<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A Framework for Building a Secure, Resilient and AI-based Digital Future for SMEs</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Angel Jimenez-Aranda</string-name>
          <email>a.jimenez-aranda@salford.ac.uk</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tarek Gaber</string-name>
          <email>t.m.a.gaber@salford.ac.uk</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yun Chen</string-name>
          <email>y.chen@salford.ac.uk</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mirage Islam</string-name>
          <email>m.a.k.r.islam@salford.ac.uk</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="editor">
          <string-name>AI, Cybersecurity, SMEs, Secure AI, Digital Transformation.1</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>The University of Salford</institution>
          ,
          <addr-line>43 Crescent, Salford M5 4WT</addr-line>
          ,
          <country country="UK">United Kingdom</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2025</year>
      </pub-date>
      <abstract>
        <p>The rapid adoption of artificial intelligence (AI) by small and medium-sized enterprises (SMEs) presents both new opportunities and significant cybersecurity challenges. While AI offers powerful tools for enhancing cyber defence, it also introduces vulnerabilities that attackers can exploit. However, a clear gap remains in understanding the dual role of AI, as a solution to enhance cybersecurity and as a potential source of new security vulnerabilities in its own applications. This paper presents a novel framework designed to explore and strengthen the interconnection between AI adoption and cybersecurity preparedness in SMEs. The framework takes a multi-faceted approach to raise awareness, build organisational capacity, and enhance resilience against emerging threats. A distinguishing feature of the framework is its commitment to inclusivity, aligning with United Nations goals to increase diversity in the STEM workforce, particularly by encouraging the participation of women in AI and cybersecurity, highlighting role models, and fostering a more diverse and inclusive ecosystem. By integrating technical, organisational, and behavioural dimensions, the framework promotes responsible AI adoption while supporting broader national priorities. The findings offer practical insights and reinforce the growing need for targeted support mechanisms to ensure SMEs can confidently and securely embrace AI technologies.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Artificial intelligence (AI) is reshaping industries across the globe, offering transformative
potential for productivity, decision-making, and innovation. Its adoption is no longer confined to
large corporations, and small and medium-sized enterprises (SMEs) are increasingly embedding AI
into their operations, from customer service chatbots to predictive analytics in logistics and finance
[
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ]. However, this technological shift is not without risk. As AI systems become more pervasive,
concerns increase about their security, robustness, and trustworthiness [
        <xref ref-type="bibr" rid="ref3 ref4">3, 4</xref>
        ]. For SMEs in particular,
often operating with constrained resources and limited technical expertise, these risks are amplified.
      </p>
      <p>
        The cybersecurity landscape is evolving rapidly alongside AI. Attackers are now exploiting
vulnerabilities in AI systems, such as adversarial machine learning, data poisoning, and model
inversion [
        <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
        ]. At the same time, AI is being used defensively to enhance cybersecurity practices,
enabling anomaly detection, threat intelligence, and dynamic response capabilities [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. This dual role
of AI, both as a potential threat vector and a security tool, creates what we term the "AI-Cyber Nexus":
a critical connection at which the future of secure digital transformation is being negotiated.
      </p>
      <p>
        Despite growing recognition of the risks and opportunities associated with AI, SMEs remain
underserved in cybersecurity discourse and support. Studies show that SMEs often underestimate
their exposure to cyber threats, lack formal risk assessments, and struggle to implement even basic
2nd Workshop on Education for Artificial Intelligence (edu4AI 2025, https://edu4ai.di.unito.it/), Co-located with ECAI 2025,
the 28th European Conference on Artificial Intelligence which will take place on October 26, 2025 in Bologna, Italy
∗ Corresponding author.
† These authors contributed equally.
cybersecurity controls [
        <xref ref-type="bibr" rid="ref8 ref9">8, 9</xref>
        ]. When it comes to AI, these challenges are further complicated by a lack
of clarity around regulation, best practices, and ethical standards [
        <xref ref-type="bibr" rid="ref10 ref11">10, 11</xref>
        ]. This results in a widening
knowledge gap that can undermine trust, resilience, and competitiveness.
