{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T05:24:05Z","timestamp":1775280245776,"version":"3.50.1"},"reference-count":21,"publisher":"Emerald","issue":"4","license":[{"start":{"date-parts":[[2005,9,1]],"date-time":"2005-09-01T00:00:00Z","timestamp":1125532800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005,9,1]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>The objective of this study is to gather information about information technology (IT) related security issues in small firms in both manufacturing and service.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>Despite its widely acknowledged importance, the academic research in the area of information systems security issues for small businesses is almost negligible. To fill this gap, a questionnaire was mailed to 1,000 small business owners in Lynchburg, Virginia, USA, and 138 valid responses were received.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>The results of this study indicate that the small business owners may have procedures and policies in place and may use technologies to counteract the security threat, but this research raised doubts about their effectiveness.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>The data collected through this research will help small business organizations in planning, training, and exploitation of IT.<\/jats:p><\/jats:sec>","DOI":"10.1108\/09685220510614425","type":"journal-article","created":{"date-parts":[[2005,8,31]],"date-time":"2005-08-31T20:09:33Z","timestamp":1125518973000},"page":"297-310","source":"Crossref","is-referenced-by-count":61,"title":["Information systems security issues and decisions for small businesses"],"prefix":"10.1108","volume":"13","author":[{"given":"Atul","family":"Gupta","sequence":"first","affiliation":[]},{"given":"Rex","family":"Hammond","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022020219423049800_b1","doi-asserted-by":"crossref","unstructured":"Abu\u2010Musa, A.A. (2003), \u201cThe perceived threats to the security of computerized accounting information systems\u201d, Journal of American Academy of Business, Vol. 1 No. 2, pp. 9\u201020.","DOI":"10.2308\/jis.2006.20.1.187"},{"key":"key2022020219423049800_b2","doi-asserted-by":"crossref","unstructured":"Armstrong, S.J. and Overton, T.S. (1977), \u201cEstimating non\u2010response bias in mail surveys\u201d, Journal of Marketing Research, Vol. 14, pp. 396\u2010402.","DOI":"10.1177\/002224377701400320"},{"key":"key2022020219423049800_b4","unstructured":"Ban, L. and Heng, G. (1995), \u201cComputer security issues in small and medium\u2010sized enterprises\u201d, Singapore Management Review, Vol. 17 No. 1, pp. 15\u201030."},{"key":"key2022020219423049800_b3","doi-asserted-by":"crossref","unstructured":"Beheshti, H.M. (2004), \u201cThe impact of IT on SMEs in the United States\u201d, Information Management & Computer Security, Vol. 12 No. 4, pp. 318\u201027.","DOI":"10.1108\/09685220410553532"},{"key":"key2022020219423049800_b5","doi-asserted-by":"crossref","unstructured":"Brooks, W.J., Warren, M.J. and Hutchinson, W. (2002), \u201cA security evaluation criteria\u201d, Logistics Information Management, Vol. 15 Nos 5\/6, pp. 377\u201084.","DOI":"10.1108\/09576050210447064"},{"key":"key2022020219423049800_b8","doi-asserted-by":"crossref","unstructured":"Furnell, S.M., Gennatou, M. and Dowland, P.S. (2002), \u201cA prototype tool for information security awareness and training\u201d, Logistics Information Management, Vol. 15 Nos 5\/6, pp. 352\u20107.","DOI":"10.1108\/09576050210447037"},{"key":"key2022020219423049800_b9","doi-asserted-by":"crossref","unstructured":"Garg, A., Curtis, J. and Halper, H. (2003), \u201cQuantifying the financial impact of IT security breaches\u201d, Information Management & Computer Security, Vol. 11 No. 2, pp. 74\u201083.","DOI":"10.1108\/09685220310468646"},{"key":"key2022020219423049800_b10","unstructured":"Hebert, F. and Bradley, J. (1993), \u201cExpert systems development in small business: a managerial perspective\u201d, Journal of Small Business Management, Vol. 31 No. 3, pp. 23\u201035."