Mge 2025 1 181.1
Mge 2025 1 181.1
net/publication/388382166
Article in International Journal of Multidisciplinary Research and Growth Evaluation · January 2025
CITATIONS READS
0 379
2 authors, including:
Anfo Pub
DU
708 PUBLICATIONS 7,145 CITATIONS
SEE PROFILE
All content following this page was uploaded by Anfo Pub on 25 January 2025.
DOI: https://doi.org/10.54660/.IJMRGE.2025.6.1.982-988
Keywords: AI-driven cybersecurity, SMEs, Digital economy, Cybersecurity threats, Machine learning, Data privacy
1. Introduction
1.1 Background on SMEs in the Digital Economy
Small and Medium-sized Enterprises (SMEs) serve as the backbone of many economies worldwide, driving innovation,
employment, and economic growth. With the ongoing digital transformation, SMEs are increasingly adopting digital
technologies to enhance their operations, reach global markets, and improve customer engagement (Bhuiyan et al., 2024) [15].
Cloud computing, e-commerce platforms, and digital payment systems are becoming indispensable tools for these businesses.
However, this shift towards digitalization has also exposed SMEs to a variety of cyber threats, such as phishing attacks,
ransomware, and data breaches. Unlike larger corporations, SMEs often lack the resources and expertise to effectively manage
cybersecurity risks, leaving them particularly vulnerable (Opoku, Okafor, Williams, & Aribigbola, 2024) [34].
The digital economy, characterized by the integration of information technology in business processes, demands robust
cybersecurity measures. As SMEs continue to integrate digital tools, they must navigate a landscape fraught with sophisticated
cyberattacks that target their limited defenses (Möller, 2023) [32]. A single successful cyberattack can have devastating
consequences, including financial loss, reputational damage, and, in some cases, business closure. Consequently, addressing
cybersecurity challenges is not just a technical issue but also a strategic imperative for the long-term sustainability of SMEs in
the digital age (Perera, Jin, Maurushat, & Opoku, 2022) [34].
982 | P a g e
International Journal of Multidisciplinary Research and Growth Evaluation www.allmultidisciplinaryjournal.com
1.2. Importance of Cybersecurity for SME Development The scope of this paper is limited to conceptual analysis and
Cybersecurity is fundamental to the survival and growth of theoretical insights. By focusing on AI's strategic and
SMEs in the digital economy. Without adequate protection, technological aspects in cybersecurity, the paper seeks to
SMEs face financial losses and a significant erosion of trust offer actionable guidance for SMEs, policymakers, and other
from customers and business partners. As digital transactions stakeholders. In conclusion, the introduction establishes the
and data exchanges become more prevalent, maintaining foundation for a critical discussion on leveraging AI to
information systems' integrity, confidentiality, and strengthen SME cybersecurity. The increasing reliance on
availability is critical. Cybersecurity ensures that SMEs can digital technologies necessitates proactive measures to
confidently operate, secure their intellectual property, and safeguard SME operations and foster sustainable
comply with regulatory requirements (De Fréminville, 2020) development in the digital economy. As a game-changing
[20]
. technology, AI promises to transform the cybersecurity
Moreover, cybersecurity contributes to the competitive landscape, enabling SMEs to thrive in an increasingly
advantage of SMEs. Businesses demonstrating robust interconnected world.
security measures are more likely to attract customers, secure
partnerships, and gain access to new markets. For instance, 2. Challenges Facing SMEs in Cybersecurity
larger organizations are increasingly scrutinizing the 2.1. Overview of Cybersecurity Threats in the Digital
cybersecurity practices of their suppliers and partners to Economy
mitigate risks in their supply chains. SMEs with strong The digital economy, while offering immense opportunities
cybersecurity frameworks are better positioned to meet such for growth and innovation, also presents a vast array of
expectations, unlocking growth opportunities (Lloyd, 2020) cybersecurity challenges. As businesses increasingly rely on
[29]
. interconnected systems, digital tools, and online transactions,
the volume and complexity of cyber threats continue to rise
1.3. Role of AI in Modern Cybersecurity Solutions (Comite, 2022) [17]. Cybercriminals, often leveraging
Artificial Intelligence (AI) has emerged as a transformative sophisticated tools, target vulnerabilities in digital
force in cybersecurity, offering advanced tools and infrastructure to carry out attacks such as phishing,
techniques to detect, prevent, and respond to cyber threats. ransomware, malware infiltration, and distributed denial-of-
Traditional cybersecurity methods, such as manual service (DDoS) attacks (Möller, 2023) [32].
