Abstract
The internet has become so integrated with users’ daily activities, that cyber users interweave their daily activities automatically between the physical and cyberspace without noticing. Cyberspace can be referred to as a virtual computer world, which includes the connectivity of multiple networks. These connections between multiple networks within cyberspace form a global computer network to enable online communication between cyber users. Cyber users connect to cyberspace for socialising, work and educational purposes. The advantages of cyberspace are enormous and to a great benefit to all cyber users and cyber business. However, cyberspace opens the door to a number of possible cyber risks and cybercrimes that can affect cyber users. Cybercrimes and risks relate to either financial loss, disruption or damage to the reputation of a cyber user or organisation. These cybercrimes can include hacking, phishing or identity theft. Cyber users may not be aware of or knowledgeable regarding cyber risks and cybercrimes. The cyber user needs to be cyber safety conscious in order to be protected against cyber risks and cybercrimes. In many instances, cyber users within the industrial sector are being made aware of cyber risks through education and training programmes within their working environment. However, many cyber users within communities in South Africa are not working in industry and therefore do not have access to opportunities regarding cyber safety awareness. This research aims to investigate the level of cyber safety awareness within communities and propose a number of approaches that can be used to create and implement cyber-safety awareness programmes and material within different communities. Differently communities within South Africa have different needs that can range from different languages, learning approaches and community-defined processes and procedures. A quantitative research method and random sampling were used to obtain data about cyber safety awareness within communities. In the research, a survey with full ethical clearance was used.
Keywords
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kortjan, N., Von Solms, R.: A conceptual framework for cyber-security awareness and education in SA. South African Comput. J. 52, 29–41 (2014)
Kritzinger, E.: Growing a cyber-safety culture amongst school learners in South Africa through gaming. South African Comput. J. 29, 16–35 (2017)
Broadhurst, R., Choo, K.-K.R.: Cybercrime and online safety in cyberspace. In: Routledge Handbook of International Criminology, pp. 153–165 (2011). Chap. 16
Fourkas, V.: What is cyberspace? March 2004, 123–153 (2011)
Nick, R.: Charts: visualizing the top global risks of 2019, 18 January 2019. https://www.visualcapitalist.com/top-global-risks-2019/. Accessed 14 May 2019
Danny, P.: Data breaches, cyberattacks are top global risks alongside natural disasters and climate change—ZDNet, 16 January 2019. https://www.zdnet.com/article/data-breaches-cyber-attacks-are-top-global-risks-alongside-natural-disasters-and-climate-change/. Accessed 14 May 2019
Shanice, N.: Cyber crime is advancing fast—Weekend Argus, 15 December 2018. https://www.iol.co.za/weekend-argus/news/cyber-crime-is-advancing-fast-18516412. Accessed 14 May 2019
Carin, S.: Mobile wallets a drawcard for cyber criminals – Kaspersky expert—Fin24, 2 May 2019. https://www.fin24.com/Companies/ICT/mobile-wallets-a-drawcard-for-cyber-criminals-kaspersky-expert-20190502-2. Accessed 20 May 2019
Simon, K.: Digital in 2018: World’s internet users pass the 4 billion mark - We Are Social UK - Global Socially-Led Creative Agency, 30 January 2018. https://wearesocial.com/uk/blog/2018/01/global-digital-report-2018. Accessed 14 May 2019
Grey, A.: Cybersafety in early childhood education. Australas. J. Early Child. 36(2), 77–81 (2019)
