=Paper=
{{Paper
|id=Vol-3857/paper7
|storemode=property
|title=Factors influencing the adoption of awareness-raising activities in SMEs
|pdfUrl=https://ceur-ws.org/Vol-3857/paper7.pdf
|volume=Vol-3857
|authors=Erik Bergström,Joakim Kävrestad,Johannes Hou Gustafsson,Hannes Jonsson
|dblpUrl=https://dblp.org/rec/conf/stpis/BergstromKGJ24
}}
==Factors influencing the adoption of awareness-raising activities in SMEs==
Factors influencing the adoption of awareness-raising
activities in SMEs
Erik Bergström1,∗ , Joakim Kävrestad1 , Johannes Hou Gustafsson1 and
Hannes Jonsson1
1
Department of Computer Science and Informatics, School of Engineering, Jönköping University, Jönköping, Sweden.
Abstract
Information security incidents are most commonly caused by user behaviour, placing the user in focus.
In order to mitigate information security threats and thereby protect the organisation, more and more are
adopting a socio-technical viewpoint, which implies adopting the belief that information security cannot
be solved with technology alone. A common way to address the user is by adopting awareness-raising
activities. All types of organisations struggle to raise awareness. Several studies have pointed out
small and medium-sized enterprises (SMEs) as being extra vulnerable and, in addition, having more
issues adopting awareness-raising activities. There are few studies investigating factors influencing
the adoption of awareness-raising activities in general, and the body of literature is even more scarce
when focusing on the factors from an SME perspective. This study targets the gap by investigating
what factors influence the adoption of awareness-raising activities in SMEs. We did this by conducting a
semi-structured interview study in 10 organisations. Five factors with a total of seven sub-factors were
found: Resources (with the sub-factors time and cost), implementation, content (with the sub-factors
quality, adaptability, and comprehensibility), compliance, management (with the sub-factors management
support and motivation of the employees).
Keywords
Information security awareness, adoption factors, small and medium-sized enterprises
1. Introduction
It is estimated that a cyberattack occurs somewhere in the world every 39 seconds and costs
businesses an average of $4.45 million in 2023 [1, 2]. Most of these attacks directly or indirectly
target small and medium-sized enterprises (SMEs). SMEs are particularly vulnerable as they often
do not have the capabilities or resources that larger companies have to secure their environment
and train their employees to be more aware of information security [3]. Furthermore, ENISA
(European Union Agency for Cybersecurity) describes that SMEs often work with critical
information. Consequently, severe consequences could result if SMEs are compromised [4].
ENISA also shows that SMEs struggle to maintain sufficient information security awareness
and establish a high level of protection for sensitive information [4].
The problem of low information security awareness was addressed in, for example, Erdogan
et al.’s [5] paper on SME awareness and capabilities, where only 50% of the respondents rated
The 10th International Conference on Socio-Technical Perspectives in IS (STPIS’24) August 16-17 2024 Jönköping, Sweden.
∗
Corresponding author.
Envelope-Open erik.bergstrom@ju.se (E. Bergström); joakim.kavrestad@ju.se (J. Kävrestad)
Orcid 0000-0002-1436-2980 (E. Bergström); 0000-0003-2084-9119 (J. Kävrestad)
© 2024 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).
CEUR
ceur-ws.org
Workshop ISSN 1613-0073
Proceedings
118
their awareness as moderate or higher. The human factor plays a major role in a company’s
information security, as it is becoming increasingly popular to carry out cyber attacks by
exploiting employees. A report by Verizon Business [6] showed that 74% of data breaches were
due to a lack of knowledge among employees. These breaches occur when employees lack the
knowledge and security awareness to make the correct decisions when faced with a cyber threat
[3]. To prevent social engineering, i.e. attacks that focus on tricking people into either giving
out information or performing certain actions for malicious purposes, companies should adopt
awareness-raising training and build a robust information security culture among employees
[7].
The problems for SMEs lie in adopting awareness-raising activities and motivating employees
to comply with company security policies. By creating a solid security culture among the
company’s employees and choosing the activities that best suit the company, companies can
increase their information security and minimise the risk of data breaches [8]. Previous studies
have focused on problems SMEs encounter when adopting awareness-raising activities to
raise employee awareness, where employee motivation is often highlighted. SMEs need to
choose the most suitable activity, where several options are available, such as text-based and
instructor-based learning activities [9].
When adopting awareness-raising activities, SMEs face several factors influencing their
choice and the extent to which they can adopt them. Heidt et al. [10] highlight that SMEs must
consider financial, time and skill constraints when adopting activities. SMEs, compared to larger
companies, do not have the same budget and, therefore, do not have the same opportunity to
adopt awareness-raising activities to the extent that large companies can. This is worrying since
studies show that the majority of SMEs close down after a major attack [1]. SME employees do
not always have just one role. Someone who is a financial manager may also be in charge of IT,
which means that the person in question does not have the time needed to investigate which
solution is best for the company or to adopt activities correctly. This also affects competence, as
SMEs do not always have dedicated IT staff; if they do, the IT staff often has sole responsibility
for their environment. Therefore, managers must have the time and the skills to identify their
business needs to adopt the most relevant activities [10].
We posit that information security is a socio-technical system (STS) where the interplay
between technology, user and the organisation at large is paramount for the effectiveness of
the system, in this case, the level of information security. Furthermore, the system entities
are co-dependant and heavily influenced by each other [11]. Consider, for example, password-
based authentication [12]. Technological rules will dictate what passwords users can create,
policies establish rules for handling the passwords and users are ultimately responsible for
creating the passwords and correctly handling them. Empowering the users will increase their
ability to comply with technical and organisational rules. Likewise, adapting the technical
implementation to the abilities of the users will make the users more able to comply [13].
This research explores SME adoption of awareness-raising activities through a socio-technical
lens. How and why SMEs adopt different awareness-raising activities has not been extensively
researched but is fundamental in understanding the motivations and obstacles SMEs face when
adopting awareness-raising activities [14, 10]. This research takes its starting point in this
problem and has focused on the following research question: ”What factors influence the adoption
of awareness-raising activities in SMEs?”
119
2. Background
2.1. Awareness-raising activities
Information security awareness can be defined as an employee’s general awareness of informa-
tion security and knowledge of the company’s information security policies [15]. The role of
information security awareness in an organisation, according to Khan et al. [16], is to ensure
that employees are aware of applicable rules, regulations and policies. Through this awareness,
employees can make informed decisions about information security.
Companies increasingly use different activities to raise employee awareness of security
threats [3]. Employees in organisations need the right behaviours, knowledge, and attitudes to
make the right decisions when technological protections cannot filter out the threats, which
often occur via social engineering attacks. Organisations can minimise the risk of data breaches
or other incidents by educating and preparing employees for the threats. Several methods
exist to train employees, including instructor-based, text-based, and video-based training [9].
Instructor-based training is performed for a specific amount of time in a room with an instructor
and is often perceived by employees as time-consuming [17]. Text-based interventions include
information provided through emails or newsletters at regular intervals. Text-based training
allows the user to read at their own pace and enables them to re-read if the information is
difficult to understand. Still, it is difficult to force employees to consume the material. Video-
based training uses videos, like text-based measures, allowing employees to revisit if something
is unclear [9].
Organisations have many security awareness-raising activities to choose from, but a common
problem is motivating employees to participate in and absorb information from the different
activities. Previous publications show that employees feel bored with many types of activities,
where, for example, instructor-led elements were highlighted as “boring statement of policies
and procedures” [18, p. 250]. In addition, employees often lack motivation to participate in
organisations’ training programs as they feel they are not rewarded for the time spent on
these activities. It is not enough for companies to only implement awareness-raising training;
they must also adapt it to fit the employees. According to a study by Kävrestad et al. [19], the
preferred delivery method for training is relevant and short sequences, such as password hints,
when creating passwords. Their study also showed that the least preferred delivery method
for training was through physical sessions attended at a specific time. Similarly, Johansson
et al. [20] found that small, focused, and contained modules were preferred among SMEs in the
manufacturing sector.
Chaudhary et al. [3] describes SMEs as companies with limited resources and with employees
who fill more than one role in the organisation. Recommendations and frameworks exist to
support SMEs in raising awareness of the company and employees by helping them prioritise
what should be adopted based on their resources and making the whole adoption process
more straightforward and easier to understand. However, studies show that the frameworks
and models available to SMEs do not provide the support they need. For instance, there are
no frameworks tailored to all the sectors in which SMEs are active [3]. Supporting SMEs
in the domain of awareness-increasing activities is a goal of several authorities. ENISA, for
instance, provide a tool called awareness-raising in a box (AR-in-a-box) to help SMEs work
120
with awareness-raising techniques [21]. Also, various national initiatives (such as The Swedish
Civil Contingencies Agency [22]) offer information security training, guidance, templates, and
advice for organisations regarding information security. In addition, there are directives aimed
at creating a high level of readiness among companies and helping them prepare to defend
against current and future threats. For example, the NIS2 directive will affect several sectors,
including chemical manufacturing, food production and digital infrastructure in Europe [22].
