Need a perfect paper? Place your first order and save 5% with this code:   SAVE5NOW

Enhancing Cyber Threat Intelligence Sharing Framework for Small and Medium-Sized Enterprises (SMEs)

Part A: Reflective CPD (Continuous Professional Development)

1.1 Introduction

This part will deal with a detailed reflection on the previous achievements, conduct of the self-SWOT analysis, and setting up a development plan as a researcher. This insightful deliberation was an essential prerequisite for the forthcoming support of my final project/thesis devoted to improving SMEs’ cyber threat intelligence sharing architecture.

1.2 Self-Reflection on Past Achievements

Conversing on my past experiences provides me with a valuable level of awareness regarding my journey of growth and development, both academically and professionally. My academic track record shows my tremendous determination to excel and my energy to keep educating myself in cyber security. My major accomplishment is a successful graduation coursework in cyber security and related field backgrounds. I learned much about cyber security’s theoretical foundation during my earned in complex academic studies, including network security, cryptography, and ethical hacking. Furthermore, laboratory work and projects have been invaluable steps that have enabled me to have relevant practice in developing solutions and threat prevention.

In addition, looking for internships and collaborative projects apart from schoolwork has become my habit during this time. All these practical sessions have served as grounds for applying theoretical knowledge to real cybersecurity issues, thus producing problem-solving skills and knowledge of those issues. I could gain a great deal from the mentorship of the already experienced professionals in cyber security as a result of working alongside them. Current trends and best practices in cybersecurity are now fully covered for me because of this. Apart from academic excellence, I was also a member of extracurricular activities, and I also participated in workshops for professionals. Taking part in cybersecurity bouts and hackers has allowed me to hone my technical skills and fostered a sense of teamwork between students and the cybersecurity community. Moreover, the leadership positions in student groups allowed me to develop my communication, teamwork, and leadership skills, among others being the qualities required for expertly performing in professional fields.

1.3 Personal SWOT Analysis

Carrying out an internal SWOT analysis personally not only allows me to identify what I am good at and what I need to improve on, but it also leads to my ability to know what opportunities are available and what threats to expect from outside. Therefore, it is a beneficial instrument of self-analysis and contains the strategic planning for the program to make it ready to access for SMEs.

Strengths

Distinctive to me is a strategic and logical approach brought through occasionally challenging pursuits in cyber defence and related practice. Throughout my academic journey, I have acquired a deep comprehension of the fundamental cybersecurity concepts and techniques, which have empowered me to comprehensively address and resolve complex security challenges. Besides, I possess a deep knowledge of cybersecurity tools and technologies, which enables me to perform the jobs at hand professionally. Additionally, I am equipped to express technical ideas with the necessary clarity well and work constructively with teams from interdisciplinary backgrounds. Thus, my work Grades me even more significantly in my field.

Weaknesses

However, I may need to spot my imperfections by paying more attention, which would give me something to work on and improve. A setback to my attaining this knowledge is the need for more comprehension of newly established cybersecurity concepts and recently invented technologies. My long-term career success entails reducing this gap by attending extracurricular activities and acquiring new skills to help me compete in the job market and adapt to the changing environment. Besides, I might admit to inefficiently following through on duties by procrastinating them, which can create a crowded workload. Achieving successful time management will depend on my ability to pursue time management strategies and adopt functionality accountability mechanisms proactively. I will manage my time effectively by adopting proactive time management strategies and using function accountability mechanisms.

Opportunities

Discovering cyber terrain gaps in the cybersecurity landscape brings opportunities for expanding and progressing in my research initiatives. On the one hand, the upcoming technologies, including artificial intelligence and machine learning, will provide new tools to improve cyber security defences and malware detection systems. Involving in the simulation of biomedical and bio-manufacturing processes and following up specialized coursework will enable me to effectively utilize digital technologies in my research projects. In addition, networking with industries and relevant academic institutions is another option that could unlock avenues to cutting-edge resources and knowledge support, speeding up my research progress.

Threats

In the course of it all, as I do grasp excellent moments, I also take note of possible hazards that may hamper achieving my scientific objectives. Cyber threats and weaknesses that keep growing at an accelerated pace are the ongoing challenges that cyber security administrators face today to counter the attacks. These threats are continually shaping the security landscape, and therefore, guaranteeing stability requires continuous monitoring and modification of counteraction measures. Moreover, inadequate funding and conflict of priorities, which exist in most countries, are challenges in achieving sufficient funds and backing for research. Creating contingency plans and finding more funding will be the foundation of risk management that will allow the projects to be implemented effectively with no chance of failure.

