{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T02:49:29Z","timestamp":1726368569914},"reference-count":69,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,4]]},"abstract":"Small to medium-sized enterprises (SMEs) in North America do not always adequately address security. Based on responses from 232 SME owners and managers, the authors found that the adoption of security recommendations made by experts appear to be significantly influenced by the decisions of other local SMEs. A hot-spot analysis of information security practices suggested that local trends lead to prioritizing certain security practices and not adopting others. Follow-up interviews with business owners and Chamber of Commerce directors provided insights on how security hotspots developed or not. The study identified both hot spot and cold spot communities, and sought to assess how local business networking conduits like chambers of commerce help promote best security practices<\/jats:p>","DOI":"10.4018\/irmj.2019040104","type":"journal-article","created":{"date-parts":[[2019,3,12]],"date-time":"2019-03-12T11:59:01Z","timestamp":1552391941000},"page":"76-93","source":"Crossref","is-referenced-by-count":4,"title":["Information Security Practices in Small-to-Medium Sized Businesses"],"prefix":"10.4018","volume":"32","author":[{"given":"Kent","family":"Marett","sequence":"first","affiliation":[{"name":"Mississippi State University, USA"}]},{"given":"Tim","family":"Barnett","sequence":"additional","affiliation":[{"name":"Mississippi State University, USA"}]}],"member":"2432","reference":[{"key":"IRMJ.2019040104-0","first-page":"97","article-title":"Crime Mapping and Hot Spot Analysis","author":"L.Anselin","year":"2008","journal-title":"Environmental Criminology and Crime Analysis"},{"key":"IRMJ.2019040104-1","unstructured":"Asheim, B., & Gertler, M. (2005). The Geography of Innovation. In J. Faberberg, D. Mowery & R. Nelson (Eds.), The Oxford Handbook of Innovation (pp. 291-317)."},{"key":"IRMJ.2019040104-2","doi-asserted-by":"publisher","DOI":"10.2307\/3094892"},{"key":"IRMJ.2019040104-3","doi-asserted-by":"publisher","DOI":"10.1080\/00343400020002958"},{"key":"IRMJ.2019040104-4","doi-asserted-by":"publisher","DOI":"10.1111\/1467-8551.00144"},{"key":"IRMJ.2019040104-5","doi-asserted-by":"publisher","DOI":"10.5465\/amr.2011.0431"},{"key":"IRMJ.2019040104-6","doi-asserted-by":"publisher","DOI":"10.2307\/25148643"},{"key":"IRMJ.2019040104-7","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2011.08.006"},{"key":"IRMJ.2019040104-8","doi-asserted-by":"publisher","DOI":"10.4018\/IRMJ.2017100103"},{"key":"IRMJ.2019040104-9","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2011.08.003"},{"issue":"3","key":"IRMJ.2019040104-10","first-page":"1","article-title":"Effects of team collaboration on sharing information security advice: Insights from network analysis.","volume":"30","author":"D.Dang","year":"2017","journal-title":"Information Resources Management Journal"},{"key":"IRMJ.2019040104-11","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2016.12.003"},{"key":"IRMJ.2019040104-12","doi-asserted-by":"publisher","DOI":"10.1016\/j.respol.2005.03.006"},{"key":"IRMJ.2019040104-13","doi-asserted-by":"publisher","DOI":"10.1086\/231170"},{"key":"IRMJ.2019040104-14","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.1050.0137"},{"key":"IRMJ.2019040104-15","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2006.00219.x"},{"key":"IRMJ.2019040104-16","doi-asserted-by":"publisher","DOI":"10.2307\/2095101"},{"key":"IRMJ.2019040104-17","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.03809"},{"key":"IRMJ.2019040104-18","unstructured":"FCC. (2012). Cybersecurity for Small Business. Retrieved from https:\/\/www.fcc.gov\/general\/cybersecurity-small-business"},{"key":"IRMJ.2019040104-19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jtrangeo.2018.04.005"},{"key":"IRMJ.2019040104-20","doi-asserted-by":"publisher","DOI":"10.1111\/j.1538-4632.1992.tb00261.x"},{"key":"IRMJ.2019040104-21","first-page":"261","article-title":"Local Spatial Statistics: An Overview","author":"A.Getis","year":"1996","journal-title":"Spatial Analysis: Modelling in a GIS Environment"},{"key":"IRMJ.2019040104-22","doi-asserted-by":"publisher","DOI":"10.1016\/j.sleh.2015.06.003"},{"key":"IRMJ.2019040104-23","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00068"},{"key":"IRMJ.2019040104-24","doi-asserted-by":"publisher","DOI":"10.1177\/0170840605053539"},{"key":"IRMJ.2019040104-25","doi-asserted-by":"publisher","DOI":"10.1108\/09685220510614425"},{"key":"IRMJ.2019040104-26","doi-asserted-by":"publisher","DOI":"10.2307\/41410418"},{"key":"IRMJ.2019040104-27","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222250310"},{"key":"IRMJ.2019040104-28","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2009.02.005"},{"key":"IRMJ.2019040104-29","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1110.0393"},{"key":"IRMJ.2019040104-30","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2007.05.004"},{"key":"IRMJ.2019040104-31","doi-asserted-by":"publisher","DOI":"10.1080\/08985620903171350"},{"key":"IRMJ.2019040104-32","doi-asserted-by":"publisher","DOI":"10.1016\/S0268-4012(02)00105-6"},{"key":"IRMJ.2019040104-33","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2006.06.006"},{"key":"IRMJ.2019040104-34","doi-asserted-by":"crossref","unstructured":"Kissel, R. (2009). Small