Redirigiendo al acceso original de articulo en 17 segundos...
Inicio  /  Information  /  Vol: 12 Par: 3 (2021)  /  Artículo
ARTÍCULO
TITULO

Conceptualising a Cloud Business Intelligence Security Evaluation Framework for Small and Medium Enterprises in Small Towns of the Limpopo Province, South Africa

Moses Moyo and Marianne Loock    

Resumen

The purpose of this study was to investigate security evaluation practices among small and medium enterprises (SMEs) in small South African towns when adopting cloud business intelligence (Cloud BI). The study employed a quantitative design in which 57 SMEs from the Limpopo Province were surveyed using an online questionnaire. The study found that: (1) the level of cybersecurity threats awareness among decision-makers was high; (2) decision-makers preferred simple checklists and guidelines over conventional security policies, standards, and frameworks; and (3) decision-makers considered financial risks, data and application security, and cloud service provider reliability as the main aspects to consider when evaluating Cloud BI applications. The study conceptualised a five-component security framework for evaluating Cloud BI applications, integrating key aspects of conventional security frameworks and methodologies. The framework was validated for relevance by IT specialists and acceptance by SME owners. The Spearman correlational test for relevance and acceptance of the proposed framework was found to be highly significant at p < 0.05. The study concluded that SMEs require user-friendly frameworks for evaluating Cloud BI applications. The major contribution of this study is the security evaluation framework conceptualised from the best practices of existing security standards and frameworks for use by decision-makers from small towns in Limpopo. The study recommends that future research consider end-user needs when customising or proposing new solutions for SMEs in small towns.

 Artículos similares

       
 
Darja Cirjulina, Ruslans Babajans, Filips Capligins, Deniss Kolosovs and Anna Litvinenko    
This manuscript presents an experimental study of Quadrature Chaos Shift Keying (QCSK) as a means to tighten the physical layer security of Internet of Things (IoT) communication. Our study examines the characteristics and operational aspects of chaos os... ver más
Revista: Applied Sciences

 
Aurelia Scarano, Teodoro Semeraro, Antonio Calisi, Roberta Aretano, Caterina Rotolo, Marcello S. Lenucci, Angelo Santino, Gabriella Piro and Monica De Caroli    
This study explores the potential application of tomato fruit production within the agrivoltaic system, aiming to evaluate its contribution to food security in the context of climate change. Specifically, the study compares tomato cultivation under agriv... ver más
Revista: Applied Sciences

 
Guillermo Calahorra-Candao and María José Martín-de Hoyos    
This study develops a theoretical framework integrating the Technology Acceptance Model (TAM) and Uses and Gratifications Theory (UGT) to predict and understand the acceptance of voice shopping intentions, particularly through AI-driven voice assistants.... ver más
Revista: Information

 
Francisco Alonso, Benjamín Samaniego, Gonzalo Farias and Sebastián Dormido-Canto    
This article provides a general overview of the communication protocols used in the IEC61850 standard for the automation of electrical substations. Specifically, it examines the GOOSE and R-GOOSE protocols, which are used for exchanging various types of ... ver más
Revista: Applied Sciences

 
Hamad Almaghrabi, Ben Soh and Alice Li    
Effective and efficient use of information and communication technology (ICT) systems in the administration of educational organisations is crucial to optimise their performance. Earlier research on the identification and analysis of ICT users? satisfact... ver más
Revista: Information