Search engine optimization poisoning: A cybersecurity threat analysis and mitigation strategies for small and medium-sized enterprises
Author
Abstract
Suggested Citation
DOI: 10.1016/j.techsoc.2024.102470
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
References listed on IDEAS
- Christos Ziakis & Maro Vlachopoulou & Theodosios Kyrkoudis & Makrina Karagkiozidou, 2019. "Important Factors for Improving Google Search Rank," Future Internet, MDPI, vol. 11(2), pages 1-12, January.
- John William Walker, 2021. "Data Security for the SME," International Journal of Cyber Forensics and Advanced Threat Investigations, Concept Tech Publishing, vol. 1(1-3), pages 47-52.
- Kamiya, Shinichi & Kang, Jun-Koo & Kim, Jungmin & Milidonis, Andreas & Stulz, René M., 2021. "Risk management, firm reputation, and the impact of successful cyberattacks on target firms," Journal of Financial Economics, Elsevier, vol. 139(3), pages 719-749.
- Abraham, Sherly & Chengalur-Smith, InduShobha, 2010. "An overview of social engineering malware: Trends, tactics, and implications," Technology in Society, Elsevier, vol. 32(3), pages 183-196.
- Alsharida, Rawan A. & Al-rimy, Bander Ali Saleh & Al-Emran, Mostafa & Zainal, Anazida, 2023. "A systematic review of multi perspectives on human cybersecurity behavior," Technology in Society, Elsevier, vol. 73(C).
- Yves Barlette & Katherine Gundolf & Annabelle Jaouen, 2017. "CEOs’ information security behavior in SMEs: Does ownership matter?," Post-Print hal-02000435, HAL.
- Stella Tomasi & Xiaolin Li, 2015. "Influences of Search Engine Optimization on Performance of SMEs: A Qualitative Perceptive," Journal of Electronic Commerce in Organizations (JECO), IGI Global, vol. 13(1), pages 27-49, January.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Agbodoh-Falschau, Kouassi Raymond & Ravaonorohanta, Bako Harinivo, 2023. "Investigating the influence of governance determinants on reporting cybersecurity incidents to police: Evidence from Canadian organizations’ perspectives," Technology in Society, Elsevier, vol. 74(C).
- Asad Hussain & Sunila Fatima Ahmad & Mishal Tanveer & Ansa Sameen Iqbal, 2022. "Computer Malware Classification, Factors, and Detection Techniques: A Systematic Literature Review (SLR)," International Journal of Innovations in Science & Technology, 50sea, vol. 4(3), pages 899-918, August.
- Milunovich, George & Lee, Seung Ah, 2022. "Measuring the impact of digital exchange cyberattacks on Bitcoin Returns," Economics Letters, Elsevier, vol. 221(C).
- Artur Strzelecki, 2020. "Google Medical Update: Why Is the Search Engine Decreasing Visibility of Health and Medical Information Websites?," IJERPH, MDPI, vol. 17(4), pages 1-13, February.
- Chris Florackis & Christodoulos Louca & Roni Michaely & Michael Weber & Itay Goldstein, 2023.
"Cybersecurity Risk,"
The Review of Financial Studies, Society for Financial Studies, vol. 36(1), pages 351-407.
- Chris Florakis & Christodoulos Louca & Roni Michaely & Michael Weber, 2020. "Cybersecurity Risk," Working Papers 2020-178, Becker Friedman Institute for Research In Economics.
- Chris Florackis & Christodoulos Louca & Roni Michaely & Michael Weber, 2020. "Cybersecurity Risk," Swiss Finance Institute Research Paper Series 20-108, Swiss Finance Institute.
- Chris Florackis & Christodoulos Louca & Roni Michaely & Michael Weber, 2020. "Cybersecurity Risk," NBER Working Papers 28196, National Bureau of Economic Research, Inc.
- Chris Florackis & Christodoulos Louca & Roni Michaely & Michael Weber & Michael Weber, 2020. "Cybersecurity Risk," CESifo Working Paper Series 8760, CESifo.
- Nguyen, Phan Dinh & Tran, Lobel Trong Thuy & Baker, John, 2021. "Driving university brand value through social media," Technology in Society, Elsevier, vol. 65(C).
- Aldasoro, Iñaki & Gambacorta, Leonardo & Giudici, Paolo & Leach, Thomas, 2022.
"The drivers of cyber risk,"
Journal of Financial Stability, Elsevier, vol. 60(C).
- Iñaki Aldasoro & Leonardo Gambacorta & Paolo Giudici & Thomas Leach, 2020. "The drivers of cyber risk," BIS Working Papers 865, Bank for International Settlements.
- Gambacorta, Leonardo & Aldasoro, Inaki & Giudici, Paolo & Leach, Thomas, 2020. "The drivers of cyber risk," CEPR Discussion Papers 14805, C.E.P.R. Discussion Papers.
- Yang, Xiao & Yang, Shudong, 2024. "Executives’ income tax burden, earnings management and stock reduction," Finance Research Letters, Elsevier, vol. 65(C).
- Mohammad Ashraful Ferdous Chowdhury & Mohammad Abdullah & Nurun Nowshin Chowdhury Nazia & Debarshi Roy, 2023. "The nonlinear and threshold effects of IT investment on the banking sector of Bangladesh," Economic Change and Restructuring, Springer, vol. 56(6), pages 4253-4283, December.
- Akey, Pat & Grégoire, Vincent & Martineau, Charles, 2022. "Price revelation from insider trading: Evidence from hacked earnings news," Journal of Financial Economics, Elsevier, vol. 143(3), pages 1162-1184.
- Rezaee, Zabihollah & Zhou, Gaoguang & Bu, Luofan (Luther), 2024. "Corporate social irresponsibility and the occurrence of data breaches: A stakeholder management perspective," International Journal of Accounting Information Systems, Elsevier, vol. 53(C).
- Bai-Sian Chen & Hong-Yi Chen & Hsiao-Yin Chen & Fang-Chi Lin, 2022. "Corporate growth and strategic payout policy," Review of Quantitative Finance and Accounting, Springer, vol. 59(2), pages 641-669, August.
- Wang, Jiaxin & Wu, Zhifeng & Yuan, Xue & Song, Zilong, 2024. "Peer governance effects of information security breaches," Energy Economics, Elsevier, vol. 129(C).
- Juhász, Péter & Szabó, Ágnes, 2021. "A koronavírus-járvány okozta válság vállalati kockázati térképe az első hullám hazai tapasztalatai alapján [The risk map of the Covid-19 crisis based on first-wave experience in Hungary]," Közgazdasági Szemle (Economic Review - monthly of the Hungarian Academy of Sciences), Közgazdasági Szemle Alapítvány (Economic Review Foundation), vol. 0(S11), pages 126-153.
- Xiaoli Guo & Andrew Fluharty, 2024. "Mandatory Disclosure of Negative Events and Auditor Behavior: Evidence from a Natural Experiment," JRFM, MDPI, vol. 17(11), pages 1-25, November.
- Martin Boyer & Martin Eling, 2023. "New advances on cyber risk and cyber insurance," The Geneva Papers on Risk and Insurance - Issues and Practice, Palgrave Macmillan;The Geneva Association, vol. 48(2), pages 267-274, April.
- Rickard, Amelia & Wagner, Jeffrey & Schull, Jonathan, 2017. "Observations on the technology and economics of digital emissions," Technology in Society, Elsevier, vol. 48(C), pages 28-32.
- Paméla Baillette & Yves Barlette, 2018. "Examining CEOs' behavior related to BYOD implementation through the CMUA," Post-Print hal-02102830, HAL.
- Peng, Jin & Zhang, Haofei & Mao, Juan & Xu, Shouhuai, 2023. "Repeated data breaches and firm value," Economics Letters, Elsevier, vol. 224(C).
- Nadine Gatzert & Madeline Schubert, 2022. "Cyber risk management in the US banking and insurance industry: A textual and empirical analysis of determinants and value," Journal of Risk & Insurance, The American Risk and Insurance Association, vol. 89(3), pages 725-763, September.
More about this item
Keywords
SME; SEO; Digital marketing; Cybersecurity;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:teinso:v:76:y:2024:i:c:s0160791x24000186. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/technology-in-society .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.