monitoring and signature-based detection, struggle to keep Phishing attacks, for instance, exploit human error by tricking
pace with modern cyberattacks' volume, velocity, and employees into revealing sensitive information such as
sophistication. AI addresses these limitations by enabling passwords or financial details. Ransomware has become a
automation, real-time analysis, and predictive capabilities particularly pervasive threat, encrypting critical data and
(Manoharan & Sarker, 2023) [30]. demanding payments for its release. Malware and spyware
Machine learning algorithms, a subset of AI, can analyze vast are designed to infiltrate systems, steal confidential data, and
datasets to identify patterns and anomalies that may indicate monitor business activities. Furthermore, SMEs often face
malicious activity. For example, AI-powered intrusion the risk of insider threats, whether through malicious intent
detection systems can recognize unusual network traffic and or unintentional actions by employees who lack adequate
flag potential threats before they escalate. Additionally, AI cybersecurity awareness (Rains, 2020) [38].
enhances incident response by providing automated tools that The rapid evolution of cyberattacks compounds these threats.
can neutralize threats quickly, minimizing damage and Advanced Persistent Threats (APTs), for example, involve
downtime (Prince et al., 2024) [37]. prolonged and targeted efforts by attackers to gain
AI-driven cybersecurity solutions are particularly valuable unauthorized access to a business’s network. Such threats are
for SMEs because they offer scalable and cost-effective difficult to detect and can cause significant damage before
protection. Cloud-based AI tools, for example, allow SMEs they are neutralized. SMEs are particularly vulnerable to
to access cutting-edge security features without the need for these multifaceted risks in a digital economy characterized by
significant upfront investment in hardware or personnel. interconnectedness and data-driven operations (Jabar &
Furthermore, AI can be integrated seamlessly into existing Mahinderjit Singh, 2022) [25].
business processes, allowing SMEs to adapt to evolving
cyber risks (Yaseen, 2023) [46]. 2.2. Unique Vulnerabilities of SMEs Compared to Larger
Enterprises
1.4. Objectives and Scope of the Paper SMEs are uniquely vulnerable to cybersecurity threats due to
The primary objective of this paper is to explore how AI- their limited resources, lack of expertise, and often
driven cybersecurity frameworks can mitigate the risks faced inadequate cybersecurity measures. Unlike large enterprises,
by SMEs in the digital economy. By analyzing the unique which typically have dedicated IT departments and advanced
challenges that SMEs encounter and the potential of AI to security protocols, SMEs often operate with small teams and
address these issues, the paper aims to provide a rely on basic security tools. This lack of sophistication in
comprehensive understanding of the subject. cybersecurity infrastructure makes them an attractive target
This discussion will encompass the following key areas: the for cybercriminals (Chidukwani, Zander, & Koutsakis, 2022)
[16]
cybersecurity challenges specific to SMEs, the potential of .
AI-driven solutions to address these challenges, and the A key vulnerability lies in the inadequate prioritization of
policy and strategic considerations necessary for effective cybersecurity. Many SMEs perceive cybersecurity as a
implementation. Additionally, the paper will outline practical secondary concern, focusing instead on immediate business
recommendations for SMEs to adopt AI-based cybersecurity operations and revenue generation. This perception leaves
measures while considering ethical and regulatory critical systems and data exposed to potential threats.
implications. Additionally, SMEs are often unaware of the full scope of
983 | P a g e
International Journal of Multidisciplinary Research and Growth Evaluation www.allmultidisciplinaryjournal.com
984 | P a g e
International Journal of Multidisciplinary Research and Growth Evaluation www.allmultidisciplinaryjournal.com
monitoring, threat analysis, and incident response, AI reduces necessary certifications, and adhering to industry best
the burden on human resources and minimizes the need for practices. Transparent and ethical use of AI is essential for
extensive in-house expertise. This is especially advantageous building trust with customers and stakeholders, which is
for SMEs, which often lack dedicated IT or cybersecurity particularly important for SMEs seeking to establish
teams. Additionally, AI's predictive capabilities help themselves in competitive markets (Adewumi, Dada, Azai, &
businesses prioritize their cybersecurity investments by Oware, 2024; Dada, Okonkwo, & Cudjoe-Mensah, 2024) [4,
19]
identifying and addressing the most critical vulnerabilities .
