
ACKNOWLEDGEMENTS
This work is co-funded by the European Union
through INTERREG VI-A Germany/Bavaria–Austria
2021–2027 – INTERREG VI-A Bayern-
¨
Osterreich
2021–2027, as part of the Project “CySeReS-KMU:
Cyber Security and Resilience in Supply Chains with
focus on SMEs” (project number BA0100016).
REFERENCES
Ahmed, F., Burney, A., and Malik, A. (2020). Security as-
pects of virtualization and its impact on business in-
formation security. In 2020 International Conference
on Information Science and Communication Technol-
ogy (ICISCT), pages 1–9. IEEE.
Aigbefo, Q. A., Blount, Y., and Marrone, M. (2022).
The influence of hardiness and habit on security be-
haviour intention. Behaviour & Information Technol-
ogy, 41(6):1151–1170.
Bisma, R., Winarto, S. R., and Puspita, Y. C. (2021). In-
vestigating cyber security factors influencing the per-
ception behavioral intention of small and medium en-
terprise. In 2021 Fourth International Conference
on Vocational Education and Electrical Engineering
(ICVEE), pages 1–7. IEEE.
Center for Internet Security (2021). Cis critical security
controls v8.
Chaudhary, S., Gkioulos, V., and Goodman, D. (2022). cy-
bersecurity awareness for small and medium-sized en-
terprises (smes): availability and scope of free and
inexpensive awareness resources. In European Sym-
posium on Research in Computer Security, pages 97–
115. Springer.
Chidukwani, A., Zander, S., and Koutsakis, P. (2022). A
survey on the cyber security of small-to-medium busi-
nesses: Challenges, research focus and recommenda-
tions. IEEE Access, 10:85701–85719.
de Bruijn, H. and Janssen, M. (2017). Building cyberse-
curity awareness: The need for evidence-based fram-
ing strategies. Government Information Quarterly,
34(1):1–7.
Durowoju, O., Chan, H. K., and Wang, X. (2020). Investi-
gation of the effect of e-platform information security
breaches: a small and medium enterprise supply chain
perspective. IEEE Transactions on Engineering Man-
agement, 69(6):3694–3709.
European Commission (2020). User guide to the sme defi-
nition.
European Commission (2023a). Cyber resilience act.
European Commission (2023b). Directive on measures for
a high common level of cybersecurity across the union
(nis2 directive).
European Union Agency for Cybersecurity, ENISA (2023).
Enisa threat landscape 2023.
Georgsen, R. and Køien, G. M. (2022). Serious games with
sysml: Gamifying threat modelling in a small busi-
ness setting. In INCOSE International Symposium,
volume 32, pages 119–132. Wiley Online Library.
Heidenreich, M., Franczyk, B., and Johannsen, A. (2022).
Evaluation study of an it security measurement
method for micro-enterprises. In 2022 International
Conference on Electrical, Computer and Energy Tech-
nologies (ICECET), pages 1–7. IEEE.
Kontio, J., Bragge, J., and Lehtola, L. (2008). The focus
group method as an empirical tool in software engi-
neering. In Guide to advanced empirical software en-
gineering, pages 93–116. Springer.
Lejaka, T. K., Da Veiga, A., and Loock, M. (2019). Cy-
ber security awareness for small, medium and micro
enterprises (smmes) in south africa. In 2019 Confer-
ence on Information Communications Technology and
Society (ICTAS), pages 1–6. IEEE.
Mantas, E., Papadopoulos, D., Fern
´
andez, C., Ortiz, N.,
Compasti
´
e, M., Mart
´
ınez, A. L., P
´
erez, M. G., Kour-
tis, A., Xylouris, G., Mlakar, I., et al. (2021). Practi-
cal autonomous cyberhealth for resilient micro, small
and medium-sized enterprises. In 2021 IEEE Interna-
tional Mediterranean Conference on Communications
and Networking (MeditCom), pages 500–505. IEEE.
Markakis, E., Nikoloudakis, Y., Mastorakis, G., Mavro-
moustakis, C. X., Pallis, E., Sideris, A., Zotos, N.,
Antic, J., Cernivec, A., Fejzic, D., et al. (2019). Accel-
eration at the edge for supporting smes security: The
fortika paradigm. IEEE Communications Magazine,
57(2):41–47.
Mayer, P. and Volkamer, M. (2018). Addressing misconcep-
tions about password security effectively. In Proceed-
ings of the 7th Workshop on Socio-Technical Aspects
in Security and Trust, pages 16–27.
Melnyk, S. A., Schoenherr, T., Speier-Pero, C., Peters, C.,
Chang, J. F., and Friday, D. (2022). New challenges
in supply chain management: cybersecurity across the
supply chain. International Journal of Production Re-
search, 60(1):162–183.
National Institute of Standards and Technology, U.S. De-
partment of Commerce (2016). Small business infor-
mation security: The fundamentals – nistir 7621 revi-
sion 1.
Ncubukezi, T., Mwansa, L., and Rocaries, F. (2020). A
review of the current cyber hygiene in small and
medium-sized businesses. In 2020 15th Interna-
tional Conference for Internet Technology and Se-
cured Transactions (ICITST), pages 1–6. IEEE.
Pawar, S. and Palivela, H. (2022). Lcci: A framework
for least cybersecurity controls to be implemented for
small and medium enterprises (smes). International
Journal of Information Management Data Insights,
2(1):100080.
Rae, A. and Patel, A. (2020). Developing a security be-
havioural assessment approach for cyber rating uk
msbs. In 2020 International Conference on Cyber Se-
curity and Protection of Digital Services (Cyber Secu-
rity), pages 1–8. IEEE.
Rodr
´
ıguez-Corzo, J. A., Rojas, A. E., and Mej
´
ıa-Moncayo,
C. (2018a). Methodological model based on gophish
to face phishing vulnerabilities in sme. In 2018 ICAI
Workshops (ICAIW), pages 1–6. IEEE.
ICEIS 2025 - 27th International Conference on Enterprise Information Systems
262