My research proposal is about small business and cyber-attacks. Why are small businesses attacked? What can small businesses do to prevent and respond to cyber-attacks.
Search 1:
- Database: Computer Source
- Search: “cyber”, “security” and “business”
- Limiters: Full Text, Peer Reviewed
- Results: 37
Yong Wu, Tayi, G. K., Genzhong Feng, & Fung, R. Y. K. (2021). Managing Information Security Outsourcing in a Dynamic Cooperation Environment. Journal of the Association for Information Systems, 22(3), 827–850. https://doi-org.ezproxy.fhsu.edu/10.17705/1jais.00681
Annotated Bibliography #1:
This article is about managing contracts with outsourced security. It also touches on the responsibility of both the clients and the security provider. The article studies a business environment with both the client and security provider’s efforts with the security. The article also proposes bilateral refund contracts to consider for changing responsibilities. This article could be useful in my research as I do have a section over whether or not outsourced or in house security is better for a small business.
Search 2:
- Database: Small Business Reference Center
- Search: “information” and “security”
- Limiters: Full Text, Publication between 2010 and 2022.
- Results: 52
Marett, K., Niu, Z., & Barnett, T. R. (2020). Professionalizing the information security of family firms: A family essence perspective. Journal of Small Business Management, 58(2), 390–408. https://doi-org.ezproxy.fhsu.edu/10.1080/00472778.2019.1659683
Annotated Bibliography #2:
This article investigated possible influences on a family firm’s decision to professionalize their security. The article’s results showed that the family aspect had a negative influence on the extent of professionalism. Having a family member of the desire to have a family handle information security could have a negative impact. Their study also showed on the other side, that an outside provider may encounter some resistance when providing security. The family may not be welcoming to having stranger having access to their information.
Search 3:
- Database: Small Business Reference Center
- Search: “hacking” and “small business”
- Limiters: Full Text, Publication between 2010 and 2022
- Results: 9
ALLARD, E. (2016). Cybersecurity forum spells out business risk. New Hampshire Business Review, 38(12), 14.
Annotated Bibliography #3:
This article was about small businesses not thinking they will be hacked. The reason behind this thinking was that they are too small to be hacked. The article points out that 40 percent of cyberattacks are aimed at companies with 500 employees or less. The article gives a list of five questions related mostly to data and what the company would do if that data was compromised. This article is very helpful in laying out in plain facts why preventive measures are important for businesses of all sizes.
Search 4:
- Database: Computer Science Collection
- Search: “small”, “business” and “hacking”
- Limiters: Full text, peer reviewed
- Results: 38
Udofot, M., & Topchyan, R. (2020). Factors Related to Small Business Cyber-Attack Protection in the United States. International Journal of Cyber-Security and Digital Forensics, 9(1), 12+. https://link.gale.com/apps/doc/A652011403/CDB?u=klnb_fhsuniv&sid=bookmark-CDB&xid=d721060c
Annotated Bibliography #4:
This is article was a quantitative study. The study attempted to identify if there is a relationship between company characteristics and cyber-attack protection. The study also attempted to identify if cyber-attack protection is the same in businesses with and with out cyber-attacks.
Search 5:
- Database: Computer Science Collection
- Search: “cyber-attacks”, “prevention”, and “response”
- Limiters: Full Text, Peer-Reviewed
- Results: 81
Lopez, M. A., Lombardo, J. M., Lopez, M., Alba, C. M., Velasco, S., Braojos, M. A., & Fuentes-Garcia, M. (2020). Intelligent Detection and Recovery from Cyberattacks for Small and Medium-Sized Enterprises. International Journal of Interactive Multimedia and Artificial Intelligence, 6(3), 55+. https://link.gale.com/apps/doc/A638116050/CDB?u=klnb_fhsuniv&sid=bookmark-CDB&xid=c395e4b3
Annotated Bibliography #5:
This article proposes an intelligent platform to enhance detection and recovery from attacks. The proposed platform specifically for small and medium-sized businesses. The platform would help with prevention and security and a more affordable cost to the business.
Saturation?
At the beginning of my research, I was a little worried that I wouldn’t find the information I needed for my proposal. After the past two weeks I am not worried about it at all. Refining search terms, using more databases, and different limiters have made more information available to me. As a result, I don’t believe I have reached saturation.