SMEs need to choose the training that best suits the company and its employees and ensure
the training is tailored to the needs of the company and its employees. Employees are more likely
to absorb the presented information if they can relate it to their role within the organisation or
the company’s needs [18]. Furthermore, it is highlighted that if the information is related to
employees’ personal lives and how it can improve their safety at home and work, employees
are more motivated to receive and apply the information [18].
2.2. Factors influencing the introduction of awareness-raising activities
While it is important to adopt awareness-raising activities, the organisation must strive for an
activity that suits them, as one of the most critical factors in raising security awareness is the
choice of activities. In a study by Dahabiyeh [9], the Technology-Organisation-Environment
(TOE) (developed by Tornatzky et al. [23]) highlighted factors that influence organisations’
adoption of new technologies. Dahabiyeh [9] used TOE to discuss the factors that influenced
organisations’ choice of information security awareness-raising measures, where the focus was
computer-based tools. The technology aspect highlighted the factors of how easy the activity
is to use and implement, the quality of the content, the integration and how easy it is for the
organisation to adapt the content to their needs. From an organisational point of view, the
support of the management team, the employees’ commitment, and a dedicated IT security team
were considered the most important factors. From the environmental point of view, two factors
were considered to be most important, with the support of those delivering activities being
considered important, including customer care and their technical competence. In addition,
compliance was highlighted as an important factor [9].
SMEs often do not have the resources to adopt awareness-raising activities, as a study by
Heidt et al. [10] showed. All those who participated in their study highlighted the lack of
resources as an obstacle, where budget, time and workforce took up most of them. The budget
was the main factor highlighted by management, and they did not have the finances to invest
in activities but instead had to spend it on investments to increase the company’s financial
profit. Heidt et al. [10] found that the most commonly raised factor, regardless of the role in the
company, was time constraints. Employees felt there was no time to adopt awareness-raising
activities [10]. SMEs usually have employees with more than one role in the company and,
therefore, do not have the time to read up and educate themselves on the best options for the
company. Without dedicated information security staff, it is possible that SMEs do not have
the skills and knowledge to understand why awareness-raising training is needed or how to
implement it, and it is likely they end up choosing and prioritising the economic growth of the
company [10].
121
3. Research approach
To be able to investigate what factors influence SMEs when adopting awareness-raising measures,
we opted for a qualitative research approach. The study has been conducted by collecting data
using semi-structured interviews and analysing that data thematically. Recent studies on
awareness in SMEs have successfully used a similar approach with semi-structured interviews
as a basis (e.g. [20, 24, 25]).
3.1. Data collection
Interviews are widely used for gathering data in qualitative research and can be performed
in various ways [26]. As the aim of the study is exploratory, semi-structured interviews were
selected as they allow the respondent to elaborate on their answers [27, 28], and because the
interviewer can raise ideas and questions that emerge during the interview [29]. Thornhill et al.
[30] highlight that semi-structured interviews allow, for example, the exploration of the ideas
and word choices of the respondents, which in turn can lead to more in-depth answers and
a deeper understanding. Qualitative interviews are designed to generate more detailed and
in-depth data, which is useful when studying “why” factors [31].
Semi-structured interviews are characterized by open-ended questions and an interview
guide where a broader theme is developed [28]. In this research, an interview guide was created
and revised after the first interview. The guide consisted of three parts: an introductory part
aimed at collecting background data on the respondent, a part that aimed at collecting more
general data on how they work with awareness-raising activities, and the main part of the guide
focusing on eliciting the adoption of awareness-raising activities. In the first part, a typical
question was, “How long have you been doing this?” In the second part, “How are you currently
working on raising information security awareness?” Finally, in the last part, we used questions
like “What factors limited the adoption of that specific activity?”
Respondents were recruited through various channels, such as, emails available on company
websites and via LinkedIn’s message function. Around 60 company representatives were asked
for an interview, but unfortunately, the majority of them did not respond to the request. Some
respondents declined because they did not feel confident in their knowledge of the subject or
because they did not have time, but we also know that security-related topics generally have
issues finding participants [32, 33, 34]. In total, ten respondents who work at SMEs in different
types of industries were interviewed. Table 1 shows an overview of the respondents and their
experience of their current role.
The interviews were conducted using online conferencing software that allowed for the
recording of the interviews. All interviews were recorded and transcribed.
3.2. Analysis
Thematic analysis was chosen to analyse the data from the semi-structured interviews. The
thematic analysis focuses on identifying, analysing and interpreting themes from qualitative
data [35]. When applying thematic analysis and identifying themes, looking for repetition,
differences, and similarities is important [36]. The coding guidelines from Saldaña [36] were
122
Table 1
Overview of the respondents and their level of experience.