(Thethi, 2024) [43].
AI frameworks improve accuracy and reliability in threat 4. Policy and Strategic Considerations
detection. Unlike human analysts, who may overlook subtle 4.1. Importance of Government and Industry Regulations
indicators due to fatigue or inexperience, AI systems for SME Cybersecurity
consistently identify threats with high precision. This reduces The increasing digitization of small and medium-sized
the likelihood of false positives and ensures that resources are enterprises (SMEs) has made them a prime target for
allocated to genuine security concerns. For SMEs, this cyberattacks, underscoring the urgent need for robust
reliability is crucial for maintaining trust and operational regulatory frameworks to safeguard these businesses.
continuity (Shandilya, Datta, Kartik, & Nagar, 2024) [42]. Government and industry regulations play a pivotal role in
Finally, AI empowers SMEs to stay ahead of evolving establishing baseline cybersecurity practices, ensuring that
threats. Cybercriminals continuously develop new attack SMEs adhere to consistent standards for data protection,
methods, making it challenging for traditional systems to threat mitigation, and operational resilience.
keep up. AI's ability to learn and adapt ensures that SMEs are Government intervention through cybersecurity regulations
protected against both known and emerging threats, provides SMEs with clear guidelines on managing digital
providing a proactive rather than reactive approach to risks. For example, data protection laws such as the General
cybersecurity (Rawindaran, Jayal, & Prakash, 2021) [40]. Data Protection Regulation (GDPR) in the European Union
mandate stringent security measures to protect sensitive
3.3. Integration of AI with Existing SME Infrastructure information. Compliance with such regulations minimizes
Integrating AI-driven solutions into an SME's infrastructure risks and enhances SMEs' credibility with customers and
requires careful planning and execution. While AI offers stakeholders. Similarly, industry-specific standards, such as
numerous benefits, its effectiveness depends on seamless those in healthcare (HIPAA) or finance (PCI DSS), ensure
alignment with the business's current systems, processes, and tailored cybersecurity measures are implemented to meet
goals. One of the first steps in integration is conducting a sector-specific needs (Banji, Adekola, & Dada, 2024) [14].
comprehensive assessment of the SME's cybersecurity needs Regulatory frameworks also help SMEs combat challenges
and existing infrastructure. This involves identifying key associated with limited resources. Governments can alleviate
assets, potential vulnerabilities, and areas where AI can the financial burden on SMEs by providing access to
provide the most value. For example, SMEs with extensive standardized tools, subsidies, or tax incentives for adopting
customer data may prioritize AI solutions for data protection cybersecurity measures. For instance, some governments
and privacy, while those reliant on e-commerce platforms offer grants for cybersecurity training or investments in
may focus on fraud detection (Oguta, 2024) [33]. advanced technology, enabling smaller businesses to enhance
Cloud-based AI solutions offer an accessible and cost- their defenses without overstretching their budgets. However,
effective option for SMEs. These platforms provide advanced the effectiveness of regulations depends on their clarity,
cybersecurity features without the need for significant accessibility, and enforcement. Complex or ambiguous
upfront investment in hardware or software. Cloud-based requirements can overwhelm SMEs, particularly those with
tools are also easy to integrate with existing systems, limited technical expertise. Policymakers must strike a
enabling SMEs to leverage AI's capabilities with minimal balance by designing rigorous yet adaptable frameworks,
disruption to their operations (Johnson, Seyi-Lande, Adeleke, accommodating SMEs' diverse needs and capacities (Attah,
Amajuoyi, & Simpson, 2024) [24]. Garba, Gil-Ozoudeh, & Iwuanyanwu, 2024b) [10].
Collaboration with third-party providers is another critical
aspect of integration. Many technology companies offer AI- 4.2. Collaboration Opportunities with Tech Providers
driven cybersecurity services tailored to the needs of SMEs. and Policymakers
Partnering with these providers allows SMEs to access Addressing SMEs' cybersecurity challenges requires
cutting-edge tools and expertise that may be otherwise out of collaborative efforts between businesses, technology
reach. These partnerships also help SMEs stay updated on the providers, and policymakers. Such partnerships leverage the
latest cybersecurity trends and innovations (Attah, Garba, strengths of each stakeholder to create a more secure and
Gil-Ozoudeh, & Iwuanyanwu, 2024a) [9]. resilient digital ecosystem. Tech providers play a crucial role
Training and awareness are equally important for successful in equipping SMEs with advanced cybersecurity solutions.
integration. Employees must understand how AI systems By offering affordable and scalable tools tailored to the needs
function and how to use them effectively. This includes of smaller enterprises, providers can help bridge the resource
recognizing alerts generated by AI tools, responding to gap that often leaves SMEs vulnerable. Collaboration
automated incident reports, and collaborating with AI initiatives such as managed security services or shared threat
systems to strengthen overall security. By fostering a culture intelligence platforms enable SMEs to access state-of-the-art
of cybersecurity awareness, SMEs can maximize the benefits technology and expertise without incurring prohibitive costs
of their AI investments. (AD Adekola & SA Dada, 2024; Dada & Adekola, 2024) [2,
3]
Finally, SMEs must ensure their AI systems comply with .
regulatory requirements and ethical standards. This involves Conversely, policymakers facilitate collaboration by creating
implementing robust data privacy measures, obtaining an enabling environment for public-private partnerships
985 | P a g e
International Journal of Multidisciplinary Research and Growth Evaluation www.allmultidisciplinaryjournal.com
(PPPs). Governments can establish forums or task forces that meaningfully to their organizations (Anozie et al., 2024;
bring together SMEs, tech providers, and regulators to Attah, Garba, Gil-Ozoudeh, & Iwuanyanwu, 2024a) [6, 9].
identify challenges, share best practices, and co-develop
innovative solutions. For example, national cybersecurity 5. Conclusion and Recommendations
centers in several countries offer platforms for collaborative SMEs are crucial pillars of innovation and economic growth
threat analysis and rapid response, enhancing collective in the rapidly advancing digital economy. However, their
resilience (Iwuanyanwu, 2024) [8]. increasing reliance on digital technologies exposes them to a
Additionally, educational institutions and nonprofit heightened risk of cyberattacks, such as phishing,
organizations can contribute by providing cybersecurity ransomware, and malware. Unique vulnerabilities, including
training programs tailored to SMEs. These initiatives ensure limited financial and technical resources and the absence of
that employees at all levels are equipped to recognize and robust cybersecurity infrastructure, make SMEs prime targets
respond to cyber threats, fostering a culture of security for cybercriminals. These challenges often result in severe
awareness. Cross-border collaboration is also essential, given financial losses and reputational harm, underlining the
the global nature of cyber threats. International frameworks urgency of adopting more sophisticated and scalable
and agreements enable knowledge sharing and coordinated cybersecurity measures. Artificial intelligence has emerged
responses, ensuring that SMEs operating in multiple as a game-changing solution, providing SMEs with tools that
jurisdictions are not left exposed to fragmented or enhance their ability to identify, mitigate, and prevent cyber
inconsistent policies (Gil-Ozoudeh, & Iwuanyanwu, 2024b) threats through real-time detection, predictive analytics, and
[10]
. automated responses.
AI-driven cybersecurity solutions empower SMEs to
4.3. Ethical Implications and Data Privacy Concerns in overcome resource constraints by leveraging machine
AI Deployment learning, anomaly detection, and natural language processing
While AI-driven solutions offer significant benefits for SME technologies. These tools offer scalability, cost efficiency,
cybersecurity, their deployment raises important ethical and and adaptability, making them particularly suited for the
data privacy concerns that must be addressed to ensure dynamic threat landscape SMEs face. However, the
responsible use. One of the primary concerns is the potential integration of AI into SME cybersecurity efforts requires not
misuse of AI technologies. Advanced AI tools, such as those only technological investment but also supportive policies
used for threat detection, can inadvertently be repurposed for and strategies. Collaborative efforts among governments,
malicious activities if they fall into the wrong hands. tech providers, and SMEs can strengthen regulatory
Policymakers and tech providers must establish robust compliance, provide access to resources, and address ethical
safeguards, such as access controls and encryption, to prevent considerations such as data privacy and algorithmic fairness.
unauthorized use of these systems. These measures are essential for fostering trust and ensuring
Another critical issue is bias and fairness in AI algorithms. responsible AI deployment across industries.
AI systems may exhibit biases that disproportionately affect To fully realize the potential of AI-driven cybersecurity,
certain users or groups if not designed and tested carefully. SMEs must take practical steps toward implementation.
