{"id":"https://openalex.org/W3214083186","doi":"https://doi.org/10.3390/computers10110150","title":"Machine Learning Cybersecurity Adoption in Small and Medium Enterprises in Developed Countries","display_name":"Machine Learning Cybersecurity Adoption in Small and Medium Enterprises in Developed Countries","publication_year":2021,"publication_date":"2021-11-10","ids":{"openalex":"https://openalex.org/W3214083186","doi":"https://doi.org/10.3390/computers10110150","mag":"3214083186"},"language":"en","primary_location":{"id":"doi:10.3390/computers10110150","is_oa":true,"landing_page_url":"https://doi.org/10.3390/computers10110150","pdf_url":"https://www.mdpi.com/2073-431X/10/11/150/pdf?version=1636534476","source":{"id":"https://openalex.org/S4210228075","display_name":"Computers","issn_l":"2073-431X","issn":["2073-431X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2073-431X/10/11/150/pdf?version=1636534476","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041136061","display_name":"Nisha Rawindaran","orcid":"https://orcid.org/0000-0002-1914-7366"},"institutions":[{"id":"https://openalex.org/I8408910","display_name":"Cardiff Metropolitan University","ror":"https://ror.org/00bqvf857","country_code":"GB","type":"education","lineage":["https://openalex.org/I8408910"]},{"id":"https://openalex.org/I161548249","display_name":"Bangor University","ror":"https://ror.org/006jb1a24","country_code":"GB","type":"education","lineage":["https://openalex.org/I161548249"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Nisha Rawindaran","raw_affiliation_strings":["Aytel Systems Ltd., Cardiff CF3 2PU, Wales, UK","Cardiff School of Technologies, Cardiff Metropolitan University, Cardiff CF5 2XJ, Wales, UK","KESS2, Knowledge Economy Skills Scholarships, Supported by European Social Funds (ESF), Bangor University, Bangor, Gwynedd LL57 2DG, Wales, UK"],"affiliations":[{"raw_affiliation_string":"Aytel Systems Ltd., Cardiff CF3 2PU, Wales, UK","institution_ids":[]},{"raw_affiliation_string":"Cardiff School of Technologies, Cardiff Metropolitan University, Cardiff CF5 2XJ, Wales, UK","institution_ids":["https://openalex.org/I8408910"]},{"raw_affiliation_string":"KESS2, Knowledge Economy Skills Scholarships, Supported by European Social Funds (ESF), Bangor University, Bangor, Gwynedd LL57 2DG, Wales, UK","institution_ids":["https://openalex.org/I161548249"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074384016","display_name":"Ambikesh Jayal","orcid":"https://orcid.org/0000-0002-9936-5311"},"institutions":[{"id":"https://openalex.org/I188329596","display_name":"University of Canberra","ror":"https://ror.org/04s1nv328","country_code":"AU","type":"education","lineage":["https://openalex.org/I188329596"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Ambikesh Jayal","raw_affiliation_strings":["School of Information Systems and Technology, University of Canberra, Bruce, ACT 2617, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Systems and Technology, University of Canberra, Bruce, ACT 2617, Australia","institution_ids":["https://openalex.org/I188329596"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074498946","display_name":"Edmond Prakash","orcid":"https://orcid.org/0000-0001-9129-0186"},"institutions":[{"id":"https://openalex.org/I8408910","display_name":"Cardiff Metropolitan University","ror":"https://ror.org/00bqvf857","country_code":"GB","type":"education","lineage":["https://openalex.org/I8408910"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Edmond Prakash","raw_affiliation_strings":["Cardiff School of Technologies, Cardiff Metropolitan University, Cardiff CF5 2XJ, Wales, UK"],"affiliations":[{"raw_affiliation_string":"Cardiff School of Technologies, Cardiff Metropolitan University, Cardiff CF5 