Respondent Title Experience
1 Operations engineer/IT architect <5 years
2 Chief financial officer/Chief information officer >5 years
3 IT manager >5 years
4 System developer >5 years
5 IT security engineer <5 years
6 IT technician >5 years
7 IT manager <5 years
8 IT manager <5 years
9 Chief information security officer <5 years
10 IT operations manager <5 years
followed. More specifically, a two-cycle coding procedure was adopted. The first cycle used
structural coding, which is especially suitable when the data comes from semi-structured
interviews [36]. In structural coding, large segments of text form the basis for in-depth analysis
[37]. After this step, codes are developed that are categorised based on similarities, differences,
and repetition [36]. Busetto et al. [28] highlight that it is important that at least two researchers
are involved during the coding process, especially at the beginning, so it is possible to compare
the coding to ensure that coding is applied consistently to the data [28]. Therefore, the data
coding was first carried out individually by two authors, and then the categories identified were
compared and consolidated jointly. The final process of deriving the themes was a joint effort.
In this case, the themes were the factors found to influence the adoption of awareness-raising
activities.
4. Results
The thematic analysis resulted in the identification of 5 factors with a total of 7 sub-factors.
The following factors were found: Resources (with the sub-factors time and cost), implemen-
tation, content (with the sub-factors quality, adaptability, and comprehensibility), compliance,
management (with the sub-factors management support and motivation of the employees).
4.1. Resources
Resources was found to contain two sub-factors: time and cost. Several respondents mentioned
that time is a factor that affects them greatly, both when introducing and investigating new
activities. Respondent 1 explains that the reason why they have not introduced even more
awareness-raising activities is that ”we are a small company with few employees, and it’s really
only me who works with this ... and I have other things to do.” Several of the respondents raise
similar arguments as to why they have not adopted more activities. Some respondents also
expressed the time it takes to carry out the training, with staff feeling that they do not have
time to, for example, do micro-training or attend lectures on information security because they
123
are already too busy. The cost was a well-discussed factor. The respondents were split into
two groups: those who felt constrained by the costs and those who saw the costs as secondary
to the potential benefit of raising awareness in the organisation. This can be exemplified by
Respondent 1, who said: “that it shouldn’t cost too much is quite important because as we are
a small company… [where] costs are a big issue,” whereas Respondent 2 puts less emphasis on
cost: ”money is secondary in the context of security.”
4.2. Implementation
Being able to implement an awareness-raising activity easily is considered an important factor
by the respondents. Some respondents wanted measures that come pre-packaged by an external
party so they don’t have to spend too much time on them. Preferably, the activity should also
be easy to manage after the implementation. This can be exemplified by Respondent 2: “It is
easier when you get it served by an external party so you do not have to sit and work on the issue
yourself.“
4.3. Content
The content contained three sub-factors: quality, adaptability and comprehensibility. The
respondents emphasise that the quality of the activity’s content is important. What constitutes
higher-quality material is, of course, something subjective. Here, it can be summarised from the
respondents’ descriptions as material that is not substandard and that the employees would not
understand or consider when exposed to it. Interesting to note is that none of the respondents
worked with the content quality actively to try to raise the level. Some respondents also address
why they consider the information in awareness-raising activities should be comprehensible.
For example, Respondent 5 explained that the quality of the content can be very high, but what
is important is that employees can easily absorb the information: “in the end, you can have
the world’s most high-quality material that does no good if no one reads it, so comprehensibility,
there should be a very low threshold there, to absorb the information, so people actually do it.”
Furthermore, it was explained that content needs to be adapted to the company’s lowest level
and that there are often very different digital maturity levels. That is to say, that content
needs to be adapted in various ways, but most respondents did not adapt their awareness-
raising activities. Especially the ones using micro-training did not adapt the content to fit
the organisation. Respondents that used newsletters customised them for the threats they
considered relevant at the moment, but other than that, they did not adapt them to fit the
organisation either.
4.4. Compliance
Compliance is a factor that can potentially positively impact awareness-raising activities. As
discussed previously, there is no guarantee that employees will remember the information in
the awareness-raising activity. Depending on the type of awareness-raising activity, there are
different possibilities from a compliance perspective. For example, newsletters and lectures were
seen as difficult activities from a compliance perspective, i.e., the respondents had difficulties
knowing if their employees actively read or absorbed the information. On the other hand,
124
activities like micro-training and simulated phishing attacks were seen as compliance enablers
as they came with a built-in option to track statistics on completion rates and how many
employees clicked on phishing emails. I.e., it allows the manager to measure the awareness
temperature in the organisation or, as Respondent 9 phrased it: “There [in our micro-training
system] we have continuous monitoring and measurement.”