      </p>
      <p>In response to these challenges, this study introduces a novel framework aimed at examining and
reinforcing the relationship between the adoption of artificial intelligence (AI) and cybersecurity
readiness within SMEs. The proposed framework adopts a comprehensive approach that emphasises
awareness-raising, capacity building, and the strengthening of organisational resilience in response
to evolving cyber threats for AI and of AI. An important dimension of the framework is its inclusive
orientation, which aligns with broader national and United Nations objectives to diversify the STEM
workforce. In particular, it seeks to promote greater female participation in AI and cybersecurity by
showcasing role models and cultivating a more inclusive and representative professional
environment. As a case-study in Greater Manchester, UK, a region recognised for its dynamic SME
ecosystem, the framework was evaluated to support SMEs in navigating the dual challenge of AI
adoption and cybersecurity preparedness.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Methodology</title>
      <p>The development of the AI-Cyber Nexus framework was informed by insights and lessons learned
from earlier regional initiatives, such as the Cyber Foundry and AI Foundry programmes. These
previous initiatives provided valuable understanding of the needs, barriers, and capabilities of SMEs
adopting digital technologies. However, neither addressed the specific risks and opportunities arising
from the convergence of AI and cybersecurity. The AI-Cyber Nexus framework sought to fill this
gap by integrating key themes from both fields and applying them across four practical dimensions:
Awareness and Engagement, Skills and Capability Development, Hands-on Support and Expert
Guidance, and Inclusivity. The framework was operationalised through a series of targeted
interventions delivered over a three-month period, from January to March 2025.</p>
      <p>The framework was shaped and refined through ongoing engagement activities with SMEs, which
served both to validate its relevance and to ensure its implementation addressed real-world
challenges. Particular attention was given to reaching underserved groups and sectors traditionally
underrepresented in the digital economy.</p>
      <p>Collaboration was central to this initiative. The delivery team worked closely with local business
networks, innovation hubs, AI and cybersecurity experts, and academic partners to ensure relevance
and legitimacy. Partnerships with regional organisations extended the project’s reach and ensured
that messaging aligned with the existing SME support ecosystem.</p>
      <p>The engagement activities were delivered through four main strands. First, a series of interactive
workshops—conducted both in-person and online—focused on practical topics such as AI risks,
cybersecurity for non-specialists, and responsible AI deployment. These sessions featured real-world
examples and facilitated peer discussion to make the material accessible and engaging for SMEs.
Second, a suite of digital training materials, including animated videos, was made available via an
open-access platform. These resources included concise explanations, infographics, and checklists
tailored for time-constrained business owners and managers. Third, a podcast series was produced,
featuring interviews with industry leaders, cybersecurity experts, and AI thought leaders. These
episodes offered SMEs valuable insights into practical applications, emerging challenges, and
opportunities at the intersection of AI and cybersecurity. Available across multiple platforms
(Spotify, Apple Podcasts, YouTube), the podcasts provided a flexible and accessible way for busy
professionals to stay informed. Finally, SMEs were offered personalised advice through one-to-one
consultancy sessions with the project team. These confidential sessions created a safe space for
organisations to explore questions about AI adoption, regulatory compliance, and digital security
without fear of judgment or exposure.</p>
      <p>This flexible and modular structure enabled SMEs to engage with the initiative at varying levels
of intensity, depending on their specific needs, interests, and availability.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Framework Overview</title>
      <p>The AI-Cyber Nexus introduced a holistic framework grounded in practical experience and
informed by sustained engagement with regional SME ecosystems. The framework, as illustrated in
Figure 1, is structured around four interconnected dimensions: Awareness and Engagement, Skills
and Capability Development, Hands-on Support and Expert Guidance, and Inclusivity and Diversity.
Together, these dimensions offer a structured yet flexible approach to supporting SMEs in adopting
AI responsibly, building cyber resilience, and ensuring equitable access to the benefits of digital
innovation.</p>
      <p>The Awareness and Engagement dimension focuses on raising awareness of both the opportunities
and risks associated with AI and cybersecurity across the full spectrum of SMEs. Activities such as
workshops, webinars, and community engagement events are used to demystify complex
technologies and improve visibility among traditionally underserved groups. The emphasis is on
developing inclusive messaging and engagement strategies that resonate with a diverse SME
audience.</p>
      <p>
        Skills and Capability Development addresses the significant skills gap in AI and cybersecurity as
reported by UK government in [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. This was done by supporting the creation of accessible and
informal learning pathways tailored to SMEs with varying levels of digital maturity. It includes
practical training, modular learning resources, and opportunities for hands-on exploration of
relevant tools and techniques. The content is designed to be inclusive and relevant, regardless of the
SME’s size, sector, or technical background.
      </p>
      <p>
        The third dimension, Hands-on Support and Expert Guidance, as proven in [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] provides
contextualised, on-demand support through expert clinics, sector-specific advice, and one-to-one
consultancy. This ensures that SMEs are not left to navigate the complexities of secure AI adoption
in isolation but are supported through trusted, personalised guidance.
      </p>
      <p>
        The final dimension, Inclusivity and
Diversity, is embedded throughout the
entire framework and also functions as
a standalone focus area. It aims to
reduce structural barriers to digital
participation by actively involving
underrepresented groups, including
women- and minority-led SMEs [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ].
      </p>
      <p>Activities include showcasing diverse
role models in AI and cybersecurity,
building inclusive networks, and
designing interventions that reflect the
lived experiences of a broader range of
SME leaders. This approach supports the
creation of a more equitable innovation
ecosystem and aligns with national
efforts to improve diversity in STEM and
Fig 1. AI-Cyber Nexus Framework digital sectors.</p>
      <p>Figure 1 presents a visual
representation of the framework, positioning the SME at the centre, surrounded by the four
dimensions. The design reflects the iterative and interconnected nature of the framework, where
inclusivity and diversity are not treated as a separate strand but are integrated into every activity. It
highlights the reinforcing relationships that drive awareness, build skills, enable informed action,
and promote equity.</p>
      <p>The framework is closely aligned with key UK government priorities, including the National AI
Strategy (2021), the National Cyber Strategy (2022), and the UK Digital Strategy (2022) as well as
international initiatives such as the US National Artificial Intelligence Initiative Act (2020), the EU
Strategy for Artificial Intelligence (2021), Canada’s Pan-Canadian AI Strategy (2017), and Australia’s
AI Action Plan (2019).". It supports strategic objectives such as improving cyber resilience among
SMEs, scaling the responsible adoption of AI, and increasing diversity across the digital and tech
sectors. By taking a regional, inclusive, and practice-led approach, the AI-Cyber Nexus framework
contributes meaningfully to the national goal of fostering a secure, innovative, and equitable digital
economy.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Discussion and Results</title>
      <p>The framework was evaluated by case-study in Greater Manchester, UK. This region was selected
as it is recognised for its dynamic SME ecosystem. All project materials (including workshops,
training resources, video and audio podcasts, and consultancy information) were made freely
available via the project’s dedicated website: https://aicybernexus.salford.ac.uk. The website
functioned as a central hub for SMEs, allowing them to explore and download resources at their
convenience. To enhance accessibility and ongoing engagement, the site also included interactive
features such as feedback forms, event registrations, and updates on upcoming support
opportunities. The site remains publicly accessible after the pilot, serving as a lasting legacy of the
project.</p>
      <p>The AI-Cyber Nexus framework yielded important insights into the current state of AI adoption
and cybersecurity preparedness among SMEs in Greater Manchester. While the engagement
activities were not designed to generate formal research data, they provided a rich source of
qualitative evidence. Through workshops, briefing sessions, drop-in clinics, and informal discussions
with SME owners, advisors, and ecosystem partners, the project team identified recurring concerns,
knowledge gaps, and areas of opportunity. These findings directly influenced the development and
refinement of the support activities, helping to ensure that the framework's four dimensions
remained aligned with the lived experiences of SMEs.</p>
      <p>
        One of the most striking insights emerged within the Awareness and Engagement dimension: a
consistently low baseline understanding of how AI technologies can themselves pose cybersecurity
risks. While many participants had some familiarity with using generative AI tools or business
automation software, there was little awareness of issues such as adversarial attacks, data poisoning,
or vulnerabilities in AI models. As in prior studies [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], many SMEs assumed that third-party,
cloudbased AI tools were secure by default, an assumption that persists despite growing concern among
cybersecurity experts about black-box models and supply chain risks [
        <xref ref-type="bibr" rid="ref3 ref9">3, 9</xref>
        ].
      </p>
      <p>
        Relatively few SMEs (less than 3%) had considered the opportunities for using AI to enhance their
cybersecurity posture. While some expressed interest in AI applications for threat detection,
phishing prevention, or endpoint monitoring, this was often theoretical. Practical adoption was
constrained by barriers identified under the Skills and Capability Development and Hands-on
Support dimensions, specifically cost, complexity, and lack of clear, tailored guidance. Participants
repeatedly expressed a desire for lightweight, explainable AI tools that could be integrated into
existing systems with minimal disruption. Aligned with the findings of a previous study [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], this
suggests a clear opportunity for innovation and targeted support and the development of simple,
affordable, and trustworthy AI-enabled solutions designed specifically for the SME context.
      </p>
      <p>The project also highlighted the challenges of digital maturity for the majority of participating
SMEs. Even where appetite for innovation existed, foundational practices such as cybersecurity risk
assessments, regular staff training, or data governance frameworks were often lacking. This
presented a challenge for engaging with more advanced topics such as AI security or regulation
readiness. 50% of SMEs expressed concern about potential non-compliance, particularly in relation
to upcoming AI directives. These concerns reinforced the importance of demystifying AI and
cybersecurity, central aims of the Awareness and Skills dimensions of the framework, and providing
SMEs with a low-risk, practical entry point into these critical conversations.</p>
      <p>A recurring theme across all engagement strands was the issue of internal capacity. Time,
expertise, and resource constraints limited many SMEs’ ability to engage with fast-evolving digital
technologies. When support was delivered through the Hands-on Support and Expert Guidance
dimension, such as one-to-one consultancy sessions, it created a trusted environment for SMEs to
explore their questions, however basic, without fear of judgement or exposure. This trust-based
approach also facilitated participation from underrepresented groups, fulfilling the goals of the
Inclusivity and Diversity strand. For example, several women and minority-led SMEs noted that the
inclusive, jargon-free format of workshops and podcasts made them feel more comfortable joining
the discussion and asking questions.</p>
      <p>Overall, the participatory approach of the AI-Cyber Nexus framework proved highly effective in
building trust, fostering dialogue, and enhancing engagement. The flexible, modular structure of the
framework enabled SMEs to participate at varying levels of intensity, depending on their needs and
availability. Participants expressed strong interest in future collaboration, including continued access
to support materials and follow-up programmes. These findings demonstrate the value of regional,
practice-led initiatives that go beyond awareness-raising to build real capability, reduce structural
barriers, and equip SMEs for a secure and inclusive digital future.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusion</title>
      <p>The AI-Cyber Nexus framework represents a timely and practical response to the growing need
for targeted, inclusive support at the intersection of artificial intelligence and cybersecurity within
the SME landscape. Drawing on lessons from earlier initiatives and informed by real-world
engagement across Greater Manchester, as a case-study, the framework addresses not only the
technical and operational challenges SMEs face, but also the broader structural barriers to
participation, resilience, and innovation.</p>
      <p>Greater Manchester was selected as the pilot region due to its strong history of innovation
support and active SME base. Its diversity, both in terms of business sectors and communities,
provided a valuable testbed for examining how inclusive and responsive the framework could be in
practice. Insights gained from the regional implementation offer important lessons for broader
adoption and replication across other UK regions.</p>
