scholarly journals ASSESSMENT ON PHISHING AVOIDANCE BEHAVIOUR AMONG INTERNET BANKING USERS IN NIGERIA: A CONCEPTUAL MODEL

2020 ◽  
Vol 5 (16) ◽  
pp. 01-14
Author(s):  
Fadare Olusolade Aribake ◽  
Zahurin Mat Aji

Although acceptance of Internet Banking (IB) has improved among banking customers due to the suitability it offers, there are quite a few risks accompanying with its since it depends heavily towards the usage of Internet network, which has increased the chances of Phishing Attacks (PA). PA referred to as the most defiant of all information security threats and often perpetuated by conning user’s information systems to inadvertently disclose their personal information or by modifying or deleting sensitive information and maliciously destructing and destroying users’ resources Despite this huge enhancement, the ratio of usage has been relatively low, among IB users in Nigeria. This evidence indicates that there is an urgent requirement to investigate the factors behind the issue. Therefore, this study is conducted to develop a conceptual model based on Technology Threat Avoidance Theory (TTAT) to evaluate the PA among IB users in Nigeria and to enhance avoidance behaviour. This paper will present the initial investigation that leads to the development of the conceptual model. Researchers in this field can use the model in different populations and settings, and thus create an avenue in stopping the factors that contribute to the PA.

2021 ◽  
Vol 17 (1) ◽  
pp. 150-166
Author(s):  
Andrei L. LOMAKIN ◽  
Evgenii Yu. KHRUSTALEV ◽  
Gleb A. KOSTYURIN

Subject. As the socio-economic relationships are getting digitalized so quickly, the society faces more and more instances of cybercrime. To effectively prevent arising threats to personal information security, it is necessary to know key social engineering methods and security activities to mitigate consequences of emerging threats. Objectives. We herein analyze and detect arising information security threats associated with social engineering. We set forth basic guidelines for preventing threats and improving the personal security from social engineering approaches. Methods. The study relies upon methods of systems analysis, synthesis, analogy and generalization. Results. We determined the most frequent instances associated with social engineering, which cause personal information security threats and possible implications. The article outlines guidelines for improving the persona; security from social engineering approaches as an information security threat. Conclusions and Relevance. To make information security threats associated with social engineering less probable, there should be a comprehensive approach implying two strategies. First, the information security protection should be technologically improved, fitted with various data protection, antivirus, anti-fishing software. Second, people should be more aware of information security issues. Raising the public awareness, the government, heads of various departments, top executives of public and private organizations should set an integrated training system for people, civil servants, employees to proliferate the knowledge of information security basics.


2011 ◽  
pp. 140-150 ◽  
Author(s):  
Richard G. Taylor

The introduction of new technologies to accumulate large amounts of data has resulted in the need for new methods to secure organizational information. Current information security strategies tend to focus on a technology-based approach to securing information. However, this technology-based approach can leave an organization vulnerable to information security threats. Organizations must realize that information security is not necessarily a technology issue, but rather a social issue. Humans operate, maintain, and use information systems. Their actions, whether intentional or accidental, are the real threat to organizations. Information security strategies must be developed to address the social issue.


2019 ◽  
Vol 8 (4) ◽  
pp. 9030-9034

The article provides a comprehensive analysis of the concepts related to the information security of critically important information systems in Russia. Today, problems exist, which are associated with numerous threats to Russian information security due to the rapidly increasing role of the information sphere. To solve these problems, an effective mechanism is needed to prevent and eliminate these threats. To develop the organizational and legal basis of the mechanism, it is necessary to define a number of concepts, such as information security, critically important information system, information infrastructure, etc. The authors explore Russian legal regulation, as well as international experience and research on this topic. The article shows the main sources of information security threats and defines general principles and approaches to ensuring information security of critically important information systems. The concept and types of critically important information systems are identified and the necessity of developing and improving their legal regulation is substantiated. A number of legal and organizational measures aimed at ensuring the information system security of Russian infrastructure are proposed.


2018 ◽  
pp. 521-543
Author(s):  
Nainika Patnayakuni ◽  
Ravi Patnayakuni ◽  
Jatinder N. D. Gupta

Technical solutions to security have been suggested but found lacking and it has been recognized that security is a people issue as well, and behavioral research on information security is critical. Individual learning about cybersecurity is not formal and linear, but complex and network based. In this paper we develop a model of how social media characteristics impact cybersecurity knowledge transfer using technology threat avoidance theory. In developing the conceptual model we seek to answer the following questions. How do users discover cybersecurity knowledge on social media platforms? What are the platform and interaction characteristics that enable them to find cybersecurity knowledge and share this knowledge with others? In doing so we consider the impact of the threat and protection context on cybersecurity knowledge transfer which is different from knowledge transfer in the other contexts.