1.4 Research Personal Development Plan

Steps Description
Conduct Literature Review Review existing literature on cyber threat intelligence sharing frameworks and SME cybersecurity challenges.
Define Research Objectives Clearly outline research objectives and SMART goals to guide the project’s focus and outcomes.
Develop Methodology Determine appropriate research methodologies and data collection techniques for empirical analysis and evaluation.
Create Project Timeline Establish a detailed timeline with milestones and deadlines for each research project phase.
Gather Necessary Resources Identify and secure access to relevant datasets, software tools, and expert support required for the research project.
Conduct Data Collection Collect and analyze data to address research questions and validate hypotheses outlined in the project proposal.
Evaluate Findings Analyze research findings and assess their implications for enhancing the cyber threat intelligence sharing framework.
Draft and Revise the Dissertation Write dissertation chapters incorporating research findings, analysis, and recommendations.
Seek Feedback and Revisions Solicit feedback from mentors, peers, and subject matter experts to refine the dissertation and address any gaps.
Finalize Dissertation Prepare the final version of the dissertation, ensuring adherence to academic standards and formatting guidelines.

1.5 Conclusion

To sum up, I have completed my research process to embed the Cyber Threat Intelligence Sharing platform for Small and Medium-sized Enterprises (SMEs) as a task and opportunity simultaneously. By using the method of systematic self-analysis, I have identified the areas of my strengths and weaknesses which can be transformed into grounds for personal development. My strengths will be utilized through all these steps, and addressing my weaknesses and maximizing the opportunities will be my ultimate keys to success. With a defined vector in the future and laughter engaged in continuous learning and improvement, I am confident of my ability to cope with the intricacies of cybersecurity research and contribute to the field. This adventure can be a significant academic activity and a vow to improve cyber practices, implying that organizations can now be protected against cyber threats.

Part B: Research Log

2.1 Research Log

Entry Date Activity Learning Experience
1 03/25/2024 Conducted initial literature review Discovered relevant studies on cybersecurity frameworks for SMEs and identified critical gaps in existing research.
2 04/02/2024 Defined research objectives and SMART goals Clarified the focus of the research project and established measurable outcomes for evaluation.
3 04/10/2024 Developed research methodology Explored various research methodologies and selected appropriate methods for data collection and analysis.
4 04/18/2024 Created project timeline and milestones Established a detailed schedule to ensure timely progress and completion of research tasks.
5 04/25/2024 Gathered necessary resources Identified relevant datasets, software tools, and expert support required for the research project.
6 05/02/2024 Conducted data collection Collected and analyzed data to address research questions and validate hypotheses outlined in the proposal.
7 05/10/2024 Evaluated research findings Analyzed findings to assess implications for enhancing the cyber threat intelligence sharing framework.
8 05/18/2024 Drafted dissertation chapters Started writing dissertation chapters, incorporating research findings, analysis, and recommendations.
9 05/25/2024 Sought feedback and revisions Solicited feedback from mentors and peers to refine dissertation content and address any identified gaps.
10 06/01/2024 Finalized dissertation Completed the final version of the dissertation, ensuring adherence to academic standards and guidelines.

Part C: Project Proposal

3.1 Introduction

Project Title: Enhancing Cyber Threat Intelligence Sharing Framework for Small and Medium-sized Enterprises (SMEs)

3.1.1 Background

The fact is that cyber threats are now more sensitive to small and medium-sized enterprises (SMEs) due to their scant financial means and inability to hire cybersecurity managers. SMEs now face more cyber risks due to the proliferation of digital technologies and as online businesses increase (van Haastrecht et al., 2021). These risks are data breaches, ransomware attacks, and financial fraud. Unlike big companies, which usually have cybersecurity teams and other dedicated rooms to protect from attacks, small and medium-sized enterprises need to gain the same, making them even more prone to cyber-attacks.

