Abstract
This study explores the current state of cyber-security awareness among cell phone users living in South Africa. The study used a scorecard approach to measure the level of cyber-security awareness among cell phone users in Rocklands Township, South Africa. Following a description of the scorecard and its application, a brief discussion of the results obtained is presented. The scorecard suggested that individual respondents (cell phone users) were most likely vulnerable to cyber-security threats due to their lack of adequate cyber-security awareness (and, consequently, in many cases, their behaviour was risky).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Heidenreich, B., Gray, D.H.: Cyber-security: the threat of the internet. Glob. Secur. Stud. 4(3), 17–26 (2013)
Kumar, P., Joseph, J., Singh, K.: International conference on recent trends in physics 2016 (ICRTP2016). J. Phys.: Conf. Ser. 755, 011001 (2016)
Wright, J., Omar, M.: Cyber security and mobile threats: the need for antivirus applications for smart phones. J. Inf. Syst. Technol. Plan. 5(14), 40–60 (2012)
Sornamageswari, M., Bothma, C.: Phishing detection in websites using neural networks and firefly. Int. J. Eng. Comput. Sci. 5(9), 18197–18204 (2016)
Kortjan, N., Von Solms, R.: A conceptual framework for cyber-security awareness and education in SA. S. Afr. Comput. J. 52(52), 29–41 (2014)
Androulidakis, I., Kandus, G.: Mobile phone security awareness and practices of students in budapest. In: ICDT 2011, The Sixth International, pp. 18–24 (2011). Available from: http://www.thinkmind.org/index.php?view=article&articleid=icdt_2011_1_40_20110. Accessed 8 July 2017
Mylonas, A., Kastania, A., Gritzalis, D.: Delegate the smartphone user? Security awareness in smartphone platforms. Comput. Secur. 34, 47–66 (2013)
Dominguez, C.M.F., Ramaswamy, M., Martinez, E.M., Cleal, M.G.: A framework for information security awareness programs. Issues Inf. Syst. 11(1), 402–409 (2010)
Shing, L.P., Shing, L.H., Tech, V., Chiang, M.C., Yang, C.W., Lu, T.: Smartphone security risks: android. Int. J. Electron. Electr. Eng. 4(4), 346–350 (2016)
Kortjan, N.: A cyber security awareness and education framework for South Africa, p. 219 (2013). https://researchspace.csir.co.za/dspace/handle/10204/5941. Accessed 14 May 2017
Grobler, M., Dlamini, Z., Ngobeni, S., Labuschagne, A.: Towards a cyber security aware rural community. In: Proceedings of the 2011 Information Security for South Africa (ISSA) Conference, pp. 1–7 (2011). http://goo.gl/680YtV. Accessed 4 May 2017
GC Active Management: 2GC Balanced Scorecard Usage Survey. 2GC Active Management (2014). http://2gc.eu/resource_centre/surveys. Accessed 23 Nov 2016
Cooper, D.R., Emory, C.W.: Business Research Methods, 5th edn. Irwin, Chicago (1995)
Dillon, W.R., Madden, T.J., Firtle, N.H.: Essentials of Marketing Research. Irwin, Illinois (1993)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Shabe, T., Kritzinger, E., Loock, M. (2017). Scorecard Approach for Cyber-Security Awareness. In: Huang, TC., Lau, R., Huang, YM., Spaniol, M., Yuen, CH. (eds) Emerging Technologies for Education. SETE 2017. Lecture Notes in Computer Science(), vol 10676. Springer, Cham. https://doi.org/10.1007/978-3-319-71084-6_16
Download citation
DOI: https://doi.org/10.1007/978-3-319-71084-6_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-71083-9
Online ISBN: 978-3-319-71084-6
eBook Packages: Computer ScienceComputer Science (R0)