《美國網絡安全和基礎設施安全局:2024中小型企業采用單點登錄的障礙: 確定挑戰與機遇報告(英文版)(19頁).pdf》由會員分享,可在線閱讀,更多相關《美國網絡安全和基礎設施安全局:2024中小型企業采用單點登錄的障礙: 確定挑戰與機遇報告(英文版)(19頁).pdf(19頁珍藏版)》請在三個皮匠報告上搜索。
1、 Publication:May 2024 Cybersecurity and Infrastructure Security Agency Barriers to Single Sign-On(SSO)Adoption for Small and Medium-Sized Businesses:Identifying Challenges and Opportunities 2 CISA|Cybersecurity and Infrastructure Security Agency Table of Contents 1 Problem Statement.3 2 Key Findings
2、.4 3 SSO Basics.5 4 SSO Benefits.7 5 Barriers and Catalysts to Technology Adoption by SMBs.8 6 The Perspective of the Vendors and Customers.10 7 Conclusion.12 8 Recommendations.13 Appendix Stakeholder Engagement Methodology.15 Referencies.16 Glossary.19 3 CISA|Cybersecurity and Infrastructure Securi
3、ty Agency 1 1 Problem Statement This study explores barriers and challenges to Single Sign-On(SSO)adoption by small and medium-sized businesses(SMBs).The study also identifies potential ways to overcome these challenges,which in turn improve an SMBs level of security.SSO is a user authentication and
4、 access control system that allows users to access multiple applications,tools,and systems with just one set of credentials.By centralizing the authentication process,SSO streamlines identity management and simplifies the user experience by only needing to remember one username and password for all
5、accounts.SSO can help bolster security measures as it decreases the frequency of users having to input their login credentials.Furthermore,SSO can reduce password duplication across various platforms,consequently reducing the potential for password leakage.As part of this study,the Cybersecurity and
6、 Infrastructure Security Agency(CISA)engaged with various stakeholders involved with SSO.These include SSO vendors,experienced managed service providers,non-profit organizations dedicated to improving cybersecurity,and SMBs that have experience with adopting SSO and migrating across SSO platforms.Ba
7、sed on these discussions,CISA found that despite the benefits of SSO,the adoption of SSO capabilities for identity management remains low,particularly among SMBs.There are numerous obstacles to successfully implementing a workable SSO solution.These include cost,technical hurdles,and a lack of aware
8、ness and resources.Small enterprises often opt for manual passwords and hands-on approaches to manage access and identities as opposed to the SSO option.These methods tend to be more cost-effective in terms of the purchasing cost,which does not include the hidden cost associated with administrative
9、overhead.Often,a primary reason for the difference in the purchasing cost is that SSO is often only available as a premium enterprise-level service,which comes with custom pricing that is significantly higher than essential services.A premium enterprise-level service with SSO can cost more per user
10、than a lower-tier service without SSO.In addition to a higher cost per user,this premium pricing model typically requires a minimum number of users.This additional incremental cost,which can significantly raise the total cost per user compared to a lower-tier service without SSO,can be a substantial
11、 financial barrier for many organizations.The price difference often results in SMBs selecting cheaper,lower-tier services lacking SSO features.Additionally,setting up the advanced SSO features often requires specialized technical knowledge and expertise as well as a time commitment.The combination
12、of extra costs,the need for technical skills,and the time needed leads many businesses to continue relying on manual methods,such as spreadsheets,to handle user access to various applications and systems.To encourage the adoption of SSO by SMBs,SSO providers must address their concerns and offer com
13、prehensive technical support and solutions tailored to SMB needs and priorities.This study is organized as follows:Section 2 presents the key findings related to the advantages of SSO,the challenges SMBs face in terms of SSO adoption,and the role government can play in encouraging SSO adoption.Secti
14、on 3 describes what SSO is and how it works.Section 4 identifies benefits of SSO adoption.Section 5 presents an overview of the literature on how SMBs adopt technology in general and describes how it may be applicable in the case of SSO adoption.Section 6 presents the results of CISAs engagement wit
15、h SSO stakeholders by identifying key factors and considerations influencing SSO adoption and highlights how vendors and customers have differing views.Section 7 summarizes the studys findings regarding the benefits of SSO adoption,challenges SMBs experience in implementing SSO,SMB needs,and typical
16、 vendor practices.Section 8 provides recommendations on how to help ensure a smooth and successful implementation with the aim of encouraging SSO adoption by SMBs.Finally,the appendix presents a brief description of the research method used in the study and associated stakeholder engagement process.
17、4 CISA|Cybersecurity and Infrastructure Security Agency 2 2 Key Findings Below we describe the advantages and challenges associated with SSO adoption as well as the role government can play in addressing some of those challenges.A Advantages dvantages o of f SSO ASSO Adoptiondoption According to Cha
18、ng and Lee(2012),SSO is designed with a primary focus on security and user experience,distinguishing it from other access management solutions such as individual usernames and passwords.SSO improves user experience,making it more likely that users will properly implement security measures.Users can
19、easily enable and disable the capability to enter multiple systems,platforms,apps,and resources.Also,it may effectively resolve the problem of password-related downtime and reset expenses.When properly implemented and configured,SSO technology offers numerous advantages to SMBs in terms of improving
20、 cybersecurity.Cusack and Ghazizadeh(2016)and DCosta-Alphonso and Lane(2010)agree that SSO reduces disclosure,human error,and cybersecurity risk.SSO also ensures the termination of an Identity Provider session as soon as the user signs out of all the services authenticated by the Identity Provider(R
21、amamoorthi&Sarkar,2020).This reduces the risk of events like Cross-Site Request Forgery attacks(Armando et al.,2013).Considering the recent cyber incidents related to SSO services(e.g.,the Okta cyber incident;Bradbury 2023,Bracken 2023,Newman 2023),digital forensics and incident response experts rec
22、ommend not locking cybersecurity tools under SSO.If sufficient expertise and dedicated resources are available,a more differentiated and closely monitored approach for cybersecurity tools may be warranted.Nevertheless,cybersecurity analysts perceive the benefits provided by SSO capabilities to outwe
23、igh potential risks,even in the context of the most recent Okta cyber incident.Although long confined to a supporting role,information technology(IT)in general,and cybersecurity specifically have now become an essential part of the strategic behavior of any firm seeking greater competitiveness.In so
24、me cases,cybersecurity maturity and adoption of advanced IT is an essential element of a firms corporate strategy and can serve as a potential factor in product or service differentiation.SSO SSO A Adoption doption C Challenges hallenges F Faced aced byby SMBsSMBs SMBs represent over 90%of all firms
25、 globally and are projected to grow 6.1%annually between 2020 and 2025(Quirt et al.,2022).SMBs face the hurdle of dealing with numerous logins and passwords needed for web applications.These challenges can create difficulties in password management for end users(Komorowski et al.,2016).While new tec
26、hnology that can streamline access and identity management may sound attractive to SMBs,implementation could be challenging.SMBs are often reluctant to adopt technology based on a very few published articles that explain the advantages technology can bring to an organization but do not properly expl