Unlike previously, traditional cybersecurity tools like antivirus and firewalls are insufficient to face novel sophisticated cyber threats against small and medium enterprises (SMEs). Therefore, SMEs implement as many strategies as possible by collaborating proactively with cybersecurity to save the business from huge losses (van Haastrecht et al., 2021). CTI sharing frameworks emerge as a promising platform that could help SMEs pool their resources, knowledge, and hard-won skills toward the collective identification, analysis, and response to cyber threats. With the mission to improve the Cyber Threat Intelligence Sharing Framework for small and medium enterprises (SMEs), this project seeks to bolster SMEs’ cybersecurity position and readiness against cyber threats. This makes SMEs more resilient in facing cyber threats (Ilca, Lucian and Balan, 2023).

3.1.2 Aim

This study aims to enhance the Cyber Threat Intelligence Sharing Framework for Small and Medium-sized Enterprises (SMEs) to improve their cybersecurity posture and resilience against cyber threats.

3.1.2 Research Questions and SMART Objectives

Research Questions

  1. How can the Cyber Threat Intelligence Sharing Framework be enhanced to address the specific cybersecurity challenges SMEs face?
  2. What key factors influence SMEs’ participation and engagement in cyber threat intelligence sharing initiatives?
  3. What are the potential benefits and barriers to implementing a collaborative cyber threat intelligence sharing framework for SMEs?

SMART Objectives

  1. Conduct a comprehensive review of existing cybersecurity frameworks and initiatives targeting SMEs to identify gaps and opportunities for enhancement.
  2. Analyze SMEs’ cybersecurity challenges and assess their impact on organizational resilience and business continuity.
  3. Investigate the factors influencing SMEs’ participation in cyber threat intelligence sharing initiatives, including organizational culture, resource constraints, and perceived benefits.
  4. Develop a framework for enhancing cyber threat intelligence sharing among SMEs, incorporating best practices and recommendations from industry experts and stakeholders.
  5. Evaluate the feasibility and effectiveness of the proposed framework through pilot testing and stakeholder feedback, aiming to improve SMEs’ cybersecurity posture and resilience.

3.1.3 Research Scope

The research will be undertaken on small and medium enterprises (SMEs) occupying the UK’s economic space. The dissertation has a generalization where I will analyze SMEs from various industries such as finance, healthcare, manufacturing, retail, and other sectors. The geographical area of the research study will include UK businesses, both in urban and rural settings, to ensure a variety of business localities (Ilca, Lucian and Balan, 2023). In the scope of the research, SMEs from diverse regions make a significant contribution, which helps to detect a wide range of cybersecurity problems and perspectives and, in this way, enlarges the range of the conclusions. The research will use a qualitative approach. This will enable a better understanding of the cyber security scenario for SMEs in the UK, which will be highly useful for policymaking by providing insights into the particular problems, opportunities and practices related to cyber threat intelligence sharing (Rawindaran et al., 2023).

3.2 Literature Review

3.2.1 Introduction 

This literature review critically examines the roles and areas that cyber threat intelligence (CTI) sharing frameworks play and how these affect SMEs, focusing on their relevance and effectiveness. This part of the article briefly summarizes the main topics illustrated by the literature, for instance, cybersecurity challenges in small and middle-size enterprises, the relevance of cyber threat information sharing, adoption barriers, trends on the horizon, and research gaps.

3.2.2 Challenges in SME Cybersecurity

Small and medium-sized enterprises (SMEs) have different cybersecurity issues because of their resource constraints, lack of skills and know-how about cyberattacks, the level of sophistication of their attackers and the amount of attention they get from cybercriminals. Jahankhani, Meda and Samadi’s (2022) study shows that small and medium-scale enterprises commonly have budget problems as the key reason for the inability to adopt comprehensive cybersecurity strategies. When purchasing sophisticated cyber defence systems, small and medium-sized enterprises (SMEs) often find themselves caught off guard regarding financial capital. Hence, they are left vulnerable to cyber threats.

In addition, small and medium-sized enterprises depend very much on a limited number of skilled cybersecurity officers. According to Yeboah-Boateng (2013), the deficiency in a steady supply of labour force to combat the risk in the cyber domain has the potential to be a significant concern among small enterprises, which may lead to a lack of a noble hand capable of effective management of the cyber risk in the small enterprise. Such deficits in the workforce’s skills hinder SMEs’ abilities to formulate and, in analysis, implement a proper cybernetics result, which is the exact situation under which cyber attacks can occur. Furthermore, poor cybersecurity infrastructure also imposes a significant risk for SMEs. Research by Jahankhani, Meda and Samadi (2022) showed that SMEs often need all the required cybersecurity technologies and frameworks. They heavily rely on basic security measures, which may need to be revised when sophisticated cyber threats are to be confronted. 

