Authors :
Sayid Ali Abubakar Sheik Ahmed; Mohamed Adam Isak Abdirahman
Volume/Issue :
Volume 9 - 2024, Issue 7 - July
Google Scholar :
https://tinyurl.com/26wvu9un
Scribd :
https://tinyurl.com/bdcnjdf6
DOI :
https://doi.org/10.38124/ijisrt/IJISRT24JUL264
Abstract :
The incorporation of new digital technologies
into the small business environment has led to the
emergence of new potential threats and risks. The
impact of cybercrime on the operational effectiveness
and performance of business entities is a major
challenge. Each year, billions of dollars are lost to
cybercrime. In order to address this issue, SMEs have
invested heavily in cyber-security protocols. In this
study, we aimed to analyze the various factors that
influence cyber security readiness among SMEs in the
greater Mogadishu area. Specifically, we looked at how
management support and resource factors, as well as
regulatory factors, affect cyber security readiness among
small and medium enterprises in Somalia. The
methodology of the study was based on a positivistic
approach with descriptive research. The sample size was
all operational SMEs in the city of Mogadishu. The
respondents were either ICT managers or IT security or
other IT professional. A structured research
questionnaire was employed to facilitate the collection of
data. This was supplemented by the use of Google forms
and, where feasible, actual data collection. The analysis
of the data was conducted through the utilization of
descriptive metrics, correlations and regression, which
were presented in the form of tables. The findings of the
study revealed a positive relationship between the level
of management support, resource and regulatory factors
in relation to cyber Security readiness and performance
in the city of Mogadishu, indicating a positive
correlation. The overall regression showed that the
above-mentioned factors play a significant role in the
cyber Security status of the SMEs in Mogadishu. In
order for SMEs to become more cyber security
prepared, the findings of the study indicate that
organizations must be adequately prepared to allocate
significant financial and technological resources to cover
the considerable expenses associated with the pursuit of
cyber security status. The study also advises managers to
coordinate security choices with organizational
objectives and capabilities to lessen imbalances that
might prevent the effective application of cyber security
measures. Finally, the study recommends that SME
policy makers should assess the readiness of the industry
and create a set of norms and standards that all firms
can meet, as this would support cyber security
preparedness and performance.
Keywords :
Cyber Security Readiness and Performance, Management Support, Resource Factors, Regulatory Factors, Small Medium Enterprises. (SMEs)
References :
- AlEnezi, A. (2019). Internet of Things & Cybersecurity Readiness in Smart-government and Organizations. Kuwait University, February 2020, 1–55. https://doi.org/10.13140/RG.2.2.17160.34563
- Angst, C. M., Block, E. S., Arcy, J. D., & Kelley, K. (2017). R Esearch a Rticle W Hen D O It S Ecurity I Nvestments M Atter ? a Ccounting for the I Nfluence of I Nstitutional F Actors in the C Ontext of H Ealthcare D Ata B Reaches 1. 41(3), 893–916.
- Assefa, T., & Tensaye, A. (2021). Factors influencing information security compliance: an institutional perspective.
- SINET: Ethiopian Journal of Science, 44(1), 108–118. https://doi.org/10.4314/SINET.V44I1.10
- Bell, S. (2017). Cybersecurity is not just a “big business” issue - Governance directions : journal of Governance Institute of Australia Ltd. Governance Directions : Journal of Governance Institute of Australia Ltd., 69(9), 536–539.
- Catota, F. E., Granger Morgan, M., & Sicker, D. C. (2019). Cybersecurity education in a developing nation: The Ecuadorian environment. Journal of Cybersecurity, 5(1), 1–19. https://doi.org/10.1093/ cybsec/tyz001
- Chang, Y. W., & Chen, J. (2021). What motivates customers to shop in smart shops? The impacts of smart technology and technology readiness. Journal of Retailing and Consumer Services, 58(May 2020), 102325. https://doi.org/10.1016/j.jretconser.2020. 102325
- CyberTalents. (n.d.). What is Cyber Crime? Types, Examples, and Prevention - CyberTalents.
- D’Arcy, J., Herath, T., & Shoss, M. K. (2014). Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective. Journal of Management Information Systems, 31(2), 285–318. https://doi.org/10.2753/ MIS0742-1222310210
- Daniel, D. (2015). No Title空間像再生型立体映像の 研究動向. Nhk技研, 151, 10–17.
- Daud, M., Rasiah, R., George, M., Asirvatham, D., & Thangiah, G. (2018). Bridging the gap between organisational practices and cyber security compliance: Can cooperation promote compliance in organisations? International Journal of Business and Society, 19(1), 161–180.
- Gafni, R., & Pavel, T. (2019). The invisible hole of information on SMB’s cybersecurity. Online Journal of Applied Knowledge Management, 7(1), 14–26. https://doi.org/10.36965/OJAKM.2019.7(1)14-26
- Hsu, C., Lee, J. N., & Straub, D. W. (2012). Institutional influences on information systems security innovations.
