SciELO - Scientific Electronic Library Online

 
vol.24 número1Insight into ethical cyber behaviour of undergraduate students at selected African universitiesPredicting communication constructs towards determining information security policies compliance índice de autoresíndice de assuntospesquisa de artigos
Home Pagelista alfabética de periódicos  

Serviços Personalizados

Artigo

Indicadores

Links relacionados

  • Em processo de indexaçãoCitado por Google
  • Em processo de indexaçãoSimilares em Google

Compartilhar


South African Journal of Information Management

versão On-line ISSN 1560-683X
versão impressa ISSN 2078-1865

Resumo

RAJKUMAR, Kavish  e  NJENGA, Kennedy. Make personal information security great again: A case of users' perspectives on personal identifiable information in South Africa. SAJIM (Online) [online]. 2022, vol.24, n.1, pp.1-9. ISSN 1560-683X.  http://dx.doi.org/10.4102/sajim.v24i1.1526.

BACKGROUND: There is concern that information technology (IT) users are not taking cognisance of personal information security (PIS), with many keen to disclose personal identifiable information (PII) across connected and integrated IT systems that use the Internet. Compromised PII has led to many users being vulnerable to information security risks emanating from malicious software and hackers. OBJECTIVE: This article elicits perspectives from IT users in the metropole area of Johannesburg, South Africa, in an effort to raise awareness of the dangers of oversharing PII across the Internet. METHODS: The study uses a quantitative approach to elicit data on user perspectives. The quantitative data were collected through online surveys distributed amongst IT employees working across various companies in Johannesburg. RESULTS: The results revealed that of the four constructs drawn from the literature review, namely training, interest, awareness and action that possibly predict user predisposition to maintain information security at a personal level, of concern is that only the construct interest would not likely predict PIS. CONCLUSION: Dangers such as identity theft and phishing attacks are exacerbated by the willingness of users to overshare PII across social networks. A concerted user awareness campaign to promote user PIS needs to be revisited whilst incorporating innovative ways to raise interest amongst users regarding these dangers. South African companies are encouraged to invest resources in bespoke ways to increase user interest, which would be seen as an ideal starting point to making PIS great again.

Palavras-chave : personal identifiable information; personal information security; South Africa; users; IS threats.

        · texto em Inglês     · Inglês ( pdf )

 

Creative Commons License Todo o conteúdo deste periódico, exceto onde está identificado, está licenciado sob uma Licença Creative Commons