Information Security Threats and Practices in Small Businesses

@article{Keller2005InformationST,
  title={Information Security Threats and Practices in Small Businesses},
  author={Shannon Keller and Anne Powell and Ben Horstmann and Chad Predmore and Matt Crawford},
  journal={IS Management},
  year={2005},
  volume={22},
  pages={7-19}
}
Information Security Threats and Practices in Small Businesses Shannon Keller b , Anne Powell a , Ben Horstmann c , Chad Predmore d & Matt Crawford e a Principal contact, is an assistant professor in the School of Business at Southern Illinois University, Edwardsville. She can be reached at apowell@siue.edu. b Currently a student at Southern Illinois University, Edwardsville. Previously, she was a network analyst for Monsanto Corporation. c A network coordinator d Technology Coordinator for the… CONTINUE READING
Highly Cited
This paper has 38 citations. REVIEW CITATIONS
21 Citations
28 References
Similar Papers

Citations

Publications citing this paper.
Showing 1-10 of 21 extracted citations

References

Publications referenced by this paper.
Showing 1-10 of 28 references

2004 CSI/FBI Computer Crime and Security Survey,

  • Gordon, A Lawrence, Martin P. Loeb, William Lucyshyn, Robert Richardson
  • Computer Security Institute 2004. Accessed
  • 2004
Highly Influential
7 Excerpts

2004 Global Information Security Survey,

  • Ernst, Young
  • September 2004. Accessed
  • 2004
2 Excerpts

All-Out Blitz against Web App Attacks,

  • Desmond, Paul
  • Network World Fusion,
  • 2004

Auditing E-Business: New Challenges for External Auditors,

  • Abu-Musa, Ahmad
  • Journal of American Academy of Business,
  • 2004

Crime Fighters Cast Wide Net,

  • Piazza, Peter
  • Security Management,
  • 2004

Cyber Security,

  • Colias, Mike
  • Hospitals and Health Networks,
  • 2004

Eradicating Spyware in the Enterprise,

  • Schwartz, Mathew
  • Enterprise Systems,
  • 2004

In Defense of the Realm: Understanding the Threats to Information Security,

  • Whitman, E Michael
  • International Journal of Information Management,
  • 2004

Similar Papers

Loading similar papers…