27、ore the cost implications(Fink,1998).For some SMBs,the lack of conclusive information on SSO from reliable sources reduces their willingness to implement it.Even if they are informed,SMBs often need clarification on where to acquire a viable SSO solution(Riches,2007).Due to organizational structure,
28、the willingness to upgrade to other secure and efficient sign-on forms,like SSO,might not be a top priority when profit is crucial for some SMBs.The idea of SSO adoption may be appealing,but external market forces may significantly impact adoption decisions by SMBs.Cybersecurity is inherently a busi
29、ness support function and is dominated by business priorities such as attracting new customers,retaining existing customers,securing financing,complying with regulations,and attracting talent.SMBs tend to be constrained in resources and expertise when it comes to managing new technologies.Thus,the c
30、ost of SSO implementation coupled with a lack of requisite technical expertise to configure and deploy the solution properly further hinder SSO adoption among SMBs.G Governmentovernment I Involvementnvolvement The government can play a significant role in encouraging SMBs to embrace policies and imp
31、lement new technologies.Support services in the form of financial incentives or grants may increase adoption of particular measures,but constraints on the use of funds tend to discourage SMBs from accepting government support services.5 CISA|Cybersecurity and Infrastructure Security Agency Through i
32、ts collaboration with private and public sector entities,CISA can contribute to government initiatives such as promoting positive cybersecurity outcomes(e.g.,a higher rate of SSO adoption).CISA can provide technical publications,training support and resources,and instructional materials.In addition,
33、its partnerships serve as effective and credible channels for disseminating accurate and actionable information while also increasing awareness,outreach,and engagement.Furthermore,potential joint collaborative efforts between the government and SSO stakeholders offer an opportunity for key SSO servi
34、ce providers,organizations representing the SMB community,and managed service providers to come together and explore ways to enhance SSO service offerings that are more accessible and affordable for SMBs.3 3 SSO Basics The primary purposes of an SSO service are to efficiently and effectively manage
35、the user and organization identity,create one centralized location to access a system,and establish cohesive log files documenting all instances of use.Connecting all business and operational applications under centralized identity management can improve effectiveness and yield efficiencies.However,
36、the current pricing structure and other challenges described in more detail in Sections 5 and 6 significantly hinder SSO adoption.Organizations are unable to realize the advantages of SSO and instead rely on manual identity and access management practices(e.g.,tracking and managing passwords using s
37、preadsheets).An example of this is when individuals depend on spreadsheets or collaborative documents to keep track of their passwords or when administrators opt for a spreadsheet to manage all the passwords associated with IT services.These shared spreadsheets may also contain data regarding bugs,t
38、ravel and expenses,time tracking,and customer support portal details.Relying on manual spreadsheets for identity,credential,and access management come with notable difficulties and potential risks.The current manual access and identity management practices are illustrated in Figure 1.Figure 1:Passwo
39、rd-Based User Authentication During a standard login procedure,users are required to enter their credentials,such as a user ID and password,into the designated fields of the application.Once the users authentication is successful,they are granted access to the desired resources.However,if incorrect
40、credentials are provided,an error message is 6 CISA|Cybersecurity and Infrastructure Security Agency displayed,prompting the user to re-enter the correct credentials.This process occurs independently for each of the applications requiring an individual to sign in,with a separate set of unique creden
41、tials per application,and with the administrator manually tracking lists of authorized users for each application.In addition,another layer of responsibility and administrative burden is associated with managing each stage of the user account lifecycle for each of the applications.Figure 2 illustrat
42、es the user account lifecycle,which is briefly described below.Figure 2:User Account Lifecyle The administrative burden associated with managing user accounts starts with establishing a new user identity and spans a specific set of activities up to disabling accounts for staff leaving the organizati
43、on.In larger more mature organizations,once a candidate has accepted a job offer and their identity has been confirmed,the human resources system will notify the IT department to initiate the onboarding process.This involves creating a new user account specifically tailored to the new employees posi
44、tion within the company,with corresponding privileges assigned accordingly.However,SMBs may not have a separate HR system or an IT department,where an ad-hoc access management is combined with other duties.As employees advance in their careers within the organization,their privileges may be adjusted
45、 to align with any role changes.Organizations should conduct periodic audits to evaluate different roles and associated privileges to grant only necessary permissions.Inactive accounts pose potential risks;therefore,when an employee departs from the company,their account is promptly disabled in orde
46、r to mitigate these risks effectively.The companies facing the challenge of signing into separate applications with different sign-in credentials and manually managing user account lifecycle are the ones that would benefit from SSO the most.This is especially relevant for SMBs,and even more critical
47、 for SMBs below the cyber poverty line.The cyber poverty line is a point of divide that signifies the difference between organizations who can and should perform cybersecurity functions and those that cannot and should not.SSO provides an integrated unified tool for user management.The user account
48、lifecycle can be managed from a centralized location,reducing management overhead and preventing stale accounts.Figure 3 depicts the SSO process to access multiple applications.7 CISA|Cybersecurity and Infrastructure Security Agency Figure 3.SSO Process for Multiple Applications The SSO process cons
49、ists of several steps.Initially,when a user requests access to a specific application service,the service will notify the user that they are not logged in and need to provide their login credentials.The user then provides the necessary login credentials to the SSO Credentialing Center.The SSO Creden
50、tialing Center issues a ticket to the user,confirming their legitimacy.The user will then repeat their initial request to access the application service.The application service verifies the users credentials by checking with the SSO Credentialing Center.The SSO Credentialing Center responds,confirmi
51、ng that the user has been properly authenticated.Once the application service receives this confirmation,it can provide the desired resources to the user.This process can be repeated for additional application services.The key advantage is that the user only needs to provide their credentials to the
52、 SSO Credentialing Center once to access multiple application services.4 4 SSO Benefits Unified access management with a single set of credentials has multiple operational benefits and positive cybersecurity outcomes.SSO adoption can result in increased security and privacy,a simplified and improved