4.5. Management
Finally, management is a factor that contains two sub-factors: management support and how
the management works with the motivation of the employees. Most respondents considered
the support of management crucial. There was a belief in a need for management support for
information security in general, but also that the management showed its commitment to the
activities selected. By actively showing support, preferably repeatedly over time, the employees
understand the importance of the activities. It was emphasised that management support should
come not only from the highest level but also from other managers, such as IT managers. IT
managers also explained that they needed support from upper management in terms of time,
in this case, so that they could spend the necessary time to research possible future activities,
properly implement activities, and to be able to follow up on the results. Motivating employees
to take part in the awareness-raising activities was seen as a difficulty, or as it was described by
Respondent 4: “The first difficulty that I see is that people should understand that they should do it
and then actually do it.“ How the organisation worked to motivate employees differed. Several
respondents talked directly to the employees since the investigated organisations were SMEs
and hence had smaller organisations. The managers tried to explain why they had chosen their
activities and why it was important that they take part in them. All respondents except one used
a normative approach (i.e., moral reasoning and the values behind it). One respondent used a
coercive approach (i.e., threats and punishments) by employing scare tactics. The normative
group tried to highlight why taking part was good for the organisation and what could happen
if there was an attack. The motivation of the employees to actively participate in an awareness-
raising activity was seen as a very important factor, as without active participation, it doesn’t
matter what activities to adopt; the employee would not be actively involved anyway. I.e.,
employee motivation is crucial for the adoption of awareness-raising activities.
5. Discussion
This paper has investigated factors influencing the adoption of awareness-raising activities in
SMEs. A number of factors were found, and a summary of these factors can be found in Table 2.
A recurring theme that emerged from the interviews was that management needs to be
more engaged in awareness-raising activities. This is achieved by giving those responsible
more time to work on these issues and by being involved in the adoption process to show
employees that this is an important issue. These results are in line with, for example, Renaud
[38] and Chaudhary et al. [3]. Management involvement in awareness-raising activities is
crucial, and we know that awareness-raising activities are most effective when management
fully supports them, as employees are more likely to participate more actively in these activities
if they can see that management is dedicated to the issue. Much literature on the topic is getting
125
Table 2
Summary of the factors found that influence the adoption of awareness-raising activities, including a
description of the factors.
Factor Description
Resources
Time There is a lack of time for introducing and investigating new
activities and carrying out the training.
Cost Split into two groups: the ones feeling constrained by costs and
the ones who perceive the cost to be secondary to the benefit.
Implementation Implementation and maintenance should be easy. They should
preferably come as pre-packaged solutions.
Content
Quality Content should be of a high standard, and users should under-
stand and consider it when exposed.
Comprehensibility Users should easily be able to absorb the content.
Adaptability It should be possible to adapt the content to organisational
needs and for users on different levels.
Compliance Depending on the awareness-raising activity, there are different
possibilities for tracking completion and absorption rates.
Management
Management support Show support by giving more time to work on awareness-raising
activities and be active in the adoption process.
Motivation of the employees Employee motivation for actively participating in awareness-
raising activities.
somewhat old, and the advice for engaging management (e.g. by explaining the cost-benefit
of awareness-raising activities [39], to design and utilise low-cost awareness-raising activities
[40, 41], and to show that awareness-raising activities are effective [42]) does not seem to work,
at least not for SMEs. Some newer suggestions could be interesting to pursue to see if they
could affect SME management, for example, to utilise peer comparisons through benchmarking,
illustrating to leadership the investments competitors are doing [3]. Our study also arrives
at a slightly different conclusion than Dahabiyeh’s [9] study that found management not as
important a factor as we do in this study. Perhaps this can be explained by our respondents’
perceptions of the limitations regarding available resources. There is also how management
works to motivate the employees to partake in awareness-raising activities. Here, we found that
all except one used a normative approach, which is an interesting find since previous literature
has shown inconsistent findings [43], and there are many calls for more research on this aspect
[43, 44].
Related to management is resources, as management can affect time constraints and costs.
The respondents highlighted that IT managers need more time to implement and maintain
awareness-raising activities. Also, the cost was found to be an obstacle, which has been observed
as a general SME problem [18] as fewer financial resources imply having to choose between
awareness-raising activities or economic growth. As this is such a big issue where the majority
of companies are struggling, we recommend numerous national and international initiatives,
126
such as AR-in-a-box [21], to ramp up their marketing as the awareness of the initiatives is low.