      <p>By organising its interventions around four key dimensions (Awareness and Engagement, Skills
and Capability Development, Hands-on Support and Expert Guidance, and Inclusivity and Diversity)
the framework provides a comprehensive approach to enabling responsible AI adoption and
strengthening cyber readiness. Its emphasis on accessibility, equity, and responsiveness ensures that
SMEs are not only better equipped to adopt emerging technologies securely, but are also supported
in ways that reflect their unique contexts and needs.</p>
      <p>While the framework does not claim to be exhaustive, its initial implementation has demonstrated
the value of an integrated, inclusive model for digital transformation and AI adoption. The findings
suggest that a combination of tailored support, practical learning opportunities, and attention to
diversity can significantly enhance SMEs’ readiness to navigate the dual opportunities and risks of
AI and cybersecurity.</p>
      <p>Looking ahead, there is significant potential to adapt this framework across different sectors by
tailoring its approach to their specific digital maturity, risk profiles, and operational challenges. The
framework could also strengthen connections with national digital and innovation strategies.
Further work is needed to deepen the evidence base, refine delivery mechanisms, and explore
longterm impact. Nonetheless, the AI-Cyber Nexus contributes to the ongoing efforts to ensure that no
SME is left behind in the rapidly evolving digital economy.</p>
    </sec>
    <sec id="sec-6">
      <title>Acknowledgements</title>
      <p>This initiative was made possible through funding and support from the UK Department for
Science, Innovation and Technology and InnovateUK as part of the Cyber Local Programme.</p>
      <p>During the preparation of this work, the authors used GPT-4 in order to: Grammar and spelling
check. After using this tool, the authors reviewed and edited the content as needed and take full
responsibility for the publication’s content.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <article-title>[1] OECD, The Digital Transformation of SMEs, OECD Studies on SMEs and Entrepreneurship (</article-title>
          <year>2021</year>
          ). [Online]. Available: doi:10.1787/bdb9256a-en
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>UK</given-names>
            <surname>Government</surname>
          </string-name>
          ,
          <source>National AI Strategy</source>
          , Department for Digital, Culture, Media and Sport (
          <year>2021</year>
          ). [Online]. Available: https://www.gov.uk/government/publications/national-ai-strategy
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>M.</given-names>
            <surname>Brundage</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Avin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Clark</surname>
          </string-name>
          , et al.,
          <source>The Malicious Use of Artificial Intelligence: Forecasting</source>
          , Prevention, and
          <string-name>
            <surname>Mitigation</surname>
          </string-name>
          , Future of Humanity Institute, University of Oxford (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>R.</given-names>
            <surname>Binns</surname>
          </string-name>
          ,
          <article-title>"On the apparent conflict between individual and group fairness,"</article-title>
          <source>Proceedings of the 2021 ACM Conference on Fairness, Accountability</source>
          , and
          <string-name>
            <surname>Transparency</surname>
          </string-name>
          (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>B.</given-names>
            <surname>Biggio</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Roli</surname>
          </string-name>
          ,
          <article-title>"Wild patterns: Ten years after the rise of adversarial machine learning,"</article-title>
          <source>Pattern Recognition</source>
          , vol.
          <volume>84</volume>
          , pp.
          <fpage>317</fpage>
          -
          <lpage>331</lpage>
          (
          <year>2018</year>
          ). doi:
          <volume>10</volume>
          .1016/j.patcog.
          <year>2018</year>
          .
          <volume>07</volume>
          .023.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>N.</given-names>
            <surname>Papernot</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>McDaniel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Goodfellow</surname>
          </string-name>
          , et al.,
          <article-title>"Practical Black-Box Attacks against Deep Learning Systems using Adversarial Examples," arXiv preprint</article-title>
          ,
          <source>arXiv:1602.02697</source>
          (
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>F.</given-names>
            <surname>Sharmeen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Sami</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Khan</surname>
          </string-name>
          , et al.,
          <article-title>"Artificial Intelligence for Cybersecurity: A Systematic Mapping Study,"</article-title>
          <source>Computers &amp; Security</source>
          , vol.
          <volume>127</volume>
          , p.
          <volume>102697</volume>
          (
          <year>2023</year>
          ). doi:
          <volume>10</volume>
          .1016/j.cose.
          <year>2023</year>
          .
          <volume>102697</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>ENISA</surname>
          </string-name>
          ,
          <article-title>Cybersecurity for SMEs, European Union Agency for Cybersecurity (</article-title>
          <year>2020</year>
          ). [Online]. Available: https://www.enisa.europa.eu/publications/cybersecurity-for-smes
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>NCSC</given-names>
            ,
            <surname>Cyber Security Small Business Guide</surname>
          </string-name>
          ,
          <source>National Cyber Security Centre</source>
          (
          <year>2023</year>
          ). [Online]. Available: https://www.ncsc.gov.uk/collection/small-business-guide
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>L.</given-names>
            <surname>Floridi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Cowls</surname>
          </string-name>
          ,
          <article-title>"A Unified Framework of Five Principles for AI in Society,"</article-title>
          <source>Harvard Data Science Review</source>
          , vol.
          <volume>1</volume>
          , no.
          <issue>1</issue>
          (
          <year>2019</year>
          ). doi:
          <volume>10</volume>
          .1162/99608f92.8cd550d1.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>European</surname>
            <given-names>Commission</given-names>
          </string-name>
          ,
          <article-title>Proposal for a Regulation on Artificial Intelligence (AI Act)</article-title>
          , COM/
          <year>2021</year>
          /206 final (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12] Department for Digital, Culture, Media &amp; Sport. (
          <year>2023</year>
          ).
          <article-title>UK cyber security skills in the labour market 2023</article-title>
          . https://www.gov.uk/government/publications/cyber
          <article-title>-security-skills-in-the-uklabour-market-2023</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Bhalerao</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kumar</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kumar</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Pujari</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          (
          <year>2022</year>
          ).
          <article-title>A study of barriers and benefits of artificial intelligence adoption in small and medium enterprise</article-title>
          .
          <source>Academy of Marketing Studies Journal</source>
          ,
          <volume>26</volume>
          (
          <issue>1</issue>
          ). Allied Business Academies.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Carter</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mwaura</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ram</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Trehan</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Jones</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          (
          <year>2015</year>
          ).
          <article-title>Barriers to ethnic minority and women's enterprise: Existing evidence, policy tensions and unsettled questions</article-title>
          .
          <source>International Small Business Journal: Researching Entrepreneurship</source>
          ,
          <volume>33</volume>
          (
          <issue>1</issue>
          ),
          <fpage>49</fpage>
          -
          <lpage>69</lpage>
          . doi:
          <volume>10</volume>
          .1177/0266242614556823
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Lyons</surname>
            ,
            <given-names>J. B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Meisner</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Bharati</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          (
          <year>2024</year>
          ).
          <article-title>Explainable AI for small and medium enterprises: Enabling trustworthy and context-aware adoption</article-title>
          .
          <source>Journal of Small Business Management</source>
          .
          <article-title>Advance online publication</article-title>
          .
          <source>doi:10.1080/00472778</source>
          .
          <year>2024</year>
          .2379999
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>