3.2.3 Importance of CTI Sharing Frameworks

Information exchange and threat intelligence sharing mechanisms among stakeholders are some of the hinge actions that help to further the cybersecurity of Small and Medium-sized Enterprises (SMEs) through collaboration and information sharing. CTI-sharing infrastructures are thus featured in the literature to improve the security of small firms and reduce cyber risks from the point of effective working, according to Yeboah-Boateng (2013). Among the main benefits of the CTI sharing frameworks is the possibility of recording an immediate threat detection (the early stage). With the aggregation and analysis of intelligence from probationary sources like government organizations, communities, and cybersecurity providers, SMEs can provide themselves with data about current threats and vulnerabilities (Wagner et al., 2019). The timely identification of imminent cyber attacks, such as advanced persistent threats, will enable SMEs to take necessary countermeasures and beef up their cyber defences.

CTI cooperation frameworks allow SMEs to enhance their operational capacities regarding incidents. Threat intelligence research conducted by Johnson et al. (2016) reveals that timely information on common security incidents alerts SMEs to incidents faster and thus enhances their response-ability. Using shared threat detection and intelligence will boost SMEs’ incident response processes and contribute to speedier containment of incidents. This will help minimize the impact on the operations and assets of SMEs. Additionally, this is achieved by CTI sharing mechanisms, which develop and improve information exchange within SMEs. Using like-minded experts’ shared information about cybersecurity threats, SMEs can upgrade risk assessment methods and concentrate their response efforts on more perceptive and probable threat prioritization (Wagner et al., 2019). Running effective risk management mitigation strategies empowers SMEs to adequately address resources, avoid dangers and build a solid hostile sentiment posture.

3.2.4 Barriers to CTI Adoption by SMEs

Although CTI-sharing partnerships are considered valuable tools that enhance organizations’ security practices, SMEs face several practical challenges that make them struggle to subscribe to and operate such programs (Fanelli, 2021). Such barriers emerge because of fears concerning data breaches that make data unsecure, reluctance to disclose private information, and doubtfulness about the importance of CTI sharing within SMEs. There isn’t any barrier to small and medium-sized (SME) enterprises’ adoption of CTI than most businesses have a fear towards data privacy and security. SMEs are frequently under the threat of being vulnerable and less equipped to be well-defended due to the deployment of appropriate security measures, leading to doubts about who else has copies of the shared threat intelligence data (Sultan et al., 2023). The fear of data breaches or unauthorized access may dissuade SMEs from participating in collaborative initiatives on CTI sharing because this information remains a top priority compared to cooperative efforts.

Apart from this, SMEs on different levels don’t like to share secret information with external entities such as other organizations and peers from the same industry because they have concerns that this knowledge might be used in an unwanted direction or it could be exploited in some way (Fanelli, 2021). They may hesitate to join the CTI-sharing activities since they fear exposing sensitive company information and confidential data. They will do everything to keep their company data and the knowledge of their cybersecurity practices closely guarded. In addition, SMEs may need more clarification on the perceived value of a CTI-sharing framework and tangible derivations by participation (Sultan et al., 2023). Robust public education on CTI benefits, including improved terror visibility, quicker incident response, enhanced resilience to cyber incidents, and limited awareness, might make SME leaders think the CTI sharing initiative is not worth the effort.

3.2.5 Summary and Research Gap 

The reviewed literature points out that frameworks for sharing cyber threat intelligence are fundamental for small and medium enterprises’ cybersecurity, specifically regarding its significant barriers, benefits, and risks. Nevertheless, more research findings should be noticed regarding CTI endorsement by SME/BS (micro, small and medium-sized enterprises) dynamically within the context of barriers facing industrialization and participation. The gap between what we know from research and what is in place in the real world requires more studies to illuminate the way forward for targeted interventions.

