Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2837185.2837237acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiiwasConference Proceedingsconference-collections
research-article

The urgent need for an enforced awareness programme to create internet security awareness in nigeria

Published: 11 December 2015 Publication History

Abstract

Although the Internet offers an endless list of services and opportunities, it is also accompanied by many risks, of which many Internet users may not be aware of the dangers. As such, various countries have developed and implemented cyber-security awareness measures to counter this. However, there is currently a definite lack in this regard in Nigeria, as there are currently, little government-led and sponsored Internet security awareness initiatives. Also, a security illiterate person will not know of the need to search for these awareness programmes online, particularly in Nigeria's case where personal information security may not be an overly important issue for citizens. This paper therefore, is to establish the need for an enforced Internet security awareness programme for Nigeria that would assist in creating a cyber-secure culture in Nigeria among all of the users of the Internet.

References

[1]
Adkinson, W. F., Eisenach, J. A. and Lenard, T. M., 2002. Privacy online: A report on the information practices and policies of commercial web sites. Progress and Freedom Foundation, Washington DC.
[2]
Antón, A., Earp, J. B. and Reese, A., 2002. Analyzing website privacy requirements using a privacy goal taxonomy, Requirements Engineering, 2002. Proceedings. IEEE Joint International Conference on 2002, IEEE, pp. 23--31.
[3]
Symantec Norton, 2012. Norton Cybercrime Report," 2012.
[4]
Furnell, S., Tsaganidi, V. and Phippen, A., 2008. Security beliefs and barriers for novice Internet users. Computers & Security, 27(7), pp. 235--240.
[5]
Kritzinger, E. and Smith, E., 2008. Information security management: An information security retrieval and awareness model for industry. Computers & Security, 27(5), pp. 224--231.
[6]
Kritzinger, E. and von Solms, S. H., 2010. Cyber security for home users: A new way of protection through awareness enforcement. Computers & Security, 29(8), pp. 840--847.
[7]
Wolf Park and Digital Jewels, 2014. The Nigerian Cyber threat barometer report.
[8]
Dlamini, I., Taute, B. and Radebe, J., 2011. Framework for an African policy towards creating cyber security awareness.
[9]
Cone, B. D., Irvine, C. E., Thompson, M. F. and Nguyen, T. D., 2007. A video game for cyber security training and awareness. Computers & Security, 26(1), pp. 63--72.
[10]
Blythe, J. M. and Coventry, L., 2012. Cyber security games: a new line of risk. Entertainment Computing-ICEC 2012. Springer, pp. 600--603.
[11]
Kortjan, N. and Von Solms, R., 2014. A conceptual framework for cyber-security awareness and education in SA. South African Computer Journal, 52, pp. 29--41.
[12]
National Initiative for Cybersecurity Education, 2015-last update, The National Initiative for Cybersecurity Education (NICE). Available: http://csrc.nist.gov/nice/awareness.html [8/20/2015, 2015].
[13]
UK Government Cabinet Office, 2013-last update, Protecting and promoting the UK in a digital world: 2 years on. Available: https://www.gov.uk/government/news/protecting-and-promoting-the-uk-in-a-digital-world-2-years-on [08/20, 2015].
[14]
Internet Live Stats, 2015-last update, Number of Internet Users (2015) - Internet Live Stats. Available: http://www.internetlivestats.com/internet-users/#byregion [8/24/2015, 2015]
[15]
Farooq, A. and Ullah Kakakhel, S. R., 2013. Information Security Awareness: Comparing perceptions and training preferences, Information Assurance (NCIA), 2013 2nd National Conference on 2013, IEEE, pp. 53--57.
[16]
Adelola, T., Dawson, R. and Batmaz, F., 2015. Nigerians' Perceptions of Personal Data Protection and Privacy, SQM (Software Quality Management) and INSPIRE (International conference for Process Improvement, Research and Education) Conference, 30th March 2015 2015.
[17]
CSEAN, 2015-last update, About CSEAN. Available: http://csean.org.ng/about-csean/ [8/24/2015, 2015].
[18]
Oludare, R., 2015-last update, CSEAN kicks off cyber security awareness campaign, expansion | The Guardian Nigeria. Available: http://www.ngrguardiannews.com/2015/07/csean-kicks-off-cyber-security-awareness-campaign-expansion/ [8/24/2015, 2015].
[19]
ngCert, 2014-last update, ngCert, About. Available: https://www.cert.gov.ng/about [08/24/2014, 2015].
[20]
Information Commissioner's Office, For the public [Homepage of Information Commissioner's Office], [Online]. Available: https://ico.org.uk/for-the-public/ [09/07, 2015].
[21]
Central Intelligence Agency, 2015-last update, The world fact book. Available: https://www.cia.gov/library/publications/resources/the-world-factbook/geos/ni.html [08/25, 2015].
[22]
Adelola, T., Dawson, R. and Batmaz, F., 2014. Privacy and Data Protection in E-commerce in Developing Nations: Evaluation of Different Data Protection Approaches. Regulation, 2, pp. 5.
[23]
Milberg, S. J., Burke, S. J., Smith, H. J. and Kallman, E. A., 1995. Values, personal information privacy, and regulatory approaches. Communications of the ACM, 38(12), pp. 65--74.
[24]
Wilson, M. and Hash, J., 2003. Building an information technology security awareness and training program. NIST Special publication, 800, pp. 50.
[25]
HM Government, 2013-last update, Guiding Principles on Cyber Security. Available: https://www.gov.uk/government/publications/cyber-security-guiding-principles [08/25, 2015].
[26]
McCoy, C. and Fowler, R. T., 2004. You are the key to security: establishing a successful security awareness program, Proceedings of the 32nd annual ACM SIGUCCS conference on User services 2004, ACM, pp. 346--349.
[27]
McGettrick, A., Cassel, L. N., Dark, M., Hawthorne, E. K. and Impagliazzo, J., 2014. Toward curricular guidelines for cybersecurity, Proceedings of the 45th ACM technical symposium on Computer science education 2014, ACM, pp. 81--82.
[28]
Stop Think Connect, 2015 Last update, Keeping the web a safer place for everyone. Available: https://stopthinkconnect.org [8/24/2015, 2015].