Another way to increase such initiatives’ usage is to (further) adapt them to various sectors (e.g.
manufacturing, healthcare, etc.) to make them more relevant for the target groups. It is also
interesting to study in future research as little is known about the adaptation to different user
groups or, for that matter, what types of user groups exist.
Several of the respondents thought that the quality of the content of the awareness-raising
activity was the most important aspect. Previous research, such as He and Zhang [18], has
discussed the importance of activities that should be adapted to the level of the employee so
that the content is comprehensible. Here, we found that the respondents acknowledged this, but
very few of them worked with this type of adaptation due to resource limitations. In general,
adaptability was considered important, which is consistent with Dahabiyeh [9], but again, the
respondents did not do it in practice. This further strengthens the argument above about the
necessity to adapt awareness-raising activities sectorally and to different user groups so that
the ones implementing them in the organisation can easily push out suitable content on the
correct level to their colleagues. Especially since we know that the quality of the content is
highlighted as a critical factor in successful awareness-raising activities [3].
Related to implementation is integration, which was raised in Dahabiyeh’s [9] study as a factor,
but this study showed that integration was not something respondents considered important.
This may be due to the fact that SMEs rarely have systems that can be regarded as necessary
for integrating awareness-raising activities. Regarding implementation, we found that pre-
packaged content by an external provider was favoured among the respondents. Similarly,
it should be easy to manage after the implementation. So, yet again, we find a gap between
content providers and their users.
Finally, compliance was found to be a factor that ultimately can affect the type of activities
to be adopted. Depending on the type of activity, there are different possibilities for tracking
completion and absorption rates among employees. We found that activities that include such
functionality (e.g. micro-training and simulated phishing emails) were seen positively. Being
able to track performance, of course, also influences motivation as tracking enables finding
those who do not participate in training or those who are performing poorly. With a normative
approach, one can also possibly find the underlying reasons why someone is not participating.
Is it too hard, or is there perhaps a problem with time?
6. Conclusion
The research question, What factors influence the adoption of awareness-raising activities in SMEs?,
was addressed using semi-structured interviews with ten participants who are responsible for
awareness-raising within their respective organisations. Adopting a socio-technical lens, this
research confirms that awareness-raising is dependent on the interplay between management,
technology and system users. The results show five main factors that are of importance for the
organisational adoption of awareness-raising activities, which span the entire socio-technical
spectrum. The perhaps most notable conclusion is that management is an enabler which can
both provide resources and lead by example. Lack of resources is constantly mentioned as an
obstacle by the participants who, for instance, describe a need for ready-to-use solutions to save
127
time or not being able to modify activities due to a lack of time. A second notable finding is that
this research confirms the importance of activities that are adapted to the organisation where
they are used. The respondents describe adaption as important to raise employee motivation and
increase relevance. However, while the respondents emphasise the importance of adaptation,
they do not work with it in practice. While this conclusion appears to be a conundrum, it is well
aligned with the fact that SMEs are struggling to find resources for awareness-raising activities.
Acknowledgments
We gratefully acknowledge the grants from the Swedish Civil Contingencies Agency (MSB),
projects VISKA (MSB 2021–14650) and ICANP (MSB 2023-10887).
References
[1] ThriveDX, 15 alarming cybersecurity facts and statistics, 2022. URL: https://thrivedx.com/
resources/article/cyber-security-facts-statistics.
[2] I. Security, Cost of a data breach report 2023, 2023. URL: https://www.ibm.com/reports/
data-breach.
[3] S. Chaudhary, V. Gkioulos, S. Katsikas, A quest for research and knowledge gaps in
cybersecurity awareness for small and medium-sized enterprises, Computer Science
Review 50 (2023) 100592. doi:https://doi.org/10.1016/j.cosrev.2023.100592 .
[4] A. Sarri, V. Paggio, G. Bafoutsou, Cybersecurity for smes–challenges and
recommendations, 2021. URL: https://www.enisa.europa.eu/publications/
enisa-report-cybersecurity-for-smes.
[5] G. Erdogan, R. Halvorsrud, C. Boletsis, S. Tverdal, J. Brian Pickering, Cybersecurity
awareness and capacities of smes, in: 9th International Conference on Information
Systems Security and Privacy - ICISSP, volume 1, SciTePress, 2023, pp. 296–304. doi:10.
5220/0011609600003405 .
[6] V. Business, 2024 data breach investigations report, 2024. URL: https://www.verizon.com/
business/resources/reports/dbir/2023/summary-of-findings/.
[7] F. Salahdine, N. Kaabouch, Social engineering attacks: A survey, Future Internet 11 (2019)
89. URL: https://www.mdpi.com/1999-5903/11/4/89.
[8] M. Bada, J. R. C. Nurse, Developing cybersecurity education and awareness programmes
for small- and medium-sized enterprises (smes), Information Computer Security 27 (2019)
393–410. doi:10.1108/ICS- 07- 2018- 0080 .
[9] L. Dahabiyeh, Factors affecting organizational adoption and acceptance of computer-based
security awareness training tools, Information Computer Security 29 (2021) 836–849.
doi:10.1108/ICS- 12- 2020- 0200 .
[10] M. Heidt, J. P. Gerlach, P. Buxmann, Investigating the security divide between sme and
large companies: How sme characteristics influence organizational it security investments,
Information Systems Frontiers 21 (2019) 1285–1305. doi:10.1007/s10796- 019- 09959- 1 .
[11] E. Mumford, The story of socio-technical design: Reflections on its successes, failures and
potential, Information systems journal 16 (2006) 317–342.
128
[12] C. P. Pfleeger, S. L. Pfleeger, J. Margulies, Security in computing, fifth edition ed., Prentice
Hall, Upper Saddle River, NJ, 2015.
[13] B. Ur, F. Noma, J. Bees, S. M. Segreti, R. Shay, L. Bauer, N. Christin, L. F. Cranor, ” i
added’!’at the end to make it secure”: Observing password creation in the lab, in: Eleventh
symposium on usable privacy and security (SOUPS 2015), 2015, pp. 123–140.
[14] A. Al-Salek, J. Kävrestad, M. Nohlberg, Exploring experiences of using seta in nordic
municipalities, in: S. Furnell, N. Clarke (Eds.), Human Aspects of Information Security
and Assurance, Springer International Publishing, 2021, pp. 22–31.
[15] B. Bulgurcu, H. Cavusoglu, I. Benbasat, Information security policy compliance: an
empirical study of rationality-based beliefs and information security awareness, MIS
quarterly 34 (2010) 523–548.
[16] B. Khan, K. S. Alghathbar, S. I. Nabi, M. K. Khan, Effectiveness of information secu-
rity awareness methods based on psychological theories, African journal of business
management 5 (2011) 10862.
[17] K. F. Tschakert, S. Ngamsuriyaroj, Effectiveness of and user preferences for security
awareness training methodologies, Heliyon 5 (2019). URL: https://doi.org/10.1016/j.heliyon.
2019.e02010. doi:10.1016/j.heliyon.2019.e02010 , doi: 10.1016/j.heliyon.2019.e02010.
[18] W. He, Z. Zhang, Enterprise cybersecurity training and awareness programs: Recom-
mendations for success, Journal of Organizational Computing and Electronic Com-
merce 29 (2019) 249–257. URL: https://doi.org/10.1080/10919392.2019.1611528. doi:10.
1080/10919392.2019.1611528 .
[19] J. Kävrestad, M. Nohlberg, S. Furnell, A taxonomy of seta methods and linkage to delivery
preferences, SIGMIS Database 54 (2023) 107–133. doi:10.1145/3631341.3631348 .
[20] K. Johansson, T. Paulsson, E. Bergström, U. Seigerroth, Improving cybersecurity awareness
among smes in the manufacturing industry, in: A. H. C. Ng, A. Syberfelt, D. Högberg,
M. Holm (Eds.), SPS2022: Proceedings of the 10th Swedish production symposium, IOS
Press, 2022, pp. 209–220.
[21] ENISA, Custom-made awareness raising to enhance cyberse-
curity culture, 2024. URL: https://www.enisa.europa.eu/news/
custom-made-awareness-raising-to-enhance-cybersecurity-culture.
[22] The Swedish Civil Contingencies Agency, Informationssäkerhet för
små och medelstora organisationer [information security for small
and medium-sized organisations], 2024. URL: https://www.msb.se/sv/
amnesomraden/informationssakerhet-cybersakerhet-och-sakra-kommunikationer/
arbeta-systematiskt-informationssakerhet-och-cybersakerhet/
informationssakerhet-for-sma-och-medelstora-organisationer/.
[23] L. G. Tornatzky, M. Fleischer, A. K. Chakrabarti, The processes of technological innovation,
Lexington Books, Lexington, MA, USA, 1990.
[24] M. Sadok, S. Alter, P. Bednar, It is not my job: exploring the disconnect between corporate
security policies and actual security practices in smes, Information Computer Security 28
(2020) 467–483. doi:10.1108/ICS- 01- 2019- 0010 .