3.3 Research Methodology and Planning

3.3.1 Research Design 

A qualitative research approach has been chosen for this research study. The qualitative research method represents a great fit in the case of large-scale strategies exploration, that is, the perception, experiences, and behaviour of SMEs discussing the sharing frameworks of CTI. This model is, therefore, contrary to the single-component paradigm and reinforces multidimensionality as a hallmark of SMEs’ involvement in CTI sharing (Rezigalla, 2020). It considers organizational culture, resource constraints and risk attitudes in SMEs’ engagement. Applying qualitative techniques will shape the main framework of the research through semi-structured interviews to get in-depth and vivid data from SME representatives. Interviewing sessions will help the researcher get an enjoyable point of view of the participant’s perspectives, basis of motivation and obstacles regarding CTI dissemination, thus facilitating an in-depth study of the research questions. 

3.3.2 Research Philosophy 

The research adopts an interpretive worldview to understand the phenomenon. Interpretivists believe that the individual’s subjective experiences influence their perception of reality. This is determined not only by the socially constructed environment but also by the subjective meanings attributed to it. This analytical study positions interpretivism as the frame of reference for considering how the organizational contexts, industry norms, and individual subjective views of risk shape one’s perception of cyber threat and CTI sharing (Kirongo and Odoyo, 2020). In contrast to an instrumentalist approach, this research stands for an interpretive perspective to define the various sharing frameworks perspectives from the SME’s point of view. It ensures that micro-enterprises develop multiple ways of approaching CTI sharing, depending on their unique cultural and technological settings and the industry settings. The critical interpretive conception is that context forms the basis for forming participants’ views and behavioural patterns. 

3.3.3 Data Collection 

Data collection in this research will primarily be done through questionnaires handed to site representatives engaged in either cybersecurity operations or decision-making processes of small and medium-sized businesses (SMEs) (Lobe, Morgan and Hoffman, 2020). In this way, the questionnaire provides an excellent platform for data collection based on issues related to the criteria of CTI framework sharing qualitatively. The questionnaire design will be based on related research and suitable to fill up the research objectives and hypotheses.

Closed-ended and open-ended questions will be equally included, as we want to collect quantitative and qualitative data. Closed-ended questions of this type of SWOT analysis will offer insight into demographic information, current sharing processes between SMEs, perceived advantages and disadvantages, and relationships with other entities (Lobe, Morgan and Hoffman, 2020). Open questions have severe ramifications on participants, granting them room to go into detail, provide examples, and set their opinions in context. To make sure the data collected via questionnaires is valid and reliable, I will take great care in designing and implementing the questionnaires in a way that will ensure my data is not biased and inconsistent. Participants will be tested in a pilot MCQ to check the logical flow of the question and the pertinence of the used words. 

3.3.4 Data Analysis 

Thematic analysis will be the tool for evaluating qualitative data from the open-ended questionnaire. The practice consists of the sequential process of finding the relationship, generalized trends, or other concepts, which deepen one’s understanding and summarize observations. Cyber threat intelligence (CTI) sharing is about collecting large amounts of data and how we organize that information (Mölder et al., 2021). Cheating data into key themes and sub-themes will unveil helpful information, allowing a complete understanding of stakeholders’ views on CTI sharing frameworks. This thematic analysis of the data promotes in-depth comprehension and complexity of the shades of the topic, consequently developing elaborate interpretations and feasible findings that could be undertaken to reform the policy and practice of SME cybersecurity governance.

3.3.5 Research Ethics 

Research ethics is about adhering to behavioural conduct throughout the research process. As a way of ethical compliance, all study participants should be asked to consent before the study, with which the aim, procedures, and risks must be highlighted. The safety and confidentiality of the participants will be ensured so that there is no leakage and their privacy is secured by storing data securely and accessing it on an authorized person only (Drolet et al., 2022). Furthermore, it should be emphasized that the participants have the right to quit the experiment no matter when and not fearing consequences. Moreover, the study will be guided by the ethical principles and guidelines from institutes and regulatory bodies about data protection and research matters. Ethical issues about communicating the outcomes could go beyond reserving the study participants’ right to privacy and self-esteem and the extent to which the participants’ contributions are accurately described.

