Skip to main content

Friendly Folk Advice: Exploring Cybersecurity Information Sharing in Nigeria

  • Conference paper
  • First Online:
Human-Computer Interaction – INTERACT 2023 (INTERACT 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14142))

Included in the following conference series:

  • 1142 Accesses

Abstract

The risk of cyber crimes continues to increase as more Nigerians continue to adopt digital and online tools and services. However, we do not know enough about citizens’ understanding of cybersecurity behaviours and habits. In this paper, we explored the cybersecurity behaviours of Nigerians using a mixed-methods approach to understand how citizens stay safe online. Using a survey, we collected data (n = 208) on how citizens protect themselves online and where they get cybersecurity advice from. We then further explored the reported behaviours using semi-structured interviews (n = 22). We found that Nigerian citizens discussed cybersecurity incidents openly and shared tips and advice with peers through social media and through broadcasts on messaging platforms. We discovered that this has resulted in relatively high adoption rates for protective technologies like 2FA, particularly on WhatsApp. However, we also report how the adoption of 2FA on one account did not necessarily lead to enabling it on other accounts and how some citizens were being socially engineered to bypass those 2FA protections. Finally, we discuss some recommendations for how tools could provide more information to improve users’ understanding of both security threats and the countermeasures the tools offer.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Chakravorti, B., Chaturvedi, R.S.: Research: how technology could promote growth in 6 African Countries (2019). https://hbr.org/2019/12/research-how-technology-could-promote-growth-in-6-african-countries

  2. Doyon-Martin, J.: Cybercrime in West Africa as a result of transboundary e-waste. J. Appl. Secur. Res. 10, 207–220 (2015). https://doi.org/10.1080/19361610.2015.1004511

    Article  Google Scholar 

  3. Fassassi, A., Akoussan, C.F.: Cybercrime in Africa: facts and figures (2016)

    Google Scholar 

  4. Pervaiz, F., et al.: An assessment of SMS fraud in Pakistan. In: Proceedings of the 2nd ACM SIGCAS Conference on Computing and Sustainable Societies, pp. 195–205. Association for Computing Machinery, New York (2019)

    Google Scholar 

  5. Kshetri, N.: Cybercrime and cybersecurity in Africa. J. Glob. Inf. Technol. Manag. 22, 77–81 (2019). https://doi.org/10.1080/1097198X.2019.1603527

    Article  Google Scholar 

  6. Kaimba, B.: Demystifying Africa’s cyber security poverty line. SERIANU (2017)

    Google Scholar 

  7. Thomas, K., Moscicki, A.: New research: how effective is basic account hygiene at preventing hijacking (2019). https://security.googleblog.com/2019/05/new-research-how-effective-is-basic.html

  8. Wash, R., Cooper, M.M.: Who provides phishing training? Facts, Stories, and People Like Me. In: Presented at the Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 21 April 2018

    Google Scholar 

  9. Das, S., Dabbish, L.A., Hong, J.I.: A typology of perceived triggers for end-user security and privacy behaviors. In: Presented at the Fifteenth Symposium on Usable Privacy and Security ({SOUPS} 2019) (2019)

    Google Scholar 

  10. Watson, H., Moju-Igbene, E., Kumari, A., Das, S.: ‘We Hold Each Other Accountable’: unpacking how social groups approach cybersecurity and privacy together. In: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, pp. 1–12. Association for Computing Machinery, Honolulu (2020)

    Google Scholar 

  11. Das, S., Lo, J., Dabbish, L., Hong, J.I.: Breaking! A typology of security and privacy news and how it’s shared. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1:1–1:12. ACM, New York (2018)

    Google Scholar 

  12. Nicholson, J., Coventry, L., Briggs, P.: “If It’s Important It Will Be A Headline”: cybersecurity information seeking in older adults. In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, pp. 1–11. Association for Computing Machinery, Glasgow (2019)

    Google Scholar 

  13. Murthy, S., Bhat, K.S., Das, S., Kumar, N.: Individually vulnerable, collectively safe: the security and privacy practices of households with older adults. Proc. ACM on Hum.-Comput. Interact. 5, 24 (2021)

    Article  Google Scholar 

  14. Nicholson, J., Morrison, B., Dixon, M., Holt, J., Coventry, L., McGlasson, J.: Training and embedding cybersecurity guardians in older communities. In: SIGCHI Conference on Human Factors in Computing Systems (2021)

