Table 5.

Cross-tabulations for Hypotheses 1a, 1 b and 1c

Attack severity, n (%)
LowMediumHigh
H1a: Organization size (n = 50)
 SME7 (20)8 (23)20 (57)
 Large5 (33)2 (13)8 (53)
H1b: Sector (n = 50)*
 Public5 (26)7 (37)7 (37)
 Private7 (23)3 (10)21 (68)
H1c: Security posture (n = 34)***
 Weak0 (0)4 (20)16 (80)
 Medium4 (31)6 (46)3 (23)
 Strong1 (100)0 (0)0 (0)
Attack severity, n (%)
LowMediumHigh
H1a: Organization size (n = 50)
 SME7 (20)8 (23)20 (57)
 Large5 (33)2 (13)8 (53)
H1b: Sector (n = 50)*
 Public5 (26)7 (37)7 (37)
 Private7 (23)3 (10)21 (68)
H1c: Security posture (n = 34)***
 Weak0 (0)4 (20)16 (80)
 Medium4 (31)6 (46)3 (23)
 Strong1 (100)0 (0)0 (0)
*

P < 0.05; ***P < 0.001.

Table 5.

Cross-tabulations for Hypotheses 1a, 1 b and 1c

Attack severity, n (%)
LowMediumHigh
H1a: Organization size (n = 50)
 SME7 (20)8 (23)20 (57)
 Large5 (33)2 (13)8 (53)
H1b: Sector (n = 50)*
 Public5 (26)7 (37)7 (37)
 Private7 (23)3 (10)21 (68)
H1c: Security posture (n = 34)***
 Weak0 (0)4 (20)16 (80)
 Medium4 (31)6 (46)3 (23)
 Strong1 (100)0 (0)0 (0)
Attack severity, n (%)
LowMediumHigh
H1a: Organization size (n = 50)
 SME7 (20)8 (23)20 (57)
 Large5 (33)2 (13)8 (53)
H1b: Sector (n = 50)*
 Public5 (26)7 (37)7 (37)
 Private7 (23)3 (10)21 (68)
H1c: Security posture (n = 34)***
 Weak0 (0)4 (20)16 (80)
 Medium4 (31)6 (46)3 (23)
 Strong1 (100)0 (0)0 (0)
*

P < 0.05; ***P < 0.001.

Close
This Feature Is Available To Subscribers Only

Sign In or Create an Account

Close

This PDF is available to Subscribers Only

View Article Abstract & Purchase Options

For full access to this pdf, sign in to an existing account, or purchase an annual subscription.

Close