Matches in SemOpenAlex for { <https://semopenalex.org/work/W2940226380> ?p ?o ?g. }
Showing items 1 to 71 of
71
with 100 items per page.
- W2940226380 abstract "Small and medium enterprises are major stakeholders in developing countries’ economies. In Kenya although SMEs take off on a high note their life span is short. SMEs are more exposed to information security risks, short life and thus poor performance. The general objective of this study was to investigate the on the influence of information technology security practices on the performance of small and medium enterprises in Nairobi County. This research study used a descriptive research design. The targeted population was the 1,221 owners or general managers of all the SMEs in the hotel sector operating in Nairobi County. Random sampling was used to choose a sample size of 292 SME owners or managers from the targeted population. Semi structured questionnaires were used to collect primary data. To test the reliability and validity of the instruments of research a pilot test was conducted. Thematic content analysis was used to analyze qualitative data realized from open-ended questions while quantitative data was analyzed using inferential and descriptive statics by employing Statistical Package for Social Sciences (SPSS version 22). Descriptive statistics and multiple regression analysis were employed to determine the relationship between independent and dependent variables. The study found that privacy and confidentiality policy, back up policy as well as policies on sharing, storing and transmitting of data influence the performance of SMEs in Kenya. In addition, communication channels, security training and education as well as frequency of training influences the performance of SMEs in Kenya. The study established that use of passwords was the most used access control measure to enhance information technology security, followed by smart cards and biometric access controls. The study recommends that SMEs that have adopted information technology to come up with an IT security policies. The policies should comprise of use of passwords, encryption and consequences of misuse of ICT resources among others. In addition, the management of SMEs should plan for training programs on information technology security. This will help in ensuring that the staff have up-to-date information on security risks and how to mitigate them." @default.
- W2940226380 created "2019-04-25" @default.
- W2940226380 creator A5004132051 @default.
- W2940226380 creator A5007135013 @default.
- W2940226380 date "2017-05-01" @default.
- W2940226380 modified "2023-09-23" @default.
- W2940226380 title "Information Technology Security Practices and Performance of Small and Medium Enterprises in Nairobi County, Kenya" @default.
- W2940226380 hasPublicationYear "2017" @default.
- W2940226380 type Work @default.
- W2940226380 sameAs 2940226380 @default.
- W2940226380 citedByCount "0" @default.
- W2940226380 crossrefType "journal-article" @default.
- W2940226380 hasAuthorship W2940226380A5004132051 @default.
- W2940226380 hasAuthorship W2940226380A5007135013 @default.
- W2940226380 hasConcept C10138342 @default.
- W2940226380 hasConcept C105795698 @default.
- W2940226380 hasConcept C133462117 @default.
- W2940226380 hasConcept C144024400 @default.
- W2940226380 hasConcept C144133560 @default.
- W2940226380 hasConcept C149923435 @default.
- W2940226380 hasConcept C162853370 @default.
- W2940226380 hasConcept C185592680 @default.
- W2940226380 hasConcept C198531522 @default.
- W2940226380 hasConcept C2908647359 @default.
- W2940226380 hasConcept C33923547 @default.
- W2940226380 hasConcept C39896193 @default.
- W2940226380 hasConcept C43617362 @default.
- W2940226380 hasConcept C48879800 @default.
- W2940226380 hasConceptScore W2940226380C10138342 @default.
- W2940226380 hasConceptScore W2940226380C105795698 @default.
- W2940226380 hasConceptScore W2940226380C133462117 @default.
- W2940226380 hasConceptScore W2940226380C144024400 @default.
- W2940226380 hasConceptScore W2940226380C144133560 @default.
- W2940226380 hasConceptScore W2940226380C149923435 @default.
- W2940226380 hasConceptScore W2940226380C162853370 @default.
- W2940226380 hasConceptScore W2940226380C185592680 @default.
- W2940226380 hasConceptScore W2940226380C198531522 @default.
- W2940226380 hasConceptScore W2940226380C2908647359 @default.
- W2940226380 hasConceptScore W2940226380C33923547 @default.
- W2940226380 hasConceptScore W2940226380C39896193 @default.
- W2940226380 hasConceptScore W2940226380C43617362 @default.
- W2940226380 hasConceptScore W2940226380C48879800 @default.
- W2940226380 hasIssue "2" @default.
- W2940226380 hasLocation W29402263801 @default.
- W2940226380 hasOpenAccess W2940226380 @default.
- W2940226380 hasPrimaryLocation W29402263801 @default.
- W2940226380 hasRelatedWork W1709367148 @default.
- W2940226380 hasRelatedWork W2173102392 @default.
- W2940226380 hasRelatedWork W2182505002 @default.
- W2940226380 hasRelatedWork W2185878732 @default.
- W2940226380 hasRelatedWork W2528494844 @default.
- W2940226380 hasRelatedWork W2555828469 @default.
- W2940226380 hasRelatedWork W2617194032 @default.
- W2940226380 hasRelatedWork W2740195788 @default.
- W2940226380 hasRelatedWork W2800949610 @default.
- W2940226380 hasRelatedWork W2923772582 @default.
- W2940226380 hasRelatedWork W2939776533 @default.
- W2940226380 hasRelatedWork W2950240452 @default.
- W2940226380 hasRelatedWork W2982451008 @default.
- W2940226380 hasRelatedWork W2989189664 @default.
- W2940226380 hasRelatedWork W2996455408 @default.
- W2940226380 hasRelatedWork W3010512511 @default.
- W2940226380 hasRelatedWork W3094545426 @default.
- W2940226380 hasRelatedWork W3131328168 @default.
- W2940226380 hasRelatedWork W3207019881 @default.
- W2940226380 hasRelatedWork W3212759812 @default.
- W2940226380 hasVolume "3" @default.
- W2940226380 isParatext "false" @default.
- W2940226380 isRetracted "false" @default.
- W2940226380 magId "2940226380" @default.
- W2940226380 workType "article" @default.