Tightroping between APT and BCI in small enterprises
Purpose The contemporary internet provisions increasingly sophisticated security attacks. Besides underlining the advanced nature of these attacks, the concept of an advanced persistent threat (APT) catalyzes the important perspective of longitudinal persistence; attacks are not only carefully plann...
Ausführliche Beschreibung
Autor*in: |
Jesse Kaukola [verfasserIn] |
---|
Format: |
Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2017 |
---|
Schlagwörter: |
---|
Übergeordnetes Werk: |
Enthalten in: Information management & computer security - Bingley : Emerald Group Publ., 1993, 25(2017), 3, Seite 226 |
---|---|
Übergeordnetes Werk: |
volume:25 ; year:2017 ; number:3 ; pages:226 |
Links: |
---|
Katalog-ID: |
OLC1996284711 |
---|
LEADER | 01000caa a2200265 4500 | ||
---|---|---|---|
001 | OLC1996284711 | ||
003 | DE-627 | ||
005 | 20230715065157.0 | ||
007 | tu | ||
008 | 170901s2017 xx ||||| 00| ||eng c | ||
028 | 5 | 2 | |a PQ20170901 |
035 | |a (DE-627)OLC1996284711 | ||
035 | |a (DE-599)GBVOLC1996284711 | ||
035 | |a (PRQ)p570-bade3c2e3f493003ff524354846356f12325986257f5c417c90250da3aa48dee0 | ||
035 | |a (KEY)0184127020170000025000300226tightropingbetweenaptandbciinsmallenterprises | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
082 | 0 | 4 | |a 330 |a 070 |a 004 |q DNB |
100 | 0 | |a Jesse Kaukola |e verfasserin |4 aut | |
245 | 1 | 0 | |a Tightroping between APT and BCI in small enterprises |
264 | 1 | |c 2017 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
338 | |a Band |b nc |2 rdacarrier | ||
520 | |a Purpose The contemporary internet provisions increasingly sophisticated security attacks. Besides underlining the advanced nature of these attacks, the concept of an advanced persistent threat (APT) catalyzes the important perspective of longitudinal persistence; attacks are not only carefully planned and targeted but the subsequent exploitation period covers long periods of time. If an APT successfully realizes into such exploitation, information assets may be continuously monitored for harvesting business-critical information (BCI). These threats are relevant for the security of small enterprises, and this study aims to examine the qualitative factors that shape the security mindsets among these. Design/methodology/approach The data are collected with semi-structured interviews of six enterprises in a small regional market segment. The analysis is based on a fourfold taxonomy that delivers three mindset profiles, while particular emphasis is placed on the subjective security notions that shape the typical strategizing among enterprises. Findings APT is poorly understood among the observed segment, which tends to often also explicitly downplay the strategic relevance of the concept, but a more pressing challenge relates to the observation that business data is often perceived to have no value. The delivered results can be used to improve the situation. Originality/value This study is among the firsts to explore perceptions of small enterprises toward APT and BCI. The results reveal problematic mindsets and offers new avenues for practitioners as well as academics to study and improve the situation. | ||
650 | 4 | |a Entrepreneurship | |
650 | 4 | |a Regional analysis | |
650 | 4 | |a Chief executive officers | |
650 | 4 | |a Enterprise resource planning | |
650 | 4 | |a Small business | |
650 | 4 | |a Information technology | |
650 | 4 | |a Cloud computing | |
650 | 4 | |a Knowledge management | |
650 | 4 | |a Computer information security | |
650 | 4 | |a Small & medium sized enterprises-SME | |
650 | 4 | |a Taxonomy | |
650 | 4 | |a Software services | |
650 | 4 | |a Interviews | |
650 | 4 | |a Exploitation | |
650 | 4 | |a Information systems | |
650 | 4 | |a Computer forensics | |
700 | 0 | |a Jukka Ruohonen |4 oth | |
700 | 0 | |a Antti Tuomisto |4 oth | |
700 | 0 | |a Sami Hyrynsalmi |4 oth | |
700 | 0 | |a Ville Leppänen |4 oth | |
773 | 0 | 8 | |i Enthalten in |t Information management & computer security |d Bingley : Emerald Group Publ., 1993 |g 25(2017), 3, Seite 226 |w (DE-627)165670517 |w (DE-600)1154143-X |w (DE-576)429292163 |x 0968-5227 |7 nnns |
773 | 1 | 8 | |g volume:25 |g year:2017 |g number:3 |g pages:226 |
856 | 4 | 2 | |u https://search.proquest.com/docview/1925758330 |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_OLC | ||
912 | |a SSG-OLC-BUB | ||
912 | |a SSG-OPC-BBI | ||
951 | |a AR | ||
952 | |d 25 |j 2017 |e 3 |h 226 |
author_variant |
j k jk |
---|---|
matchkey_str |
article:09685227:2017----::ihrpnbtenpadcisa |
hierarchy_sort_str |
2017 |
publishDate |
2017 |
allfields |