    Google Scholar 

  15. Vashistha, A., Anderson, R., Mare, S.: Examining security and privacy research in developing regions. In: Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies, pp. 1–14. Association for Computing Machinery, Menlo Park and San Jose (2018)

    Google Scholar 

  16. Chen, J., Paik, M., McCabe, K.: Exploring internet security perceptions and practices in Urban Ghana. In: Presented at the 10th Symposium On Usable Privacy and Security ({SOUPS} 2014) (2014)

    Google Scholar 

  17. Wang, V., Nnaji, H., Jung, J.: Internet banking in Nigeria: cyber security breaches, practices and capability. Int. J. Law, Crime Justice 62, 100415 (2020). https://doi.org/10.1016/j.ijlcj.2020.100415

    Article  Google Scholar 

  18. Obasola, O.I., Agunbiade, O.M.: Online health information seeking pattern among undergraduates in a Nigerian university. SAGE Open 6, 2158244016635255 (2016). https://doi.org/10.1177/2158244016635255

    Article  Google Scholar 

  19. Petsas, T., Tsirantonakis, G., Athanasopoulos, E., Ioannidis, S.: Two-factor authentication: is the world ready? Quantifying 2FA adoption. In: Proceedings of the Eighth European Workshop on System Security, pp. 4:1–4:7. ACM, New York (2015)

    Google Scholar 

  20. Braun, V., Clarke, V.: Using thematic analysis in psychology. Qual. Res. Psychol. 3, 77–101 (2006). https://doi.org/10.1191/1478088706qp063oa

    Article  Google Scholar 

  21. Nowell, L.S., Norris, J.M., White, D.E., Moules, N.J.: Thematic analysis: striving to meet the trustworthiness criteria. Int. J. Qual. Methods 16, 1609406917733847 (2017). https://doi.org/10.1177/1609406917733847

    Article  Google Scholar 

  22. Egelman, S., Peer, E.: Scaling the security wall: developing a security behavior intentions scale (SeBIS). In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, pp. 2873–2882. Association for Computing Machinery, Seoul (2015)

    Google Scholar 

  23. Reichel, J., Peck, F., Inaba, M., Moges, B., Chawla, B.S., Chetty, M.: ‘I have too much respect for my elders’: Understanding South African mobile users’ perceptions of privacy and current behaviors on Facebook and WhatsApp. In: Presented at the 29th {USENIX} Security Symposium ({USENIX} Security 20) (2020)

    Google Scholar 

  24. van Bavel, R., Rodríguez-Priego, N., Vila, J., Briggs, P.: Using protection motivation theory in the design of nudges to improve online security behavior. Int. J. Hum. Comput. Stud. 123, 29–39 (2019). https://doi.org/10.1016/j.ijhcs.2018.11.003

    Article  Google Scholar 

  25. Wash, R.: Folk models of home computer security. In: Proceedings of the Sixth Symposium on Usable Privacy and Security, pp. 1–16. Association for Computing Machinery, New York (2010)

    Google Scholar 

  26. Wiefling, S., Dürmuth, M., Lo Iacono, L.: More than just good passwords? A study on usability and security perceptions of risk-based authentication. In: Annual Computer Security Applications Conference, pp. 203–218. Association for Computing Machinery, New York (2020)

    Google Scholar 

  27. Amran, A., Zaaba, Z.F., Singh, M.K.M.: Habituation effects in computer security warning. Inf. Secur. J.: Global Perspect. 27, 192–204 (2018). https://doi.org/10.1080/19393555.2018.1505008

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to James Nicholson .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Nicholson, J., Ajayi, O.D., Fasae, K., Alese, B.K. (2023). Friendly Folk Advice: Exploring Cybersecurity Information Sharing in Nigeria. In: Abdelnour Nocera, J., Kristín Lárusdóttir, M., Petrie, H., Piccinno, A., Winckler, M. (eds) Human-Computer Interaction – INTERACT 2023. INTERACT 2023. Lecture Notes in Computer Science, vol 14142. Springer, Cham. https://doi.org/10.1007/978-3-031-42280-5_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-42280-5_23

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-42279-9

  • Online ISBN: 978-3-031-42280-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics