{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T01:45:50Z","timestamp":1772502350752,"version":"3.50.1"},"reference-count":49,"publisher":"MDPI AG","issue":"11","license":[{"start":{"date-parts":[[2021,11,10]],"date-time":"2021-11-10T00:00:00Z","timestamp":1636502400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers"],"abstract":"<jats:p>In many developed countries, the usage of artificial intelligence (AI) and machine learning (ML) has become important in paving the future path in how data is managed and secured in the small and medium enterprises (SMEs) sector. SMEs in these developed countries have created their own cyber regimes around AI and ML. This knowledge is tested daily in how these countries\u2019 SMEs run their businesses and identify threats and attacks, based on the support structure of the individual country. Based on recent changes to the UK General Data Protection Regulation (GDPR), Brexit, and ISO standards requirements, machine learning cybersecurity (MLCS) adoption in the UK SME market has become prevalent and a good example to lean on, amongst other developed nations. Whilst MLCS has been successfully applied in many applications, including network intrusion detection systems (NIDs) worldwide, there is still a gap in the rate of adoption of MLCS techniques for UK SMEs. Other developed countries such as Spain and Australia also fall into this category, and similarities and differences to MLCS adoptions are discussed. Applications of how MLCS is applied within these SME industries are also explored. The paper investigates, using quantitative and qualitative methods, the challenges to adopting MLCS in the SME ecosystem, and how operations are managed to promote business growth. Much like security guards and policing in the real world, the virtual world is now calling on MLCS techniques to be embedded like secret service covert operations to protect data being distributed by the millions into cyberspace. This paper will use existing global research from multiple disciplines to identify gaps and opportunities for UK SME small business cyber security. This paper will also highlight barriers and reasons for low adoption rates of MLCS in SMEs and compare success stories of larger companies implementing MLCS. The methodology uses structured quantitative and qualitative survey questionnaires, distributed across an extensive participation pool directed to the SMEs\u2019 management and technical and non-technical professionals using stratify methods. Based on the analysis and findings, this study reveals that from the primary data obtained, SMEs have the appropriate cybersecurity packages in place but are not fully aware of their potential. Secondary data collection was run in parallel to better understand how these barriers and challenges emerged, and why the rate of adoption of MLCS was very low. The paper draws the conclusion that help through government policies and processes coupled together with collaboration could minimize cyber threats in combatting hackers and malicious actors in trying to stay ahead of the game. These aspirations can be reached by ensuring that those involved have been well trained and understand the importance of communication when applying appropriate safety processes and procedures. This paper also highlights important funding gaps that could help raise cyber security awareness in the form of grants, subsidies, and financial assistance through various public sector policies and training. Lastly, SMEs\u2019 lack of understanding of risks and impacts of cybercrime could lead to conflicting messages between cross-company IT and cybersecurity rules. Trying to find the right balance between this risk and impact, versus productivity impact and costs, could lead to UK SMES getting over these hurdles in this cyberspace in the quest for promoting the usage of MLCS. UK and Wales governments can use the research conducted in this paper to inform and adapt their policies to help UK SMEs become more secure from cyber-attacks and compare them to other developed countries also on the same future path.