Wolf-proof brick house? Information security of SMEs in Hungary

Authors

  • Nimród Mike Corvinus University of Budapest, Librantis
  • Enikő Krén Corvinus University of Budapest, Librantis
  • Tamás Kecskeméti Corvinus University of Budapest, Librantis

DOI:

https://doi.org/10.14267/VEZTUD.2023.09.04

Keywords:

information security, SME, cluster analysis

Abstract

IT and information security are as important in the life of SMEs as an oasis in the desert. The level of security contributes greatly to the competitiveness of companies, an area that is strongly under-represented in the SME sector. The study seeks to answer the question of whether it can really be observed that urgent digitisation has a negative impact on the level of information security in the life of SMEs in Hungary. The trends related to information security and data protection can be compared in Hungary and the European Union, showing the backwardness of the area. The study presents the results of Digimeter’s 2020, 2021 and 2022 quantitative research, and also processes public data from the Digital Economy and Society Index (DESI ) and other available indexes. The expected results of the research confirm that the immaturity of information security is clearly visible in Hungary.

Downloads

Download data is not yet available.

Author Biographies

Nimród Mike, Corvinus University of Budapest, Librantis

data protection expert

Enikő Krén, Corvinus University of Budapest, Librantis

senior adviser

Tamás Kecskeméti, Corvinus University of Budapest, Librantis

software developer, data analyst

References

A digitális gazdaság és társadalom fejlettségét mérő mutató, 2022 Magyarország. https://hungary.representation.ec.europa.eu/digitalis-gazdasag-es-tarsadalom-fejlettseget-mero-mutato-2022-altalaban-veve-javult-helyzet-2022-07-28_hu

Abroshan, H., Devos, J., Poels, G., & Laermans, E. (2021). Phishing happens beyond technology: The effects of human behaviors and demographics on each step of a phishing process. IEEE Access, 9, 44928-44949. https://doi.org/10.1109/ACCESS.2021.3066383

Bakumenko, L. P., & Minina, E. A. (2020). International Index of Digital Economy and Society (I-DESI): Trends in the Development of Digital Technologies. Statistics and Economics, 17(2), 40-54. https://doi.org/10.21686/2500-3925-2020-2-40-54

Baxter, P., & Jack, S. (2008). Qualitative case study methodology: study design and implementation for novice researchers. The Qualitative Report, 13(4), 544-559. https://doi.org/10.46743/2160-3715/2008.1573

Boletsis, C., Ragnhild, H., Pickering, J., Stephen, P., & Surridge, M. (2021). Cybersecurity for SMEs: Introducing the human element into socio-technical cybersecurity risk assessment. In Hurter, C., Purchase, H., Braz, J., & Bouatoch, K. (Eds.), Proceedings of the 16th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications, SciTePress (pp. 266-274). https://doi.org/10.5220/0010332902660274

Bruggemann, R., Koppatz, P., Scholl, M., & Schuktomow, R. (2022). Global Cybersecurity Index (GCI) and the Role of its 5 Pillars. Social Indicators Research, 159, 125–143. https://doi.org/10.1007/s11205-021-02739-y

Bryan, L. L. (2020). Effective information security strategies for small business. International Journal of Cyber Criminology, 14(1), 341-360. http://doi.org/10.5281/zenodo.3760328

Cisco. (2017). Annual CyberSecurity Report. https://learningnetwork.cisco.com/s/contentdocu-ment/0693i000001r6FtAAI

Craigen, D., Diakun-Thibault, N., & Purse, R. (2014). Defining Cybersecurity. Technology Innovation Management Review, 4(10), 13-21. http://doi.org/10.22215/timreview/835

Creswell, J. W. (2003). Research design: Qualitative, quantitative, and mixed methods approaches (2nd ed.). Thousand Oaks: Sage. https://www.ucg.ac.me/skladiste/blog_609332/objava_105202/fajlovi/Creswell.pdf

Cseh G. (2019). Digitális Gazdaság és Társadalom Index – Magyarország európai uniós teljesítménye a digitalizált világban. https://www.researchgate.net/profile/Gergely-Cseh-Zelina/publication/338140204_Digitalis_Gazdasag_es_Tarsadalom_Index_-Magyarorszag_Europai_Unios_teljesitmenye_a_digitalizalt_vilagban_KEZIRAT_-_PREPRINT/links/5e01eeb74585159aa495de3f/Digitalis-Gazdasag-es-Tarsadalom-Index-Magyarorszag-Europai-Unios-teljesitmenye-a-digitalizalt-vilagban-KEZIRAT-PREPRINT.pdf

