Journal of
Marketing Development and Competitiveness






Scholar Gateway


Abstracts prior to volume 5(1) have been archived!

Issue 5(1), October 2010 -- Paper Abstracts
Girard  (p. 9-22)
Cooper (p. 23-32)
Kunz-Osborne (p. 33-41)
Coulmas-Law (p.42-46)
Stasio (p. 47-56)
Albert-Valette-Florence (p.57-63)
Zhang-Rauch (p. 64-70)
Alam-Yasin (p. 71-78)
Mattare-Monahan-Shah (p. 79-94)
Nonis-Hudson-Hunt (p. 95-106) 



JOURNAL OF APPLIED BUSINESS AND ECONOMICS


Evaluating Self-Efficacy Pertaining to Cybersecurity for Small Businesses


Author(s): Ellen M. Raineri, Jessica Resig

Citation: Ellen M. Raineri, Jessica Resig, (2020) "Evaluating Self-Efficacy Pertaining to Cybersecurity for Small Businesses," Journal of Applied Business and Economics, Vol. 22, Iss.12,  pp. 13-23

Article Type: Research paper

Publisher: North American Business Press

​Abstract:

Small businesses are easy victims of cyberattacks due to their limited resources and insufficient training. Furthermore, many small business owners’ attitudes diminish their need for safeguards because they think that they are not likely to be attacked. Yet, small businesses experience Denial of Service (DoS) attacks, Distributed Denial of Service (DDos) attacks, phishing, vishing, and tail gating as well as theft of confidential information and hardware. Consequently, numerous small businesses close or experience detrimental results -- loss of consumer trust, lawsuits, credit monitoring fees, tarnished reputations, and lost operational costs. Since past research demonstrated that training positively impacts self-efficacy, this paper explores the effects of cybersecurity training on participants’ self-efficacy towards small business cybersecurity practices. Survey participants were face-to-face and virtual attendees at a public university’s Cybersecurity for Small Businesses Conference. To evaluate the attendees’ perceived self- efficacy, a preand post-survey included cybersecurity questions with demographic questions. The results show a significant difference in scores for overall cybersecurity self-efficacy before and after such training.