<\/jats:p>","DOI":"10.3390\/computers10110150","type":"journal-article","created":{"date-parts":[[2021,11,10]],"date-time":"2021-11-10T09:19:21Z","timestamp":1636535961000},"page":"150","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":72,"title":["Machine Learning Cybersecurity Adoption in Small and Medium Enterprises in Developed Countries"],"prefix":"10.3390","volume":"10","author":[{"given":"Nisha","family":"Rawindaran","sequence":"first","affiliation":[{"name":"Cardiff School of Technologies, Cardiff Metropolitan University, Cardiff CF5 2XJ, Wales, UK"},{"name":"Aytel Systems Ltd., Cardiff CF3 2PU, Wales, UK"},{"name":"KESS2, Knowledge Economy Skills Scholarships, Supported by European Social Funds (ESF), Bangor University, Bangor, Gwynedd LL57 2DG, Wales, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9936-5311","authenticated-orcid":false,"given":"Ambikesh","family":"Jayal","sequence":"additional","affiliation":[{"name":"School of Information Systems and Technology, University of Canberra, Bruce, ACT 2617, Australia"}]},{"given":"Edmond","family":"Prakash","sequence":"additional","affiliation":[{"name":"Cardiff School of Technologies, Cardiff Metropolitan University, Cardiff CF5 2XJ, Wales, UK"}]}],"member":"1968","published-online":{"date-parts":[[2021,11,10]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Saleem, M. (2019, January 3\u20134). Brexit Impact on Cyber Security of United Kingdom. Proceedings of the 2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), Oxford, UK.","DOI":"10.1109\/CyberSecPODS.2019.8885271"},{"key":"ref_2","unstructured":"(2021, March 03). Industry 4 and the Pandemic. Available online: https:\/\/www.imd.org\/research-knowledge\/articles\/the-pandemic-might-have-provided-a-clearing-in-the-woods-for-industry-4\/."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Warwick, K. (2013). Artificial Intelligence: The Basics, Routledge.","DOI":"10.4324\/9780203802878"},{"key":"ref_4","unstructured":"(2021, March 08). Information Commissioner\u2019s Office (ICO)\u2014SME Web Hub\u2014Advice for All Small Organizations. Available online: https:\/\/ico.org.uk\/for-organisations\/sme-web-hub\/."},{"key":"ref_5","unstructured":"(2021, March 03). Robocop Machine Learning Expense Fraud. Available online: https:\/\/www.cbronline.com\/emerging-technology\/robo-cop-machine-learning-expense-fraud\/."},{"key":"ref_6","unstructured":"(2021, March 03). Technology New. Available online: https:\/\/www.bbc.co.uk\/news\/technology-30290540."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Aslam, F., Aimin, W., Li, M., and Ur Rehman, K. (2020). Innovation in the era of IoT and industry 5.0: Absolute innovation management (AIM) framework. Information, 11.","DOI":"10.3390\/info11020124"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"141","DOI":"10.11128\/sne.28.tn.10441","article-title":"A Learned Polyalphabetic Decryption Cipher","volume":"28","author":"Hewage","year":"2018","journal-title":"SNE"},{"key":"ref_9","unstructured":"(2021, March 03). IWM How Alan Turing Cracked the Enigma. Available online: https:\/\/www.iwm.org.uk\/history\/how-alan-turing-cracked-the-enigma-code."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1237","DOI":"10.1016\/j.asoc.2009.09.014","article-title":"An ant colony optimization algorithm for the bi-objective shortest path problem","volume":"10","author":"Ghoseiri","year":"2010","journal-title":"Appl. Soft Comput."},{"key":"ref_11","unstructured":"(2021, March 03). What is Machine Learning. Available online: https:\/\/www.toolbox.com\/tech\/artificial-intelligence\/tech-101\/what-is-machine-learning-definition-types-applications-and-examples\/#_003."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","article-title":"A survey of data mining and machine learning methods for cyber security intrusion detection","volume":"18","author":"Buczak","year":"2015","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_13","unstructured":"Fraley, J.B., and Cannady, J. (April, January 30). The promise of machine learning in cybersecurity. Proceedings of the SoutheastCon, Concord, NC, USA."