Mapping Cybersecurity in SMEs: The Role of Ownership and Firm Characteristics in the Silesian Region of Poland
Abstract
1. Introduction
2. Theoretical Framework and Hypothesis Development
2.1. Theoretical Framework
2.2. Hypothesis Development
3. Materials and Methods
- Cybersecurity practices,
- Cybersecurity awareness,
- Cybersecurity perception.
- Number of SMEs’ years on the market.
- Size of SMEs (small companies with fewer than 50 employees or medium-sized companies with fewer than 249 employees).
- Sector of the SME’s performance (three main sectors: industry, services, and trade).
- Form of SME ownership (family-owned and -run enterprises and non-family-owned and -run).
- Year-on-year growth in the number of employees in SMEs.
- Market share.
- Sales revenue.
- Profitability.
- Financial liquidity.
- Overall financial situation.
- Operating profit margin (difference between sales revenue and operating expenses).
3.1. Sample
3.2. Variables and Measures—Cybersecurity
- Questions related to cybersecurity practices.
- We have implemented processes or tools to assess risks associated with IT assets.
- We have implemented certain processes or tools to identify cyber vulnerabilities.
- We have implemented certain processes or tools to identify cyberattacks.
- 2.
- Questions related to cybersecurity awareness (quality of human capital).
- We offer courses or training to employees to increase their cybersecurity awareness.
- We have positions dedicated to cybersecurity at all levels of management.
- We hold meetings or presentations internally on cybersecurity issues.
- Employees can use company devices (e.g., laptops) and applications at home.
- 3.
- Questions related to cybersecurity perception.
- We believe that our company is vulnerable to cyberattacks.
- The impact of previous cyberattacks on our company has been significant.
- The loss of data in the cyberattack will cause serious disruptions to our business.
3.3. Variables and Measures—Financial Performance and Company Health
- 4.
- Questions related to financial performance.
- We increased the number of employees.
- We have increased our market share.
- Our sales revenue increased.
- 5.
- Questions related to the financial health of the company.
- Our company maintains profitability (profitability).
- Our company maintains financial liquidity at a good and stable level (there is no payment stress—cash shortage).
- The overall financial situation of our company is good (no risk of bankruptcy).
- We are satisfied with the operating profit margin (the difference between sales revenue and operating costs).
4. Results
5. Discussion and Conclusions
- Three factors (predictors) influence the level of cybersecurity of the surveyed companies. These variables are the size of the SME, the form of the SME’s ownership, and the level of financial performance and company health.
- The size of the SME is a statistically significant predictor of the level of cybersecurity, so we can conclude that the larger the enterprise is, the better its cybersecurity protection.
- The level of cybersecurity is also influenced by the form of SME ownership. This means that family businesses have a worse level of cybersecurity than those that did not identify as family businesses in the survey. This may be because non-family firms may fill positions based not on family ties but on expertise. It may also be that non-family firms are more open to know-how.
Limitations and Further Research
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Abbreviations
IT | Information Technology |
EU | European Union |
SME | Small and Medium Enterprise |
ExCORE | Excellence in Transition of Coal Regions |
ANOVA | Analysis of Variance |
NACE | Nomenclature statistique des Activités économiques dans la Communauté Européenne—Statistical Classification of Economic Activities in the European Community |
NAWA | Narodowa Agencja Wymiany Akademickiej—Polish National Agency for Academic Exchange |
References
- Directorate-General for Communication European Commission. Special Eurobarometer 499: Europeans’ Attitudes Towards Cyber Security (Cybercrime)—Data Europa EU; Directorate-General for Communication European Commission: Brussels, Belgium, 2020. [Google Scholar]
- Schneier, B. Kliknij Tutaj, aby Zabić Wszystkich. Bezpieczeństwo i Przetrwanie w Hiperpołączonym Świecie; Wydawnictwo Helion: Gliwice, Poland, 2019; ISBN 978-83-283-5199-8. [Google Scholar]
- World Economic Forum. 2023 Was a Big Year for Cybercrime—Here’s How We Prepare for the Future. Available online: https://www.weforum.org/agenda/2024/01/cybersecurity-cybercrime-system-safety/ (accessed on 13 May 2024).
