{"response":{"docs":[{"system_create_dtsi":"2018-02-22T20:25:38Z","system_modified_dtsi":"2019-06-06T15:04:00Z","has_model_ssim":["Article"],"id":"v979v3079","accessControl_ssim":["d50ac0f8-6346-4728-ab9e-05a0907d7e12"],"hasRelatedMediaFragment_ssim":["1r66j1174"],"hasRelatedImage_ssim":["1r66j1174"],"depositor_ssim":["lindsabn@mail.uc.edu"],"depositor_tesim":["lindsabn@mail.uc.edu"],"title_tesim":["Cyber Threats and Security for Small Business"],"date_uploaded_dtsi":"2018-02-22T20:25:37Z","date_modified_dtsi":"2018-02-22T20:25:37Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/C2W40T"],"required_software_tesim":[""],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Information Technology"],"note_tesim":[""],"creator_tesim":["Lindsay, Brandon"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Information Security","Information Technology"],"language_tesim":["English"],"description_tesim":["Currently, there are many threats to small businesses, from simple employee mishandling of sensitive data to hackers attempting to breach systems for consumer data. In this paper, I attempt to review what threats businesses are currently facing, current challenges to implementing a security program, and possible ways to implement a security solution.\r\n\tKeywords: Information Security, Cyber Security, Least Privilege, Risk Mitigation, Small Business, Trojan, Phishing, Malware, Ransomware, Skimmers, Security Program"],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2017-12-04"],"thumbnail_path_ss":"/downloads/1r66j1174?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["1r66j1174"],"file_set_ids_ssim":["1r66j1174"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"CYBER THREATS AND SECURITY FOR SMALL BUSINESS","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_person_ssim":["lindsabn@mail.uc.edu"],"nesting_collection__pathnames_ssim":["v979v3079"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697096074763698176,"timestamp":"2021-04-15T08:55:38.976Z","score":0.00049999997}],"facets":[{"name":"human_readable_type_sim","items":[{"value":"Article","hits":1,"label":"Article"}],"label":"Human Readable Type Sim"},{"name":"creator_sim","items":[{"value":"Lindsay, Brandon","hits":1,"label":"Lindsay, Brandon"}],"label":"Creator Sim"},{"name":"subject_sim","items":[{"value":"Information Security","hits":1,"label":"Information Security"},{"value":"Information Technology","hits":1,"label":"Information Technology"}],"label":"Subject Sim"},{"name":"college_sim","items":[{"value":"Education, Criminal Justice, and Human Services","hits":1,"label":"Education, Criminal Justice, and Human Services"}],"label":"College Sim"},{"name":"department_sim","items":[{"value":"Information Technology","hits":1,"label":"Information Technology"}],"label":"Department Sim"},{"name":"language_sim","items":[{"value":"English","hits":1,"label":"English"}],"label":"Language Sim"},{"name":"publisher_sim","items":[{"value":"University of Cincinnati","hits":1,"label":"University of Cincinnati"}],"label":"Publisher Sim"},{"name":"date_created_sim","items":[{"value":"2017-12-04","hits":1,"label":"2017-12-04"}],"label":"Date Created Sim"},{"name":"member_of_collection_ids_ssim","items":[],"label":"Member Of Collection Ids Ssim"},{"name":"generic_type_sim","items":[{"value":"Work","hits":1,"label":"Work"}],"label":"Generic Type Sim"}],"pages":{"current_page":1,"next_page":null,"prev_page":null,"total_pages":1,"limit_value":10,"offset_value":0,"total_count":1,"first_page?":true,"last_page?":true}}}