Browse > Article
http://dx.doi.org/10.12812/ksms.2021.23.2.053

ICT Adoption and Cyber Security of Korean SMEs  

Jung, Jeyong (Department of Police Science, University of Ulsan)
Publication Information
Journal of the Korea Safety Management & Science / v.23, no.2, 2021 , pp. 53-63 More about this Journal
Abstract
Small and medium-sized enterprises(SMEs) continue to adopt ICT to gain an edge in organizational innovation and competition. This has a management advantage, but it also brings vulnerabilities as to cyber security. Therefore, the purpose of this study is to conduct an exploratory study on the cyber security situation of SMEs. A survey was conducted on Korean SMEs to determine how well they are connected to ICT and how much they are exposed to cyber security threats. The results suggest two things. First, Korean SMEs are well connected to ICT, but there is a gap between the actual adoption and human recognition of its importance. Second, security threats and breaches affect the majority of SMEs, but several problems including costs have not been properly evaluated. The results of this study are expected to help improve the cyber security management system of Korean SMEs.
Keywords
Cyber security; SMEs; ICT adoption; Threats and breaches; Survey;
Citations & Related Records
연도 인용수 순위
  • Reference
1 International Telecommunication Union(2015b), Measuring the information society report.
2 M. Harris, K. Patten(2014), "Mobile device security considerations for small and medium-sized enterprise business mobility." Information Management & Computer Security, 22(1):97-114.   DOI
3 Organisation for Economic Co-operation and Development(2017), Fixed and wireless broadband subscriptions per 100 inhabitants.
4 International Telecommunication Union(2015a), ICT facts & figures.
5 Z. A. Soomro, M. H. Shah, J. Ahmed(2016), "Information security management needs more holistic approach: A literature review." International Journal of Information Management, 36(2):215-225.   DOI
6 J. Hashim(2015), "Information Communication Technology(ICT) adoption among SME owners in Malaysia." International Journal of Business and Information, 2(2):221-240.
7 D. Wall(2007), Cybercrime. Cambridge: Polity.
8 National Police Agency(2012), National police white paper. Seoul: TSO.
9 National Police Agency(2017), National police white paper. Seoul: TSO.
10 A. Gupta, R. Hammond(2005), "Information systems security issues and decisions for SMEs: An empirical examination." Information Management & Computer Security, 13(4):297-310.   DOI
11 D. Truong(2010), "How cloud computing enhances competitive advantages: A research model for SMEs." The Business Review, 15(1):59-65.
12 J. M. Bauer, W. H. Dutton(2015), The new cyber security agenda: Economic and social challenges to a secure internet. World Bank' World Development Report, No. 102965.
13 B. Herbane(2010), "Small business research: Time for a crisis-based view." International Small Business Journal, 28(1):43-64.   DOI
14 United Nations(2014), E-government survey. Retri eved from https://publicadministration.un.org/e-govkb/portals/egovkb/documents/un/2014-survey/e-gov_complete_survey-2014.pdf
15 R. Blackburn(2012), Segmenting the SME market and implications for service provision: A literature review. London: Advisory, Conciliation and Arbitration Service, Research Paper Ref: 9/12.
16 K. Grant, D. Edgar, A. Sukumar, M. Meyer(2014), "'Risky business': Perceptions of e-business risk by UK small and medium sized enterprises (SMEs)." International Journal of Information Management, 34(2):99-122.   DOI
17 Office for National Statistics(2017), Crime in England and Wales: Year ending Sept 2016. Retrieved from https://www.ons.gov.uk/peoplepopulationandcommunity/crimeandjustice/bulletins/crimeinenglandandwales/yearendingsept2016
18 D. Bhattacharya(2011), "Leadership styles and information security in SMEs." Information Management & Computer Security, 19(5):300-312.   DOI
19 Department for Digital, Culture, Media and Sport (2018), Cyber security breaches survey 2018. Retrieved from https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2018
20 Symantec(2017), Internet security threat report. Retrieved from https://www.symantec.com/content/dam/symantec/docs/reports/istr-22-2017-en.pdf
21 A. Ghobadian, D. Gallear(1997), "TQM and organization size." International Journal of Operations & Production Management, 17(2): 121-163.   DOI
22 D. Organ(2015), "Trust through certification in SME Cloud adoption." In P. R. J. Trim, & H. Y. Youm (Eds.), Korea-UK collaboration in cyber security: From issues and challenges to sustainable partnership (pp. 32-46). Seoul: British Embassy in South Korea.