For example, anomaly detection algorithms trained on data Conducting comprehensive cybersecurity assessments allows
from large enterprises may fail to accurately detect threats in SMEs to identify vulnerabilities and prioritize areas for
SME environments, leading to gaps in protection. Developers improvement, ensuring informed decision-making. Investing
must prioritize transparency and inclusivity in algorithm in scalable and cloud-based AI solutions can help SMEs
design to ensure fair and effective outcomes for all users access advanced cybersecurity capabilities without incurring
(Attah, Garba, Gil-Ozoudeh, & Iwuanyanwu, 2024c) [11]. prohibitive costs. Additionally, enhancing employee
Data privacy is also a major concern, particularly in the awareness through regular training programs and leveraging
context of AI's reliance on large datasets for training and AI-powered simulation tools ensures that human factors, a
operation. SMEs often handle sensitive customer significant element in cybersecurity, are effectively managed.
information, making it essential to ensure that AI systems Collaboration with technology providers and industry
comply with data protection regulations. Encryption, consortia can further amplify SME capabilities, granting
anonymization, and secure storage practices are critical for access to shared resources, expertise, and best practices.
safeguarding this data against breaches and misuse. Finally, establishing clear data privacy protocols and incident
Furthermore, SMEs must maintain clear and transparent response plans is essential for building customer trust and
communication with customers about collecting, using, and ensuring regulatory compliance. AI-driven encryption and
protecting their data. anonymization tools can safeguard sensitive information,
Accountability in decision-making is another ethical while real-time threat monitoring systems help SMEs remain
consideration. As AI systems become more autonomous, agile against emerging risks. Governments also play a vital
there is a risk of reduced human oversight in critical role in bolstering SME cybersecurity, offering financial
cybersecurity decisions. SMEs must establish protocols to incentives, training programs, and participation in public-
ensure that humans control high-stakes decisions, such as private partnerships. Continuous monitoring and evolution of
determining the appropriate response to a detected threat. cybersecurity strategies, supported by AI analytics, are
This approach mitigates the risk of errors and reinforces critical for SMEs to maintain resilience in an ever-changing
accountability and trust. Lastly, the use of AI in cybersecurity threat landscape. By adopting these measures, SMEs can
raises questions about job displacement and the future of fortify their cybersecurity frameworks, ensuring their
work. While AI can automate many routine tasks, balancing sustainability and competitiveness in the digital economy.
automation with the upskilling and reskilling of employees is
crucial. Providing training opportunities ensures that workers 6. References
can adapt to evolving roles and continue to contribute 1. Adekola A, Dada S. Leveraging digital marketing for
986 | P a g e
International Journal of Multidisciplinary Research and Growth Evaluation www.allmultidisciplinaryjournal.com
health behavior change: A model for engaging patients 16. Chidukwani A, Zander S, Koutsakis P. A survey on the
through pharmacies. Int J Sci Technol Res Arch cyber security of small-to-medium businesses:
2024;7(2):050-059. doi:10.53771/ijstra.2024.7.2.0063 Challenges, research focus and recommendations. IEEE
2. Adekola A, Dada S. Optimizing pharmaceutical supply Access 2022;10:85701-85719.
chain management through AI-driven predictive 17. Comite U. Companies in the digital economy: Between
analytics: A conceptual framework. Comput Sci IT Res the enhancement of intellectual capital and cybersecurity
J 2024;5(11):2580-2593. doi:10.51594/csitrj.v5i11.1709 problems. In: Handbook of Research on Applying
3. Adekola A, Dada S. The role of Blockchain technology Emerging Technologies across Multiple Disciplines. IGI
in ensuring pharmaceutical supply chain integrity and Global; 2022. p. 249-268.
