References
- Antunes, M., Maximiano, M., Gomes, R., & Pinto, D. (2021). Information security and cybersecurity management: A case study with SMEs in Portugal. Journal of Cybersecurity and Privacy, 1(2), 219–238.
https://doi.org/10.3390/jcp1020012 - Aria, M., & Cuccurullo, C. (2017). bibliometrix: An R-tool for comprehensive science mapping analysis. Journal of Informetrics, 11(4), 959–975.
https://doi.org/10.1016/j.joi.2017.08.007 - Bada, M., & Nurse, J. R. C. (2019). Developing cybersecurity education and awareness programmes for small- and medium-sized enterprises (SMEs). Information & Computer Security, 27(3), 393–410.
https://doi.org/10.1108/ICS-07-2018-0080 - Carías, J. F., Arrizabalaga, S., Labaka, L., & Hernantes, J. (2020). Cyber resilience progression model. Applied Sciences, 10(21), 7393.
https://doi.org/10.3390/app10217393 - Carrapico, H., & Barrinha, A. (2017). The EU as a coherent (cyber)security actor? JCMS: Journal of Common Market Studies, 55(6), 1254–1272.
https://doi.org/10.1111/jcms.12575 - European Union Agency for Cybersecurity. (2025, May 8). Cybersecurity for SMEs – Challenges and recommendations.
https://www.enisa.europa.eu/publications/enisa-report-cybersecurity-for-smes - Gupta, J.; Barzotto, M.; Khorasgani, A. Does Size Matter in Predicting SMEs Failure? Int. J. Fin. Econ. 2018, 23, 571–605.
https://doi.org/10.1002/ijfe.1638 - Heidt, M., Gerlach, J. P., & Buxmann, P. (2019). Investigating the security gap between SMEs and large companies: How SME characteristics influence organizational IT security investments. Information Systems Frontiers, 21(6), 1285–1305.
https://doi.org/10.1007/s10796-019-09959-1 - Kabanda, S., Tanner, M., & Kent, C. (2018). Exploring SME cybersecurity practices in developing countries. Journal of Organizational Computing and Electronic Commerce, 28(3), 269–282.
https://doi.org/10.1080/10919392.2018.1484598 - Kljucnikov, A., Mura, L., & Sklenár, D. (2019). Information security management in SMEs: Factors of success. Entrepreneurship and Sustainability Issues, 6(4), 2081–2094.
https://doi.org/10.9770/jesi.2019.6.4(37) - Linnenluecke, M. K., Marrone, M., & Singh, A. K. (2019). Conducting systematic literature reviews and bibliometric analyses. Australian Journal of Management.
https://doi.org/10.1177/0312896219877678 - Löffler, E., Schneider, B., Zanwar, T., & Asprion, P. M. (2021). CySecEscape 2.0—A virtual escape room to raise cybersecurity awareness. International Journal of Serious Games, 8(1), 59–70.
https://doi.org/10.17083/ijsg.v8i1.413 - Markopoulou, D., Papakonstantinou, V., & de Hert, P. (2019). The new EU cybersecurity framework: The NIS Directive, ENISA's role and the General Data Protection Regulation. Computer Law & Security Review, 35(6), 105336.
https://doi.org/10.1016/j.clsr.2019.06.007 - Passas, I. (2024). Bibliometric analysis: The main steps. Encyclopedia, 4(2), 1014–1025.
https://doi.org/10.3390/encyclopedia4020065 - Ponemon Institute. The 2023 Global Study on Closing the IT Security Gap: Addressing Cybersecurity Gaps from Edge to Cloud; Ponemon Institute: North Traverse City, MI, USA, 2023.
- Tamvada, J. P., Narula, S., Audretsch, D., Puppala, H., & Kumar, A. (2022). Adopting new technology is a distant dream? The risks of implementing Industry 4.0 in emerging economy SMEs. Technological Forecasting and Social Change, 185, 122088.
https://doi.org/10.1016/j.techfore.2022.122088 - Uchendu, B., Nurse, J. R. C., Bada, M., & Furnell, S. (2021). Developing a cyber security culture: Current practices and future needs. Computers & Security, 109, 102387.
https://doi.org/10.1016/j.cose.2021.102387 - Westerlund, M. (2020). Digitalization, internationalization and scaling of online SMEs. Technology Innovation Management Review, 10(4), 48–57.
https://doi.org/10.22215/timreview/1346