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Arora, A., Jayal, A., Gupta, M., Mittal, P., and Satapathy, S.C. (2021). Brain Tumor Segmentation of MRI Images Using Processed Image Driven U-Net Architecture. Computers, 10.","DOI":"10.3390\/computers10110139"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Lee, K., Caverlee, J., and Webb, S. (2010, January 19\u201323). Uncovering Social Spammers: Social Honeypots + Machine Learning. Proceedings of the SIGIR\u201910, Geneva, Switzerland.","DOI":"10.1145\/1835449.1835522"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Uppal, S., Jayal, A., and Arora, A. (2019, January 8\u201310). Pairwise Reviews Ranking and Classification for Medicine E-Commerce Application. Proceedings of the 2019 Twelfth International Conference on Contemporary Computing (IC3), Noida, India.","DOI":"10.1109\/IC3.2019.8844887"},{"key":"ref_17","unstructured":"LAZI\u0106, L. (2019, January 18). Benefit from Ai in cybersecurity. Proceedings of the 11th International Conference on Business Information Security (BISEC 2019), Belgrade, Serbia."},{"key":"ref_18","unstructured":"(2021, March 03). Five Top Machine Learning Use Cases for Security. Available online: https:\/\/www.csoonline.com\/article\/3240925\/5-top-machine-learning-use-cases-for-security.html."},{"key":"ref_19","unstructured":"(2021, March 03). How Credit Card Companies are Fighting Cyber Frauds. Available online: https:\/\/cio.economictimes.indiatimes.com\/news\/digital-security\/heres-how-visa-mastercard-and-paypal-are-fighting-cyber-frauds-with-ai\/79381050."},{"key":"ref_20","unstructured":"V\u00e4h\u00e4kainu, P., and Lehto, M. (March, January 28). Artificial intelligence in the cyber security environment. Proceedings of the ICCWS 2019 14th International Conference on Cyber WarfarSe and Security: ICCWS, Stellenbosch, South Africa."},{"key":"ref_21","unstructured":"Amazon Web Services, Inc (2021, March 03). Amazon Macie FAQ. Amazon., Available online: https:\/\/aws.amazon.com\/macie\/faq."},{"key":"ref_22","unstructured":"Proko, E., Hyso, A., and Gjylapi, D. (2018). Machine Learning Algorithms in Cyber Security. RTA-CSIT, Available online: https:\/\/www.semanticscholar.org\/paper\/Machine-Learning-Algorithms-in-Cyber-Security-Proko-Hyso\/67525df429c50af9ae5fe10949cd7d279ee1184f."},{"key":"ref_23","unstructured":"Orche, A.E., and Bahaj, M. (2021, October 27). Approach to Combine an Ontology-Based on Payment System with Neural Network for Transaction Fraud Detection. Available online: https:\/\/astesj.com\/v05\/i02\/p69\/."},{"key":"ref_24","unstructured":"(2021, March 03). Tech Giants Using AI against Hackers. Available online: https:\/\/analyticsindiamag.com\/how-tech-giants-like-amazon-microsoft-google-are-using-ai-against-hackers\/."},{"key":"ref_25","unstructured":"(2021, March 03). Hackers Trick Tesla. Available online: https:\/\/www.technologyreview.com\/2019\/04\/01\/65915\/hackers-trick-teslas-autopilot-into-veering-towards-oncoming-traffic\/."},{"key":"ref_26","unstructured":"Ford, V., and Siraj, A. (2014, January 13\u201315). Applications of machine learning in cyber security. Proceedings of the 27th International Conference on Computer Applications in Industry and Engineering, New Orleans, LA, USA."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Jayal, A., McRobert, A., Oatley, G., and O\u2019Donoghue, P. (2018). Sports Analytics: Analysis, Visualisation and Decision Making in Sports Performance, Routledge.","DOI":"10.4324\/9781315222783"},{"key":"ref_28","unstructured":"UK Small Business Statistics, F.S.B. (2021, September 01). The Federation of Small Businesses. Available online: https:\/\/www.fsb.org.uk\/uk-small-business-statistics.html."},{"key":"ref_29","unstructured":"(2021, September 01). SME Action Plan, Available online: https:\/\/assets.publishing.service.gov.uk\/government\/uploads\/system\/uploads\/attachment_data\/file\/961722\/SME-Action-Plan.pdf."},{"key":"ref_30","unstructured":"(2021, September 01). The Impact of the Coronavirus so Far: The Industries that Struggled or Recovered\u2014Office for National Statistics (Ons.Gov.UK), Available online: https:\/\/www.ons.gov.uk\/economy\/economicoutputandproductivity\/output\/articles\/theimpactofthecoronavirussofartheindustriesthatstruggledorrecovered\/2020-12-09."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1002\/isaf.1336","article-title":"\u2018Big Data\u2019, the \u2018Internet of Things\u2019, and the \u2018Internet of Signs\u2019","volume":"20","year":"2013","journal-title":"Intell. Syst. Account. Financ. Manag."