traceability. Fin Account Res J 2024;6(11):2120-2133. 18. Dada S, Adekola A. Optimizing preventive healthcare
doi:10.51594/farj.v6i11.1700 uptake in community pharmacies using data-driven
4. Adewumi G, Dada S, Azai J, Oware E. A systematic marketing strategies. Int J Life Sci Res Arch
review of strategies for enhancing pharmaceutical supply 2024;7(2):071–079. doi:10.53771/ijlsra.2024.7.2.0076
chain resilience in the U.S. Int Med Sci Res J 19. Dada S, Okonkwo F, Cudjoe-Mensah Y. Sustainable
2024;4(11):961-972. doi:10.51594/imsrj.v4i11.1711 supply chain management in U.S. healthcare: Strategies
5. Alhogail A, Alsabih A. Applying machine learning and for reducing environmental impact without
natural language processing to detect phishing email. compromising access. Int J Sci Res Arch
Comput Secur 2021;110:102414. 2024;13(2):870–879. doi:10.30574/ijsra.2024.13.2.2113
6. Anozie U, Dada S, Okonkwo F, Egunlae O, Animasahun 20. De Fréminville M. Cybersecurity and decision makers:
B, Mazino O. The convergence of edge computing and Data security and digital trust. John Wiley & Sons; 2020.
supply chain resilience in retail marketing. Int J Sci Res 21. Fagbule O. Cyber security training in small to medium-
Arch 2024;12(2):2769–2779. sized enterprises (SMEs): Exploring organisation culture
doi:10.30574/ijsra.2024.12.2.1574 and employee training needs. Bournemouth University;
7. Arjunan T. Detecting anomalies and intrusions in 2023.
unstructured cybersecurity data using natural language 22. Hokmabadi H, Rezvani SM, de Matos CA. Business
processing. Int J Res Appl Sci Eng Technol resilience for small and medium enterprises and startups
2024;12(9):10.22214. by digital transformation and the role of marketing
8. Attah RU, Garba BMP, Gil-Ozoudeh I, Iwuanyanwu O. capabilities—A systematic review. Systems
Cross-functional team dynamics in technology 2024;12(6):220.
management: A comprehensive review of efficiency and 23. Ilca LF, Lucian OP, Balan TC. Enhancing cyber-
innovation enhancement. resilience for small and medium-sized organizations
9. Attah RU, Garba BMP, Gil-Ozoudeh I, Iwuanyanwu O. with prescriptive malware analysis, detection and
Best practices in project management for technology- response. Sensors 2023;23(15):6757.
driven initiatives: A systematic review of market 24. Iwuanyanwu O. Evaluating strategic technology
expansion and product development technique. Int J Eng partnerships: Providing conceptual insights into their
Res Dev 2024;20(11):1350-1361. role in corporate strategy and technological innovation.
10. Attah RU, Garba BMP, Gil-Ozoudeh I, Iwuanyanwu O. Int J Front Sci Technol Res 2024;7(2).
Digital transformation in the energy sector: doi:10.53294/ijfstr.2024.7.2.0058
Comprehensive review of sustainability impacts and 25. Jabar T, Singh M. Exploration of mobile device behavior
economic benefits. Int J Adv Econ 2024;6(12):760-776. for mitigating advanced persistent threats (APT): A
doi:10.51594/ijae.v6i12.1751 systematic literature review and conceptual framework.
11. Attah RU, Garba BMP, Gil-Ozoudeh I, Iwuanyanwu O. Sensors 2022;22(13):4662.
Strategic frameworks for digital transformation across 26. Jeffrey N, Tan Q, Villar JR. A review of anomaly
logistics and energy sectors: Bridging technology with detection strategies to detect threats to cyber-physical
business strategy. systems. Electronics 2023;12(15):3283.
12. Attah RU, Garba BMP, Gil-Ozoudeh I, Iwuanyanwu O. 27. Jimmy F. Emerging threats: The latest cybersecurity
Strategic partnerships for urban sustainability: risks and the role of artificial intelligence in enhancing
Developing a conceptual framework for integrating cybersecurity defenses. Valley Int J Digit Lib 2021:564-
technology in community-focused initiatives. 574.
13. Attah RU, Garba BMP, Gil-Ozoudeh I, Iwuanyanwu O. 28. Johnson E, Seyi-Lande OB, Adeleke GS, Amajuoyi CP,
Corporate banking strategies and financial services Simpson BD. Developing scalable data solutions for
innovation: Conceptual analysis for driving corporate small and medium enterprises: Challenges and best
growth and market expansion. Int J Eng Res Dev practices. Int J Manag Entrep Res 2024;6(6):1910-1935.