PQ20170901 (DE-627)OLC1996284711 (DE-599)GBVOLC1996284711 (PRQ)p570-bade3c2e3f493003ff524354846356f12325986257f5c417c90250da3aa48dee0 (KEY)0184127020170000025000300226tightropingbetweenaptandbciinsmallenterprises DE-627 ger DE-627 rakwb eng 330 070 004 DNB Jesse Kaukola verfasserin aut Tightroping between APT and BCI in small enterprises 2017 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Purpose The contemporary internet provisions increasingly sophisticated security attacks. Besides underlining the advanced nature of these attacks, the concept of an advanced persistent threat (APT) catalyzes the important perspective of longitudinal persistence; attacks are not only carefully planned and targeted but the subsequent exploitation period covers long periods of time. If an APT successfully realizes into such exploitation, information assets may be continuously monitored for harvesting business-critical information (BCI). These threats are relevant for the security of small enterprises, and this study aims to examine the qualitative factors that shape the security mindsets among these. Design/methodology/approach The data are collected with semi-structured interviews of six enterprises in a small regional market segment. The analysis is based on a fourfold taxonomy that delivers three mindset profiles, while particular emphasis is placed on the subjective security notions that shape the typical strategizing among enterprises. Findings APT is poorly understood among the observed segment, which tends to often also explicitly downplay the strategic relevance of the concept, but a more pressing challenge relates to the observation that business data is often perceived to have no value. The delivered results can be used to improve the situation. Originality/value This study is among the firsts to explore perceptions of small enterprises toward APT and BCI. The results reveal problematic mindsets and offers new avenues for practitioners as well as academics to study and improve the situation. Entrepreneurship Regional analysis Chief executive officers Enterprise resource planning Small business Information technology Cloud computing Knowledge management Computer information security Small & medium sized enterprises-SME Taxonomy Software services Interviews Exploitation Information systems Computer forensics Jukka Ruohonen oth Antti Tuomisto oth Sami Hyrynsalmi oth Ville Leppänen oth Enthalten in Information management & computer security Bingley : Emerald Group Publ., 1993 25(2017), 3, Seite 226 (DE-627)165670517 (DE-600)1154143-X (DE-576)429292163 0968-5227 nnns volume:25 year:2017 number:3 pages:226 https://search.proquest.com/docview/1925758330 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-BUB SSG-OPC-BBI AR 25 2017 3 226 |
spelling |
PQ20170901 (DE-627)OLC1996284711 (DE-599)GBVOLC1996284711 (PRQ)p570-bade3c2e3f493003ff524354846356f12325986257f5c417c90250da3aa48dee0 (KEY)0184127020170000025000300226tightropingbetweenaptandbciinsmallenterprises DE-627 ger DE-627 rakwb eng 330 070 004 DNB Jesse Kaukola verfasserin aut Tightroping between APT and BCI in small enterprises 2017 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Purpose The contemporary internet provisions increasingly sophisticated security attacks. Besides underlining the advanced nature of these attacks, the concept of an advanced persistent threat (APT) catalyzes the important perspective of longitudinal persistence; attacks are not only carefully planned and targeted but the subsequent exploitation period covers long periods of time. If an APT successfully realizes into such exploitation, information assets may be continuously monitored for harvesting business-critical information (BCI). These threats are relevant for the security of small enterprises, and this study aims to examine the qualitative factors that shape the security mindsets among these. Design/methodology/approach The data are collected with semi-structured interviews of six enterprises in a small regional market segment. The analysis is based on a fourfold taxonomy that delivers three mindset profiles, while particular emphasis is placed on the subjective security notions that shape the typical strategizing among enterprises. Findings APT is poorly understood among the observed segment, which tends to often also explicitly downplay the strategic relevance of the concept, but a more pressing challenge relates to the observation that business data is often perceived to have no value. The delivered results can be used to improve the situation. Originality/value This study is among the firsts to explore perceptions of small enterprises toward APT and BCI. The results reveal problematic mindsets and offers new avenues for practitioners as well as academics to study and improve the situation. Entrepreneurship Regional analysis Chief executive officers Enterprise resource planning Small business Information technology Cloud computing Knowledge management Computer information security Small & medium sized enterprises-SME Taxonomy Software services Interviews Exploitation Information systems Computer forensics Jukka Ruohonen oth Antti Tuomisto oth Sami Hyrynsalmi oth Ville Leppänen oth Enthalten in Information management & computer security Bingley : Emerald Group Publ., 1993 25(2017), 3, Seite 226 (DE-627)165670517 (DE-600)1154143-X (DE-576)429292163 0968-5227 nnns volume:25 year:2017 number:3 pages:226 https://search.proquest.com/docview/1925758330 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-BUB SSG-OPC-BBI AR 25 2017 3 226 |