Csótó, M. (2019). Mérni annyi, mint tudni? Az elektronikus közigazgatás közösségi mérőszámairól. Vezetéstudomány, 50(2), 14-31. https://doi.org/10.14267/VEZTUD.2019.02.02

Demeter K., Losonci, D., & Takács, O. (2019). Az ipar 4.0 hatásainak nyomában – a magyarországi járműipar elemzése. Közgazdasági Szemle, 66(2), 185-218. http://dx.doi.org/10.18414/KSZ.2019.2.185

DESI (2022). A digitális gazdaság és társadalom indexe (DESI). https://digital-strategy.ec.europa.eu/hu/policies/ desi

DHS. (2014). A glossary of common cybersecurity terminology. National Initiative for Cybersecurity Careers and Studies: Department of Homeland Security. October 1. http://niccs.us-cert.gov/glossary#letter_c

Digiméter. (2023). Digiméter jelentés 2022. https://digimeter.hu/wp-content/uploads/2023/02/Digimeter-2022-jelentes.pdf

Edmondson, A., & McManus, S. (2007). Methodological fit in management field research. Academy of Management Review, 32(4), 1155-1179. https://doi.org/10.5465/AMR.2007.26586086

Farahbod, K., Shayo, C., & Varzandeh, J. (2020). Cybersecurity indices and cybercrime annual loss and economic impacts. Journal of Business and Behavioral Sciences, 32(1), 63-71. http://asbbs.org/files/2020/JBBS_32.1_Spring_2020.pdf#page=63

Gerda, B., & Regina, R. (2022). A vállalkozások és a digitális fejlődés. In Baráth N. & Mezei J. (Eds.), Rendészet – Tudomány – Aktualitások, A rendészettudomány a fiatal kutatók szemével, Konferenciakötet, (pp. 82-97). Doktoranduszok Országos Szövetsége. https://tudasportal.uni-nke.hu/xmlui/bitstream/handle/20.500.12944/18611/RTA%202022.pdf?sequence=1&isAllowed=yGlobalCybersecurityIndex2020.(2021).InternationalTelecommunicationUnion https://www.itu.int/epublications/publication/D-STR-GCI.01-2021-HTM-E?fbclid=IwAR0po3BCP_jjWUxMIOJCNK1Y4WxNAGWkIqbso_grf2zQ_1V2bA3tZssOoW4

Hemant, P., Chawande, N. P., Sonule, A., & Wani, H. (2011). Development of servers in cloud computing to solve issues related to security and backup. In 2011 IEEE International Conference on Cloud Computing and Intelligence Systems (pp. 158-163). IEEE. https://doi.org/10.1109/CCIS.2011.6045052

International Organization for Standardization. (2020). Information technology – Security techniques – Information security management systems – Requirements. ISO/IEC 27001:2013. ISO. https://www.iso.org/standard/27001

ITU.(2009).Overview of Cyber security. Recommendation ITU-T X.1205. Geneva: International TelecommunicationUnion (ITU). http://www.itu.int/rec/T-RECX.1205-200804-I/en

Kaila, U. (2018). Information security best practices: First steps for Startups and SMEs. Technology Innovation Management Review, 8(11), 32-42. https://doi.org/10.22215/timreview/1198

Khanvilkar, S., & Khokhar, A. (2004). Virtual private networks: an overview with performance evaluation.

IEEE Communications Magazine, 42(10), 146-154. https://doi.org/10.1109/MCOM.2004.1341273

Ključnikov, A., Mura, L., & Sklenár, D. (2019). Information security management in SMEs: factors of success. Entrepreneurship and Sustainability Issues, 6(4), 2081-2094. https://doi.org/10.9770/jesi.2019.6.4(37)

Kravets, V. (2019). Comparative analysis of the cybersecurity indices and their applications. Theoretical and Applied Cybersecurity, 1(1), 97-102. https://doi.org/10.20535/tacs.2664-29132019.1.169090

Lewis, M. (2006). Comparing, Designing, and Deploying VPNs. Cisco Press.

Mackenzie, N., & Knipe, S. (2006). Research dilemmas: Paradigms, methods and methodology. Issues in Educational Research, 16, 193-205. http://www.iier.org.au/iier16/mackenzie.html

Mertens, D. M. (2005). Research methods in education and psychology: Integrating diversity with quantitative and qualitative approaches (2nd ed.). Sage.

Michelberger, P., & Lábodi, Cs. (2012). Vállalati információbiztonság szervezése. In Vállalkozásfejlesztés a XXI. században II. (pp. 241-302)., Óbuda University, Keleti Faculty of Business and Management. https://docplayer.hu/3431306-Vallalati-informaciobiztonsag-szervezese.html

Mirkovic, J., & Reiher, P. (2004). A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Computer Communication Review, 34(2), 39–53. https://doi.org/10.1145/997150.997156

Mullarkey, M. T., & Hevner, A. R. (2018). An elaborated action design research process model. European Journal of Information Systems, 28(1). 6-20. https://doi.org/10.1080/0960085X.2018.1451811

National Cyber Security Index (2023). https://ncsi.ega.ee/indicators/

Naylor, D., Finamore, A., Leontiadis, I., Grunenberger, Y., Mellia, M., Munafò, M., Papagiannaki, K., & Steenk Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies (CoNEXT ‚14) (pp. 133–140). ACM. https://doi.org/10.1145/2674005.2674991

Nehrey, M., Voronenko, I., & Salem, A. B. M. (2022). Cybersecurity Assessment: World and Ukrainian Experience. In 2022 12th International Conference on Advanced Computer Information Technologies (ACIT) (pp. 335-340). IEEE. https://doi.org/10.1109/ACIT54803.2022.9913081

Nemeslaki, A., & Sasvári, P. (2014). Az információbiztonság- tudatosság empirikus vizsgálata a magyar üzleti és közszférában. Infokommunikáció és Jog, 60(4), 169-177. https://infojog.hu/wp-content/uploads/pdf/201460_NemeslakiAndras_SasvariPeter.pdf

Pfeiffer, U. (2022). Eine starke Unternehmenskultur minimiert Cyberrisiken. Digitale Welt, 6, 24–27. https://doi.org/10.1007/s42354-022-0429-x

Porter Felt, A., Barnes, R., King, A., Palmer, C., Bentzel, C., & Tabriz, P. (2017). Measuring HTTPS adoption on the web. In Proceedings of the 26th USENIX Conference on Security Symposium (SEC’17) ( pp. 1323– 1338). ACM. https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-felt.pdf

Ratchford, M., El-Gayar, O., Noteboom, C., & Wang, Y. (2022). BYOD security issues: A systematic literature review. Information Security Journal: A Global Perspective, 31(3), 253–273. https://doi.org/10.1080/19393555.2021.1923873

Romanosky, S., Telang, R., & Acquisti, A. (2011). Do data breach disclosure laws reduce identity theft? Journal of Policy Analysis and Management, 30(2), 256–286. http://www.jstor.org/stable/23018983

Sadok, M., Alter, S., & Bednar, P. (2020). It is not my job: exploring the disconnect between corporate security policies and actual security practices in SMEs. Information and Computer Security, 28(3), 467-483. https://doi.org/10.1108/ICS-01-2019-0010

Schatz, D., Bashroush, R., & Wall, J. (2017). Towards a more representative definition of cyber security. Journal of Digital Forensics, Security and Law, 12(2), 53- 74. https://doi.org/10.15394/jdfsl.2017.1476

Sharma, D. H., Dhote, C. A., & Potey, M. M. (2016). Identity and Access Management as Security-as-a-Service from Clouds. Procedia Computer Science, 79, 170– 174. https://doi.org/10.1016/j.procs.2016.03.117

Simmonds, M. (2017). How businesses can navigate the growing tide of ransomware attacks. Computer Fraud & Security, (3), 9-12. https://doi.org/10.1016/S1361-3723(17)30023-4

Simon, J. (2006). A klaszterelemzés alkalmazási lehetőségei a marketingkutatásban. Statiszikai Szemle, 84(7), 627-650. https://www.ksh.hu/statszemle_archive/2006/2006_07/2006_07_627.pdf

Smartcommerce Consulting, Reacty Digital, Virgo & Enet. (2020). Digiméter [Online]. https://digimeter.hu/

Tanenbaum, A. S., & Wetherall, D. J. (2013). Számítógép-hálózatok. Panem Kiadó. Venkateswaran, R. (2001). Virtual private networks. IEEE Potentials, 20(1), 11-15. https://doi.org/10.1109/45.913204

von Solms, B., & von Solms, R. (2018). Cybersecurity and information security – what goes where? Information and Computer Security, 26(1), 2-9. https://doi.org/10.1108/ICS-04-2017-0025

Yildirim, M., & Mackie, I. (2019). Encouraging users to improve password security and memorability. International Journal of Information Security, 18(12), 741-759. https://doi.org/10.1007/s10207-019-00429-y

Downloads

Published

2023-09-15

How to Cite

Mike, N., Krén, E., & Kecskeméti, T. (2023). Wolf-proof brick house? Information security of SMEs in Hungary. Vezetéstudomány Budapest Management Review, 54(9), 44–57. https://doi.org/10.14267/VEZTUD.2023.09.04

Issue

Section

KSZ: DIG-KKV