2024;20(11):1339-1349. 29. Lloyd G. The business benefits of cyber security for
14. Banji A, Adekola A, Dada S. Pharmacogenomic SMEs. Comput Fraud Secur 2020;2020(2):14-17.
approaches for tailoring medication to genetic profiles in 30. Manoharan A, Sarker M. Revolutionizing cybersecurity:
diverse populations. World J Adv Pharm Med Res Unleashing the power of artificial intelligence and
2024;7(2):109-118. machine learning for next-generation threat detection.
doi:10.53346/wjapmr.2024.7.2.0049 IRJMETS 2023;1. doi:10.56726/IRJMETS32644.
15. Bhuiyan MRI, Faraji MR, Rashid M, Bhuyan MK, 31. Mmango N, Gundu T. Cyber resilience in the
Hossain R, Ghose P. Digital transformation in SMEs entrepreneurial environment: A framework for
emerging technological tools and technologies for enhancing cybersecurity awareness in SMEs. Paper
enhancing the SME's strategies and outcomes. J presented at: 2023 International Conference on
Ecohumanism 2024;3(4):211-224. Electrical, Computer and Energy Technologies
987 | P a g e
International Journal of Multidisciplinary Research and Growth Evaluation www.allmultidisciplinaryjournal.com
(ICECET); 2023.
32. Möller DP. Cybersecurity in digital transformation. In:
Guide to Cybersecurity in Digital Transformation:
Trends, Methods, Technologies, Applications and Best
Practices. Springer; 2023. p. 1-70.
33. Oguta GC. Securing the virtual marketplace: Navigating
the landscape of security and privacy challenges in E-
commerce. GSC Adv Res Rev 2024;18(1):084-117.
34. Opoku E, Okafor M, Williams M, Aribigbola A.
Enhancing small and medium-sized businesses through
digitalization. World J Adv Res Rev 2024;23(2).
35. Perera S, Jin X, Maurushat A, Opoku DGJ. Factors
affecting reputational damage to organisations due to
cyberattacks. Paper presented at: Informatics; 2022.
36. Perwej Y, Abbas SQ, Dixit JP, Akhtar N, Jaiswal AK. A
systematic literature review on the cyber security. Int J
Sci Res Manag 2021;9(12):669-710.
37. Prince NU, Faheem MA, Khan OU, Hossain K,
Alkhayyat A, Hamdache A, Elmouki I. AI-powered
data-driven cybersecurity techniques: Boosting threat
identification and reaction. Nanotechnol Perceptions
2024;20:332-353.
38. Rains T. Cybersecurity threats, malware trends, and
strategies: Learn to mitigate exploits, malware, phishing,
and other social engineering attacks. Secured Future
2024;1:1-10.
39. Singh J, Sharma M. Internet of things (IoT) and machine
learning (ML) techniques for cybersecurity and
vulnerability detection. Sustain Technol Innov
2022;1(1):100009.
40. Rawindaran N, Jayal A, Prakash E. Machine learning
cybersecurity adoption in small and medium enterprises
in developed countries. Computers. 2021;10(11):150.
41. Rawindaran N, Jayal A, Prakash E, Hewage C.
Perspective of small and medium enterprise (SME's) and
their relationship with government in overcoming
cybersecurity challenges and barriers in Wales.
International Journal of Information Management Data
Insights. 2023;3(2):100191.
42. Shandilya SK, Datta A, Kartik Y, Nagar A. Role of
Artificial Intelligence and Machine Learning. In Digital
Resilience: Navigating Disruption and Safeguarding
Data Privacy; 2024:313-399.
43. Thethi SK. Machine learning models for cost-effective
healthcare delivery systems: A global perspective.
Digital Transformation in Healthcare 5.0: Volume 1:
IoT, AI and Digital Twin; 2024:199.
44. Wilson M, McDonald S, Button D, McGarry K. It won’t
happen to me: surveying SME attitudes to cyber-
security. Journal of Computer Information Systems.
2023;63(2):397-409.
45. Xie X, Jin X, Wei G, Chang CT. Monitoring and early
warning of SMEs’ shutdown risk under the impact of
global pandemic shock. Systems. 2023;11(5):260.
46. Yaseen A. AI-driven threat detection and response: A
paradigm shift in cybersecurity. International Journal of
Information and Cybersecurity. 2023;7(12):25-43.
47. Yudhiyati R, Putritama A, Rahmawati D. What small
businesses in developing country think of cybersecurity
risks in the digital age: Indonesian case. Journal of
Information, Communication and Ethics in Society.
2021;19(4):446-462.
988 | P a g e