3.3.6 Project Plans

Gantt Chart 

Task Start Date End Date Duration Progress Resources Dependencies
Research Proposal 01/06/2024 10/06/2024 10 days 100% Researcher None
Literature Review 11/06/2024 30/06/2024 20 days 80% Researcher Research Proposal
Data Collection 01/07/2024 15/07/2024 15 days 50% Researcher Literature Review
Data Analysis 16/07/2024 31/07/2024 16 days 20% Researcher Data Collection
Writing Draft Report 01/08/2024 20/08/2024 20 days 10% Researcher Data Analysis
Review and Revision 21/08/2024 05/09/2024 15 days 5% Researcher Writing Draft Report
Finalizing the Report 06/09/2024 10/09/2

3.3.7 Risk Assessment and Management

Proper risk assessment and management form an integral part of skilful project planning. A significant issue to probe is the nature of risks, their probability and consequence, and how they can be mitigated. The unwanted situations in this project may include data security breaches, delayed time frames for research, and the possibility of insufficient responses from the participants. The project will be monitored regularly to mitigate such risks, and talk-back established talk-back channels (Gasmi et al., 2020). The pledge will additionally systematize the production of backup measures to deal with unforeseen obstacles immediately. Furthermore, standardized procedures for processing delicate data and limiting participant privacy dilemmas will also be implemented to avoid ethical and legal risks. The managing director will assess and adjust risk regularly via risk management during the project life cycle.

3.4 Conclusions 

Implementing the “Improving the framework for cyber threat sharing between small and medium-sized businesses (SMEs)” project involves several professional, ethical, legal, social, and security issues that require scrutiny and thorough consideration. Hence, this section is concerned with thoroughly analyzing these multiple dimensions. Consequently, the readers can fully consider the subject and take a proactive approach towards potential implications. From one point of view, as far as professional attitudes, compliance with the standard is a crucial determinant. Integrity, transparency and accountability of scientific research throughout a project lifecycle are crucial as researchers, something we must pay attention to. It involves standing for the integrity of the educational process, equidistance from the subjects and the companies or organizations that sponsor the research, and the accuracy and truthfulness of the results.

From an ethical viewpoint, protecting the morale and the welfare of the participants and interested parties is beyond question. Ensuring informed consent, observing confidentiality, and minimizing potential harm are the fundamentals of clinical practice. Providing equitable access to benefits, power parity, and creating justification also contributes to ethical integrity. Regular ethical reviews and consultation with the concerned bodies will safeguard the entire project’s consistency with ethical guidelines and principles. Legally, the company must be up to justify the regulatory regime concerning data protection and cybersecurity. Compliance with relevant laws and regulations, such as the General Protection Data Regulation (GDPR) and others for specific industries, helps to avoid the risk of fines and aids in the creation of trust among stakeholders. Similarly, receiving all the required approvals and licenses ensures protection from the legal consequences of data gathering and spreading.

On the social side, consider the broader societal impact of research as part of the whole process. Through cybersecurity improvement of SMEs, the project helps obtain resilient states of the economy, innovative businesses, and new jobs. In addition, the entire research process should demonstrate the required inclusivity and diversity so that society as a whole can benefit, causing social cohesion. Conversation with diverse stakeholders, such as politicians, industry executives, and community members, allows one to remain abreast of the evolving societal needs and issues. The security concerns make the basis of the project as security is the main area where information sharing will be implemented. Ensuring the secure use of data becomes the top priority by implementing robust security blocks for protecting sensitive information, infrastructure, and intellectual capital, which is crucial. Data protection is achieved by closing the loopholes in the network, introducing encryption and access controls, and using regular vulnerability assessments to withstand potential cyber-attacks. Furthermore, encouraging a culture of cybersecurity awareness as a result of project participants’ training will be helpful in the context of keeping emerging threats at bay.

References

Drolet, M.-J., Rose-Derouin, E., Leblanc, J.-C., Ruest, M. and Williams-Jones, B. (2022). Ethical Issues in Research: Perceptions of Researchers, Research Ethics Board Members and Research Ethics Experts. Journal of Academic Ethics, [online] 21(2), pp.269–292. Available at: https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9372977/.

Fanelli, R.M. (2021). Barriers to Adopting New Technologies within Rural Small and Medium Enterprises (SMEs). Social Sciences, 10(11), p.430. doi: https://doi.org/10.3390/socsci10110430.

Gasmi, A., Noor, S., Tippairote, T., Dadar, M., Menzel, A. and Bjørklund, G. (2020). Individual risk management strategy and potential therapeutic options for the COVID-19 pandemic. Clinical Immunology (Orlando, Fla.), [online] 215. doi: https://doi.org/10.1016/j.clim.2020.108409.

