],"globally":[10],"contribute":[12],"to":[13,34,64,79,88,108,131,137,153,158],"50%":[14],"employment":[15],"worldwide.":[16],"Despite":[17],"many":[18],"widely":[19],"acclaimed":[20],"cybersecurity":[21,67,141,206],"standards":[22],"or":[23,84,91,203],"frameworks":[24,207],"that":[25,128],"exist":[26],"in":[27,163],"the":[28,66,120,126,161,164,167],"industry,":[29],"SMEs":[30,53,76,107,138,152,187],"are":[31,54,71],"most":[32],"vulnerable":[33],"cyberattacks":[35],"have":[37,61],"a":[38,48,86,102,155,180],"high":[39],"chance":[40],"losing":[42],"their":[43,146],"existence":[44],"if":[45],"they":[46],"undergo":[47],"successful":[49],"cyberattack":[50],"by":[51,74],"cybercriminals.":[52,75],"rapidly":[55],"adopting":[56],"latest":[57],"technologies":[58],"but":[59],"don\u2019t":[60],"enough":[62],"resources":[63],"implement":[65],"controls":[68],"therefore":[70],"actively":[72],"targeted":[73],"often":[77],"try":[78],"manage":[80],"cyber":[81,110,113],"risk":[82,99,114],"informally":[83],"as":[85,179,209],"reaction":[87],"security":[89],"events":[90],"incidents.":[92],"Both":[93],"approaches,":[94],"informal":[95],"management":[96],"reaction-based":[98],"mitigation,":[100],"lack":[101],"structured":[103],"method":[104],"blinds":[106],"actual":[109],"risk.":[111],"Actual":[112],"can":[115,150,177],"only":[116],"be":[117],"measured":[118],"once":[119],"organization":[121],"has":[122],"visibility":[123],"all":[125,160],"assets":[127,162,185],"it":[129],"aims":[130],"protect.":[132],"This":[133,148],"research":[134,149],"provides":[135],"guidance":[136],"on":[139,228],"implementing":[140],"techniques":[142,176],"protection":[144,173,183],"assets.":[147],"help":[151,189],"follow":[154],"methodological":[156],"approach":[157],"find":[159],"organization,":[165],"calculate":[166],"assets\u2019":[168],"values,":[169],"subsequently":[171],"apply":[172],"controls.":[174],"These":[175],"serve":[178],"suitable":[181],"baseline":[182],"them":[190],"comply":[191,204],"with":[192,205],"potential":[193],"future":[194],"Service":[195],"Organization":[197],"Controls":[198],"2":[199],"(SOC":[200],"2)":[201],"requirements":[202],"such":[208],"ISO":[210],"27001":[211],"National":[213],"Institute":[214],"Standards":[216],"Technology":[218],"(NIST)":[219],"Cybersecurity":[220],"Framework":[221],"(CSF).":[222],"In":[223],"this":[224],"paper,":[225],"we":[226],"focus":[227],"Asset":[229],"Management":[230],"Data":[232],"Classification.":[233]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-03-05T09:29:38.588285","created_date":"2025-10-10T00:00:00"}