},{"key":"key2022020219423049800_b11","doi-asserted-by":"crossref","unstructured":"Kankanhalli, A., Teo, H., Tan, B. and Wei, K. (2003), \u201cAn integrative study of information systems security effectiveness\u201d, International Journal of Information Management, Vol. 23 No. 2, p. 139.","DOI":"10.1016\/S0268-4012(02)00105-6"},{"key":"key2022020219423049800_b12","doi-asserted-by":"crossref","unstructured":"Knotts, R. and Richards, T. (1989), \u201cComputer security: who's minding the store?\u201d, The Academy of Management Executive, Vol. 3 No. 1, pp. 63\u20106.","DOI":"10.5465\/ame.1989.4277162"},{"key":"key2022020219423049800_b13","unstructured":"Krause, J. (2003), \u201cGuarding the cyberfort\u201d, ABA Journal, Vol. 89, pp. 42\u20106."},{"key":"key2022020219423049800_b14","unstructured":"Lei, T.A. (2003), \u201cDeveloping sound security policies\u201d, Asia Computer Weekly, 30 June, p. 1."},{"key":"key2022020219423049800_b16","unstructured":"Ryan, J.J.C. (2000), \u201cInformation security practices and experiences in small businesses\u201d, Unpublished Dissertation, George Washington University."},{"key":"key2022020219423049800_b17","unstructured":"Sisk, M. (2003), \u201cBetting students will be drawn to ethical hacking\u201d, US Banker, Vol. 113 No. 6, p. 12."},{"key":"key2022020219423049800_b18","doi-asserted-by":"crossref","unstructured":"Smith, A.D. and Rupp, W.T. (2002), \u201cIssues in cybersecurity; understanding the potential risks associated with hackers\/crackers\u201d, Information Management & Computer Security, Vol. 10 No. 4, pp. 178\u201083.","DOI":"10.1108\/09685220210436976"},{"key":"key2022020219423049800_b19","doi-asserted-by":"crossref","unstructured":"Smith, J. (1999), \u201cInformation technology in the small business: establishing the basis for a management information system\u201d, Journal of Small Business and Enterprise Development, Vol. 6 No. 4, pp. 326\u201040.","DOI":"10.1108\/EUM0000000006684"},{"key":"key2022020219423049800_b20","doi-asserted-by":"crossref","unstructured":"Spinellis, D., Kokolakis, S. and Gritzalis, S. (1999), \u201cSecurity requirements, risks and recommendations for small enterprise and home\u2010office environments\u201d, Information Management & Computer Security, Vol. 7 No. 3, pp. 121\u20108.","DOI":"10.1108\/09685229910371071"},{"key":"key2022020219423049800_b21","doi-asserted-by":"crossref","unstructured":"Wakefield, R. (2002), \u201cIT security issues\u201d, The CPA Journal, Vol. 72 No. 11, pp. 55\u20106.","DOI":"10.1201\/1086\/43322.11.4.20020901\/38845.7"},{"key":"key2022020219423049800_b22","doi-asserted-by":"crossref","unstructured":"Warren, M.J. (2002), \u201cSecurity practice: survey evidence from three countries\u201d, Logistics Information Management, Vol. 15 Nos 5\/6, pp. 347\u201051.","DOI":"10.1108\/09576050210447028"},{"key":"key2022020219423049800_b23","unstructured":"Williams, K. (2000), \u201cPreparing your business for secure e\u2010commerce\u201d, Strategic Finance, Vol. 82 No. 3, p. 21."},{"key":"key2022020219423049800_frd1","unstructured":"Richmond, R. (2003), \u201cSpread of e\u2010mail virus is fastest ever\u201d, AP News, available at: http:\/\/apnews.excite.com\/article\/20030821\/D7T23LVO1.html."}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09685220510614425","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685220510614425\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685220510614425\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:08:55Z","timestamp":1753402135000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/13\/4\/297-310\/171338"}},"subtitle":["An empirical examination"],"short-title":[],"issued":{"date-parts":[[2005,9,1]]},"references-count":21,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2005,9,1]]}},"alternative-id":["10.1108\/09685220510614425"],"URL":"https:\/\/doi.org\/10.1108\/09685220510614425","relation":{},"ISSN":["0968-5227"],"issn-type":[{"value":"0968-5227","type":"print"}],"subject":[],"published":{"date-parts":[[2005,9,1]]}}}