- Granados Franco, E. The Global Risks Report 2020. Insight Report, 15th ed.; World Economic Forum: Geneva, Switzerland, 2020. [Google Scholar]
- Accenture. State of Cybersecurity Resilience 2021. How Aligning Security and the Business Creates Cyber Resilience; Accenture: Dublin, Ireland, 2021. [Google Scholar]
- Gupta, J.; Barzotto, M.; Khorasgani, A. Does Size Matter in Predicting SMEs Failure? Int. J. Fin. Econ. 2018, 23, 571–605. [Google Scholar] [CrossRef]
- Ponemon Institute. The 2023 Global Study on Closing the IT Security Gap: Addressing Cybersecurity Gaps from Edge to Cloud; Ponemon Institute: North Traverse City, MI, USA, 2023. [Google Scholar]
- Hu, Q.; Asghar, M.R.; Brownlee, N. Evaluating Network Intrusion Detection Systems for High-Speed Networks. In Proceedings of the 2017 27th International Telecommunication Networks and Applications Conference (ITNAC), Melbourne, VIC, Australia, 22–24 November 2017; IEEE: Melbourne, Australia, 2017; pp. 1–6. [Google Scholar]
- Menezes, A.J.; van Oorschot, P.C.; Vanstone, S.A. Handbook of Applied Cryptography; CRC Press series on discrete mathematics and its applications; CRC Press: Boca Raton, FL, USA, 1997; ISBN 978-0-8493-8523-0. [Google Scholar]
- Casino, F.; Dasaklis, T.K.; Patsakis, C. A Systematic Literature Review of Blockchain-Based Applications: Current Status, Classification and Open Issues. Telemat. Inform. 2019, 36, 55–81. [Google Scholar] [CrossRef]
- Rahman, N.A.A.; Sairi, I.H.; Zizi, N.A.M.; Khalid, F. The Importance of Cybersecurity Education in School. Int. J. Inf. Educ. Technol. 2020, 10, 378–382. [Google Scholar] [CrossRef]
- Li, L.; He, W.; Xu, L.; Ash, I.; Anwar, M.; Yuan, X. Investigating the Impact of Cybersecurity Policy Awareness on Employees’ Cybersecurity Behavior. Int. J. Inf. Manag. 2019, 45, 13–24. [Google Scholar] [CrossRef]
- Chen, J.; Henry, E.; Jiang, X. Is Cybersecurity Risk Factor Disclosure Informative? Evidence from Disclosures Following a Data Breach. J. Bus. Ethics 2023, 187, 199–224. [Google Scholar] [CrossRef]
- Thames, L.; Schaefer, D. Industry 4.0: An Overview of Key Benefits, Technologies, and Challenges. In Cybersecurity for Industry 4.0; Thames, L., Schaefer, D., Eds.; Springer Series in Advanced Manufacturing; Springer International Publishing: Cham, Switzerland, 2017; pp. 1–33. ISBN 978-3-319-50659-3. [Google Scholar]
- Raamets, T.; Karjust, K.; Hermaste, A.; Mahmood, K. Planning and Acquisition of Real-Time Production Data Through the Virtual Factory in Chemical Industry. In Proceedings of the ASME 2021 International Mechanical Engineering Congress and Exposition. Volume 2B: Advanced Man-ufacturing; American Society of Mechanical Engineers, Virtual, Online, 1 November 2021; p. V02BT02A017. [Google Scholar]
- Kutzler, T.; Wolter, A.; Kenner, A.; Dassow, S. Boosting Cyber-Physical System Security. IFAC-Pap. 2021, 54, 976–981. [Google Scholar] [CrossRef]
- Morozova, O.; Nicheporuk, A.; Tetskyi, A.; Tkachov, V. Methods and Technologies for Ensuring Cybersecurity of Industrial and Web-Oriented Systems and Networks. Radioelectron. Comput. Syst. 2021, 4, 145–156. [Google Scholar] [CrossRef]
- Corallo, A.; Lazoi, M.; Lezzi, M. Cybersecurity in the Context of Industry 4.0: A Structured Classification of Critical Assets and Business Impacts. Comput. Ind. 2020, 114, 103165. [Google Scholar] [CrossRef]
- Stallings, W.; Brown, L. Bezpieczeństwo Systemów Informatycznych: Zasady i Praktyka, 4th ed.; Wydawnictwo Helion: Gliwice, Poland, 2019; Volume 1, ISBN 978-83-283-4299-6. [Google Scholar]
- ISO/IEC 27001:2022; Information Security, Cybersecurity and Privacy Protection—Information Security Management Systems—Requirements. International Organization for Standardization: Geneva, Switzerland, 2022. Available online: https://www.iso.org/standard/82875.html (accessed on 22 November 2022).