- Information Systems Research, 23(3 PART 2), 918–939. https://doi.org/10.1287/isre.1110.0393
- Kankanhalli, A., Teo, H. H., Tan, B. C. Y., & Wei, K. K. (2003). An integrative study of information systems security effectiveness. International Journal of Information Management, 23(2), 139–154. https://doi.org/10.1016/S0268- 4012(02)00105-6
- Kemper, G. (2019). Improving employees’ cyber security awareness. Computer Fraud & Security, 2019(8), 11–14. https://doi.org/10.1016/S1361-3723(19)30085-5
- Knapp, K. J., Marshall, T. E., Rainer, R., & Ford, F. N. (2005). Managerial Dimensions in Information Security: A Theoretical Model of Organizational Effectiveness. International Information Systems Security Certification Consortium (ISC), 2.
- Kong, H. K., Kim, T. S., & Kim, J. (2012). An analysis on effects of information security investments: A BSC perspective. Journal of Intelligent Manufacturing, 23(4), 941–953. https://doi.org/10.1007/S10845-010-0402-7/METRICS Kumar,
- S., Biswas, B., Bhatia, M. S., & Dora, M. (2020). Antecedents for enhanced level of cyber-security in organisations. J. Enterp. Inf. Manag., 34(6), 1597–1629. https://doi.org/10.1108/JEIM-06-2020-0240
- Lloyd, G. (2020). The business benefits of cyber security for SMEs. Computer Fraud and Security, 2020(2), 14–17. https://doi.org/10.1016/S1361-3723(20)30019-1
- Mose, T. (2019). Factors influencing cybersecurity readiness in deposit taking savings and credit cooperatives : A case study of Nairobi county. International Academic Journal of Information Systems and Technology, 2(1), 157–182.
- Muriithi, S. (2017). African Small and Medium Enterprises (Smes) Contributions, Challenges and Solutions. March.
- Neri, M., Niccolini, F., & Pugliese, R. (2022). Assessing SMEs’ cybersecurity organizational readiness: Findings from an Italian survey. Online Journal of Applied Knowledge Management, 10(2), 1–22. https://doi.org/10.36965/ojakm.2022.10(2)1-22
- Nieles, M., Dempsey, K., & Pillitteri, V. Y. (2017). An introduction to information security. https://doi.org/10.6028/NIST.SP.800-12R1
- Puhakainen, P., & Siponen, M. (2010). Improving employees’ compliance through information systems security training: An action research study. MIS Quarterly: Management Information Systems, 34(4), 757–778. https://doi.org/10.2307/25750704
- Ravichandran, T., & Rai, A. (2000). Quality management in systems development: An organizational system perspective. MIS Quarterly: Management Information Systems, 24(3), 381–410. https://doi.org/10.2307/3250967
- Rezaei, J., Ortt, R., & Trott, P. (2015). How SMEs can benefit from supply chain partnerships. International Journal of Production Research, 53(5), 1527–1543. https://doi.org/10.1080/00207543.2014. 952793
- Techopedia. (2022). What is Cyberspace? - Definition from Techopedia. Techopedia.
- Yliopisto, J. (2017). MOTIVATIONS BEHIND EMPLOYEE INFORMATION SECURITY BEHAVIOR.
The incorporation of new digital technologies
into the small business environment has led to the
emergence of new potential threats and risks. The
impact of cybercrime on the operational effectiveness
and performance of business entities is a major
challenge. Each year, billions of dollars are lost to
cybercrime. In order to address this issue, SMEs have
invested heavily in cyber-security protocols. In this
study, we aimed to analyze the various factors that
influence cyber security readiness among SMEs in the
greater Mogadishu area. Specifically, we looked at how
management support and resource factors, as well as
regulatory factors, affect cyber security readiness among
small and medium enterprises in Somalia. The
methodology of the study was based on a positivistic
approach with descriptive research. The sample size was
all operational SMEs in the city of Mogadishu. The
respondents were either ICT managers or IT security or
other IT professional. A structured research
questionnaire was employed to facilitate the collection of
data. This was supplemented by the use of Google forms
and, where feasible, actual data collection. The analysis
of the data was conducted through the utilization of
descriptive metrics, correlations and regression, which
were presented in the form of tables. The findings of the
study revealed a positive relationship between the level
of management support, resource and regulatory factors
in relation to cyber Security readiness and performance
in the city of Mogadishu, indicating a positive
correlation. The overall regression showed that the
above-mentioned factors play a significant role in the
cyber Security status of the SMEs in Mogadishu. In
order for SMEs to become more cyber security
prepared, the findings of the study indicate that
organizations must be adequately prepared to allocate
significant financial and technological resources to cover
the considerable expenses associated with the pursuit of
cyber security status. The study also advises managers to
coordinate security choices with organizational
objectives and capabilities to lessen imbalances that
might prevent the effective application of cyber security
measures. Finally, the study recommends that SME
policy makers should assess the readiness of the industry
and create a set of norms and standards that all firms
can meet, as this would support cyber security
preparedness and performance.
Keywords :
Cyber Security Readiness and Performance, Management Support, Resource Factors, Regulatory Factors, Small Medium Enterprises. (SMEs)