53、 login and user experience.In addition,SSO may help facilitating e-commerce and IT adoption,with more robust cybersecurity practices potentially serving as a factor in product or service differentiation.These benefits are briefly described below.SecuritySecurity a and nd P Privacyrivacy SSO can impr
54、ove authentication security(Chang&Lee,2012;Joshi et al.,2018).SSO mechanisms improve the overall security of distributed computer networks by consolidating user authentication and reducing the need for multiple passwords.By reducing the risk of unauthorized access and data breaches,SSO provides a mo
55、re 8 CISA|Cybersecurity and Infrastructure Security Agency secure environment for users and businesses.SSO deployment can also protect user privacy by reducing the amount of personal information shared between service providers.Such privacy protection can increase user trust and encourage the adopti
56、on of SSO solutions(Uruea et al.,2014).SSO can also address shortcomings in the sign-out process by logging users out of all connected services.By providing a secure and efficient sign-out process,SSO can enhance user trust and satisfaction with SSO systems.SimplifiedSimplified and Improvedand Impro
57、ved L Logogin in a andnd U User ser E Experiencexperience Improved user experience is a major advantage of SSO since it simplifies the login process by enabling users to access multiple services with a single set of credentials(Ramamoorthi&Sarkar,2020;Komorowski et al.,2016).In addition to reducing
58、support costs associated with password management,streamlining the user experience can lead to increased productivity and user satisfaction.SSO adoption can make it easier for users to consume media content across different platforms(i.e.,cross-media content).This can lead to increased user engageme
59、nt and a more cohesive media consumption experience.Facilitated Facilitated E E-C Commerce ommerce a and nd I IT T A Adoptiondoption In addition to direct benefits of improving cybersecurity,SSO adoption may have auxiliary benefits.SSO systems could encourage electronic transactions among SMBs by si
60、mplifying the login process and enhancing security for online businesses.Improved user experience,increased security,as well as internal process improvement that increases operational efficiencies and reduces burden on staff may lead to a more optimal use of time and resources,which in turn can resu
61、lt in increased revenue and growth opportunities for e-commerce SMBs(Esmaeilpour et al.,2016;Govindaraju&Chandra,2011).In addition,SSO helps reduce barriers to IT adoption for SMBs by streamlining user authentication and access to various applications and services(e.g.,cloud services).SSO features c
62、an improve organizational efficiency and enhance their competitiveness in the global marketplace(Santini et al.,2023;Vu et al.,2022;Blili&Raymond,1993;Nguyen,2009;Fink,1998;Ghobakhloo et al.,2012).5 5 Barriers and Catalysts to Technology Adoption by SMBs CISA conducted a literature review to identif
63、y general barriers and catalysts affecting technology adoption and innovation diffusion within SMBs.This section presents only a brief overview of available literature(including vendor marketing literature)that attempts to explain such barriers and catalysts.The objective of summarizing the most rec
64、ent research on this topic is to augment the SSO-specific findings presented in Section 6,which were obtained as part of the focus group discussions.Literature review enhances these findings with a deeper contextual understanding of a much larger set of factors and considerations that may trigger a
65、favorable adoption decision and explain the rationale.These findings are directly applicable and broadly generalizable to adoption decisions for any cybersecurity technology or practice.Below,we discuss how they relate to SSO adoption in particular.How SMBs Buy TechnologyHow SMBs Buy Technology Acco
66、rding to Riches(2007)and as confirmed by CISAs recent SSO discussions with SMBs,SMBs are hesitant to pursue early adoption of new technologies as their main goal is to maximize profits.However,they often face challenges in determining which technologies to invest in,assessing the benefits of these i
67、nvestments,and finding reliable vendors that offer reasonable prices.Riches found that SMBs could enhance their purchasing decisions by conducting thorough market research and engaging in multiple discussions with software developers or product vendors.Doing so can help SMBs identify solutions that
68、align with their existing IT roadmap and account for their scalability needs.When SMBs collaborate closely with vendors,SMBs may find it easier to adopt,implement and operates SSO solutions,which can lead to a better user experience and favorable messaging for potential adopters.Moreover,the level o
69、f education and support vendors provide following the adoption of their SSO solution may create a strong desire among SMBs to seek additional services offered by the vendor.The availability of different pricing options and tiers,tailored to suit various business models,also significantly influences
70、SMBs purchasing decisions.9 CISA|Cybersecurity and Infrastructure Security Agency Anecdotal evidence shows government incentives have also helped some IT adoption by SMBs.Dreyer and Nygaard(2020)included examples of various forms of government support(e.g.,grants,loans,free online platforms,and cons
71、ulting and advisory services)that were provided during the COVID-19 pandemic.Examples of direct financial support include the Irish government offering grants to eligible SMBs of up to 2,500 to develop e-commerce or online trading platforms or the Japanese government providing subsidies for sustaina
72、bility,manufacturing,and IT introduction via the Small and Medium-Sized Enterprise Productivity Revolution Promotion Project.With incentives like these,more SMBs were able to afford technologies prescribed for them,although sometimes with little consideration to the technologys impact on them.For ex
73、ample,such incentives would not address non-financial hurdles faced by SMBs(e.g.,the lack of technical expertise needed to implement a technology).If properly designed,incentives may be able to improve the likelihood of the desired outcomes,while avoiding unintended and unfavorable consequences.For
74、more details about the relative effectiveness,efficiency,and equity associated with various incentives aimed at promoting cybersecurity investments,please refer to a comprehensive study of incentives conducted by a U.S.Department of Homeland Security Integrated Task Force(2013).Factors Factors Influ
75、encingInfluencing the Adoption Dthe Adoption Decisionecision The need to increase productivity while facilitating access to the work environment drives the decision to adopt SSO.Santini et al.(2023)conducted a meta-analysis of 59 studies on IT adoption among SMBs and found that resources and market
76、forces were the main predictors of IT adoption.Resources include“human and technological infrastructure that supports the technology implementation(e.g.,technology competence,IT infrastructure,technology infrastructure)”(Santini et al.,2023,p.637),while market forces include changes in technological
77、 growth,shifts in client preferences,and the amount of capital a business has.Reluctance to adopt new technology is driven not only by the concerns of adding on the new platform,but also the need for more knowledge on how to implement such technology properly.Many SMBs do not have in-house cybersecu
78、rity expertise.Some SMBs outsource support on an ad-hoc basis only.If in-house expertise is available,many chief information security officers in SMBs wear multiple hats,with sometimes only a fraction of their time allocated to cybersecurity and implementing new technologies that would make the work