- Shaabany, G.; Anderl, R. Designing an Effective Course to Improve Cybersecurity Awareness for Engineering Faculties. In Advances in Human Factors in Cybersecurity; Ahram, T.Z., Nicholson, D., Eds.; Advances in Intelligent Systems and Computing; Springer International Publishing: Cham, Switzerland, 2019; Volume 782, pp. 203–211. ISBN 978-3-319-94781-5. [Google Scholar]
- Ramim, M.M.; Hueca, A. Cybersecurity Capacity Building of Human Capital: Nations Supporting Nations. J. Appl. Knowl. Manag. (OJAKM) 2021, 9, 65–85. [Google Scholar] [CrossRef]
- Pandey, S.; Singh, R.K.; Gunasekaran, A. Supply Chain Risks in Industry 4.0 Environment: Review and Analysis Framework. Prod. Plan. Control 2023, 34, 1275–1302. [Google Scholar] [CrossRef]
- Boletsis, C.; Halvorsrud, R.; Pickering, J.B.; Phillips, S.; Surridge, M. Cybersecurity for SMEs: Introducing the Human Element into Socio-Technical Cybersecurity Risk Assessment. In Proceedings of the 16th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications, Online, 8–10 February 2021; SCITEPRESS—Science and Technology Publications: Setúbal, Portugal, 2021; Volume 3, pp. 266–274. [Google Scholar]
- Asen, A.; Bohmayr, W.; Deutscher, S.; González, M.; Mkrtchian, D. Are You Spending Enough on Cybersecurity? Boston Consulting Group: Boston, MA, USA, 2019; pp. 1–7. [Google Scholar]
- European Commission. EUROBAROMETER No. 2280/FL496 SMEs and Cybercrime Report; European Commission Publications Office: Luxembourg, 2022. [Google Scholar]
- Alshboul, Y.; Streff, K. Beyond Cybersecurity Awareness: Antecedents and Satisfaction. In Proceedings of the 2017 International Conference on Software and e-Business, Hong Kong, China, 28–30 December 2017; pp. 85–91. [Google Scholar]
- Ponsard, C.; Grandclaudon, J. Guidelines and Tool Support for Building a Cybersecurity Awareness Program for SMEs. In Information Systems Security and Privacy; Mori, P., Furnell, S., Camp, O., Eds.; Communications in Computer and Information Science; Springer International Publishing: Cham, Switzerland, 2020; Volume 1221, pp. 335–357. ISBN 978-3-030-49442-1. [Google Scholar]
- Nobles, C. Stress, Burnout, and Security Fatigue in Cybersecurity: A Human Factors Problem. HOLISTICA—J. Bus. Public Adm. 2022, 13, 49–72. [Google Scholar] [CrossRef]
- Levy, Y.; Gafni, R. Introducing the Concept of Cybersecurity Footprint. Inf. Comput. Secur. 2021, 29, 724–736. [Google Scholar] [CrossRef]
- Süzen, A.A. A Risk-Assessment of Cyber Attacks and Defense Strategies in Industry 4.0 Ecosystem. Int. J. Comput. Netw. Inf. Secur. 2020, 12, 1–12. [Google Scholar] [CrossRef]
- Walker-Roberts, S.; Hammoudeh, M.; Aldabbas, O.; Aydin, M.; Dehghantanha, A. Threats on the Horizon: Understanding Security Threats in the Era of Cyber-Physical Systems. J. Supercomput. 2020, 76, 2643–2664. [Google Scholar] [CrossRef]
- Ghobakhloo, M. Determinants of Information and Digital Technology Implementation for Smart Manufacturing. Int. J. Prod. Res. 2020, 58, 2384–2405. [Google Scholar] [CrossRef]
- Bada, M.; Furnell, S.; Nurse, J.R.C.; Dymydiuk, J. Supporting Small and Medium-Sized Enterprises in Using Privacy Enhancing Technologies. In HCI for Cybersecurity, Privacy and Trust; Moallem, A., Ed.; Lecture Notes in Computer Science; Springer Nature Switzerland: Cham, Switzerland, 2023; Volume 14045, pp. 274–289. ISBN 978-3-031-35821-0. [Google Scholar]
- Bhattacharya, D. Evolution of Cybersecurity Issues in Small Businesses. In Proceedings of the 4th Annual ACM Conference on Research in Information Technology, Chicago, IL, USA, 29 September 2015; p. 11. [Google Scholar]
- PwC CEE Findings from the 2023 Global Digital Trust Insights. Available online: https://www.pwc.com/c1/en/2023-cee-digital-trust-insights.html (accessed on 13 May 2024).