2XJ, Wales, UK","institution_ids":["https://openalex.org/I8408910"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5074384016"],"corresponding_institution_ids":["https://openalex.org/I188329596"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":7.4662,"has_fulltext":true,"cited_by_count":82,"citation_normalized_percentile":{"value":0.9748089,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":"10","issue":"11","first_page":"150","last_page":"150"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.613443911075592},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.5393682718276978},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.538901686668396},{"id":"https://openalex.org/keywords/small-and-medium-sized-enterprises","display_name":"Small and medium-sized enterprises","score":0.4816928803920746},{"id":"https://openalex.org/keywords/cyberspace","display_name":"Cyberspace","score":0.4700556993484497},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.43527013063430786},{"id":"https://openalex.org/keywords/data-protection-act-1998","display_name":"Data Protection Act 1998","score":0.42429226636886597},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.397802472114563},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.19127222895622253},{"id":"https://openalex.org/keywords/finance","display_name":"Finance","score":0.1328142285346985},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.10726401209831238}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.613443911075592},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.5393682718276978},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.538901686668396},{"id":"https://openalex.org/C48879800","wikidata":"https://www.wikidata.org/wiki/Q622439","display_name":"Small and medium-sized enterprises","level":2,"score":0.4816928803920746},{"id":"https://openalex.org/C2781241145","wikidata":"https://www.wikidata.org/wiki/Q204606","display_name":"Cyberspace","level":3,"score":0.4700556993484497},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.43527013063430786},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.42429226636886597},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.397802472114563},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.19127222895622253},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.1328142285346985},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.10726401209831238},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.3390/computers10110150","is_oa":true,"landing_page_url":"https://doi.org/10.3390/computers10110150","pdf_url":"https://www.mdpi.com/2073-431X/10/11/150/pdf?version=1636534476","source":{"id":"https://openalex.org/S4210228075","display_name":"Computers","issn_l":"2073-431X","issn":["2073-431X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:844ea5c48ef143c6af6e94e183c42796","is_oa":true,"landing_page_url":"https://doaj.org/article/844ea5c48ef143c6af6e94e183c42796","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Computers, Vol 10, Iss 11, p 150 (2021)","raw_type":"article"},{"id":"pmh:oai:figshare.com:article/19362434","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/Machine_Learning_Cybersecurity_Adoption_in_Small_and_Medium_Enterprises_in_Developed_Countries/19362434","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.3390/computers10110150","is_oa":true,"landing_page_url":"https://doi.org/10.3390/computers10110150","pdf_url":"https://www.mdpi.com/2073-431X/10/11/150/pdf?version=1636534476","source":{"id":"https://openalex.org/S4210228075","display_name":"Computers","issn_l":"2073-431X","issn":["2073-431X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals","score":0.5199999809265137}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3214083186.pdf","grobid_xml":"https://content.openalex.org/works/W3214083186.grobid-xml