Factors Affect Cyber Security Readiness and Performance of SMEs: A Case Study of Mogadishu, Somalia


Authors : Sayid Ali Abubakar Sheik Ahmed; Mohamed Adam Isak Abdirahman

Volume/Issue : Volume 9 - 2024, Issue 7 - July

Google Scholar : https://tinyurl.com/26wvu9un

Scribd : https://tinyurl.com/bdcnjdf6

DOI : https://doi.org/10.38124/ijisrt/IJISRT24JUL264

Abstract : The incorporation of new digital technologies into the small business environment has led to the emergence of new potential threats and risks. The impact of cybercrime on the operational effectiveness and performance of business entities is a major challenge. Each year, billions of dollars are lost to cybercrime. In order to address this issue, SMEs have invested heavily in cyber-security protocols. In this study, we aimed to analyze the various factors that influence cyber security readiness among SMEs in the greater Mogadishu area. Specifically, we looked at how management support and resource factors, as well as regulatory factors, affect cyber security readiness among small and medium enterprises in Somalia. The methodology of the study was based on a positivistic approach with descriptive research. The sample size was all operational SMEs in the city of Mogadishu. The respondents were either ICT managers or IT security or other IT professional. A structured research questionnaire was employed to facilitate the collection of data. This was supplemented by the use of Google forms and, where feasible, actual data collection. The analysis of the data was conducted through the utilization of descriptive metrics, correlations and regression, which were presented in the form of tables. The findings of the study revealed a positive relationship between the level of management support, resource and regulatory factors in relation to cyber Security readiness and performance in the city of Mogadishu, indicating a positive correlation. The overall regression showed that the above-mentioned factors play a significant role in the cyber Security status of the SMEs in Mogadishu. In order for SMEs to become more cyber security prepared, the findings of the study indicate that organizations must be adequately prepared to allocate significant financial and technological resources to cover the considerable expenses associated with the pursuit of cyber security status. The study also advises managers to coordinate security choices with organizational objectives and capabilities to lessen imbalances that might prevent the effective application of cyber security measures. Finally, the study recommends that SME policy makers should assess the readiness of the industry and create a set of norms and standards that all firms can meet, as this would support cyber security preparedness and performance.

Keywords : Cyber Security Readiness and Performance, Management Support, Resource Factors, Regulatory Factors, Small Medium Enterprises. (SMEs)

References :

  1. AlEnezi, A. (2019). Internet of Things & Cybersecurity Readiness in Smart-government and Organizations. Kuwait University, February 2020, 1–55. https://doi.org/10.13140/RG.2.2.17160.34563
  2. Angst, C. M., Block, E. S., Arcy, J. D., & Kelley, K. (2017). R Esearch a Rticle W Hen D O It S Ecurity I Nvestments M Atter ? a Ccounting for the I Nfluence of I Nstitutional F Actors in the C Ontext of H Ealthcare D Ata B Reaches 1. 41(3), 893–916.
  3. Assefa, T., & Tensaye, A. (2021). Factors influencing information security compliance: an institutional perspective.
  4. SINET: Ethiopian Journal of Science, 44(1), 108–118. https://doi.org/10.4314/SINET.V44I1.10
  5. Bell, S. (2017). Cybersecurity is not just a “big business” issue - Governance directions : journal of Governance Institute of Australia Ltd. Governance Directions : Journal of Governance Institute of Australia Ltd., 69(9), 536–539.
  6. Catota, F. E., Granger Morgan, M., & Sicker, D. C. (2019). Cybersecurity education in a developing nation: The Ecuadorian environment. Journal of Cybersecurity, 5(1), 1–19. https://doi.org/10.1093/ cybsec/tyz001
  7. Chang, Y. W., & Chen, J. (2021). What motivates customers to shop in smart shops? The impacts of smart technology and technology readiness. Journal of Retailing and Consumer Services, 58(May 2020), 102325. https://doi.org/10.1016/j.jretconser.2020. 102325
  8. CyberTalents. (n.d.). What is Cyber Crime? Types, Examples, and Prevention - CyberTalents.
  9. D’Arcy, J., Herath, T., & Shoss, M. K. (2014). Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective. Journal of Management Information Systems, 31(2), 285–318. https://doi.org/10.2753/ MIS0742-1222310210
  10. Daniel, D. (2015). No Title空間像再生型立体映像の 研究動向. Nhk技研, 151, 10–17.
  11. Daud, M., Rasiah, R., George, M., Asirvatham, D., & Thangiah, G. (2018). Bridging the gap between organisational practices and cyber security compliance: Can cooperation promote compliance in organisations? International Journal of Business and Society, 19(1), 161–180.
  12. Gafni, R., & Pavel, T. (2019). The invisible hole of information on SMB’s cybersecurity. Online Journal of Applied Knowledge Management, 7(1), 14–26. https://doi.org/10.36965/OJAKM.2019.7(1)14-26
  13. Hsu, C., Lee, J. N., & Straub, D. W. (2012). Institutional influences on information systems security innovations.
  14. Information Systems Research, 23(3 PART 2), 918–939. https://doi.org/10.1287/isre.1110.0393
  15. Kankanhalli, A., Teo, H. H., Tan, B. C. Y., & Wei, K. K. (2003). An integrative study of information systems security effectiveness. International Journal of Information Management, 23(2), 139–154. https://doi.org/10.1016/S0268- 4012(02)00105-6
  16. Kemper, G. (2019). Improving employees’ cyber security awareness. Computer Fraud & Security, 2019(8), 11–14. https://doi.org/10.1016/S1361-3723(19)30085-5
  17. Knapp, K. J., Marshall, T. E., Rainer, R., & Ford, F. N. (2005). Managerial Dimensions in Information Security: A Theoretical Model of Organizational Effectiveness. International Information Systems Security Certification Consortium (ISC), 2.
  18. Kong, H. K., Kim, T. S., & Kim, J. (2012). An analysis on effects of information security investments: A BSC perspective. Journal of Intelligent Manufacturing, 23(4), 941–953. https://doi.org/10.1007/S10845-010-0402-7/METRICS Kumar,
  19. S., Biswas, B., Bhatia, M. S., & Dora, M. (2020). Antecedents for enhanced level of cyber-security in organisations. J. Enterp. Inf. Manag., 34(6), 1597–1629. https://doi.org/10.1108/JEIM-06-2020-0240
  20. Lloyd, G. (2020). The business benefits of cyber security for SMEs. Computer Fraud and Security, 2020(2), 14–17. https://doi.org/10.1016/S1361-3723(20)30019-1
  21. Mose, T. (2019). Factors influencing cybersecurity readiness in deposit taking savings and credit cooperatives : A case study of Nairobi county. International Academic Journal of Information Systems and Technology, 2(1), 157–182.
  22. Muriithi, S. (2017). African Small and Medium Enterprises (Smes) Contributions, Challenges and Solutions. March.
  23. Neri, M., Niccolini, F., & Pugliese, R. (2022). Assessing SMEs’ cybersecurity organizational readiness: Findings from an Italian survey. Online Journal of Applied Knowledge Management, 10(2), 1–22. https://doi.org/10.36965/ojakm.2022.10(2)1-22
  24. Nieles, M., Dempsey, K., & Pillitteri, V. Y. (2017). An introduction to information security. https://doi.org/10.6028/NIST.SP.800-12R1
  25. Puhakainen, P., & Siponen, M. (2010). Improving employees’ compliance through information systems security training: An action research study. MIS Quarterly: Management Information Systems, 34(4), 757–778. https://doi.org/10.2307/25750704
  26. Ravichandran, T., & Rai, A. (2000). Quality management in systems development: An organizational system perspective. MIS Quarterly: Management Information Systems, 24(3), 381–410. https://doi.org/10.2307/3250967
  27. Rezaei, J., Ortt, R., & Trott, P. (2015). How SMEs can benefit from supply chain partnerships. International Journal of Production Research, 53(5), 1527–1543. https://doi.org/10.1080/00207543.2014. 952793
  28. Techopedia. (2022). What is Cyberspace? - Definition from Techopedia. Techopedia.
  29. Yliopisto, J. (2017). MOTIVATIONS BEHIND EMPLOYEE INFORMATION SECURITY BEHAVIOR.

The incorporation of new digital technologies into the small business environment has led to the emergence of new potential threats and risks. The impact of cybercrime on the operational effectiveness and performance of business entities is a major challenge. Each year, billions of dollars are lost to cybercrime. In order to address this issue, SMEs have invested heavily in cyber-security protocols. In this study, we aimed to analyze the various factors that influence cyber security readiness among SMEs in the greater Mogadishu area. Specifically, we looked at how management support and resource factors, as well as regulatory factors, affect cyber security readiness among small and medium enterprises in Somalia. The methodology of the study was based on a positivistic approach with descriptive research. The sample size was all operational SMEs in the city of Mogadishu. The respondents were either ICT managers or IT security or other IT professional. A structured research questionnaire was employed to facilitate the collection of data. This was supplemented by the use of Google forms and, where feasible, actual data collection. The analysis of the data was conducted through the utilization of descriptive metrics, correlations and regression, which were presented in the form of tables. The findings of the study revealed a positive relationship between the level of management support, resource and regulatory factors in relation to cyber Security readiness and performance in the city of Mogadishu, indicating a positive correlation. The overall regression showed that the above-mentioned factors play a significant role in the cyber Security status of the SMEs in Mogadishu. In order for SMEs to become more cyber security prepared, the findings of the study indicate that organizations must be adequately prepared to allocate significant financial and technological resources to cover the considerable expenses associated with the pursuit of cyber security status. The study also advises managers to coordinate security choices with organizational objectives and capabilities to lessen imbalances that might prevent the effective application of cyber security measures. Finally, the study recommends that SME policy makers should assess the readiness of the industry and create a set of norms and standards that all firms can meet, as this would support cyber security preparedness and performance.

Keywords : Cyber Security Readiness and Performance, Management Support, Resource Factors, Regulatory Factors, Small Medium Enterprises. (SMEs)

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe