{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T23:55:51Z","timestamp":1773446151597,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,1,10]]},"DOI":"10.1145\/3725899.3725926","type":"proceedings-article","created":{"date-parts":[[2025,7,11]],"date-time":"2025-07-11T11:33:04Z","timestamp":1752233584000},"page":"178-183","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A Critical Analysis of SME Cybersecurity Policies and Practices"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-6155-0570","authenticated-orcid":false,"given":"Alex","family":"Clark","sequence":"first","affiliation":[{"name":"Department of Technology, Illinois State University, Normal, IL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8571-2183","authenticated-orcid":false,"given":"Stephen","family":"Mujeye","sequence":"additional","affiliation":[{"name":"Department of Technology, Illinois State University, Normal, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,7,11]]},"reference":[{"key":"e_1_3_3_1_1_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3197899"},{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.20525\/ijrbs.vl3i4.3308"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.3390\/s23156757"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102535"},{"key":"e_1_3_3_1_5_2","volume-title":"How to Reduce the Expense of Cyber Business Interruption. Insurance Journal","author":"Lifshitz A.","year":"2020","unstructured":"Lifshitz, A. (2020). How to Reduce the Expense of Cyber Business Interruption. Insurance Journal."},{"key":"e_1_3_3_1_6_2","unstructured":"NIST.SP.800-61r2. Computer Security Incident Handling Guide. Retrieved from https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-61r2.pdf."},{"key":"e_1_3_3_1_7_2","volume-title":"SME cybersecurity: Challenges and solutions","author":"Cybersecurity","year":"2023","unstructured":"ML Cybersecurity. (2023). SME cybersecurity: Challenges and solutions."},{"issue":"1","key":"e_1_3_3_1_8_2","first-page":"89","article-title":"The global rise of cyberattacks and their impact on SMEs","volume":"12","author":"Wyatt J.","year":"2021","unstructured":"Wyatt, J. (2021). The global rise of cyberattacks and their impact on SMEs. Journal of Cybersecurity, 12(1), 89-97.","journal-title":"Journal of Cybersecurity"},{"issue":"1","key":"e_1_3_3_1_9_2","first-page":"32","article-title":"Human error and cybersecurity in SMEs","volume":"6","author":"Niekerk D.","year":"2017","unstructured":"Niekerk, D. (2017). Human error and cybersecurity in SMEs. Journal of Information Security, 6(1), 32-47.","journal-title":"Journal of Information Security"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jjimei.2023.100191"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-01-2024-0025"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-07-2018-0080"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2017.02179"}],"event":{"name":"ICSIM 2025: 2025 The 8th International Conference on Software Engineering and Information Management","location":"Singapore Singapore","acronym":"ICSIM 2025"},"container-title":["Proceedings of the 2025 8th International Conference on Software Engineering and Information Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3725899.3725926","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T11:33:58Z","timestamp":1752665638000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3725899.3725926"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,10]]},"references-count":13,"alternative-id":["10.1145\/3725899.3725926","10.1145\/3725899"],"URL":"https:\/\/doi.org\/10.1145\/3725899.3725926","relation":{},"subject":[],"published":{"date-parts":[[2025,1,10]]},"assertion":[{"value":"2025-07-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}