when working systems are modified (even if this is
to add security fixes). Experts who encourage secure
practices need to make a better effort at understanding
the developers’ issues for their message to be heard.
5 CONCLUSIONS
Organizations like chambers of commerce are mak-
ing great efforts to inform SMOs about cyber-risks
though inefficiencies remain. Among the lessons
learned in this study:
• Targeted awareness programs are worth inves-
tigating. An awareness program might target
bankers who give loans to companies and seek
to convince these bankers to ask for cybersecurity
guarantees as part of client due diligence.
• There is still a lot of geek speak and a tendency to
target IT to the detriment of others such as HR.
• Providers generally take little of the client risk,
and distrust of IT solution providers hampers
security efforts.
• A help-line service for organizations and ensur-
ing a coherent security message is transmitted to
organizations would be very useful.
• The greatest challenge to develop a business
model for companies creating solutions for
SMOs. Solution providers find it difficult to gen-
erate revenue from working with SMOs. While it
is critical to help SMOs, there is little economic
incentive to do so.
ACKNOWLEDGEMENTS
The author is very grateful to the Hasler Foundation
for funding this research.
REFERENCES
Free social engineering playing cards. https://www.nixu.
com/blog/free-social-engineering-playing-cards. Ac-
cessed: 2010-09-30.
Alahmari, A. and Duncan, B. (2020). Cybersecurity risk
management in small and medium-sized enterprises:
A systematic review of recent evidence. In 2020 inter-
national conference on cyber situational awareness,
data analytics and assessment (CyberSA), pages 1–5.
IEEE.
Atmani, M. and Flaurand, V. (2021). La
cyber-s
´
ecurit
´
e : d
´
efi du management des
risques. PME Magazine 15, PME Magazine.
https://www.pme.ch/strategie/2021/11/30/la-
cybersecurite-defi-du-management-des-risques.
G
¨
oschlberger, B. and Bruck, P. A. (2017). Gamification
in mobile and workplace integrated microlearning. In
Proceedings of the 19th International Conference on
Information Integration and Web-based Applications
& Services, iiWAS 2017, Salzburg, Austria, December
4-6, 2017, pages 545–552.
Guest, G., Bunce, A., and Johnson, L. (2006). How many
interviews are enough? an experiment with data satu-
ration and variability. Field methods, 18(1):59–82.
Huaman, N., von Skarczinski, B., Stransky, C., Wermke,
D., Acar, Y., Dreißigacker, A., and Fahl, S. (2021).
A large-scale interview study on information security
in and attacks against small and medium-sized enter-
prises. In Bailey, M. and Greenstadt, R., editors, 30th
USENIX Security Symposium, USENIX Security 2021,
August 11-13, 2021, pages 1235–1252. USENIX As-
sociation.
Kinsman, L., Rotter, T., James, E., Snow, P., and Willis, J.
(2010). Wishful thinking and IT threat avoidance: An
extension to the technology threat avoidance theory.
BMC Medicine, 8(31):552–567.
Kuderli, U. and Neher, L. (2020). Cybersecurity risks – a
matter for the board. PWC Spotlight 15, Price Water
House. https://www.weforum.org/reports/the-global-
risks-report-2020.
Nutbeam, D. (1998). Health promotion glossary. Health
Promotion International, 13(4):349–364.
Ponsard, C., Grandclaudon, J., and Bal, S. (2019). Survey
and lessons learned on raising sme awareness about
cybersecurity. ICISSP, pages 558–563.
Prochaska, J. and DiClemente, O. (2005). The transtheo-
retical approach. J. C. Norcross & M. R. Goldfried
(Eds.), Oxford series in clinical psychology. Hand-
book of psychotherapy integration (p. 147–171). Ox-
ford University Press.
Pugnetti, C. and Casi
´
an, C. (2021). Cyber risks
and swiss smes: an investigation of em-
ployee attitudes and behavioral vulnerabilities.
https://digitalcollection.zhaw.ch/handle/11475/21478.
Team, C. (2021). The urgent need to strengthen the cyber
readiness of small and medium-sized businesses.
https://cyberreadinessinstitute.org/the-urgent-need-
to-strengthen-the-cyber-readiness-of-small-and-
medium-sized-businesses-a-global-perspective.
Tuladhar, A., Lende, D., Ligatti, J., and Ou, X. (2021). An
analysis of the role of situated learning in starting a
security culture in a software company. In Chiasson,
S., editor, Seventeenth Symposium on Usable Privacy
and Security, SOUPS 2021, August 8-10, 2021, pages
617–632. USENIX Association.
Weir, C., Blair, L., Becker, I., Sasse, M. A., and Noble,
J. (2018). Light-touch interventions to improve soft-
ware development security. In 2018 IEEE Cyberse-
curity Development, SecDev 2018, Cambridge, MA,
USA, September 30 - October 2, 2018, pages 85–93.
IEEE Computer Society.
Zec, M. (2015). Cyber security measures in SME’s: a
study of it professionals’ organizational cyber security
awareness. Linnaeus University, Kalmar. Zugriff unter
http://www. divaportal. org/smash/get/diva2, 849211.
ICISSP 2023 - 9th International Conference on Information Systems Security and Privacy
388