79、ing environment safe.In summary,affordability,awareness,scalability,education,compatibility,and ease of integration drive buying decisions.One barrier preventing SMBs from adopting SSO solutions stems from a lack of technical knowledge.To fully reap the benefits of implementing SSO,it is important f
80、or SMBs to have a clearer understanding of the information required for adoption.Moreover,even if the prominent vendors provide needed information,the technical know-how and the basic operating modalities must be learned by SMBs.Many SMBs avoid this challenge as it requires additional resources and
81、carries a significant opportunity cost.Technology Technology A Adoption doption a and nd I Innovationnnovation D Diffusioniffusion MModelsodels Various theories and models explain reasons behind decision-making surrounding the adoption of IT.In the field of quantitative marketing,several classic ado
82、ption theories can be applied to understand how SMBs adopt SSO or new technologies.The following paragraphs provide a brief overview of these models.The first broad adoption theory that can be applied to SSO adoption is the Diffusion Theory of Innovation.This theory asserts that innovation diffusion
83、 is the process by which an innovation is communicated through certain channels over time among the members of a social system(Rogers,2010).Contextual research with a Diffusion Theory of Innovation perspective was more common in the information systems field to evaluate the value of enterprise resou
84、rce planning systems(Ruivo et al.,2012)and to investigate the technological innovation process(Mamun,2018).The second set of classical adoption theories that can be applied to SSO includes the Technology Acceptance Model(Davis et al.,1989)and the Unified Theory of Acceptance and Use of Technology(Ve
85、nkatesh et al.,2003).Both theories have limitations when analyzing whether a firm would adopt SSO since the theories are focused more on whether an individual user within a firm would use a new technology and not whether the firm itself would adopt a technology that would be used firm-wide(Davis et
86、al.,1989;Venkatesh et al.,2003).10 CISA|Cybersecurity and Infrastructure Security Agency Also,the factors that lead to technology adoption at the firm level are more individually driven by the firms.The Technology Acceptance Model investigates technology acceptance from a users perspective(Yousafzai
87、 et al.,2007).From this perspective,users tend to adopt new technologies for two main reasons:perceived usefulness and perceived ease of use(Davis et al.,1989).In contrast,the Unified Theory of Acceptance and Use of Technology asserts that technology adoption is influenced by effort and performance
88、expectations,social influences,and facilitating conditions(Venkatesh et al.,2003).Most of the research on the Technology Acceptance Model has been applied to intentions about engaging in e-commerce for SMBs(Hoque et al.,2015;Herzallah&Mukhtar,2015,2016).Salimon et al.(2023)used the Technology Accept
89、ance Model and the Unified Theory of Acceptance and Use of Technology to investigate Malaysian SMBs technology adoption,of which SSO is a part.Other studies have identified additional factors beyond those highlighted in the above theories.Some studies point to institutional pressures as an essential
90、 antecedent of company-level IT adoption,as companies adopt new technologies to better secure their IT environment(Chwelos et al.,2001;Sila,2013).Another theoretical perspective proposes that the institutional environment,organizational structures,and practices affect IT adoption(Goodstein,1994).Teo
91、 et al.(2003)associated IT adoption with gaining social legitimacy;responding to formal or informal pressures such as governmental regulation,and meeting the environmental needs of suppliers,customers,and businesses.This study is based on panel discussions and limited literature review.Sutanonpaiboo
92、n and Pearson(2006)found that IT adoption by SMBs was related to financial and technological resources.They also note that various types of SMBs may face external pressures to integrate technological devices into their organization.Govindaraju and Chandra(2011)found that human resources and informat
93、ion sources were the most critical barriers to IT adoption in Indonesian SMBs.The Ghobakhloo et al.(2012)study investigated the managers role in adopting e-commerce in small companies.In this case,the authors used the Diffusion Theory of Innovation as a basis for a theoretical model.They found that
94、usefulness,ease of use,compatibility with an SMBs specific need,risks,and complexity are determinants of IT adoption by SMBs.Esmaeilpour et al.(2016)applied the Technology Acceptance Model to investigate the attitudes and intentions of IT use in SMBs.They found a positive effect of usefulness and ea
95、se of use on attitude and behavioral intention.6 6 The Perspective of the Vendors and Customers Despite the operational benefits and positive cybersecurity outcomes of the unified access management with a single set of credentials provided by SSO described in Section 4,its uptake remains slow,partic
96、ularly among SMBs.To gain a deeper understanding of the most influential barriers to and catalysts of adoption beyond what we were able to learn from the literature review,CISA engaged with vendors,experienced managed service providers,non-profit organizations dedicated to improving cybersecurity,an
97、d SMBs that had experience with adopting SSO and migrating across SSO platforms.In order to provide a balanced perspective of the market dynamics,this section discusses the market from both the perspective of SSO vendors and customers.CISA conducted several focus groups and held technical discussion
98、s with various types of stakeholders involved in the SSO market.Participants included SSO vendors,experienced computer network auditors,and SMBs,who all have a significant interest in encouraging SSO adoption and have experienced both barriers and catalysts first-hand.A brief description of the rese
99、arch method used in the study and associated stakeholder engagement process is presented in the appendix.A summary of the key factors and considerations influencing the SSO adoption rate based on CISAs engagements are presented below.Overall,there are significant discrepancies between vendor percept
100、ion and customer experience and expectations on numerous issues.Some of the most frequently cited discrepancies between vendor and customer views include such topics as the benefits of adopting SSO and its priority level relative to other business considerations,costs and resource constraints,techni
101、cal challenges and technology awareness,and difficulties associated with vendor selection and upgrading legacy systems to accommodate SSO technology.Adoption Adoption Benefits Benefits andand PrioritizationPrioritization Concerning the benefits of SSO adoption,perceptions among vendors and customers
102、 differ substantially.SSO vendors recognize an urgent need for organizations to adopt SSO due to increasing identity theft and improving 11 CISA|Cybersecurity and Infrastructure Security Agency levels of threat intelligence for SMBs(i.e.,information that helps organizations better protect against cy
103、berattacks).Customers,however,tend to view the adoption of SSO with less urgency.While customers recognize the urgency of addressing security-related issues quickly,they tend to prioritize security concerns that could be addressed with SSO only once an incident occurs,as such an event can force cust
104、omers to recognize the significance and benefits of adopting SSO as a preventive measure.Increasing customer awareness about potential risks and advantages associated with adopting SSOparticularly,stressing the need for proactive security measures even before any incidents arisecould encourage SMBs