2020 ◽  
Vol 28 (2) ◽  
pp. 1-28 ◽  
Author(s):  
Paméla Baillette ◽  
Yves Barlette

Bring Your Own Device (BYOD) refers to the provision and use of personal mobile devices by employees for both private and business purposes. Although there has been research on BYOD, little attention has been paid to employees' perception of threats to their personal information security (ISS) when using a BYOD, especially in a professional context. This article investigates employee coping strategies related to BYOD ISS threats in France. The results of a survey of 223 employees indicate that while perceived behavioral control exerts only direct effects on problem-focused (i.e., disturbance handling) and emotion-focused (i.e., self-preservation) coping strategies, ISS concern exhibits significant direct and moderating influences. Several security paradoxes could be identified, namely, discrepancies between the respondents' ISS concern and the adopted coping strategies. This article offers the first insights into the French context and can serve as a basis for comparisons in future research and to help improve employees' personal ISS in the professional context.


2010 ◽  
Vol 3 (2) ◽  
Author(s):  
Zack Jourdan ◽  
R. Kelly Rainer, Jr. ◽  
Thomas E. Marshall ◽  
F. Nelson Ford

Despite a growing number and variety of information security threats, many organizations continue to neglect implementing information security policies and procedures.  The likelihood that an organization’s information systems can fall victim to these threats is known as information systems risk (Straub & Welke, 1998).  To combat these threats, an organization must undergo a rigorous process of self-analysis. To better understand the current state of this information security risk analysis (ISRA) process, this study deployed a questionnaire using both open-ended and closed ended questions administered to a group of information security professionals (N=32).  The qualitative and quantitative results of this study show that organizations are beginning to conduct regularly scheduled ISRA processes.  However, the results also show that organizations still have room for improvement to create idyllic ISRA processes. 


Author(s):  
Hendro Gunawan

The development of information technology and the internet has changed the way humans communicate. One of them is the development of social media, social media has become a part of their lives to obtain or share news online. Social media is one of the most powerful media today, because it provides the convenience and speed that allows someone to create and distribute content. With the development of social media, information security and privacy issues are also of importance today. Social media as a source of leaking classified information has become common today. The purpose of this study is to see how the views of students who are included in the millennial generation see information security and privacy in using social media. The object of this research is the students of the Information Systems Study Program, Faculty of Industrial Technology, Atma Jaya University, Yogyakarta, the data is obtained by distributing questionnaires. Based on questionnaires from respondents, it can be seen that UAJY Information Systems Study Program students understand the importance of information security (85%) but their behavior does not reflect information security, passwords are not changed regularly (75%) and like to access social media in unknown public places. level of system security. In terms of privacy, UAJY Information Systems Study Program students still include personal information on social media, where many social media accounts are open to the public (40.6%), they also do not apply privacy settings (54.9%) so that information important is not publicly accessible. Keywords: information security; social media; privacy AbstrakPerkembangan teknologi informasi dan internet saat ini telah mengubah cara manusia dalam melakukan komunikasi. Salah satunya adalah perkembangan media sosial, media sosial sudah menjadi bagian dari kehidupan mereka untuk memperoleh atau membagikan berita online. Media sosial merupakan salah satu media yang sangat kuat saat ini, karena menyediakan kemudahan dan kecepatan yang memungkinkan seseorang membuat dan mendistribusikan sebuah konten. Semakin berkembangnya media sosial maka masalah keamanan informasi dan privasi juga menjadi hal yang penting saat ini. Media sosial sebagai salah satu sumber bocornya informasi rahasia sudah menjadi hal yang umum saat ini. Tujuan dari penelitian ini melihat bagaimana pandangan mahasiswa yang termasuk dalam generasi millennial melihat keamanan informasi dan privasi dalam menggunakan media sosial. Yang menjadi objek dalam penelitian ini adalah mahasiswa Program Studi Sistem Informasi Fakultas Teknologi Industri Universitas Atma Jaya Yogyakarta, data diperoleh dengan cara menyebarkan kuesioner. Berdasarkan kuesioner dari responden maka dapat dilihat bahwa mahasiswa Prodi Sistem Informasi UAJY memahami pentingnya keamanan informasi (85%) akan tetapi perilaku mereka tidak mencerminkan keamanan informasi, password tidak diganti secara berkala (75%) dan suka mengakses media sosial di tempat publik yang belum diketahui tingkat keamanan sistemnya. Dari segi privasi, mahasiswa Prodi Sistem Informasi UAJY masih mencantumkan informasi pribadi di media sosial, yang akun media sosialnya masih banyak yang dibuka untuk umum (40,6%), mereka juga tidak menerapkan pengaturan privasi (54,9%) sehingga informasi-informasi penting tidak bisa diakses secara umum.


Author(s):  
Nainika Patnayakuni ◽  
Ravi Patnayakuni ◽  
Jatinder N. D. Gupta

Technical solutions to security have been suggested but found lacking and it has been recognized that security is a people issue as well, and behavioral research on information security is critical. Individual learning about cybersecurity is not formal and linear, but complex and network based. In this paper we develop a model of how social media characteristics impact cybersecurity knowledge transfer using technology threat avoidance theory. In developing the conceptual model we seek to answer the following questions. How do users discover cybersecurity knowledge on social media platforms? What are the platform and interaction characteristics that enable them to find cybersecurity knowledge and share this knowledge with others? In doing so we consider the impact of the threat and protection context on cybersecurity knowledge transfer which is different from knowledge transfer in the other contexts.


Sign in / Sign up

Export Citation Format

Share Document