ACKNOWLEDGEMENTS
This work has been conducted as part of the Cy-
berKit4SME project, which is funded by the Euro-
pean Union’s Horizon 2020 Research and Innovation
Programme under Grant Agreement No. 883188.
REFERENCES
Bada, M., Sasse, A. M., and Nurse, J. R. (2019). Cyber
security awareness campaigns: Why do they fail to
change behaviour? arXiv preprint arXiv:1901.02672.
DCMS, Ipsos MORI (2021). Cyber Security Breaches Sur-
vey 2021. https://shorturl.at/chRST. Online, accessed:
2022-09-29.
ENISA (2021). Cybersecurity for SMEs: Challenges
and Recommendations. https://www.enisa.europa.
eu/publications/enisa-report-cybersecurity-for-smes.
Online, accessed: 2022-12-16.
Erdogan, G., Hugo,
˚
A.,
´
Alvarez Romero, A., Varano,
D., Zazzeri, N., and
ˇ
Zitnik, A. (2020). An ap-
proach to train and evaluate the cybersecurity skills
of participants in cyber ranges based on cyber-risk
models. In Proc. 15th International Conference on
Software Technologies (ICSOFT’20), pages 509–520.
SCITEPRESS.
Erdogan, G.,
´
Alvarez Romero, A., Zazzeri, N.,
ˇ
Zitnik, A.,
Basile, M., Aprile, G., Os
´
orio, M., Pani, C., and
Kechaoglou, I. (2021). Developing cyber-risk cen-
tric courses and training material for cyber ranges: A
systematic approach. In Proc. 7th International Con-
ference on Information Systems Security and Privacy
(ICISSP’21), pages 702–713. SCITEPRESS.
European Commission (2016). User guide to the sme defi-
nition.
Gafni, R. and Pavel, T. (2019). The invisible hole of in-
formation on smb’s cybersecurity. Online Journal of
Applied Knowledge Management (OJAKM), 7(1):14–
26.
Heidt, M., Gerlach, J. P., and Buxmann, P. (2019). In-
vestigating the security divide between sme and large
companies: How sme characteristics influence organi-
zational it security investments. Information Systems
Frontiers, 21(6):1285–1305.
Hoppe, F., Gatzert, N., and Gruner, P. (2021). Cyber risk
management in smes: insights from industry surveys.
The Journal of Risk Finance.
Khan, M. I., Tanwar, S., and Rana, A. (2020). The need
for information security management for smes. In
2020 9th International Conference System Modeling
and Advancement in Research Trends (SMART), pages
328–332. IEEE.
Lewis, R., Louvieris, P., Abbott, P., Clewley, N., and Jones,
K. (2014). Cybersecurity information sharing: a
framework for information security management in uk
sme supply chains. In Proceedings of the European
Conference on Information Systems (ECIS) 2014, Tel
Aviv, Israel, pages 1–15.
Ncubukezi, T., Mwansa, L., and Rocaries, F. (2020). A
review of the current cyber hygiene in small and
medium-sized businesses. In Proc. 15th Interna-
tional Conference for Internet Technology and Se-
cured Transactions (ICITST’20), pages 1–6. IEEE.
Paek, H.-J. and Hove, T. (2017). Risk perceptions and risk
characteristics. In Oxford research encyclopedia of
communication. Oxford University Press.
Pugnetti, C. and Casi
´
an, C. (2021). Cyber risks and swiss
smes: an investigation of employee attitudes and be-
havioral vulnerabilities.
Raineri, E. M. and Resig, J. (2020). Evaluating self-efficacy
pertaining to cybersecurity for small businesses. Jour-
nal of Applied Business & Economics, 22(12).
Roy, Mekhala (2021). Cybersecurity tops list of SMB pri-
orities as attacks continue. https://shorturl.at/efkn4.
Online, accessed: 2022-09-29.
Saleem, J., Adebisi, B., Ande, R., and Hammoudeh, M.
(2017). A state of the art survey - impact of cyber
attacks on sme’s. In Proceedings of the International
Conference on Future Networks and Distributed Sys-
tems (ICFNDS’17). Association for Computing Ma-
chinery.
Senarathna, I., Yeoh, W., Warren, M., and Salzman, S.
(2016). Security and privacy concerns for australian
smes cloud adoption: Empirical study of metropolitan
vs regional smes. Australasian Journal of Information
Systems, 20.
Sheeran, P. and Webb, T. L. (2016). The intention–behavior
gap. Social and Personality Psychology Compass,
10(9):503–518.
Smerecnik, C. M., Mesters, I., Candel, M. J., De Vries, H.,
and De Vries, N. K. (2012). Risk perception and infor-
mation processing: The development and validation
of a questionnaire to assess self-reported information
processing. Risk Analysis: An International Journal,
32(1):54–66.
Vakakis, N., Nikolis, O., Ioannidis, D., Votis, K., and Tzo-
varas, D. (2019). Cybersecurity in smes: The smart-
home/office use case. In 2019 IEEE 24th Interna-
tional Workshop on Computer Aided Modeling and
Design of Communication Links and Networks (CA-
MAD), pages 1–7. IEEE.
Von Solms, R. and Van Niekerk, J. (2013). From informa-
tion security to cyber security. computers & security,
38:97–102.
Wilson, M., McDonald, S., Button, D., and McGarry, K.
(2022). It won’t happen to me: Surveying sme atti-
tudes to cyber-security. Journal of Computer Infor-
mation Systems, pages 1–13.
Witte, K. and Allen, M. (2000). A meta-analysis of fear
appeals: Implications for effective public health cam-
paigns. Health education & behavior, 27(5):591–615.
Yamin, M. M., Katt, B., and Gkioulos, V. (2020). Cy-
ber ranges and security testbeds: Scenarios, func-
tions, tools and architecture. Computers & Security,
88:101636.
ICISSP 2023 - 9th International Conference on Information Systems Security and Privacy
304