allfields_unstemmed |
PQ20170901 (DE-627)OLC1996284711 (DE-599)GBVOLC1996284711 (PRQ)p570-bade3c2e3f493003ff524354846356f12325986257f5c417c90250da3aa48dee0 (KEY)0184127020170000025000300226tightropingbetweenaptandbciinsmallenterprises DE-627 ger DE-627 rakwb eng 330 070 004 DNB Jesse Kaukola verfasserin aut Tightroping between APT and BCI in small enterprises 2017 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Purpose The contemporary internet provisions increasingly sophisticated security attacks. Besides underlining the advanced nature of these attacks, the concept of an advanced persistent threat (APT) catalyzes the important perspective of longitudinal persistence; attacks are not only carefully planned and targeted but the subsequent exploitation period covers long periods of time. If an APT successfully realizes into such exploitation, information assets may be continuously monitored for harvesting business-critical information (BCI). These threats are relevant for the security of small enterprises, and this study aims to examine the qualitative factors that shape the security mindsets among these. Design/methodology/approach The data are collected with semi-structured interviews of six enterprises in a small regional market segment. The analysis is based on a fourfold taxonomy that delivers three mindset profiles, while particular emphasis is placed on the subjective security notions that shape the typical strategizing among enterprises. Findings APT is poorly understood among the observed segment, which tends to often also explicitly downplay the strategic relevance of the concept, but a more pressing challenge relates to the observation that business data is often perceived to have no value. The delivered results can be used to improve the situation. Originality/value This study is among the firsts to explore perceptions of small enterprises toward APT and BCI. The results reveal problematic mindsets and offers new avenues for practitioners as well as academics to study and improve the situation. Entrepreneurship Regional analysis Chief executive officers Enterprise resource planning Small business Information technology Cloud computing Knowledge management Computer information security Small & medium sized enterprises-SME Taxonomy Software services Interviews Exploitation Information systems Computer forensics Jukka Ruohonen oth Antti Tuomisto oth Sami Hyrynsalmi oth Ville Leppänen oth Enthalten in Information management & computer security Bingley : Emerald Group Publ., 1993 25(2017), 3, Seite 226 (DE-627)165670517 (DE-600)1154143-X (DE-576)429292163 0968-5227 nnns volume:25 year:2017 number:3 pages:226 https://search.proquest.com/docview/1925758330 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-BUB SSG-OPC-BBI AR 25 2017 3 226 |
allfieldsGer |
PQ20170901 (DE-627)OLC1996284711 (DE-599)GBVOLC1996284711 (PRQ)p570-bade3c2e3f493003ff524354846356f12325986257f5c417c90250da3aa48dee0 (KEY)0184127020170000025000300226tightropingbetweenaptandbciinsmallenterprises DE-627 ger DE-627 rakwb eng 330 070 004 DNB Jesse Kaukola verfasserin aut Tightroping between APT and BCI in small enterprises 2017 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Purpose The contemporary internet provisions increasingly sophisticated security attacks. Besides underlining the advanced nature of these attacks, the concept of an advanced persistent threat (APT) catalyzes the important perspective of longitudinal persistence; attacks are not only carefully planned and targeted but the subsequent exploitation period covers long periods of time. If an APT successfully realizes into such exploitation, information assets may be continuously monitored for harvesting business-critical information (BCI). These threats are relevant for the security of small enterprises, and this study aims to examine the qualitative factors that shape the security mindsets among these. Design/methodology/approach The data are collected with semi-structured interviews of six enterprises in a small regional market segment. The analysis is based on a fourfold taxonomy that delivers three mindset profiles, while particular emphasis is placed on the subjective security notions that shape the typical strategizing among enterprises. Findings APT is poorly understood among the observed segment, which tends to often also explicitly downplay the strategic relevance of the concept, but a more pressing challenge relates to the observation that business data is often perceived to have no value. The delivered results can be used to improve the situation. Originality/value This study is among the firsts to explore perceptions of small enterprises toward APT and BCI. The results reveal problematic mindsets and offers new avenues for practitioners as well as academics to study and improve the situation. Entrepreneurship Regional analysis Chief executive officers Enterprise resource planning Small business Information technology Cloud computing Knowledge management Computer information security Small & medium sized enterprises-SME Taxonomy Software services Interviews Exploitation Information systems Computer forensics Jukka Ruohonen oth Antti Tuomisto oth Sami Hyrynsalmi oth Ville Leppänen oth Enthalten in Information management & computer security Bingley : Emerald Group Publ., 1993 25(2017), 3, Seite 226 (DE-627)165670517 (DE-600)1154143-X (DE-576)429292163 0968-5227 nnns volume:25 year:2017 number:3 pages:226 https://search.proquest.com/docview/1925758330 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-BUB SSG-OPC-BBI AR 25 2017 3 226 |
allfieldsSound |
PQ20170901 (DE-627)OLC1996284711 (DE-599)GBVOLC1996284711 (PRQ)p570-bade3c2e3f493003ff524354846356f12325986257f5c417c90250da3aa48dee0 (KEY)0184127020170000025000300226tightropingbetweenaptandbciinsmallenterprises DE-627 ger DE-627 rakwb eng 330 070 004 DNB Jesse Kaukola verfasserin aut Tightroping between APT and BCI in small enterprises 2017 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier Purpose The contemporary internet provisions increasingly sophisticated security attacks. Besides underlining the advanced nature of these attacks, the concept of an advanced persistent threat (APT) catalyzes the important perspective of longitudinal persistence; attacks are not only carefully planned and targeted but the subsequent exploitation period covers long periods of time. If an APT successfully realizes into such exploitation, information assets may be continuously monitored for harvesting business-critical information (BCI). These threats are relevant for the security of small enterprises, and this study aims to examine the qualitative factors that shape the security mindsets among these. Design/methodology/approach The data are collected with semi-structured interviews of six enterprises in a small regional market segment. The analysis is based on a fourfold taxonomy that delivers three mindset profiles, while particular emphasis is placed on the subjective security notions that shape the typical strategizing among enterprises. Findings APT is poorly understood among the observed segment, which tends to often also explicitly downplay the strategic relevance of the concept, but a more pressing challenge relates to the observation that business data is often perceived to have no value. The delivered results can be used to improve the situation. Originality/value This study is among the firsts to explore perceptions of small enterprises toward APT and BCI. The results reveal problematic mindsets and offers new avenues for practitioners as well as academics to study and improve the situation. Entrepreneurship Regional analysis Chief executive officers Enterprise resource planning Small business Information technology Cloud computing Knowledge management Computer information security Small & medium sized enterprises-SME Taxonomy Software services Interviews Exploitation Information systems Computer forensics Jukka Ruohonen oth Antti Tuomisto oth Sami Hyrynsalmi oth Ville Leppänen oth Enthalten in Information management & computer security Bingley : Emerald Group Publ., 1993 25(2017), 3, Seite 226 (DE-627)165670517 (DE-600)1154143-X (DE-576)429292163 0968-5227 nnns volume:25 year:2017 number:3 pages:226 https://search.proquest.com/docview/1925758330 GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-BUB SSG-OPC-BBI AR 25 2017 3 226 |
language |
English |
source |
Enthalten in Information management & computer security 25(2017), 3, Seite 226 volume:25 year:2017 number:3 pages:226 |
sourceStr |
Enthalten in Information management & computer security 25(2017), 3, Seite 226 volume:25 year:2017 number:3 pages:226 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
Entrepreneurship Regional analysis Chief executive officers Enterprise resource planning Small business Information technology Cloud computing Knowledge management Computer information security Small & medium sized enterprises-SME Taxonomy Software services Interviews Exploitation Information systems Computer forensics |
dewey-raw |
330 |
isfreeaccess_bool |
false |
container_title |
Information management & computer security |
authorswithroles_txt_mv |
Jesse Kaukola @@aut@@ Jukka Ruohonen @@oth@@ Antti Tuomisto @@oth@@ Sami Hyrynsalmi @@oth@@ Ville Leppänen @@oth@@ |
publishDateDaySort_date |
2017-01-01T00:00:00Z |
hierarchy_top_id |
165670517 |
dewey-sort |
3330 |
id |
OLC1996284711 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a2200265 4500</leader><controlfield tag="001">OLC1996284711</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230715065157.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">170901s2017 xx ||||| 00| ||eng c</controlfield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">PQ20170901</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC1996284711</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBVOLC1996284711</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PRQ)p570-bade3c2e3f493003ff524354846356f12325986257f5c417c90250da3aa48dee0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(KEY)0184127020170000025000300226tightropingbetweenaptandbciinsmallenterprises</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">330</subfield><subfield code="a">070</subfield><subfield code="a">004</subfield><subfield code="q">DNB</subfield></datafield><datafield tag="100" ind1="0" ind2=" "><subfield code="a">Jesse Kaukola</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Tightroping between APT and BCI in small enterprises</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2017</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Purpose The contemporary internet provisions increasingly sophisticated security attacks. Besides underlining the advanced nature of these attacks, the concept of an advanced persistent threat (APT) catalyzes the important perspective of longitudinal persistence; attacks are not only carefully planned and targeted but the subsequent exploitation period covers long periods of time. If an APT successfully realizes into such exploitation, information assets may be continuously monitored for harvesting business-critical information (BCI). These threats are relevant for the security of small enterprises, and this study aims to examine the qualitative factors that shape the security mindsets among these. Design/methodology/approach The data are collected with semi-structured interviews of six enterprises in a small regional market segment. The analysis is based on a fourfold taxonomy that delivers three mindset profiles, while particular emphasis is placed on the subjective security notions that shape the typical strategizing among enterprises. Findings APT is poorly understood among the observed segment, which tends to often also explicitly downplay the strategic relevance of the concept, but a more pressing challenge relates to the observation that business data is often perceived to have no value. The delivered results can be used to improve the situation. Originality/value This study is among the firsts to explore perceptions of small enterprises toward APT and BCI. The results reveal problematic mindsets and offers new avenues for practitioners as well as academics to study and improve the situation.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Entrepreneurship</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Regional analysis</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Chief executive officers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Enterprise resource planning</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Small business</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud computing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Knowledge management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer information security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Small & medium sized enterprises-SME</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Taxonomy</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software services</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Interviews</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Exploitation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer forensics</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Jukka Ruohonen</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Antti Tuomisto</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Sami Hyrynsalmi</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Ville Leppänen</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Information management & computer security</subfield><subfield code="d">Bingley : Emerald Group Publ., 1993</subfield><subfield code="g">25(2017), 3, Seite 226</subfield><subfield code="w">(DE-627)165670517</subfield><subfield code="w">(DE-600)1154143-X</subfield><subfield code="w">(DE-576)429292163</subfield><subfield code="x">0968-5227</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:25</subfield><subfield code="g">year:2017</subfield><subfield code="g">number:3</subfield><subfield code="g">pages:226</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">https://search.proquest.com/docview/1925758330</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-BUB</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OPC-BBI</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">25</subfield><subfield code="j">2017</subfield><subfield code="e">3</subfield><subfield code="h">226</subfield></datafield></record></collection>