Cited By

View all
  • (2024)Designing Cybersecurity Awareness Solutions for Young People in Rural Developing Countries: Insights and Lessons LearnedUniversal Access in Human-Computer Interaction10.1007/978-3-031-60881-0_1(3-18)Online publication date: 1-Jun-2024
  • (2023)Towards Roles and Responsibilities in a Cyber Security Awareness Framework for South African Small, Medium, and Micro Enterprises (SMMEs)Human Aspects of Information Security and Assurance10.1007/978-3-031-38530-8_17(211-224)Online publication date: 26-Jul-2023
  • (2019)An Analysis of Assessment Approaches and Maturity Scales used for Evaluation of Information Security and Cybersecurity User Awareness and Training Programs: A Scoping Review2019 Conference on Next Generation Computing Applications (NextComp)10.1109/NEXTCOMP.2019.8883535(1-6)Online publication date: Sep-2019
  • Show More Cited By

Index Terms

  1. The urgent need for an enforced awareness programme to create internet security awareness in nigeria

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    iiWAS '15: Proceedings of the 17th International Conference on Information Integration and Web-based Applications & Services
    December 2015
    704 pages
    ISBN:9781450334914
    DOI:10.1145/2837185
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 11 December 2015

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. E-commerce
    2. internet security awareness
    3. nigeria

    Qualifiers

    • Research-article

    Conference

    iiWAS '15

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)15
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 09 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Designing Cybersecurity Awareness Solutions for Young People in Rural Developing Countries: Insights and Lessons LearnedUniversal Access in Human-Computer Interaction10.1007/978-3-031-60881-0_1(3-18)Online publication date: 1-Jun-2024
    • (2023)Towards Roles and Responsibilities in a Cyber Security Awareness Framework for South African Small, Medium, and Micro Enterprises (SMMEs)Human Aspects of Information Security and Assurance10.1007/978-3-031-38530-8_17(211-224)Online publication date: 26-Jul-2023
    • (2019)An Analysis of Assessment Approaches and Maturity Scales used for Evaluation of Information Security and Cybersecurity User Awareness and Training Programs: A Scoping Review2019 Conference on Next Generation Computing Applications (NextComp)10.1109/NEXTCOMP.2019.8883535(1-6)Online publication date: Sep-2019
    • (2019)Cyber security awareness for small, medium and micro enterprises (SMMEs) in South Africa2019 Conference on Information Communications Technology and Society (ICTAS)10.1109/ICTAS.2019.8703609(1-6)Online publication date: Mar-2019
    • (2017)Cybersecurity Culture: An Ill-Defined ProblemInformation Security Education for a Global Digital Society10.1007/978-3-319-58553-6_9(98-109)Online publication date: 4-May-2017

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media