دورية أكاديمية

Evaluating Self-Efficacy Pertaining to Cybersecurity for Small Businesses.

التفاصيل البيبلوغرافية
العنوان: Evaluating Self-Efficacy Pertaining to Cybersecurity for Small Businesses.
المؤلفون: Raineri, Ellen M., Resig, Jessica
المصدر: Journal of Applied Business & Economics; 2020, Vol. 22 Issue 12, p13-23, 11p
مصطلحات موضوعية: SMALL business, SELF-efficacy, SMALL business conferences, INTERNET security, OPERATING costs
مستخلص: Small businesses are easy victims of cyberattacks due to their limited resources and insufficient training. Furthermore, many small business owners' attitudes diminish their need for safeguards because they think that they are not likely to be attacked. Yet, small businesses experience Denial of Service (DoS) attacks, Distributed Denial of Service (DDos) attacks, phishing, vishing, and tail gating as well as theft of confidential information and hardware. Consequently, numerous small businesses close or experience detrimental results -- loss of consumer trust, lawsuits, credit monitoring fees, tarnished reputations, and lost operational costs. Since past research demonstrated that training positively impacts self-efficacy, this paper explores the effects of cybersecurity training on participants' self-efficacy towards small business cybersecurity practices. Survey participants were face-to-face and virtual attendees at a public university's Cybersecurity for Small Businesses Conference. To evaluate the attendees' perceived self- efficacy, a pre-and post-survey included cybersecurity questions with demographic questions. The results show a significant difference in scores for overall cybersecurity self-efficacy before and after such training. [ABSTRACT FROM AUTHOR]
Copyright of Journal of Applied Business & Economics is the property of North American Business Press Inc. and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
قاعدة البيانات: Supplemental Index
الوصف
تدمد:1499691X
DOI:10.33423/jabe.v22i12.3876