- Brustbauer, J. Enterprise Risk Management in SMEs: Towards a Structural Model. Int. Small Bus. J. 2016, 34, 70–85. [Google Scholar] [CrossRef]
- Culot, G.; Fattori, F.; Podrecca, M.; Sartor, M. Addressing Industry 4.0 Cybersecurity Challenges. IEEE Eng. Manag. Rev. 2019, 47, 79–86. [Google Scholar] [CrossRef]
- Chaudhary, S. Driving Behaviour Change with Cybersecurity Awareness. Comput. Secur. 2024, 142, 103858. [Google Scholar] [CrossRef]
- Ferraioli, J. Megatrends: Opportunities on the Front Lines of Cybersecurity. Available online: https://www.morganstanley.com/articles/investing-in-cybersecurity-long-term-guide (accessed on 13 May 2024).
- Ehret, M.; Kashyap, V.; Wirtz, J. Business Models: Impact on Business Markets and Opportunities for Marketing Research. Ind. Mark. Manag. 2013, 42, 649–655. [Google Scholar] [CrossRef]
- Kent Baker, H.; Mukherjee, T.K. Survey Research in Finance: Views from Journal Editors. Int. J. Manag. Financ. 2007, 3, 11–25. [Google Scholar] [CrossRef]
- Erdogan, G.; Halvorsrud, R.; Boletsis, C.; Tverdal, S.; Pickering, J. Cybersecurity Awareness and Capacities of SMEs. In Proceedings of the 9th International Conference on Information Systems Security and Privacy, Lisbon, Portugal, 22–24 February 2023; SCITEPRESS—Science and Technology Publications: Lisbon, Portugal, 2023; pp. 296–304. [Google Scholar]
- Raport o Stanie Województwa za rok 2023—Biuletyn Informacji Publicznej Samorządu Województwa Śląskiego; Urząd Marszałkowski Województwa Śląskiego: Katowice, Poland, 2024.
- Ozili, P.K. The Acceptable R-Square in Empirical Modelling for Social Science Research. Available online: https://mpra.ub.uni-muenchen.de/115769/1/MPRA_paper_115769 (accessed on 13 May 2024).
- Ozili, P.K. The Acceptable R-Square in Empirical Modelling for Social Science Research. SSRN J. 2023. [Google Scholar] [CrossRef]
- Alahmari, A.; Duncan, B. Cybersecurity Risk Management in Small and Medium-Sized Enterprises: A Systematic Review of Recent Evidence. In Proceedings of the 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), Dublin, Ireland, 15–19 June 2020; IEEE: Dublin, Ireland, 2020; pp. 1–5. [Google Scholar]
- Yamin, M.M.; Katt, B.; Gkioulos, V. Cyber Ranges and Security Testbeds: Scenarios, Functions, Tools and Architecture. Comput. Secur. 2020, 88, 101636. [Google Scholar] [CrossRef]
- Bada, M.; Nurse, J.R.C. Developing Cybersecurity Education and Awareness Programmes for Small- and Medium-Sized Enterprises (SMEs). Inf. Comput. Secur. 2019, 27, 393–410. [Google Scholar] [CrossRef]
- Sabilion, R. Delivering Effective Cybersecurity Awareness Training to Support the Organizational Information Security Function. In Research Anthology on Privatizing and Securing Data; IGI Global: Hershey, PA, USA, 2021. [Google Scholar] [CrossRef]
- Melaku, H.M. A Dynamic and Adaptive Cybersecurity Governance Framework. J. Cybersecur. Priv. 2023, 3, 327–350. [Google Scholar] [CrossRef]
- Calvo-Manzano, J.A.; Feliu, T.S.; Herranz, Á.; Mariño, J.; Fredlund, L.-Å.; Colomo-Palacios, R.; Moreno, A.M. Towards an Integrated Cybersecurity Framework for Small and Medium Enterprises. In Systems, Software and Services Process Improvement: 31st European Conference, EuroSPI 2024, Munich, Germany, 4–6 September 2024; Communications in Computer and Information Science; Springer: Cham, Switzerland, 2024. [Google Scholar] [CrossRef]
Characteristics of Companies | N (%) |
---|---|
Size of SME | |
Small enterprise (0–49 employees) | 124 (62) |
Medium enterprise (0–49 employees) | 76 (38) |
Sector of SME’s performance | |
Trade business | 29 (14.5) |
Production | 79 (39.5) |
Services | 92 (46) |
Form of SME’s ownership | |
Family business | 122 (61) |
Non-family business | 78 (39) |
Minimum | Maximum | Mean | Std. Deviation | Skewness | Kurtosis | |
---|---|---|---|---|---|---|
Cybersecurity scale | 10 | 67 | 38.60 | 11.05 | −0.02 | −0.17 |
Financial performance and company health | 7 | 49 | 31.56 | 7.69 | −0.36 | 0.39 |
Form | N | Minimum | Maximum | Mean | Std. Deviation | |
---|---|---|---|---|---|---|
Size of SME | Small | 124 | 10 | 67 | 36.12 | 10.62 |
Medium | 76 | 10 | 63 | 42.62 | 10.60 | |
Form of SME’s ownership (family business) | No | 78 | 10 | 67 | 41.51 | 11.27 |
Yes | 122 | 10 | 63 | 36.72 | 10.53 | |
Sector of SME’s performance | Trade | 29 | 14 | 62 | 39.76 | 10.85 |
Industry | 79 | 10 | 61 | 38.81 | 10.56 | |
Services | 92 | 10 | 67 | 38.03 | 11.60 |
Predictor | Model 1 (R2 = 0.12 ***) | Model 2 (ΔR2 = 0.05 **) | ||||||
---|---|---|---|---|---|---|---|---|
B (CI) | SE (B) | β | p | B (CI) | SE (B) | β | p | |
Size of SME’s | 6.36 (3.38;9.35) | 1.52 | 0.28 | 0.000 | 6.21 (3.29;9.13) | 1.48 | 0.27 | 0.000 |
Form of SME’s ownership | −4.61 (−7.58;−1.64) | 1.51 | −0.20 | 0.003 | −4.59 (−7.49;−1.68) | 1.47 | −0.20 | 0.002 |
Financial performance and health | 0.30 (0.12;0.48) | 0.09 | 0.21 | 0.002 | ||||
F | 13.87 *** | 13.11 *** |
Predictor | Model 1 (R2 = 0.05 **) | |||
---|---|---|---|---|
B (CI) | SE (B) | Β | p | |
Cybersecurity level | 0.15 (0.06;0.25) | 0.05 | 0.22 | 0.002 |
F | 10.02 ** |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Šafár, L.; Pekarčik, M.; Morawiec, P.; Rutecka, P.; Wieczorek-Kosmala, M. Mapping Cybersecurity in SMEs: The Role of Ownership and Firm Characteristics in the Silesian Region of Poland. Information 2025, 16, 590. https://doi.org/10.3390/info16070590
Šafár L, Pekarčik M, Morawiec P, Rutecka P, Wieczorek-Kosmala M. Mapping Cybersecurity in SMEs: The Role of Ownership and Firm Characteristics in the Silesian Region of Poland. Information. 2025; 16(7):590. https://doi.org/10.3390/info16070590
Chicago/Turabian StyleŠafár, Leoš, Marek Pekarčik, Patryk Morawiec, Paulina Rutecka, and Monika Wieczorek-Kosmala. 2025. "Mapping Cybersecurity in SMEs: The Role of Ownership and Firm Characteristics in the Silesian Region of Poland" Information 16, no. 7: 590. https://doi.org/10.3390/info16070590
APA StyleŠafár, L., Pekarčik, M., Morawiec, P., Rutecka, P., & Wieczorek-Kosmala, M. (2025). Mapping Cybersecurity in SMEs: The Role of Ownership and Firm Characteristics in the Silesian Region of Poland. Information, 16(7), 590. https://doi.org/10.3390/info16070590