[25] N. Rawindaran, A. Jayal, E. Prakash, Exploration of the impact of cybersecurity awareness
on small and medium enterprises (smes) in wales using intelligent software to combat
cybercrime, Computers 11 (2022) 174. URL: https://www.mdpi.com/2073-431X/11/12/174.
129
[26] B. J. Oates, Researching Information Systems and Computing, Sage, London, 2006.
[27] W. C. Adams, Conducting Semi-Structured Interviews, 2015, pp. 492–505. doi:https:
//doi.org/10.1002/9781119171386.ch19 .
[28] L. Busetto, W. Wick, C. Gumbinger, How to use and assess qualitative research methods,
Neurological Research and Practice 2 (2020) 14. doi:10.1186/s42466- 020- 00059- z .
[29] O. A. Adeoye-Olatunde, N. L. Olenik, Research and scholarly methods: Semi-structured
interviews, JACCP: JOURNAL OF THE AMERICAN COLLEGE OF CLINICAL PHARMACY
4 (2021) 1358–1367. doi:https://doi.org/10.1002/jac5.1441 .
[30] A. Thornhill, M. Saunders, P. Lewis, Research methods for business students, seventh
edition ed., Prentice Hall: London, 2016.
[31] A. Blackstone, Principles of sociological inquiry: Qualitative and quantitative methods,
Saylor Academy Open Textbooks, 2018.
[32] R. Baskerville, F. Rowe, F.-C. Wolff, Integration of information systems and cybersecurity
countermeasures: An exposure to risk perspective, SIGMIS Database 49 (2018) 33–52.
doi:10.1145/3184444.3184448 .
[33] K. Bernsmed, G. Bour, M. Lundgren, E. Bergström, An evaluation of practitioners’ per-
ceptions of a security risk assessment methodology in air traffic management projects,
Journal of Air Transport Management 102 (2022) 102223. doi:10.1016/j.jairtraman.
2022.102223 .
[34] W. A. Cram, J. D’Arcy, J. G. Proudfoot, Seeing the forest and the trees: A meta-analysis
of the antecedents to information security policy compliance, MIS Quarterly 43 (2019)
525–554. doi:10.25300/MISQ/2019/15117 .
[35] V. Braun, V. Clarke, Using thematic analysis in psychology, Qualitative Research in
Psychology 3 (2006) 77–101. doi:10.1191/1478088706qp063oa .
[36] J. Saldaña, The coding manual for qualitative researchers, 4th ed., SAGE Publications Inc.,
Thousand Oaks, CA, USA, 2021.
[37] K. M. MacQueen, E. McLellan-Lemal, K. Bartholow, B. Milstein, Team-based codebook
development: Structure, process, and agreement, AltaMira Press, Lanham, MD, USA, 2008,
pp. 119–135.
[38] K. Renaud, How smaller businesses struggle with security advice, Computer Fraud
Security 2016 (2016) 10–18. doi:https://doi.org/10.1016/S1361- 3723(16)30062- 8 .
[39] R. Groner, P. Brune, Towards an empirical examination of it security infrastructures in
sme, in: Secure IT Systems: 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden,
October 31–November 2, 2012. Proceedings 17, Springer, 2012, pp. 73–88.
[40] T. Gundu, S. V. Flowerday, Ignorance to awareness: Towards an information security
awareness process, SAIEE Africa Research Journal 104 (2013) 69–79. doi:10.23919/SAIEE.
2013.8531867 .
[41] S. Dojkovski, S. Lichtenstein, M. Warren, Challenges in fostering an information security
culture in australian small and medium sized enterprises, in: 5th European conference on
Information Warfare and Security, 2006, pp. 31–40.
[42] M. Eminağaoğlu, E. Uçar, S. Eren, The positive outcomes of information security awareness
training in companies – a case study, Information Security Technical Report 14 (2009)
223–229. doi:https://doi.org/10.1016/j.istr.2010.05.002 .
[43] C. Liu, H. Liang, N. Wang, Y. Xue, Ensuring employees’ information security policy compli-
130
ance by carrot and stick: the moderating roles of organizational commitment and gender,
Information Technology People 35 (2022) 802–834. doi:10.1108/ITP- 09- 2019- 0452 .
[44] M. I. Merhi, P. Ahluwalia, Examining the impact of deterrence factors and norms on
resistance to information systems security, Computers in Human Behavior 92 (2019) 37–46.
doi:https://doi.org/10.1016/j.chb.2018.10.031 .
131