105、to adopt SSO sooner than they otherwise would.SSO adoption priorities also often vary between vendors and customers.Whereas vendors might view adoption of SSO as both essential and a priority,customers may not view it as such given their assessment of the potential service disruption risks and assoc
106、iated costs(e.g.,the opportunity cost of time and lost productivity due to business interruptions).Given their assessment,they may not prioritize investing in SSO over other business objectives such as gaining new customers,retaining existing customers,and complying with regulations.C Cost ost I Imp
107、licationsmplications and Resource and Resource ConstraintsConstraints Cost perception varies significantly between vendors and customers regarding SSO implementation.SSO and application vendors believe the price tag justifies itself.Vendors may bundle services together to reduce overall expenses and
108、 appeal to customers with varying budgets,thereby shifting focus from cost to value.Tiered pricing options exist to accommodate different budgets and business sizes.Some customers,however,feel they are subject to what is commonly referred to as an“SSO tax”because they perceive SSO as being excessive
109、ly costly due to the higher cost of the premium-tier service that includes SSO as compared to the lower-tier service that does not include SSO coupled with a requirement to subscribe for a minimum number of seats that may exceed the actual number of users.Customers also feel they pay for redundant p
110、ackages or are charged for extra options that are neither wanted nor needed and do not provide value for the money paid.The National Security Agency and CISA(2023)explain this aspect in their joint guidance on Identity and Access Management as follows:In numerous relying party applications,SSO capab
111、ilities are bundled with other high end“enterprise”features in such a way to make them inaccessible to small and medium organizations.This business practice deprives these organizations of the security benefits of multifactor authentication and other critical capabilities that come from adoption of
112、SSO and is based on a flawed assumption that SSO is an“enterprise”feature.In todays market,SSO is a table stakes feature for organizations of all sizes and should be included in any pricing plans that are targeted at business customers,regardless of size.(p.9)Resource constraints can also result in
113、an unfavorable SSO adoption experience.Customers frequently need more dedicated staff to implement an SSO solution.Those who are unable to meet their staffing needs must rely on overworked and undertrained staff,which may result in difficulties during implementation.Vendors,however,typically assign
114、dedicated resources to an SSO adoption project and may not be aware of the difficulties the customer is experiencing and perceive that the implementation is progressing as planned.Vendors are interested in encouraging SSO adoption;however,they sometimes make a business case for SSO that does not alw
115、ays accurately reflect SMBs constraints and objectives.There is an inherent incentive to convince SMBs to adopt technologies at the level of service that may not necessarily benefit the SMBs.Such upselling practices involve embedding or bundling tiers of unnecessary packages or services alongside a
116、few that may be useful to the businesses purchasing them.Some vendors will bound some SMBs to their selected tier of service even if it is underutilized.Such information and negative adoption experience impact adoption decisions by other SMBs.Technical Technical K Knownow-H Howow andand A Awarenessw
117、areness Vendors feel confident that they offer sufficient training materials and how-to guides to support customers in effectively deploying SSO technology.They believe organizations should be able to overcome any technical hurdles associated with its deployment;however,customers have different perc
118、eptions and user experiences.They see SSO as a complex solution with numerous moving parts that may impede its successful deployment,12 CISA|Cybersecurity and Infrastructure Security Agency thus becoming a potential barrier to adoption.These challenges related to implementation need to be addressed
119、before customers consider adopting it.In addition,customers have varying degrees of satisfaction with the accuracy and completeness of the provided support materials and instructions.Even some of the more experienced and technically savvy users have reported the need to submit numerous support ticke
120、ts and engage in multiple interactions with their vendors customer support staff to fill the gaps or resolve inaccuracies and omissions.For SMBs with limited resources,the opportunity cost of that time makes the pursuit of proper SSO implementation prohibitively expensive and results in a negative u
121、ser experience from the very start.Regarding technological awareness,vendors often see SSO as a minimum standard security practice that all organizations should follow regardless of size or industry.They emphasize its benefits beyond security(e.g.,potentially reducing cyber insurance costs for SMBs)
122、.However,customers have differing perspectives.Some see it as adding value that improves their security posture,while others view it as an unnecessary expense that does not deliver significant operational improvement and commensurate returns.The latter view may reflect a lack of awareness of all the
123、 benefits SSO may provide and highlights the need for clear messaging regarding its advantages.Vendor Vendor R Rivalryivalry a and nd L Legacy egacy S System ystem C Challengeshallenges The market for SSO solutions is highly competitive.As such,vendors provide different service offerings and technol
124、ogies that allow flexibility.They attempt to streamline the selection process by publishing marketing data and technical details.Customers,however,may feel overwhelmed during this process.They often rely on unreliable customer reviews or recommendations for solutions that do not align with their nee
125、ds.They may make judgments based on biased,unverified information,and not wholly on sound vendor trade-off analysis that accounts for their business needs and peculiarities.Compatibility of SSO and its interoperability with legacy systems is also a challenge.Clients may have existing platforms that
126、need help to accommodate the new SSO technology offerings.In order to adopt SSO,these customers must first invest in upgrading the legacy systems.Customers also often rely on older standalone apps built with outdated technology and see SSO implementation as disruptive and high-risk,given the signifi
127、cant upgrades needed on existing technologies.Such customers may need accurate and conclusive evidence of SSO benefits and descriptions of its actual operational performance and user experience provided by prior SSO adopters via a trusted and reputable information dissemination channel.Such informat
128、ion can help them assess whether the long-term benefits of adoption outweigh the temporary discomfort SSO implementation might cause.Furthermore,adoption may also depend on an SMBs ability to secure financing.Reliance on significantly outdated legacy systems is often a consequence of constrained fin
129、ancial circumstances over a prolonged period.Thus,even with a favorable cost-benefit analysis,an upgrade that requires a significant initial capital outlay may not be attainable.At present,many SMBs are using outdated systems for their day-to-day operations.Unfortunately,some platforms do not have t
130、he necessary technology to support a modern and scalable sign-on solution.To implement an SSO solution,it might be necessary to dismantle parts,or all of the existing IT environment.This type of upgrade might be perceived as involving a slow rollout that would place an unnecessary burden on the orga
131、nizations day-to-day operations.The reluctance to undertake a significant overhaul of the environment might bring delays or hamper the adoption of SSO and any other new technology(Teo et al.,2003).7 7 Conclusion Both the literature review and CISA efforts that included focus groups and follow-up tec
132、hnical discussions identify several sets of benefits,challenges,and other considerations associated with the SSO adoption by SMBs.BenefitsBenefits of SSOof SSO To fully leverage the advantages of SSO,SMBs should understand that it enhances productivity by minimizing the number of login attempts requ
133、ired to access multiple systems.Additionally,SSO strengthens security measures by reducing the exposure of passwords.Typically,individuals tend to reuse the same password across various 13 CISA|Cybersecurity and Infrastructure Security Agency systems,which is considered a risky behavior.Such behavio
134、r can be addressed by implementing SSO.SMBs can also reap the benefits of an SSO solution by effectively managing user accounts from a centralized location,streamlining user management,and minimizing the risk of unmanaged accounts.Furthermore,SSO is an enabler for other technologies and e-commerce.I
135、t simplifies the process of managing end-user identities online.For many SMBs,e-commerce applications can translate into an additional source of revenue.SMB Challenges SMB Challenges w withith Implementing SSOImplementing SSO Implementing SSO solutions can be quite challenging for SMBs.Both financia
136、l costs and non-financial burdens associated with switching to a new technology solution serve as key obstacles hindering SSO deployment.The cost of entry is a significant factor as it involves a high initial investment.Training poses an additional challenge for many SMBs that need more technical ex
137、pertise to manage an SSO solution independently.Furthermore,some of the SMBs that have already committed to a long-term or locked-in contract with a specific vendor may find it difficult to switch providers without penalties or integration issues.Lastly,the lack of technical knowledge among SMBs can
138、 impede the implementation of an SSO solution,particularly when ensuring interoperability with existing infrastructures.VendorVendor Business PracticeBusiness Practices s Various vendors provide discounts to entice customers to purchase multiple software programs and services.One effective strategy
139、is to offer tiered discounts based on the bundled services.Additionally,vendors aim to establish a Customer Relationship Management system to enhance the satisfaction of SMB clients.By analyzing the data collected through a Customer Relationship Management system,vendors can gain deeper insights int
140、o the specific needs of SMBs and provide tailored solutions accordingly.SMBSMB NeedNeeds s SMBs are on the hunt for specific attributes in an SSO solution.It needs to be scalable so it can accommodate additional users as the SMB expands.Affordability is crucial for SMBs in the short and long term,so
141、 a low initial cost is considered important.SMBs highly value user-friendliness in an SSO solution,as they often need more skills to manage it.SMBs ranked customer support as one of the most significant features in SSO solutions.As SMBs typically have limited technical experience,they prefer to avoi
142、d tinkering with the solution and rely on vendor for guidance and assistance during the initial SSO implementation phase.8 8 Recommendations Based on what CISA learned from this study,CISA has identified general recommendations for SMBs,SSO vendors,government agencies,and non-profit organizations ai
143、med at encouraging SMB adoption of SSO solutions by helping to ensure a smooth and successful implementation while providing enhanced security and streamlined user access.Recommendations for SMBsRecommendations for SMBs Implementing a systematic approach to SSO will facilitate SSO deployment in SMB
144、environments.We recommend SMBs use an approach such as the following.Start by analyzing the organizations needs,such as the number of users,applications,and security requirements.This assessment will help determine the most suitable SSO solution.Look for affordable options(e.g.,cloud-based solutions
145、 that do not require extensive infrastructure).Compare the features and compatibility of different SSO solutions provided by the many vendors in the market.Evaluate how well the solutions integrate with existing infrastructure and applications.Conduct a pilot project to minimize risks and test the s
146、olutions effectiveness before rolling it out to the entire organization.Train the staff and provide clear guidelines for password management and security practices.Continuously monitor the SSO solution to strengthen the overall security posture.Recommendations for VendorsRecommendations for Vendors
147、Based on user feedback,vendors can significantly improve their service offerings by implementing the following recommendations.Vendors should(a)gather customer requirements and offer tailored solutions that meet their needs,while eliminating unnecessary services;(b)offer more flexible seat threshold
148、s or requirements;and(c)improve the accuracy and completeness of support materials for their essential set of services such as SSO.14 CISA|Cybersecurity and Infrastructure Security Agency First,basic and essential services such as SSO should be decoupled from bundles with premium services.Vendors sh
149、ould avoid upselling techniques,whereby they sell unnecessary services to SMBs.While product bundling is a recognized pricing strategy to extract maximum consumer surplus,the need for essential cyber services to protect and defend critical infrastructure and cyber-poor,target-rich organizations shou
150、ld not be leveraged to upsell premium services that may not have the same appeal or value-added.Instead,they should encourage customers to request additional services to improve their overall security standing when needed.Second,vendors should provide a more flexible schedule of seat thresholds or r
151、equirements that would allow a meaningful service tailoring based on organization size.Specifically,for SMBs,special consideration should be given for pooling SSO licenses at the managed service provider level or SMB-group level rather than the individual subscriber organization level.Third,it is cr
152、ucial that vendors offer SMBs any necessary support and training.To reduce the number of call-ins and amount of technical support required by SMBs to properly implement and maintain SSO,the quality of the instructions given to users upfront should be significantly improved.In their user experience f
153、eedback,users consistently emphasized that instructions are incomplete,vague,and often inaccurate.The latter factor is a barrier not only to SSO adoption,but also manifests itself when the existing users attempt to migrate platforms.Jointly these three factors(i.e.,the inclusion of SSO in bundles wi
154、th premium services,inflexible seat thresholds and requirements,and inaccurate and incomplete instructions)result in a negative user experience,which negatively influences adoption decisions for potential SSO adopters.Recommendations for Government AgenciesRecommendations for Government Agencies Gov
155、ernment agencies such as the National Institute of Standards and Technology,CISA,and the General Services Administration can help highlight best practices,provide guidance,and produce buyer guides related to technologies,such as SSO,that align with current security recommendations.Furthermore,the go
156、vernment could consider providing incentives that would encourage the adoption of security technologies,such as SSO.A comprehensive study of incentives conducted by a U.S.Department of Homeland Security Integrated Task Force(2013)contains detailed discussion of the potential options.Recommendations