|
author |
Jesse Kaukola |
spellingShingle |
Jesse Kaukola ddc 330 misc Entrepreneurship misc Regional analysis misc Chief executive officers misc Enterprise resource planning misc Small business misc Information technology misc Cloud computing misc Knowledge management misc Computer information security misc Small & medium sized enterprises-SME misc Taxonomy misc Software services misc Interviews misc Exploitation misc Information systems misc Computer forensics Tightroping between APT and BCI in small enterprises |
authorStr |
Jesse Kaukola |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)165670517 |
format |
Article |
dewey-ones |
330 - Economics 070 - News media, journalism & publishing 004 - Data processing & computer science |
delete_txt_mv |
keep |
author_role |
aut |
collection |
OLC |
remote_str |
false |
illustrated |
Not Illustrated |
issn |
0968-5227 |
topic_title |
330 070 004 DNB Tightroping between APT and BCI in small enterprises Entrepreneurship Regional analysis Chief executive officers Enterprise resource planning Small business Information technology Cloud computing Knowledge management Computer information security Small & medium sized enterprises-SME Taxonomy Software services Interviews Exploitation Information systems Computer forensics |
topic |
ddc 330 misc Entrepreneurship misc Regional analysis misc Chief executive officers misc Enterprise resource planning misc Small business misc Information technology misc Cloud computing misc Knowledge management misc Computer information security misc Small & medium sized enterprises-SME misc Taxonomy misc Software services misc Interviews misc Exploitation misc Information systems misc Computer forensics |
topic_unstemmed |
ddc 330 misc Entrepreneurship misc Regional analysis misc Chief executive officers misc Enterprise resource planning misc Small business misc Information technology misc Cloud computing misc Knowledge management misc Computer information security misc Small & medium sized enterprises-SME misc Taxonomy misc Software services misc Interviews misc Exploitation misc Information systems misc Computer forensics |
topic_browse |
ddc 330 misc Entrepreneurship misc Regional analysis misc Chief executive officers misc Enterprise resource planning misc Small business misc Information technology misc Cloud computing misc Knowledge management misc Computer information security misc Small & medium sized enterprises-SME misc Taxonomy misc Software services misc Interviews misc Exploitation misc Information systems misc Computer forensics |
format_facet |
Aufsätze Gedruckte Aufsätze |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
nc |
author2_variant |
j r jr a t at s h sh v l vl |
hierarchy_parent_title |
Information management & computer security |
hierarchy_parent_id |
165670517 |
dewey-tens |
330 - Economics 070 - News media, journalism & publishing 000 - Computer science, knowledge & systems |
hierarchy_top_title |
Information management & computer security |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)165670517 (DE-600)1154143-X (DE-576)429292163 |
title |
Tightroping between APT and BCI in small enterprises |
ctrlnum |
(DE-627)OLC1996284711 (DE-599)GBVOLC1996284711 (PRQ)p570-bade3c2e3f493003ff524354846356f12325986257f5c417c90250da3aa48dee0 (KEY)0184127020170000025000300226tightropingbetweenaptandbciinsmallenterprises |
title_full |
Tightroping between APT and BCI in small enterprises |
author_sort |
Jesse Kaukola |
journal |
Information management & computer security |
journalStr |
Information management & computer security |
lang_code |
eng |
isOA_bool |
false |
dewey-hundreds |
300 - Social sciences 000 - Computer science, information & general works |
recordtype |
marc |
publishDateSort |
2017 |
contenttype_str_mv |
txt |
container_start_page |
226 |
author_browse |
Jesse Kaukola |
container_volume |
25 |
class |
330 070 004 DNB |
format_se |
Aufsätze |
author-letter |
Jesse Kaukola |
dewey-full |
330 070 004 |
title_sort |
tightroping between apt and bci in small enterprises |
title_auth |
Tightroping between APT and BCI in small enterprises |
abstract |
Purpose The contemporary internet provisions increasingly sophisticated security attacks. Besides underlining the advanced nature of these attacks, the concept of an advanced persistent threat (APT) catalyzes the important perspective of longitudinal persistence; attacks are not only carefully planned and targeted but the subsequent exploitation period covers long periods of time. If an APT successfully realizes into such exploitation, information assets may be continuously monitored for harvesting business-critical information (BCI). These threats are relevant for the security of small enterprises, and this study aims to examine the qualitative factors that shape the security mindsets among these. Design/methodology/approach The data are collected with semi-structured interviews of six enterprises in a small regional market segment. The analysis is based on a fourfold taxonomy that delivers three mindset profiles, while particular emphasis is placed on the subjective security notions that shape the typical strategizing among enterprises. Findings APT is poorly understood among the observed segment, which tends to often also explicitly downplay the strategic relevance of the concept, but a more pressing challenge relates to the observation that business data is often perceived to have no value. The delivered results can be used to improve the situation. Originality/value This study is among the firsts to explore perceptions of small enterprises toward APT and BCI. The results reveal problematic mindsets and offers new avenues for practitioners as well as academics to study and improve the situation. |
abstractGer |
Purpose The contemporary internet provisions increasingly sophisticated security attacks. Besides underlining the advanced nature of these attacks, the concept of an advanced persistent threat (APT) catalyzes the important perspective of longitudinal persistence; attacks are not only carefully planned and targeted but the subsequent exploitation period covers long periods of time. If an APT successfully realizes into such exploitation, information assets may be continuously monitored for harvesting business-critical information (BCI). These threats are relevant for the security of small enterprises, and this study aims to examine the qualitative factors that shape the security mindsets among these. Design/methodology/approach The data are collected with semi-structured interviews of six enterprises in a small regional market segment. The analysis is based on a fourfold taxonomy that delivers three mindset profiles, while particular emphasis is placed on the subjective security notions that shape the typical strategizing among enterprises. Findings APT is poorly understood among the observed segment, which tends to often also explicitly downplay the strategic relevance of the concept, but a more pressing challenge relates to the observation that business data is often perceived to have no value. The delivered results can be used to improve the situation. Originality/value This study is among the firsts to explore perceptions of small enterprises toward APT and BCI. The results reveal problematic mindsets and offers new avenues for practitioners as well as academics to study and improve the situation. |
abstract_unstemmed |
Purpose The contemporary internet provisions increasingly sophisticated security attacks. Besides underlining the advanced nature of these attacks, the concept of an advanced persistent threat (APT) catalyzes the important perspective of longitudinal persistence; attacks are not only carefully planned and targeted but the subsequent exploitation period covers long periods of time. If an APT successfully realizes into such exploitation, information assets may be continuously monitored for harvesting business-critical information (BCI). These threats are relevant for the security of small enterprises, and this study aims to examine the qualitative factors that shape the security mindsets among these. Design/methodology/approach The data are collected with semi-structured interviews of six enterprises in a small regional market segment. The analysis is based on a fourfold taxonomy that delivers three mindset profiles, while particular emphasis is placed on the subjective security notions that shape the typical strategizing among enterprises. Findings APT is poorly understood among the observed segment, which tends to often also explicitly downplay the strategic relevance of the concept, but a more pressing challenge relates to the observation that business data is often perceived to have no value. The delivered results can be used to improve the situation. Originality/value This study is among the firsts to explore perceptions of small enterprises toward APT and BCI. The results reveal problematic mindsets and offers new avenues for practitioners as well as academics to study and improve the situation. |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-BUB SSG-OPC-BBI |
container_issue |
3 |
title_short |
Tightroping between APT and BCI in small enterprises |
url |
https://search.proquest.com/docview/1925758330 |
remote_bool |
false |
author2 |
Jukka Ruohonen Antti Tuomisto Sami Hyrynsalmi Ville Leppänen |
author2Str |
Jukka Ruohonen Antti Tuomisto Sami Hyrynsalmi Ville Leppänen |
ppnlink |
165670517 |
mediatype_str_mv |
n |
isOA_txt |
false |
hochschulschrift_bool |
false |
author2_role |
oth oth oth oth |
up_date |
2024-07-04T00:17:49.845Z |
_version_ |
