SciELO - Scientific Electronic Library Online

 
vol.24 issue1Insight into ethical cyber behaviour of undergraduate students at selected African universitiesPredicting communication constructs towards determining information security policies compliance author indexsubject indexarticles search
Home Pagealphabetic serial listing  

Services on Demand

Article

Indicators

Related links

  • On index processCited by Google
  • On index processSimilars in Google

Share


South African Journal of Information Management

On-line version ISSN 1560-683X
Print version ISSN 2078-1865

Abstract

RAJKUMAR, Kavish  and  NJENGA, Kennedy. Make personal information security great again: A case of users' perspectives on personal identifiable information in South Africa. SAJIM (Online) [online]. 2022, vol.24, n.1, pp.1-9. ISSN 1560-683X.  http://dx.doi.org/10.4102/sajim.v24i1.1526.

BACKGROUND: There is concern that information technology (IT) users are not taking cognisance of personal information security (PIS), with many keen to disclose personal identifiable information (PII) across connected and integrated IT systems that use the Internet. Compromised PII has led to many users being vulnerable to information security risks emanating from malicious software and hackers. OBJECTIVE: This article elicits perspectives from IT users in the metropole area of Johannesburg, South Africa, in an effort to raise awareness of the dangers of oversharing PII across the Internet. METHODS: The study uses a quantitative approach to elicit data on user perspectives. The quantitative data were collected through online surveys distributed amongst IT employees working across various companies in Johannesburg. RESULTS: The results revealed that of the four constructs drawn from the literature review, namely training, interest, awareness and action that possibly predict user predisposition to maintain information security at a personal level, of concern is that only the construct interest would not likely predict PIS. CONCLUSION: Dangers such as identity theft and phishing attacks are exacerbated by the willingness of users to overshare PII across social networks. A concerted user awareness campaign to promote user PIS needs to be revisited whilst incorporating innovative ways to raise interest amongst users regarding these dangers. South African companies are encouraged to invest resources in bespoke ways to increase user interest, which would be seen as an ideal starting point to making PIS great again.

Keywords : personal identifiable information; personal information security; South Africa; users; IS threats.

        · text in English     · English ( pdf )

 

Creative Commons License All the contents of this journal, except where otherwise noted, is licensed under a Creative Commons Attribution License