},{"key":"ref_32","unstructured":"Cox, M., and Ellsworth, D. (2021, October 27). Managing Big Data for Scientific Visualization. ACM Siggraph: USA. Available online: https:\/\/www.researchgate.net\/publication\/238704525_Managing_big_data_for_scientific_visualization."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"927","DOI":"10.1016\/j.jbusres.2020.09.018","article-title":"Conversation-based perspective for shaping ethical human\u2013machine interactions: The particular challenge of chatbots","volume":"129","author":"Murtarelli","year":"2020","journal-title":"J. Bus. Res."},{"key":"ref_34","unstructured":"(2021, March 03). GHCQ Overview, Available online: https:\/\/www.gchq.gov.uk\/section\/mission\/overview."},{"key":"ref_35","unstructured":"(2021, March 03). Intelligent Security Tools, Available online: https:\/\/www.ncsc.gov.uk\/collection\/intelligent-security-tools."},{"key":"ref_36","unstructured":"(2021, March 03). Small Business Guide: Cyber Security, Available online: www.ncsc.gov.uk."},{"key":"ref_37","first-page":"55","article-title":"Intelligent Detection and Recovery from Cyberattacks for Small and Medium-Sized Enterprises","volume":"6","author":"Lombardo","year":"2020","journal-title":"Int. J. Interact. Multimed. Artif. Intell."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Rawindaran, N., Jayal, A., Prakash, E., and Hewage, C. (2021). Cost Benefits of Using Machine Learning Features in NIDS for Cyber Security in UK Small Medium Enterprises (SME). Future Internet, 13.","DOI":"10.3390\/fi13080186"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Elmrabit, N., Zhou, F., Li, F., and Zhou, H. (2020, January 15\u201319). Evaluation of machine learning algorithms for anomaly detection. Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), Dublin, Ireland.","DOI":"10.1109\/CyberSecurity49315.2020.9138871"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Gupta, A., Gupta, R., and Kukreja, G. (2021). Cyber Security Using Machine Learning: Techniques and Business Applications. Applications of Artificial Intelligence in Business, Education and Healthcare, Springer.","DOI":"10.1007\/978-3-030-72080-3_21"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Van Haastrecht, M., Yigit Ozkan, B., Brinkhuis, M., and Spruit, M. (2021). Respite for SMEs: A Systematic Review of Socio-Technical Cybersecurity Metrics. Appl. Sci., 11.","DOI":"10.3390\/app11156909"},{"key":"ref_42","unstructured":"Hiatt, J. (2006). ADKAR: A Model for Change in Business, Government, and Our Community, Prosci."},{"key":"ref_43","unstructured":"DIGITAL SME Alliance (2020). The EU Cybersecurity Act and the Role of Standards for SMEs\u2014Position Paper, European DIGITAL SME Alliance. Technical Report."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"102385","DOI":"10.1016\/j.cose.2021.102385","article-title":"The Good, The Bad and The Missing: A Narrative Review of Cyber-security Implications for Australian Small Businesses","volume":"109","author":"Tam","year":"2021","journal-title":"Comput. Secur."},{"key":"ref_45","unstructured":"(2020, March 03). Qualtrics [Online Software]: Provo, UT, USA. Available online: www.qualtrics.com."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"330","DOI":"10.7713\/ijms.2013.0032","article-title":"Sampling: Why and how of it","volume":"4","author":"Acharya","year":"2013","journal-title":"Indian J. Med. Spec."},{"key":"ref_47","unstructured":"Greenfield, T. (2002). Research Methods for Postgraduates, Arnold."},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Sarantakos, S. (2013). Social Research, Macmillan.","DOI":"10.1007\/978-1-137-29247-6"},{"key":"ref_49","unstructured":"Kirby, M., Konbel, F., Barter, J., Hope, T., Kirton, D., Madry, N., Manning, P., and Trigges, K. (2000). Sociology in Perspective, Heinnemann."}],"container-title":["Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-431X\/10\/11\/150\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T07:28:33Z","timestamp":1760167713000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-431X\/10\/11\/150"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,10]]},"references-count":49,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2021,11]]}},"alternative-id":["computers10110150"],"URL":"https:\/\/doi.org\/10.3390\/computers10110150","relation":{},"ISSN":["2073-431X"],"issn-type":[{"value":"2073-431X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,11,10]]}}}