157、for NonRecommendations for Non-Profit OrganizationsProfit Organizations Relevant non-profit organizations dedicated to improving cybersecurity(e.g.,the Global Cyber Alliance and National Cybersecurity Alliance)can engage with the public on the topic of SSO solutions as a part of their community invo
158、lvement.These community engagements play a vital role in educating SMBs about the advantages of SSO technology.In addition,during their regular interactions with SMBs,these non-profit organizations gather valuable information about the SMBs requirements,which can be used to offer tailored services a
159、nd toolkits to these SMBs.15 CISA|Cybersecurity and Infrastructure Security Agency Appendix Stakeholder Engagement Methodology CISA chose a convenience sample1 of SSO vendors based on the Gartner Magic Quadrant,2 existing industry relations,and broader market research.The list of participants was ex
160、tended via snowball sampling,where initial participants identified additional contacts of relevance.CISA used a similar technique for identifying managed service providers,experienced network auditors,and SMBs with SSO adoption experience.CISA then conducted focus groups with various groups of stake
161、holders involved with SSO.Participants in these discussions include SSO vendors,experienced computer network auditors,and SMBs,who all have a significant interest in encouraging SSO adoption and have experienced both barriers and catalysts first-hand.This study analyzes factors affecting adoption by
162、 examining patterns and trends revealed during these discussions.Stakeholder engagement and technical discussions continued until a core set of considerations were addressed to the point that no new incremental information was presenting itself in subsequent outreach.Research DesignResearch Design C
163、ISA used a qualitative research design to obtain in-depth knowledge of the catalysts and barriers to SSO adoption.The individual conversations helped CISA obtain participants insight and understand their experiences through semi-structured discussions that allowed for deeper investigation on specifi
164、c topics while maintaining a uniform framework across discussions.Data Collection Method Data Collection Method CISA gathered data through one-on-one discussions with each participant,either face-to-face,over the phone,or via video conferencing,depending on their availability and preference.CISA tra
165、nscribed the discussions and reviewed the notes for later analysis.CISA synthesized and aggregated the findings in a manner that preserves anonymity and prevents re-identification to the extent possible.Data Sources Data Sources CISA chose participants from diverse backgrounds to gain a broad balanc
166、ed perspective of SSO adoption.The sample consisted of representatives from SSO vendors,computer network auditors with extensive experience in SSO audits,and SMBs who adopted or contemplating adopting SSO solutions.Validity and Reliability Validity and Reliability CISA used several strategies to enh
167、ance the validity and reliability of the findings.First,CISA selected participants with relevant expertise in the SSO domain.Purposeful sampling is a technique widely used in qualitative research for the identification and selection of information-rich cases for the most effective use of limited res
168、ources.Next,CISA adopted member-checking techniques,where participants received a summary of the findings with opportunities for feedback or clarification from others in attendance.Furthermore,CISA held peer debriefing sessions among researchers to review the data analysis process and ensure an accu
169、rate interpretation of findings.In addition,CISA is planning a follow-up engagement and outreach to the SMB community via the Global Cyber Alliance.CISA plans to conduct roundtables and focus groups to validate the findings of this study with a broader set of current SSO users and potential SSO adop
170、ters.LimitationsLimitations This studys reliance on a convenience sample based on voluntary participation has recognized limitations.Namely,as with any voluntary discussion,there is a limited sample of participants with inherent self-selection bias,where statistical inference of the sample results o
171、n the rest of the population(beyond the actual respondents)is not appropriate.Therefore,the results cannot be generalized for the entire SMB population.Sample size and composition may not accurately represent all aspects of the SSO ecosystem.In addition,insights gleaned are contingent upon participa
172、nts personal experiences,assuming honest and accurate accounts of their experiences with SSO adoption are presented.This studys focus on qualitative data regarding a specific cybersecurity solution(i.e.,SSO)could limit generalizability across other contexts.1 A convenience sample is a type of sample
173、 where the first-available primary data source will be used for the research without additional requirements.2 The Gartner Magic Quadrant is a series of market research reports published by the IT consulting firm Gartner that rely on proprietary qualitative data analysis methods to demonstrate marke
174、t trends,such as direction,maturity,and participants(Teixeira et al.,2022).16 CISA|Cybersecurity and Infrastructure Security Agency Referencies Armando,A.,Carbone,R.,Compagna,L.,Cullar,J.,Pellegrino,G.,&Sorniotti,A.(2013).An authentication flaw in browser-based Single Sign-On protocols:Impact and re
175、mediations.Computers&Security,33,4158.https:/doi.org/10.1016/j.cose.2012.08.007 Blili,S.,&Raymond,L.(1993).Information technology:Threats and opportunities for small and medium-sized enterprises.International Journal of Information Management,13(6),439448.https:/doi.org/10.1016/0268-4012(93)90060-H
176、Bracken,B.(2023,November 30).Okta Breach Widens to Affect 100%of Customer Base.DarkReading.https:/ Bradbury,D.(2023,October 20).Tracking unauthorized access to Oktas support system.Okta.https:/ Chang,C.-C.,&Lee,C.-Y.(2012).A secure single sign-on mechanism for distributed computer networks.IEEE Tran
177、sactions on Industrial Electronics,59(1),629637.https:/doi.org/10.1109/TIE.2011.2130500 Chwelos,P.,Benbasat,I.,&Dexter,A.S.(2001).Research report:Empirical test of an EDI adoption model.Information Systems Research,12(3),304321.https:/doi.org/10.1287/isre.12.3.304.9708 Cusack,B.,&Ghazizadeh,E.(2016)
178、.Evaluating single sign-on security failure in cloud services.Business Horizons,59(6),605614.https:/doi.org/10.1016/j.bushor.2016.08.002 Davis,F.D.,Bagozzi,R.P.,&Warshaw,P.R.(1989).User acceptance of computer technology:A comparison of two theoretical models.Management Science,35(8),9821003.https:/d
179、oi.org/10.1287/mnsc.35.8.982 DCosta-Alphonso,M.-M.,&Lane,M.(2010).The adoption of single sign-on and multifactor authentication in organisations A critical evaluation using TOE framework.Issues in Informing Science and Information Technology Education,7,161189.https:/doi.org/10.28945/1199 Dreyer,M.,
180、&Nygaard,K.(2020,June 15).Governments encourage SMEs to adopt new technology.Yale School of Management.https:/som.yale.edu/blog/governments-encourage-smes-to-adopt-new-technology Esmaeilpour,M.,Hoseini,S.Y.,&Jafarpour,Y.(2016).An empirical analysis of the adoption barriers of E-commerce in small and
181、 medium sized enterprises(SMEs)with implementation of Technology Acceptance Model.Journal of Internet Banking and Commerce,21(2).Fink,D.(1998).Guidelines for the successful adoption of information technology in small and medium enterprises.International Journal of Information Management,18(4),243253
182、.https:/doi.org/10.1016/S0268-4012(98)00013-9 Ghobakhloo,M.,Hong,T.S.,Sabouri,M.S.,&Zulkifli,N.(2012).Strategies for successful information technology adoption in small and medium-sized enterprises.Information,3(1),3667.https:/doi.org/10.3390/info3010036 Goodstein,J.D.(1994).Institutional pressures
