{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T13:50:21Z","timestamp":1770817821636,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T00:00:00Z","timestamp":1694563200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,9,13]]},"DOI":"10.1145\/3603304.3603346","type":"proceedings-article","created":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T00:17:01Z","timestamp":1694650621000},"page":"101-105","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["The problem of information systems security in SME"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0570-4854","authenticated-orcid":false,"given":"Anatolie","family":"Alexei","sequence":"first","affiliation":[{"name":"Telecommunication and Electronic Systems, Technical University of Moldova, Republic of Moldova"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4138-957X","authenticated-orcid":false,"given":"Arina","family":"Alexei","sequence":"additional","affiliation":[{"name":"Telecommunication and Electronic Systems, Technical University of Moldova, Republic of Moldova"}]}],"member":"320","published-online":{"date-parts":[[2023,9,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3197899"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","first-page":"39","DOI":"10.9774\/GLEAF.4700.2006.sp.00006","article-title":"Social and Environmental Responsibility in Small and Medium Enterprises in Latin America","volume":"21","author":"Vives","year":"2006","unstructured":"Vives A. 2006 . Social and Environmental Responsibility in Small and Medium Enterprises in Latin America ,\u201d Journal of Corporate Citizenship , vol. 21 , pp. 39 \u2013 50 , doi: 10.9774\/GLEAF.4700.2006.sp.00006. 10.9774\/GLEAF.4700.2006.sp.00006 Vives A. 2006. Social and Environmental Responsibility in Small and Medium Enterprises in Latin America,\u201d Journal of Corporate Citizenship, vol. 21, pp. 39\u201350, doi: 10.9774\/GLEAF.4700.2006.sp.00006.","journal-title":"Journal of Corporate Citizenship"},{"key":"e_1_3_2_1_3_1","volume-title":"Retrieved","author":"NATIONAL BUREAU OF STATISTICS OF THE REPUBLIC OF","year":"2020","unstructured":"NATIONAL BUREAU OF STATISTICS OF THE REPUBLIC OF MOLDOVA. 2020 . The activity of small and medium enterprises in the Republic of Moldova in 2020 . Retrieved Jan. 29, 2023 from https:\/\/statistica.gov.md\/ro\/activitatea-intreprinderilor-mici-si-mijlocii-in-republica-moldova-in-anul-9557_50055.html NATIONAL BUREAU OF STATISTICS OF THE REPUBLIC OF MOLDOVA. 2020. The activity of small and medium enterprises in the Republic of Moldova in 2020. Retrieved Jan. 29, 2023 from https:\/\/statistica.gov.md\/ro\/activitatea-intreprinderilor-mici-si-mijlocii-in-republica-moldova-in-anul-9557_50055.html"},{"issue":"1","key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","DOI":"10.1016\/j.jjimei.2022.100080","article-title":"LCCI: A framework for least cybersecurity controls to be implemented for small and medium enterprises (SMEs)","volume":"2","author":"Pawar","year":"2022","unstructured":"Pawar S., Palivela H. 2022 . LCCI: A framework for least cybersecurity controls to be implemented for small and medium enterprises (SMEs) . International Journal of Information Management Data Insights , vol. 2 , no. 1 , p. 100080, doi: 10.1016\/j.jjimei.2022.100080. 10.1016\/j.jjimei.2022.100080 Pawar S., Palivela H. 2022. LCCI: A framework for least cybersecurity controls to be implemented for small and medium enterprises (SMEs). International Journal of Information Management Data Insights, vol. 2, no. 1, p. 100080, doi: 10.1016\/j.jjimei.2022.100080.","journal-title":"International Journal of Information Management Data Insights"},{"issue":"4","key":"e_1_3_2_1_5_1","first-page":"103","article-title":"INFORMATICS SECURITY ASSESSMENT IN THE REPUBLIC OF MOLDOVA","author":"Ion Bolun","year":"2020","unstructured":"Bolun Ion , Ciorb\u0103 Dumitru , Zgureanu Aureliu , Bulai Rodica . 2020 . INFORMATICS SECURITY ASSESSMENT IN THE REPUBLIC OF MOLDOVA . In Journal of Engineering Science , vol. XXVII, no. 4 , pp. 103 \u2013 119 , doi: 10.5281\/zenodo.4288297. 10.5281\/zenodo.4288297 Bolun Ion, Ciorb\u0103 Dumitru, Zgureanu Aureliu, Bulai Rodica. 2020. INFORMATICS SECURITY ASSESSMENT IN THE REPUBLIC OF MOLDOVA. In Journal of Engineering Science, vol. XXVII, no. 4, pp. 103\u2013119, doi: 10.5281\/zenodo.4288297.","journal-title":"Journal of Engineering Science"},{"issue":"1","key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","first-page":"75","DOI":"10.32890\/jgd2022.18.1.5","article-title":"CYBER SECURITY IN SMALL AND MEDIUM ENTERPRISES (SMEs)","volume":"18","author":"Shariffuddin Wallang M., M. D. K.","year":"2022","unstructured":"Wallang M., M. D. K. Shariffuddin , and M. Mokhtar . 2022 . CYBER SECURITY IN SMALL AND MEDIUM ENTERPRISES (SMEs) . In Journal of Governance and Development (JGD) , vol. 18 , no. 1 , pp. 75 \u2013 87 , doi: 10.32890\/jgd2022.18.1.5. 10.32890\/jgd2022.18.1.5 Wallang M., M. D. K. Shariffuddin, and M. Mokhtar. 2022. CYBER SECURITY IN SMALL AND MEDIUM ENTERPRISES (SMEs). In Journal of Governance and Development (JGD), vol. 18, no. 1, pp. 75\u201387, doi: 10.32890\/jgd2022.18.1.5.","journal-title":"Journal of Governance and Development (JGD)"},{"key":"e_1_3_2_1_7_1","volume-title":"Mattord","author":"Whitman M. E.","year":"2021","unstructured":"M. E. Whitman and Herbert J . Mattord . 2021 . Principles of Information Security, 7 th ed. Cengage Learning . M. E. Whitman and Herbert J. Mattord. 2021. Principles of Information Security, 7th ed. Cengage Learning.","edition":"7"},{"key":"e_1_3_2_1_8_1","unstructured":"A. Sarri V. Paggio and G. Bafoutsou. 2021. CYBERSECURITY FOR SMES \u2013 Challenges and Recommendations. Heraklion Greece.  A. Sarri V. Paggio and G. Bafoutsou. 2021. CYBERSECURITY FOR SMES \u2013 Challenges and Recommendations. Heraklion Greece."},{"key":"#cr-split#-e_1_3_2_1_9_1.1","doi-asserted-by":"crossref","unstructured":"M. Falch H. Olesen K. E. Skouby R. Tadayoni and I. Williams. 2023. Cybersecurity Strategies for SMEs in the Nordic Baltic Region. In Journal of Cyber Security and Mobility doi: 10.13052\/jcsm2245-1439.1161. 10.13052\/jcsm2245-1439.1161","DOI":"10.13052\/jcsm2245-1439.1161"},{"key":"#cr-split#-e_1_3_2_1_9_1.2","doi-asserted-by":"crossref","unstructured":"M. Falch H. Olesen K. E. Skouby R. Tadayoni and I. Williams. 2023. Cybersecurity Strategies for SMEs in the Nordic Baltic Region. In Journal of Cyber Security and Mobility doi: 10.13052\/jcsm2245-1439.1161.","DOI":"10.13052\/jcsm2245-1439.1161"},{"key":"#cr-split#-e_1_3_2_1_10_1.1","doi-asserted-by":"crossref","unstructured":"Alexei Arina and Alexei Anatolie. 2022. THE DIFFERENCE BETWEEN CYBER SECURITY VS INFORMATION SECURITY. In Journal of Engineering Science doi: https:\/\/doi.org\/10.52326\/jes.utm.2022.29(4).08. 10.52326\/jes.utm.2022.29(4).08","DOI":"10.52326\/jes.utm.2022.29(4).08"},{"key":"#cr-split#-e_1_3_2_1_10_1.2","doi-asserted-by":"crossref","unstructured":"Alexei Arina and Alexei Anatolie. 2022. THE DIFFERENCE BETWEEN CYBER SECURITY VS INFORMATION SECURITY. In Journal of Engineering Science doi: https:\/\/doi.org\/10.52326\/jes.utm.2022.29(4).08.","DOI":"10.52326\/jes.utm.2022.29(4).08"},{"key":"e_1_3_2_1_11_1","first-page":"304","volume-title":"Proceedings of the 9th International Conference on Information Systems Security and Privacy, SCITEPRESS - Science and Technology Publications","author":"Erdogan G.","unstructured":"G. Erdogan , R. Halvorsrud , C. Boletsis , S. Tverdal , and J. Pickering . 2023. Cybersecurity Awareness and Capacities of SMEs . In Proceedings of the 9th International Conference on Information Systems Security and Privacy, SCITEPRESS - Science and Technology Publications , pp. 296\u2013 304 . doi: 10.5220\/0011609600003405. 10.5220\/0011609600003405 G. Erdogan, R. Halvorsrud, C. Boletsis, S. Tverdal, and J. Pickering. 2023. Cybersecurity Awareness and Capacities of SMEs. In Proceedings of the 9th International Conference on Information Systems Security and Privacy, SCITEPRESS - Science and Technology Publications, pp. 296\u2013304. doi: 10.5220\/0011609600003405."},{"key":"e_1_3_2_1_12_1","first-page":"274","volume-title":"Proceedings of the 16th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications, SCITEPRESS - Science and Technology Publications","author":"Boletsis C.","unstructured":"C. Boletsis , R. Halvorsrud , J. Pickering , S. Phillips , and M. Surridge . 2021. Cybersecurity for SMEs: Introducing the Human Element into Socio-technical Cybersecurity Risk Assessment . In Proceedings of the 16th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications, SCITEPRESS - Science and Technology Publications , pp. 266\u2013 274 . doi: 10.5220\/0010332902660274. 10.5220\/0010332902660274 C. Boletsis, R. Halvorsrud, J. Pickering, S. Phillips, and M. Surridge. 2021. Cybersecurity for SMEs: Introducing the Human Element into Socio-technical Cybersecurity Risk Assessment. In Proceedings of the 16th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications, SCITEPRESS - Science and Technology Publications, pp. 266\u2013274. doi: 10.5220\/0010332902660274."},{"key":"e_1_3_2_1_13_1","volume-title":"Accessed","author":"Ponemon Institute","year":"2023","unstructured":"Ponemon Institute , \u201c What's New in the 2019 Cost of a Data Breach Report. Security Intelligence.,\u201d 2019 . Accessed : Jan. 29, 2023 . [Online]. Available : https:\/\/securityintelligence.com\/posts\/whats-new-in-the-2019-costof- a-data-breach-report\/ Ponemon Institute, \u201cWhat's New in the 2019 Cost of a Data Breach Report. Security Intelligence.,\u201d 2019. Accessed: Jan. 29, 2023. [Online]. Available: https:\/\/securityintelligence.com\/posts\/whats-new-in-the-2019-costof- a-data-breach-report\/"},{"key":"e_1_3_2_1_14_1","volume-title":"Cybersecurity Maturity Assessment for Small and Medium Enterprises","author":"ENISA","year":"2023","unstructured":"ENISA , \u201c Cybersecurity Maturity Assessment for Small and Medium Enterprises ,\u201d 2023 . https:\/\/www.enisa.europa.eu\/cybersecurity-maturity-assessment-for-small-and-medium-enterprises#\/ (accessed Jan. 31, 2023). ENISA, \u201cCybersecurity Maturity Assessment for Small and Medium Enterprises,\u201d 2023. https:\/\/www.enisa.europa.eu\/cybersecurity-maturity-assessment-for-small-and-medium-enterprises#\/ (accessed Jan. 31, 2023)."},{"key":"e_1_3_2_1_15_1","first-page":"5","volume-title":"2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), IEEE","author":"Alahmari A.","unstructured":"A. Alahmari and B. Duncan . 2020. Cybersecurity Risk Management in Small and Medium-Sized Enterprises: A Systematic Review of Recent Evidence ,\u201d in 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), IEEE , pp. 1\u2013 5 . doi: 10.1109\/CyberSA49311.2020.9139638. 10.1109\/CyberSA49311.2020.9139638 A. Alahmari and B. Duncan. 2020. Cybersecurity Risk Management in Small and Medium-Sized Enterprises: A Systematic Review of Recent Evidence,\u201d in 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), IEEE, pp. 1\u20135. doi: 10.1109\/CyberSA49311.2020.9139638."},{"key":"e_1_3_2_1_16_1","first-page":"2023","article-title":"Survey: How Prepared are Small Business Owners for Cyber Attacks. Accessed","volume":"01","author":"Grevey M.","year":"2021","unstructured":"M. Grevey . 2021 . Survey: How Prepared are Small Business Owners for Cyber Attacks. Accessed : Mar. 01 , 2023 . [Online]. Available: https:\/\/ www.experianpartnersolutions.com\/2016\/05\/survey-how-prepared-aresmall- business-owners-for-cyber-attacks\/ M. Grevey. 2021. Survey: How Prepared are Small Business Owners for Cyber Attacks. Accessed: Mar. 01, 2023. [Online]. Available: https:\/\/ www.experianpartnersolutions.com\/2016\/05\/survey-how-prepared-aresmall- business-owners-for-cyber-attacks\/","journal-title":"Mar."},{"key":"e_1_3_2_1_17_1","volume-title":"Accessed","author":"ENISA","year":"2023","unstructured":"ENISA , \u201c CYBERSECURITY FOR SMES Challenges and Recommendations,\u201d 2021 . Accessed : Mar. 02, 2023 . [Online]. Available : https:\/\/www.enisa.europa.eu\/publications\/enisa-report-cybersecurity-for-smes ENISA, \u201cCYBERSECURITY FOR SMES Challenges and Recommendations,\u201d 2021. Accessed: Mar. 02, 2023. [Online]. Available: https:\/\/www.enisa.europa.eu\/publications\/enisa-report-cybersecurity-for-smes"},{"issue":"7","key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","first-page":"52","DOI":"10.47277\/IJCNCS\/8(7)1","article-title":"Man in the Middle Attacks: Analysis, Motivation and Prevention","volume":"8","author":"Javeed D.","year":"2020","unstructured":"D. Javeed and U. MohammedBadamasi . 2020 . Man in the Middle Attacks: Analysis, Motivation and Prevention . In International Journal of Computer Networks and Communications Security , vol. 8 , no. 7 , pp. 52 \u2013 58 , Jul. 2020, doi: 10.47277\/IJCNCS\/8(7)1. 10.47277\/IJCNCS D. Javeed and U. MohammedBadamasi. 2020. Man in the Middle Attacks: Analysis, Motivation and Prevention. In International Journal of Computer Networks and Communications Security, vol. 8, no. 7, pp. 52\u201358, Jul. 2020, doi: 10.47277\/IJCNCS\/8(7)1.","journal-title":"International Journal of Computer Networks and Communications Security"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2010.010623"},{"key":"e_1_3_2_1_20_1","first-page":"856","volume-title":"Circuits and Systems for Communications. ICCSC 2008. 4th IEEE International Conference, IEEE","author":"Wu D.","year":"2008","unstructured":"D. Wu and G. Hu . 2008. Research and improve on secure routing protocols in wireless sensor networks .,\u201d in Circuits and Systems for Communications. ICCSC 2008. 4th IEEE International Conference, IEEE , 2008 , pp. 853\u2013 856 . D. Wu and G. Hu. 2008. Research and improve on secure routing protocols in wireless sensor networks.,\u201d in Circuits and Systems for Communications. ICCSC 2008. 4th IEEE International Conference, IEEE, 2008, pp. 853\u2013856."},{"issue":"1","key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1504\/IJBCRM.2018.090580","article-title":"An initial assessment of small business risk management approaches for cyber security threats","volume":"8","author":"Berry C. T.","year":"2018","unstructured":"C. T. Berry and R. L. Berry . 2018 . An initial assessment of small business risk management approaches for cyber security threats . In International Journal of Business Continuity and Risk Management , vol. 8 , no. 1 , p. 1, doi: 10 .1504\/IJBCRM.2018.090580. 10.1504\/IJBCRM.2018.090580 C. T. Berry and R. L. Berry. 2018. An initial assessment of small business risk management approaches for cyber security threats. In International Journal of Business Continuity and Risk Management, vol. 8, no. 1, p. 1, doi: 10.1504\/IJBCRM.2018.090580.","journal-title":"International Journal of Business Continuity and Risk Management"},{"key":"#cr-split#-e_1_3_2_1_22_1.1","doi-asserted-by":"crossref","unstructured":"Y. Barlette K. Gundolf and A. Jaouen. 