Business Information Security: The Fundamentals. NIST. Retrieved from http:\/\/csrc.nist.gov\/publications\/nistir\/ir7621\/nistir-7621.pdf","DOI":"10.6028\/NIST.IR.7621"},{"key":"IRMJ.2019040104-35","doi-asserted-by":"publisher","DOI":"10.1108\/09685220610648355"},{"issue":"6","key":"IRMJ.2019040104-36","doi-asserted-by":"crossref","first-page":"621","DOI":"10.2307\/256961","article-title":"Learning by Association? Interorganizational Networks and Adaptation to Environmental Change.","volume":"41","author":"M.Kraatz","year":"1998","journal-title":"Academy of Management Journal"},{"key":"IRMJ.2019040104-37","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2011.05.007"},{"key":"IRMJ.2019040104-38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-05951-8_27"},{"key":"IRMJ.2019040104-39","doi-asserted-by":"publisher","DOI":"10.1080\/13662719400000002"},{"key":"IRMJ.2019040104-40","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-0266(199912)20:12<1133::AID-SMJ74>3.0.CO;2-7"},{"key":"IRMJ.2019040104-41","author":"R.Miles","year":"1978","journal-title":"Organizational Strategy, Structure, and Process"},{"key":"IRMJ.2019040104-42","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-6520.2007.00203.x"},{"key":"IRMJ.2019040104-43","doi-asserted-by":"publisher","DOI":"10.2307\/3250927"},{"key":"IRMJ.2019040104-44","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.05.001"},{"key":"IRMJ.2019040104-45","doi-asserted-by":"publisher","DOI":"10.1177\/0001839215592913"},{"key":"IRMJ.2019040104-46","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2013.08.008"},{"key":"IRMJ.2019040104-47","doi-asserted-by":"publisher","DOI":"10.1080\/02642060903580722"},{"key":"IRMJ.2019040104-48","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222250206"},{"key":"IRMJ.2019040104-49","doi-asserted-by":"publisher","DOI":"10.1177\/089124240001400105"},{"key":"IRMJ.2019040104-50","doi-asserted-by":"publisher","DOI":"10.5465\/amr.1996.9704071867"},{"key":"IRMJ.2019040104-51","unstructured":"Reckard, E. S., & Hsu, T. (2014). Small Businesses at High Risk for Data Breach. Los Angeles Times. Retrieved from http:\/\/www.latimes.com\/business\/la-fi-small-data-breaches-20140705-story.html"},{"key":"IRMJ.2019040104-52","doi-asserted-by":"publisher","DOI":"10.1007\/s00267-003-0220-1"},{"key":"IRMJ.2019040104-53","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2015\/39.1.04"},{"key":"IRMJ.2019040104-54","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2005.07.002"},{"key":"IRMJ.2019040104-55","doi-asserted-by":"publisher","DOI":"10.2307\/41410419"},{"key":"IRMJ.2019040104-56","unstructured":"Scott, L., & Warmerdam, N. (2005). Extend Crime Analysis with ArcGIS Spatial Statistics Tools. ERSI. Retrieved from http:\/\/www.esri.com\/news\/arcuser\/0405\/ss_crimestats1of2.html"},{"key":"IRMJ.2019040104-57","author":"W. R.Shadish","year":"2002","journal-title":"Experimental and Quasi-Experimental Designs for Generalized Causal Inference"},{"key":"IRMJ.2019040104-58","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2016.09.014"},{"key":"IRMJ.2019040104-59","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222240102"},{"key":"IRMJ.2019040104-60","doi-asserted-by":"publisher","DOI":"10.2307\/249551"},{"key":"IRMJ.2019040104-61","doi-asserted-by":"publisher","DOI":"10.2307\/30036518"},{"key":"IRMJ.2019040104-62","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2013\/37.1.02"},{"key":"IRMJ.2019040104-63","unstructured":"Verma, P. (2015). Is Your Small Business a Perfect Target for Hackers? Forbes. Retrieved from http:\/\/www.forbes.com\/sites\/centurylink\/2015\/06\/11\/is-your-small-business-a-perfect-target-for-hackers\/"},{"key":"IRMJ.2019040104-64","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2016.1205934"},{"key":"IRMJ.2019040104-65","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2004.06.007"},{"key":"IRMJ.2019040104-66","doi-asserted-by":"publisher","DOI":"10.1016\/j.hrmr.2012.06.010"},{"key":"IRMJ.2019040104-67","doi-asserted-by":"publisher","DOI":"10.1093\/biostatistics\/kxn001"},{"key":"IRMJ.2019040104-68","doi-asserted-by":"publisher","DOI":"10.1093\/aje\/kwh090"}],"container-title":["Information Resources Management Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=225018","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T12:13:09Z","timestamp":1694693589000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IRMJ.2019040104"}},"subtitle":["A Hotspot Analysis"],"short-title":[],"issued":{"date-parts":[[2019,4]]},"references-count":69,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.4018\/irmj.2019040104","relation":{},"ISSN":["1040-1628","1533-7979"],"issn-type":[{"value":"1040-1628","type":"print"},{"value":"1533-7979","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,4]]}}}