183、and strategic responsiveness:Employer involvement in work-family issues.The Academy of Management Journal,37(2),350382.17 CISA|Cybersecurity and Infrastructure Security Agency Govindaraju,R.,&Chandra,D.R.(2011).E-commerce adoption by Indonesian small,medium,and micro enterprises(SMMEs):Analysis of g
184、oals and barriers.2011 IEEE 3rd International Conference on Communication Software and Networks,113117.https:/doi.org/10.1109/ICCSN.2011.6014861 Herzallah,F.,&Mukhtar,M.(2015).The impact of internal organization factors on the adoption of e-commerce and its effect on organizational performance among
185、 Palestinian small and medium enterprise.International Conference on E-Commerce(IcoEC)2015.Herzallah,F.,&Mukhtar,M.(2016).The impact of perceived usefulness,ease of use and trust on managers acceptance of e-commerce services in small and medium-sized enterprises(SMEs)in Palestine.International Journ
186、al on Advanced Science Engineering and Information Technology,6(6),922929.Hoque,M.R.,Ali,M.A.,&Mahfuz,M.A.(2015).An empirical investigation on the adoption of e-commerce in Bangladesh.Asia Pacific Journal of Information Systems,25(1),124.http:/doi.org/10.14329/apjis.2015.25.1.001 Joshi,U.,Cha,S.,&Es
187、maili-Sardari,S.(2018).Towards adoption of authentication and authorization in identity management and Single Sign On.Advances in Science,Technology and Engineering Systems Journal,3(5),492500.https:/doi.org/10.25046/aj030556 Komorowski,M.,Coppens,P.,Van den Broeck,W.,&Braet,O.(2016).Lowering the ba
188、rriers for online cross-media usage:Scenarios for a Belgian single sign-on solution.Telematics and Informatics,33(4),916924.https:/doi.org/10.1016/j.tele.2016.02.005 Mamun,A.A.(2018).Diffusion of innovation among Malaysian manufacturing SMEs.European Journal of Innovation Management,21(1):113141.htt
189、ps:/doi.org/10.1108/EJIM-02-2017-0017 National Security Agency&Cybersecurity and Infrastructure Security Agency.(2023,October 4).Identity and access management:Developer and vendor Challenges.https:/media.defense.gov/2023/Oct/04/2003313510/-1/-1/0/ESF%20CTR%20IAM%20MFA%20SSO%20CHALLENGES.PDF Newman,
190、L.(2023,November 23).Okta Breach Impacted All Customer Support UsersNot 1 Percent.Wired.https:/ Nguyen,T.H.(2009).Information technology adoption in SMEs:an integrated framework.International Journal of Entrepreneurial Behavior&Research,15(2),162186.https:/doi.org/10.1108/13552550910944566 Quirt,B;S
191、ingh,P;Sparling,C.(2022).SMBs:The next growth opportunity for high tech.https:/ Ramamoorthi,L.S.,&Sarkar,D.(2020).Single Sign-On:A solution approach to address inefficiencies during sign-out process.IEEE Access,8,195675195691.https:/doi.org/10.1109/ACCESS.2020.3033570 Riches,T.(2007).The challenge o
192、f supporting new technology adoption by SMBs.Database and Network Journal,37(3).Rogers,E.M.(2010).Diffusion of innovations(4th ed.).Simon and Schuster.18 CISA|Cybersecurity and Infrastructure Security Agency Ruivo,P.,Oliveira,T.,&Neto,M.(2012).ERP use and value:Portuguese and Spanish SMEs.Industrial
193、 Management&Data Systems,112(7),10081025.http:/doi.org/10.1108/02635571211254998 Salimon,M.G.,Kareem,O.,Mokhtar,S.S.M.,Aliyu,O.A.,Bamgbade,J.A.,&Adeleke,A.Q.(2023).Malaysian SMEs m-commerce adoption:TAM 3,UTAUT 2 and TOE approach.Journal of Science and Technology Policy Management,14(1),98126.https:
194、/doi.org/10.1108/JSTPM-06-2019-0060 Santini,F.d.O.,de Matos,C.A.,Ladeira,W.J.,Jardim,W.C.,&Perin,M.G.(2023).Information technology adoption by small and medium enterprises:a meta-analysis.Journal of Small Business and Entrepreneurship,35(4),632655.https:/doi.org/10.1080/08276331.2022.2145787 Sila,I.
195、(2013).Factors affecting the adoption of B2B e-commerce technologies.Electronic Commerce Research,13(2),199236.https:/doi.org/10.1007/s10660-013-9110-7 Sutanonpaiboon,J.,&Pearson,A.M.(2006).E-commerce adoption:Perceptions of managers/owners of small-and medium-sized enterprises(SMEs)in Thailand.Jour
196、nal of Internet Commerce,5(3),5382.https:/doi.org/10.1300/J179v05n03_03 Teixeira,H.,Data,A.,Kelley,M.,Hoover,J.,&Guthrie,B.(2022).Gartner,Magic Quadrant for Access Management.Teo,H.H.,Wei,K.K.,&Benbasat,I.(2003).Predicting intention to adopt interorganizational linkages:An institutional perspective.
197、MIS Quarterly,27(1),1949.https:/doi.org/10.2307/30036518 Uruea,M.,Muoz,A.,&Larrabeiti,D.(2014).Analysis of privacy vulnerabilities in single sign-on mechanisms for multimedia websites.Multimedia Tools and Applications,68(1),159176.https:/doi.org/10.1007/s11042-012-1155-4 U.S.Department of Homeland S
198、ecurity Integrated Task Force.(2013,June 12).Executive Order 13636:Improving critical infrastructure cybersecurity.https:/www.cisa.gov/sites/default/files/2023-01/19_1115_dhs-eo13636-analytic-report-cybersecurity-incentives-study.pdf U.S.Small Business Administration.(2023).Frequently Asked Question
199、s About Small Business.Office of Advocacy.https:/ Venkatesh,V.,Morris,M.G.,Davis,G.B.,&Davis,F.D.(2003).User acceptance of information technology:Toward a unified view.MIS Quarterly,27(3)425478.https:/doi.org/10.2307/30036540 Vu,N.H.,Bui,T.A.,Hoang,T.B.,&Pham,H.M.(2022).Information technology adopti
200、on and integration into global value chains:Evidence from small and mediumsized enterprises in Vietnam.Journal of International Development,34(2),259286.https:/doi.org/10.1002/jid.3591 Yousafzai,S.Y.,Foxall,G.R.,&Pallister,J.G.(2007).Technology acceptance:A meta-analysis of the TAM:Part 1.Journal of
201、 Modelling in Management,2(3),251280.https:/doi.org/10.1108/17465660710834453 19 CISA|Cybersecurity and Infrastructure Security Agency Glossary Access Management-Administering the logins and passwords of users across a range of apps and resources,typically contained inside a single organization.Auth
202、entication-Validating an identity as true or false,generally used to verify that a user is who they say they are.Most commonly achieved through a username and password combination,but the same principle applies to other forms of authentication such as secret questions,secret links,and biometric iden
203、tification.Cross-Site Request Forgery-An attack that forces authenticated users to submit a request to a web application against which they are currently authenticated.Cross-Site Request Forgery attacks exploit the trust a web application has in an authenticated user.E-commerce-Buying and selling go
204、ods and services online.Identity Provider-A website,app,or service responsible for coordinating identities between users and clients.An Identity Provider can provide a user with identifying information and share that information with services when the user requests access.Information Security(InfoSe
205、c)-The practice of protecting information by mitigating information risks.It is part of information risk management.Information Technology(IT)-The use of computers to create,process,store,retrieve,and exchange data and information.Single Sign-On(SSO)-An identification method that enables users to lo
206、g in to multiple applications and websites with one set of credentials.Small and medium-sized business(SMB)-While Small Business Administration(SBA)has an established definition of a small business,the threshold number of employees and revenue size varies by industry.SBAs Office of Advocacy generall
207、y defines a small business as an independent business having fewer than 500 employees3.For industry-level small business size standards used in government programs and contracting,see the Table of Size Standards at https:/www.sba.gov/document/support-table-size-standards.There is not a set definitio
208、n for a medium-sized business.However,based on the industry feedback,a business with fewer than 100 employees are generally considered small,while one with 100 to 999 employees is considered medium-sized.3 U.S.Small Business Administration.(2023).Frequently Asked Questions About Small Business.Office of Advocacy.https:/