{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T05:24:09Z","timestamp":1775280249224,"version":"3.50.1"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7,1]]},"DOI":"10.1109\/ecai52376.2021.9515166","type":"proceedings-article","created":{"date-parts":[[2021,8,23]],"date-time":"2021-08-23T22:03:11Z","timestamp":1629756191000},"page":"1-6","source":"Crossref","is-referenced-by-count":9,"title":["Investigating Potential Barriers to Cybersecurity Risk Management Investment in SMEs"],"prefix":"10.1109","author":[{"given":"Abdulmajeed Abdullah","family":"Alahmari","sequence":"first","affiliation":[]},{"given":"Robert Anderson","family":"Duncan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.05.043"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CCC.2016.29"},{"key":"ref31","first-page":"1","author":"morgan","year":"2021","journal-title":"2021 Report Cyberwarfare in the C-Suite"},{"key":"ref30","first-page":"19","article-title":"The Future of Traditional Commerce","volume":"17","author":"eugenia","year":"2017","journal-title":"Ovidius University Annals Economic sciences series"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s11187-006-9002-5"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1108\/JRF-06-2014-0091"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSA49311.2020.9139638"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1504\/IJBCRM.2018.090580"},{"key":"ref14","author":"pugnetti","year":"2021","journal-title":"Cyber risks and Swiss SMEs an investigation of employee attitudes and behavioral vulnerabilities"},{"key":"ref15","first-page":"48","article-title":"IT Risk and Chaos Theory: Effect on the performance of South African SMEs","volume":"2","author":"bayaga","year":"2017","journal-title":"WMSCI 2017 - 21st World Multi-Conference Syst Cybern Informatics Proc"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1080\/10919392.2018.1484598"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxx093"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.rm.8240227"},{"key":"ref19","author":"creswell","year":"2017","journal-title":"Research Design Qualitative Quantitative and Mixed Methods Approaches"},{"key":"ref28","article-title":"Verizon Security Breach Report 2020","year":"2020","journal-title":"Tech Rep"},{"key":"ref4","year":"2021","journal-title":"ICO BA fine for 2019 GDPR Breach Settled at ?20 million"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2773366"},{"key":"ref3","year":"2019","journal-title":"ICO Proposed Fine for BA GDPR Breach ?183 5 million"},{"key":"ref6","author":"lomas","year":"2021","journal-title":"Google GDPR fine appeal"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1080\/24749508.2020.1711637"},{"key":"ref5","year":"2019","journal-title":"CNIL fine Google 50 million Euros"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3917\/sim.173.0007"},{"key":"ref7","first-page":"1","year":"2020","journal-title":"35 3 Million Euro Fine for Data Protection Violations in H&M&#x2019;s Service Center"},{"key":"ref2","article-title":"Providing Tamper-Resistant Audit Trails with Distributed Ledger based Solutions for Forensics of IoT Systems using Cloud Resources","volume":"11","author":"westerlund","year":"2018","journal-title":"International Journal on Advances in Security"},{"key":"ref9","first-page":"1","year":"2016","journal-title":"World Trade Report 2016"},{"key":"ref1","article-title":"UK Information Security Breaches Survey - Technical Report 2012","year":"2012","journal-title":"PWC2012 Tech Rep"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1093\/fampra\/13.6.522"},{"key":"ref22","first-page":"121","article-title":"Content Analysis. The Sage Encyclopedia of Qualitative Research Methods","volume":"745","author":"julien","year":"2008","journal-title":"Sage"},{"key":"ref21","first-page":"149","article-title":"Sampling and sampling methods","volume":"5","author":"etikan","year":"2017","journal-title":"Journal of Biometrics &amp; Biostatistics"},{"key":"ref24","article-title":"Developing nursing theories","author":"lauri","year":"2005","journal-title":"Vantaa Finland Werner S&#x00F6;derstr&#x00F6;m Dark Oy"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2648.2007.04569.x"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1080\/00220380412331293707"},{"key":"ref25","first-page":"669","article-title":"Diagnosing monopoly","volume":"27","author":"fisher","year":"1997","journal-title":"J Reprints Antitrust L Econ"}],"event":{"name":"2021 13th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","location":"Pitesti, Romania","start":{"date-parts":[[2021,7,1]]},"end":{"date-parts":[[2021,7,3]]}},"container-title":["2021 13th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9514927\/9515011\/09515166.pdf?arnumber=9515166","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:44:49Z","timestamp":1652197489000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9515166\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,1]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/ecai52376.2021.9515166","relation":{},"subject":[],"published":{"date-parts":[[2021,7,1]]}}}