Saha, D., Mukhopadhyay, A., Sadhukhan, S.K., Chatterjee, S., Mahanti, A.: Cyber-risk decision models: to insure IT or not? Decis. Support Syst. 56, 11–26 (2013)
Wall, D.: CYBERCRIME: what is it and what do we do about it? - Mapping out and policing cybercrimes (2011)
Betternet: The major types of cybercrime, 21 February 2018. https://www.betternet.co/blog/the-major-types-of-cybercrime/. Accessed 09 May 2019
Farina, K.A.: Cyber crime: identity theft. Int. Encycl. Soc. Behav. Sci. Second Ed. 5, 633–637 (2015)
Cho, S., Lee, J.M.: Explaining physical, verbal, and social bullying among bullies, victims of bullying, and bully-victims: assessing the integrated approach between social control and lifestyles-routine activities theories. Child Youth Serv. Rev. 91(February), 372–382 (2018)
Kircaburun, K., Jonason, P.K., Griffiths, M.D.: The dark tetrad traits and problematic social media use: the mediating role of cyberbullying and cyberstalking. Pers. Individ. Dif. 135(June), 264–269 (2018)
Qabajeh, I., Thabtah, F., Chiclana, F.: A recent review of conventional vs. automated cybersecurity anti-phishing techniques. Comput. Sci. Rev. 29, 44–55 (2018)
Strawser, B.J., Joy, D.J.: Cyber security and user responsibility: surprising normative differences. Procedia Manuf. 3(Ahfe), 1101–1108 (2015)
Cheryl, K.: 2019: What to expect from cyber criminals, 30 November 2018. https://www.thesouthafrican.com/news/2019-expect-cyber-criminals/. Accessed 20 May 2019
Cheryl, K.: The top five scams that fooled South Africans in 2018, 28 December 2018. https://www.thesouthafrican.com/news/top-five-scams-fooled-south-africans-2018/. Accessed 24 May 2019
Aslin, H., Brown, V.: Towards whole of community engagement: a practical toolkit, pp. 1–146 (2004)
Paula, G.: SA embraces safer internet day—ITWeb, 6 February 2018. https://www.itweb.co.za/content/j5alrvQlPa1qpYQk. Accessed 25 May 2019
Department of Justice and Constitutional Development (2019). http://www.justice.gov.za/cybersafety/cybersafety.html. Accessed 25 May 2019
ISPA (1996). https://ispa.org.za/. Accessed 25 May 2019
Cybercrime Organization (2019). http://cybercrime.org.za/international-resources/. Accessed 25 May 2019
Sutherland, E.: Governance of cybersecurity – the case of South Africa. African J. Inf. Commun. 20, 83–112 (2018)
Andrews, M., Manning, N.: Draft for consultation a guide to peer-to-peer learning (2016). https://www.effectiveinstitutions.org/media/The_EIP_P_to_P_Learning_Guide.pdf. Accessed 14 Feb 2018
Swapnali Gazulaa, P.P., McKennab, L., Cooper, S.: A systematic review of reciprocal peer tutoring within tertiary health profession educational programs. Heal. Prof. Educ. 3(2), 64–78 (2016)
Damon, W., Phelps, E.: Critical distinctions among three methods of peer education. Int. J. Educ. Res. 13, 9–19 (1989)
Kelly, P., David, B.: How to help your employees learn from each other, 8 November 2018. https://hbr.org/2018/11/how-to-help-your-employees-learn-from-each-other. Accessed 25 May 2019
LaMesha, C.: Peer-to-peer learning: the most powerful tool in the workplace » Community—GovLoop, 12 March 2018. https://www.govloop.com/community/blog/the-most-powerful-tool-in-the-workplace/. Accessed 25 May 2019
Acknowledgement
The cyber-safety awareness workbooks were created by Professor E Kritzinger that is also one of the authors of this paper.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Scholtz, D., Kritzinger, E. (2019). Enculturation of Cyber Safety Awareness for Communities in South Africa. In: Wrycza, S., Maślankowski, J. (eds) Information Systems: Research, Development, Applications, Education. SIGSAND/PLAIS 2019. Lecture Notes in Business Information Processing, vol 359. Springer, Cham. https://doi.org/10.1007/978-3-030-29608-7_8
Download citation
DOI: https://doi.org/10.1007/978-3-030-29608-7_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-29607-0
Online ISBN: 978-3-030-29608-7
eBook Packages: Computer ScienceComputer Science (R0)