An investigation of cybersecurity implementation challenges among South African SMEs

dc.contributor.authorFakir, Jeeten
dc.date.accessioned2025-03-11T13:02:49Z
dc.date.issued2024
dc.descriptionA research report submitted in partial fulfilment of the requirements for the degree of Master of Management in the field of Digital Business to the Faculty of Commerce, Law, and Management, Wits Business School, University of the Witwatersrand, Johannesburg, 2024
dc.description.abstractIn today's technologically driven world, cybersecurity implementation among Small and Medium Enterprises (SMEs) is of paramount importance, particularly in developing nations like South Africa, where cybercrime is prevalent. Due to inadequate cybersecurity practices, weak policy execution, and low public awareness, cybercriminals are targeting South Africa. Furthermore, local SMEs have limited budget, skills and resources dedicated to cybersecurity, which enhances the problem in the current South African context. Drawing upon a literature review encompassing global perspectives on cybersecurity and SMEs, this study focuses on the South African context to provide insights tailored to the local SME landscape. This research investigates the cybersecurity implementation challenges faced by SMEs, by exploring the influence that subjective norms, attitude, perceived behavioural control, perceived ease of use, and perceived usefulness has on the intention to implement cybersecurity among South African SMEs. This quantitative study employed a survey which was distributed on social media to SMEs across the country to answer the research objectives. Key findings highlight the significant gaps in cybersecurity awareness and resources among South African SMEs, underscoring the urgent need for enhanced cybersecurity education and support. The investigation indicates that subjective norms, attitude, perceived behavioural control, perceived ease of use, and perceived usefulness contribute significantly to influencing cybersecurity implementation among South African SMEs. The identified factors provide a foundation for addressing the research objectives by emphasising the importance of subjective norms, attitudes, control perceptions, ease of use, and usefulness perceptions in the context of cybersecurity implementation. Ultimately, this research underscores the imperative for collaborative efforts between government, academia, and industry to address cybersecurity challenges faced by South African SMEs and foster a more resilient digital ecosystem.
dc.description.submitterMM2025
dc.facultyFaculty of Commerce, Law and Management
dc.identifier.citationFakir, Jeeten. (2024). An investigation of cybersecurity implementation challenges among South African SMEs [Master’s dissertation, University of the Witwatersrand, Johannesburg].WireDSpace.https://hdl.handle.net/10539/44227
dc.identifier.urihttps://hdl.handle.net/10539/44227
dc.language.isoen
dc.publisherUniversity of the Witwatersrand, Johannesburg
dc.rights© 2025 University of the Witwatersrand, Johannesburg. All rights reserved. The copyright in this work vests in the University of the Witwatersrand, Johannesburg. No part of this work may be reproduced or transmitted in any form or by any means, without the prior written permission of University of the Witwatersrand, Johannesburg.
dc.rights.holderUniversity of the Witwatersrand, Johannesburg
dc.schoolWITS Business School
dc.subjectcybersecurity
dc.subjectcyber threats
dc.subjectcyberattacks,
dc.subjectSouth Africa
dc.subjectsmall and medium enterprises (SMEs)
dc.subjectCybersecurity frameworks
dc.subjectUCTD
dc.subject.otherSDG-8: Decent work and economic growth
dc.titleAn investigation of cybersecurity implementation challenges among South African SMEs
dc.typeDissertation

Files

Original bundle

Now showing 1 - 1 of 1
Thumbnail Image
Name:
Fakir_Investigation_2025.pdf
Size:
1.55 MB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
2.43 KB
Format:
Item-specific license agreed upon to submission
Description: