IDEAS home Printed from https://ideas.repec.org/a/eee/teinso/v76y2024ics0160791x24000186.html
   My bibliography  Save this article

Search engine optimization poisoning: A cybersecurity threat analysis and mitigation strategies for small and medium-sized enterprises

Author

Listed:
  • Le, Tran Duc
  • Le-Dinh, Thang
  • Uwizeyemungu, Sylvestre

Abstract

This study investigates the emerging cybersecurity threat of search engine optimization (SEO) poisoning and its impact on small and medium-sized enterprises’ (SMEs) digital marketing efforts. Through a comprehensive analysis of SEO poisoning techniques employed by attackers, the study reveals the significant risks and consequences for SMEs, including reputational damage, financial losses, and disrupted operations. To address these threats, the study proposes tailored mitigation strategies aligned with the principles of the NIST Cybersecurity Framework while considering the resource constraints facing SMEs. The mitigation recommendations encompass technical measures such as website security audits and employee training alongside non-technical initiatives to foster a culture of cybersecurity awareness. Additionally, the study offers several discussions that elucidate the multifaceted challenges posed by SEO poisoning in the SME context from both internal and external perspectives. These contributions will empower SMEs and digital marketers to implement proactive safeguards against SEO poisoning risks and preserve their online presence. The study underscores the need for continued vigilance and adaptive security to combat the evolving tactics of cyber adversaries in the digital marketing domain.