"},"referenced_works_count":28,"referenced_works":["https://openalex.org/W107711226","https://openalex.org/W1791233703","https://openalex.org/W1996802155","https://openalex.org/W2019150015","https://openalex.org/W2147805742","https://openalex.org/W2322695415","https://openalex.org/W2342408547","https://openalex.org/W2612404666","https://openalex.org/W2964850583","https://openalex.org/W2973867930","https://openalex.org/W2982484282","https://openalex.org/W3006984136","https://openalex.org/W3009259451","https://openalex.org/W3016388285","https://openalex.org/W3043486047","https://openalex.org/W3081727988","https://openalex.org/W3088440420","https://openalex.org/W3175145616","https://openalex.org/W3180150837","https://openalex.org/W3184791374","https://openalex.org/W3186390924","https://openalex.org/W3210691542","https://openalex.org/W4212996180","https://openalex.org/W4238648756","https://openalex.org/W4244422188","https://openalex.org/W6604469876","https://openalex.org/W6737245311","https://openalex.org/W6758512690"],"related_works":["https://openalex.org/W2368745349","https://openalex.org/W3167675181","https://openalex.org/W2372005904","https://openalex.org/W144012884","https://openalex.org/W2360897455","https://openalex.org/W2131575257","https://openalex.org/W2377660959","https://openalex.org/W4251169878","https://openalex.org/W2810589793","https://openalex.org/W2527886746"],"abstract_inverted_index":{"In":[0],"many":[1,127],"developed":[2,40,118,153,565],"countries,":[3],"the":[4,19,30,72,76,84,102,142,195,201,220,223,246,314,327,336,342,374,386,415,433,459,499,525,529,539,569],"usage":[5,530],"of":[6,75,144,146,175,284,292,353,376,378,414,435,461,477,479,483,531],"artificial":[7],"intelligence":[8],"(AI)":[9],"and":[10,27,32,50,65,68,92,109,158,165,167,192,204,217,263,278,288,302,317,319,329,369,372,393,406,431,442,464,472,481,493,505,510,534,547,560],"machine":[11,96],"learning":[12,97],"(ML)":[13],"has":[14,106,122],"become":[15,107,555],"important":[16,448],"in":[17,22,29,38,57,101,126,141,200,219,286,346,361,403,409,458,521,524,542],"paving":[18],"future":[20,571],"path":[21],"how":[23,58,176,205,366],"data":[24,242,338,357],"is":[25,54,137,178,226],"managed":[26,208],"secured":[28],"small":[31,268],"medium":[33],"enterprises":[34],"(SMEs)":[35],"sector.":[36],"SMEs":[37,61,287,340,554],"these":[39,59,181,367,519],"countries":[41,154,566],"have":[42,341,427],"created":[43],"their":[44,63,354,549],"own":[45],"cyber":[46,270,401,455],"regimes":[47],"around":[48],"AI":[49],"ML.":[51],"This":[52,250,272,444],"knowledge":[53],"tested":[55],"daily":[56],"countries\u2019":[60],"run":[62,360],"businesses":[64],"identify":[66,261],"threats":[67,402],"attacks,":[69],"based":[70],"on":[71,80,229,326,568],"support":[73],"structure":[74],"individual":[77],"country.":[78],"Based":[79,325],"recent":[81],"changes":[82],"to":[83,113,169,197,209,232,240,260,313,363,411,487,497,514,545,551,563],"UK":[85,103,150,266,515,533,553],"General":[86],"Data":[87],"Protection":[88],"Regulation":[89],"(GDPR),":[90],"Brexit,":[91],"ISO":[93],"standards":[94],"requirements,":[95],"cybersecurity":[98,344,494],"(MLCS)":[99],"adoption":[100,145,282,377],"SME":[104,182,202,267],"market":[105],"prevalent":[108],"a":[110,139],"good":[111],"example":[112],"lean":[114],"on,":[115],"amongst":[116],"other":[117,564],"nations.":[119],"Whilst":[120],"MLCS":[121,147,170,177,199,230,285,379],"been":[123,428],"successfully":[124],"applied":[125,179],"applications,":[128],"including":[129],"network":[130],"intrusion":[131],"detection":[132],"systems":[133],"(NIDs)":[134],"worldwide,":[135],"there":[136],"still":[138],"gap":[140],"rate":[143,375],"techniques":[148,231],"for":[149,265,280,527],"SMEs.":[151],"Other":[152],"such":[155],"as":[156],"Spain":[157],"Australia":[159],"also":[160,185,275,446,567],"fall":[161],"into":[162,248],"this":[163,331,503,522,543],"category,":[164],"similarities":[166],"differences":[168],"adoptions":[171],"are":[172,184,207,349],"discussed.":[173],"Applications":[174],"within":[180],"industries":[183],"explored.":[186],"The":[187,297,383],"paper":[188,251,273,384,445,544],"investigates,":[189],"using":[190,322],"quantitative":[191,301],"qualitative":[193,303],"methods,":[194],"challenges":[196,370],"adopting":[198],"ecosystem,":[203],"operations":[206,239],"promote":[210],"business":[211,269],"growth.":[212],"Much":[213],"like":[214,235],"security":[215,456],"guards":[216],"policing":[218],"real":[221],"world,":[222],"virtual":[224],"world":[225],"now":[227],"calling":[228],"be":[233,420],"embedded":[234],"secret":[236],"service":[237],"covert":[238],"protect":[241],"being":[243],"distributed":[244,306],"by":[245,422],"millions":[247],"cyberspace.":[249],"will":[252,274],"use":[253,538],"existing":[254],"global":[255],"research":[256,540],"from":[257,335,558],"multiple":[258],"disciplines":[259],"gaps":[262,450],"opportunities":[264],"security.":[271],"highlight":[276],"barriers":[277,368],"reasons":[279],"low":[281],"rates":[283],"compare":[289,561],"success":[290],"stories":[291],"larger":[293],"companies":[294],"implementing":[295],"MLCS.":[296,532],"methodology":[298],"uses":[299],"structured":[300],"survey":[304],"questionnaires,":[305],"across":[307],"an":[308],"extensive":[309],"participation":[310],"pool":[311],"directed":[312],"SMEs\u2019":[315,475],"management":[316],"technical":[318],"non-technical":[320],"professionals":[321],"stratify":[323],"methods.":[324],"analysis":[328],"findings,":[330],"study":[332],"reveals":[333],"that":[334,388,424,451],"primary":[337],"obtained,":[339],"appropriate":[343,439],"packages":[345],"place":[347],"but":[348],"not":[350],"fully":[351],"aware":[352],"potential.":[355],"Secondary":[356],"collection":[358],"was":[359,380],"parallel":[362],"better":[364],"understand":[365,432],"emerged,":[371],"why":[373],"very":[381],"low.":[382],"draws":[385],"conclusion":[387],"help":[389,453,552],"through":[390,467],"government":[391],"policies":[392,471,550],"processes":[394,441],"coupled":[395],"together":[396],"with":[397],"collaboration":[398],"could":[399,452,485,512],"minimize":[400],"combatting":[404],"hackers":[405],"malicious":[407],"actors":[408],"trying":[410],"stay":[412],"ahead":[413],"game.":[416],"These":[417],"aspirations":[418],"can":[419,537],"reached":[421],"ensuring":[423],"those":[425],"involved":[426],"well":[429],"trained":[430],"importance":[434],"communication":[436],"when":[437],"applying":[438],"safety":[440],"procedures.":[443],"highlights":[447],"funding":[449],"raise":[454],"awareness":[457],"form":[460],"grants,":[462],"subsidies,":[463],"financial":[465],"assistance":[466],"various":[468],"public":[469],"sector":[470],"training.":[473],"Lastly,":[474],"lack":[476],"understanding":[478],"risks":[480],"impacts":[482],"cybercrime":[484],"lead":[486,513],"conflicting":[488],"messages":[489],"between":[490,502],"cross-company":[491],"IT":[492],"rules.":[495],"Trying":[496],"find":[498],"right":[500],"balance":[501],"risk":[504],"impact,":[506],"versus":[507],"productivity":[508],"impact":[509],"costs,":[511],"SMES":[516],"getting":[517],"over":[518],"hurdles":[520],"cyberspace":[523],"quest":[526],"promoting":[528],"Wales":[535],"governments":[536],"conducted":[541],"inform":[546],"adapt":[548],"more":[556],"secure":[557],"cyber-attacks":[559],"them":[562],"same":[570],"path.":[572]},"counts_by_year":[{"year":2026,"cited_by_count":7},{"year":2025,"cited_by_count":28},{"year":2024,"cited_by_count":25},{"year":2023,"cited_by_count":18},{"year":2022,"cited_by_count":4}],"updated_date":"2026-03-03T08:47:05.690250","created_date":"2025-10-10T00:00:00"}