1803605528912330753 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a2200265 4500</leader><controlfield tag="001">OLC1996284711</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230715065157.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">170901s2017 xx ||||| 00| ||eng c</controlfield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">PQ20170901</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC1996284711</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBVOLC1996284711</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PRQ)p570-bade3c2e3f493003ff524354846356f12325986257f5c417c90250da3aa48dee0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(KEY)0184127020170000025000300226tightropingbetweenaptandbciinsmallenterprises</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">330</subfield><subfield code="a">070</subfield><subfield code="a">004</subfield><subfield code="q">DNB</subfield></datafield><datafield tag="100" ind1="0" ind2=" "><subfield code="a">Jesse Kaukola</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Tightroping between APT and BCI in small enterprises</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2017</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Purpose The contemporary internet provisions increasingly sophisticated security attacks. Besides underlining the advanced nature of these attacks, the concept of an advanced persistent threat (APT) catalyzes the important perspective of longitudinal persistence; attacks are not only carefully planned and targeted but the subsequent exploitation period covers long periods of time. If an APT successfully realizes into such exploitation, information assets may be continuously monitored for harvesting business-critical information (BCI). These threats are relevant for the security of small enterprises, and this study aims to examine the qualitative factors that shape the security mindsets among these. Design/methodology/approach The data are collected with semi-structured interviews of six enterprises in a small regional market segment. The analysis is based on a fourfold taxonomy that delivers three mindset profiles, while particular emphasis is placed on the subjective security notions that shape the typical strategizing among enterprises. Findings APT is poorly understood among the observed segment, which tends to often also explicitly downplay the strategic relevance of the concept, but a more pressing challenge relates to the observation that business data is often perceived to have no value. The delivered results can be used to improve the situation. Originality/value This study is among the firsts to explore perceptions of small enterprises toward APT and BCI. The results reveal problematic mindsets and offers new avenues for practitioners as well as academics to study and improve the situation.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Entrepreneurship</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Regional analysis</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Chief executive officers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Enterprise resource planning</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Small business</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud computing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Knowledge management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer information security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Small & medium sized enterprises-SME</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Taxonomy</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software services</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Interviews</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Exploitation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer forensics</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Jukka Ruohonen</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Antti Tuomisto</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Sami Hyrynsalmi</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Ville Leppänen</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Information management & computer security</subfield><subfield code="d">Bingley : Emerald Group Publ., 1993</subfield><subfield code="g">25(2017), 3, Seite 226</subfield><subfield code="w">(DE-627)165670517</subfield><subfield code="w">(DE-600)1154143-X</subfield><subfield code="w">(DE-576)429292163</subfield><subfield code="x">0968-5227</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:25</subfield><subfield code="g">year:2017</subfield><subfield code="g">number:3</subfield><subfield code="g">pages:226</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">https://search.proquest.com/docview/1925758330</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-BUB</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OPC-BBI</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">25</subfield><subfield code="j">2017</subfield><subfield code="e">3</subfield><subfield code="h">226</subfield></datafield></record></collection>
|
score |
7.3990517 |