Suggested Citation

  • Le, Tran Duc & Le-Dinh, Thang & Uwizeyemungu, Sylvestre, 2024. "Search engine optimization poisoning: A cybersecurity threat analysis and mitigation strategies for small and medium-sized enterprises," Technology in Society, Elsevier, vol. 76(C).
  • Handle: RePEc:eee:teinso:v:76:y:2024:i:c:s0160791x24000186
    DOI: 10.1016/j.techsoc.2024.102470
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0160791X24000186
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.techsoc.2024.102470?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Christos Ziakis & Maro Vlachopoulou & Theodosios Kyrkoudis & Makrina Karagkiozidou, 2019. "Important Factors for Improving Google Search Rank," Future Internet, MDPI, vol. 11(2), pages 1-12, January.
    2. John William Walker, 2021. "Data Security for the SME," International Journal of Cyber Forensics and Advanced Threat Investigations, Concept Tech Publishing, vol. 1(1-3), pages 47-52.
    3. Kamiya, Shinichi & Kang, Jun-Koo & Kim, Jungmin & Milidonis, Andreas & Stulz, René M., 2021. "Risk management, firm reputation, and the impact of successful cyberattacks on target firms," Journal of Financial Economics, Elsevier, vol. 139(3), pages 719-749.
    4. Abraham, Sherly & Chengalur-Smith, InduShobha, 2010. "An overview of social engineering malware: Trends, tactics, and implications," Technology in Society, Elsevier, vol. 32(3), pages 183-196.
    5. Alsharida, Rawan A. & Al-rimy, Bander Ali Saleh & Al-Emran, Mostafa & Zainal, Anazida, 2023. "A systematic review of multi perspectives on human cybersecurity behavior," Technology in Society, Elsevier, vol. 73(C).
    6. Yves Barlette & Katherine Gundolf & Annabelle Jaouen, 2017. "CEOs’ information security behavior in SMEs: Does ownership matter?," Post-Print hal-02000435, HAL.
    7. Stella Tomasi & Xiaolin Li, 2015. "Influences of Search Engine Optimization on Performance of SMEs: A Qualitative Perceptive," Journal of Electronic Commerce in Organizations (JECO), IGI Global, vol. 13(1), pages 27-49, January.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Agbodoh-Falschau, Kouassi Raymond & Ravaonorohanta, Bako Harinivo, 2023. "Investigating the influence of governance determinants on reporting cybersecurity incidents to police: Evidence from Canadian organizations’ perspectives," Technology in Society, Elsevier, vol. 74(C).
    2. Asad Hussain & Sunila Fatima Ahmad & Mishal Tanveer & Ansa Sameen Iqbal, 2022. "Computer Malware Classification, Factors, and Detection Techniques: A Systematic Literature Review (SLR)," International Journal of Innovations in Science & Technology, 50sea, vol. 4(3), pages 899-918, August.
    3. Milunovich, George & Lee, Seung Ah, 2022. "Measuring the impact of digital exchange cyberattacks on Bitcoin Returns," Economics Letters, Elsevier, vol. 221(C).
    4. Artur Strzelecki, 2020. "Google Medical Update: Why Is the Search Engine Decreasing Visibility of Health and Medical Information Websites?," IJERPH, MDPI, vol. 17(4), pages 1-13, February.
    5. Chris Florackis & Christodoulos Louca & Roni Michaely & Michael Weber & Itay Goldstein, 2023. "Cybersecurity Risk," The Review of Financial Studies, Society for Financial Studies, vol. 36(1), pages 351-407.
    6. Nguyen, Phan Dinh & Tran, Lobel Trong Thuy & Baker, John, 2021. "Driving university brand value through social media," Technology in Society, Elsevier, vol. 65(C).
    7. Aldasoro, Iñaki & Gambacorta, Leonardo & Giudici, Paolo & Leach, Thomas, 2022. "The drivers of cyber risk," Journal of Financial Stability, Elsevier, vol. 60(C).
    8. Yang, Xiao & Yang, Shudong, 2024. "Executives’ income tax burden, earnings management and stock reduction," Finance Research Letters, Elsevier, vol. 65(C).
    9. Mohammad Ashraful Ferdous Chowdhury & Mohammad Abdullah & Nurun Nowshin Chowdhury Nazia & Debarshi Roy, 2023. "The nonlinear and threshold effects of IT investment on the banking sector of Bangladesh," Economic Change and Restructuring, Springer, vol. 56(6), pages 4253-4283, December.
    10. Akey, Pat & Grégoire, Vincent & Martineau, Charles, 2022. "Price revelation from insider trading: Evidence from hacked earnings news," Journal of Financial Economics, Elsevier, vol. 143(3), pages 1162-1184.
    11. Rezaee, Zabihollah & Zhou, Gaoguang & Bu, Luofan (Luther), 2024. "Corporate social irresponsibility and the occurrence of data breaches: A stakeholder management perspective," International Journal of Accounting Information Systems, Elsevier, vol. 53(C).
    12. Bai-Sian Chen & Hong-Yi Chen & Hsiao-Yin Chen & Fang-Chi Lin, 2022. "Corporate growth and strategic payout policy," Review of Quantitative Finance and Accounting, Springer, vol. 59(2), pages 641-669, August.
    13. Wang, Jiaxin & Wu, Zhifeng & Yuan, Xue & Song, Zilong, 2024. "Peer governance effects of information security breaches," Energy Economics, Elsevier, vol. 129(C).
    14. Juhász, Péter & Szabó, Ágnes, 2021. "A koronavírus-járvány okozta válság vállalati kockázati térképe az első hullám hazai tapasztalatai alapján [The risk map of the Covid-19 crisis based on first-wave experience in Hungary]," Közgazdasági Szemle (Economic Review - monthly of the Hungarian Academy of Sciences), Közgazdasági Szemle Alapítvány (Economic Review Foundation), vol. 0(S11), pages 126-153.
    15. Xiaoli Guo & Andrew Fluharty, 2024. "Mandatory Disclosure of Negative Events and Auditor Behavior: Evidence from a Natural Experiment," JRFM, MDPI, vol. 17(11), pages 1-25, November.
    16. Martin Boyer & Martin Eling, 2023. "New advances on cyber risk and cyber insurance," The Geneva Papers on Risk and Insurance - Issues and Practice, Palgrave Macmillan;The Geneva Association, vol. 48(2), pages 267-274, April.
    17. Rickard, Amelia & Wagner, Jeffrey & Schull, Jonathan, 2017. "Observations on the technology and economics of digital emissions," Technology in Society, Elsevier, vol. 48(C), pages 28-32.
    18. Paméla Baillette & Yves Barlette, 2018. "Examining CEOs' behavior related to BYOD implementation through the CMUA," Post-Print hal-02102830, HAL.
    19. Peng, Jin & Zhang, Haofei & Mao, Juan & Xu, Shouhuai, 2023. "Repeated data breaches and firm value," Economics Letters, Elsevier, vol. 224(C).
    20. Nadine Gatzert & Madeline Schubert, 2022. "Cyber risk management in the US banking and insurance industry: A textual and empirical analysis of determinants and value," Journal of Risk & Insurance, The American Risk and Insurance Association, vol. 89(3), pages 725-763, September.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:teinso:v:76:y:2024:i:c:s0160791x24000186. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/technology-in-society .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.