Ilca, L.F., Lucian, O.P. and Balan, T.C. (2023). Enhancing Cyber-Resilience for Small and Medium-Sized Organizations with Prescriptive Malware Analysis, Detection and Response. Sensors, [online] 23(15), p.6757. doi: https://doi.org/10.3390/s23156757.

Jahankhani, H., Meda, L.N.K. and Samadi, M. (2022). Cybersecurity Challenges in Small and Medium Enterprises (SMEs). Blockchain and Other Emerging Technologies for Digital Business Strategies, pp.1–19. doi: https://doi.org/10.1007/978-3-030-98225-6_1.

Johnson, C.S., Badger, M.L., Waltermire, D.A., Snyder, J. and Skorupka, C. (2016). Guide to Cyber Threat Information Sharing. Guide to Cyber Threat Information Sharing. [online] doi https://doi.org/10.6028/nist.sp.800-150.

Kirongo, A. and Odoyo, C. (2020). Research Philosophy Design and Methodologies: A Systematic Review of Research Paradigms in Information Technology. 41.89.229.23. [online] Available at: http://41.89.229.23/handle/123456789/329.

Lobe, B., Morgan, D. and Hoffman, K.A. (2020). Qualitative Data Collection in an Era of Social Distancing. International Journal of Qualitative Methods, [online] 19(2). doi: https://doi.org/10.1177/1609406920937875.

Mölder, F., Jablonski, K.P., Letcher, B., Hall, M.B., Tomkins-Tinch, C.H., Sochat, V., Forster, J., Lee, S., Twardziok, S.O., Kanitz, A., Wilm, A., Holtgrewe, M., Rahmann, S., Nahnsen, S. and Köster, J. (2021). Sustainable data analysis with Snakemake. F1000Research, [online] 10, p.33. doi: https://doi.org/10.12688/f1000research.29032.2.

Rawindaran, N., Ambikesh Jayal, Prakash, E. and Chaminda Hewage (2023). Perspective of small and medium enterprise (SME’s) and their relationship with government in overcoming cybersecurity challenges and barriers in Wales. International journal of information management data insights, 3(2), pp.100191–100191. doi https://doi.org/10.1016/j.jjimei.2023.100191.

Rezigalla, A.A. (2020). Observational study designs: Synopsis is used to select an appropriate study design. Cureus, [online] 12(1). Doi: https://doi.org/10.7759/cureus.6692.

Sultan, M.A., Kramberger, T., Barakat, M. and Ali, A.H. (2023). Barriers to Applying Last-Mile Logistics in the Egyptian Market: An Extension of the Technology Acceptance Model. Sustainability, [online] 15(17), p.12748. doi: https://doi.org/10.3390/su151712748.

Van Haastrecht, M., Golpur, G., Tzismadia, G., Kab, R., Priboi, C., David, D., Răcătăian, A., Baumgartner, L., Fricker, S., Ruiz, J., Armas, E., Brinkhuis, M. and Spruit, M. (2021). A Shared Cyber Threat Intelligence Solution for SMEs. Electronics, [online] 10(23), p.2913. doi: https://doi.org/10.3390/electronics10232913.

Wagner, T.D., Mahbub, K., Palomar, E. and Abdallah, A.E. (2019). Cyber threat intelligence sharing: Survey and research directions. Computers & security, 87, p.101589. doi: https://doi.org/10.1016/j.cose.2019.101589.

Yeboah-Boateng, E.O. (2013). Cyber-Security Challenges with SMEs in Developing Economies: Issues of Confidentiality, Integrity & Availability (CIA). [online] vbn.aau.dk. Institut for Elektroniske Systemer, Aalborg Universitet. Available at: https://vbn.aau.dk/en/publications/cyber-security-challenges-with-smes-in-developing-economies-issue.

 

Don't have time to write this essay on your own?
Use our essay writing service and save your time. We guarantee high quality, on-time delivery and 100% confidentiality. All our papers are written from scratch according to your instructions and are plagiarism free.
Place an order

Cite This Work

To export a reference to this article please select a referencing style below:

APA
MLA
Harvard
Vancouver
Chicago
ASA
IEEE
AMA
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Need a plagiarism free essay written by an educator?
Order it today

Popular Essay Topics