2017. CEOs' information security behavior in SMEs: Does ownership matter? In Syst\u00e8mes d'information & management vol. 22 no. 3 pp. 7-45 doi: 10.3917\/sim.173.0007. 10.3917\/sim.173.0007","DOI":"10.3917\/sim.173.0007"},{"key":"#cr-split#-e_1_3_2_1_22_1.2","doi-asserted-by":"crossref","unstructured":"Y. Barlette K. Gundolf and A. Jaouen. 2017. CEOs' information security behavior in SMEs: Does ownership matter? In Syst\u00e8mes d'information & management vol. 22 no. 3 pp. 7-45 doi: 10.3917\/sim.173.0007.","DOI":"10.3917\/sim.173.0007"},{"key":"e_1_3_2_1_23_1","volume-title":"Chi\u0219in\u0103u","author":"Moldova Parliament","year":"2023","unstructured":"Parliament of the Republic of Moldova , \u201c Law of the Republic of Moldova no. 48, of March 16, 2023, regarding cyber security ,\u201d Chi\u0219in\u0103u , 2023 . Parliament of the Republic of Moldova, \u201cLaw of the Republic of Moldova no. 48, of March 16, 2023, regarding cyber security,\u201d Chi\u0219in\u0103u, 2023."},{"key":"e_1_3_2_1_24_1","volume-title":"Chisinau","author":"Moldova Ministry","year":"2022","unstructured":"Ministry of Economy of the Republic of Moldova , \u201cThe Cyber Security Law Project ,\u201d Chisinau , 2022 . Ministry of Economy of the Republic of Moldova, \u201cThe Cyber Security Law Project,\u201d Chisinau, 2022."},{"key":"e_1_3_2_1_25_1","volume-title":"Accessed","author":"The Organization for the Development of the SME Sector in the Republic of Moldova","year":"2023","unstructured":"The Organization for the Development of the SME Sector in the Republic of Moldova , \u201cDigitization of SMEs .\u201d Accessed : Mar. 01, 2023 . [Online]. Available : https:\/\/www.odimm.md\/ro\/digitalizarea. The Organization for the Development of the SME Sector in the Republic of Moldova, \u201cDigitization of SMEs.\u201d Accessed: Mar. 01, 2023. [Online]. Available: https:\/\/www.odimm.md\/ro\/digitalizarea."},{"key":"e_1_3_2_1_26_1","volume-title":"Accessed","author":"Moldova Parliament","year":"2023","unstructured":"Parliament of the Republic of Moldova , \u201c LAW no. 179 on small and medium-sized enterprises,\u201d 2016 . Accessed : Mar. 02, 2023 . [Online]. Available : https:\/\/www.legis.md\/cautare\/getResults?doc_id=105839&lang=ro. Parliament of the Republic of Moldova, \u201cLAW no. 179 on small and medium-sized enterprises,\u201d 2016. Accessed: Mar. 02, 2023. [Online]. Available: https:\/\/www.legis.md\/cautare\/getResults?doc_id=105839&lang=ro."},{"key":"e_1_3_2_1_27_1","volume-title":"Brussels","author":"Alliance Digital SME","year":"2020","unstructured":"Digital SME Alliance , \u201c European Digital SME alliance 2020. The EU cyber security Act and the role of standards for SMEs- Position paper. Technical report .,\u201d Brussels , 2020 . Digital SME Alliance, \u201cEuropean Digital SME alliance 2020. The EU cyber security Act and the role of standards for SMEs- Position paper. Technical report.,\u201d Brussels, 2020."}],"event":{"name":"CEEeGov 2023: Central and Eastern European eDem and eGov Days 2023","location":"Budapest Hungary","acronym":"CEEeGov 2023"},"container-title":["Central and Eastern European eDem and eGov Days 2023"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603304.3603346","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:41Z","timestamp":1750178801000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603304.3603346"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,13]]},"references-count":30,"alternative-id":["10.1145\/3603304.3603346","10.1145\/3603304"],"URL":"https:\/\/doi.org\/10.1145\/3603304.3603346","relation":{},"subject":[],"published":{"date-parts":[[2023,9,13]]},"assertion":[{"value":"2023-09-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}