Volume 13, Issue 1, 2024

Understanding Online Security Perceptions and Practices: A Qualitative Study

Michael Adelani Adewusi, Adebanjo Adeshina Wasiu & Ola Tokunbo Odekeye

Abstract

This explore the relationship between individuals' perceptions of online security and their corresponding practices, with the goal of understanding how these perceptions influence protective strategies against digital threats. The study utilizes a qualitative design, specifically employing thematic analysis to delve into the diverse attitudes and actions that individuals adopt concerning online security measures. Data were collected through in-depth interviews and surveys, which provided a view of the factors influencing online security perceptions and behaviors among participants. The study reveals a broad spectrum of user attitudes towards online security, showing that an individual's understanding of online threats significantly shapes their protective actions. Key influences on these perceptions include personal experiences with online threats, societal influences, and the media's portrayal of cyber risks. The study also highlights the crucial role of trust in shaping user behavior, balancing the trade-off between convenience and security. Additionally, it examines how organizational policies and practices impact personal security behaviors, demonstrating the dynamic interaction between individual choices and structured regulations. The findings underscore the intricate nature of online security perceptions and actions, emphasizing the importance of trust and the impact of external influences on user behavior. It provides valuable insights for policymakers, cybersecurity experts, and users, highlighting the need for a deeper understanding of the human elements at the core of online threats. The study recommends the development of customized educational programmes and user-friendly security measures to enhance digital literacy and promote safer online practices. These should aim to empower users with the knowledge and tools necessary to navigate the digital landscape securely, thereby mitigating the risks associated with cyber threats and protecting digital environments.
.

Keywords

Online security, Perception, Digital security, threats.

Full Text

Download

References

Twomey, J., Ching, D., Aylett, M. P., Quayle, M., Linehan, C., & Murphy, G. (2023). Do deepfake videos undermine our epistemic trust? A thematic analysis of tweets that discuss deepfakes in the Russian invasion of Ukraine. Plos one, 18(10), e0291668.
Rahi, S., Alghizzawi, M., & Ngah, A. H. (2023). Understanding consumer behavior toward adoption of e-wallet with the moderating role of pandemic risk: an integrative perspective. Kybernetes.
Jones, E., Samra, R., & Lucassen, M. (2023). Key challenges and opportunities around wellbeing for distance learning students: the online law school experience. Open Learning: The Journal of Open, Distance and e-Learning, 38(2), 117-135.
Rangaraju, S. (2023). Secure by Intelligence: Enhancing Products with AI-Driven Security Measures. EPH-International Journal of Science and Engineering, 9(3), 36-41.
Haugli-Sandvik, M. (2024). Cyber Risk Perception in Offshore Operations: An Exploratory Study of Deck Officers’ Perceptions of Cyber Risks in Norwegian Shipping Companies.
Telo, J. (2023). Understanding Security Awareness Among Bank Customers: A Study Using Multiple Regression Analysis. Sage Science Review of Educational Technology, 6(1), 26-38.
Gao, L. (2023). The Art of Communication in the Digital Age: Trends, Challenges, and Innovations. International Journal of Education and Humanities, 11(3), 287-290.
Blackmon, S. J., & Major, C. H. (2023). Inclusion or infringement? A systematic research review of students' perspectives on student privacy in technology‐enhanced, hybrid and online courses. British Journal of Educational Technology, 54(6), 1542-1565.
Kayode-Ajala, O. (2023). Applications of Cyber Threat Intelligence (CTI) in financial institutions and challenges in its adoption. Applied Research in Artificial Intelligence and Cloud Computing, 6(8), 1-21. Alqudhaibi, A., Krishna, A., Jagtap, S., Williams, N., Afy Shararah, M., & Salonitis, K. (2024). Cybersecurity 4.0: safeguarding trust and production in the digital food industry era. Discover Food, 4(1), 1-18. Adewusi, M. A., Adebanjo, A. W., Odekeye, T., & Kazibwe, S. (2024). Rise of the Machines: Exploring the Emergence of Machine Consciousness. European Journal of Theoretical and Applied Sciences, 2 (4), 563-573. DOI: 10.59324/ejtas.2024.2 (4).
48 Ajani, O. A. (2023). Challenges mitigating against effective adoption and usage of e-learning in curriculum delivery in South African universities. International Journal of Innovative Technologies in Social Science, (2 (38)).
Fosch-Villaronga, E., & Drukarch, H. (2023). Accounting for diversity in robot design, testbeds, and safety standardization. International Journal of Social Robotics, 15(11), 1871-1889.
Starks, A. C., & Reich, S. M. (2023). “What about special ed?“: Barriers and enablers for teaching with technology in special education. Computers & Education, 193, 104665.
Nwankpa, J. K., & Datta, P. M. (2023). Remote vigilance: The roles of cyber awareness and cybersecurity policies among remote workers. Computers & Security, 130, 103266.
Aslan, Ö., Aktuğ, S. S., Ozkan-Okay, M., Yilmaz, A. A., & Akin, E. (2023). A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions. Electronics, 12(6), 1333.
Brinton Anderson, B., Vance, A., Kirwan, C. B., Eargle, D., & Jenkins, J. L. (2016). How users perceive and respond to security messages: a NeuroIS research agenda and empirical study. European Journal of Information Systems, 25(4), 364-390.
Baltuttis, D., Teubner, T., & Adam, M. T. (2024). A typology of cybersecurity behavior among knowledge workers. Computers & Security, 140, 103741.
Karvonen, K. (2008). Bridging the gap between human and machine trust: applying methods of user centred design and usability to computer security.
Teknillinen korkeakoulu. Adewusi, M. A., Egbowon, S. E., & Akindoju, G. (2021). COVID-19 pandemic: An indigenously designed platform to the rescue. Journal of Computer Science and Its Application, 28(2), 33-44.
Bowen and Chawla (2012) highlight the crucial role of trust in determining cybersecurity practices, suggesting that fostering trust can enhance security compliance.
F Naga, J., Tinam-isan, A. C., Maluya, M. O., Panal, A. D., & Tupac, T. A. (2024). Investigating the Relationship between Personality Traits and Information Security Awareness. International Journal of Computing and Digital Systems, 16(1), 1-15.
McCarthy, A. M., Maor, D., McConney, A., & Cavanaugh, C. (2023). Digital transformation in education: Critical components for leaders of system change. Social sciences & humanities open, 8(1), 100479. Adewusi, M. A., Egbowon, S. E., Abodunrin, I., & Rahman, K. 11 (2021). Accra Bespoke Multidisciplinary (ABMIC).
Ahmed, S., & Khan, M. (2023). Securing the Internet of Things (IoT): A comprehensive study on the intersection of cybersecurity, privacy, and connectivity in the IoT ecosystem. AI, IoT and the Fourth Industrial Revolution Review, 13(9), 1-17.
Lottu, O. A., Abdul, A. A., Daraojimba, D. O., Alabi, A. M., John-Ladega, A. A., & Daraojimba, C. (2023). Digital transformation in banking: a review of Nigeria's journey to economic prosperity. International Journal of Advanced Economics, 5(8), 215-238.
Ahmad, E. A. (2024). Revolutionizing learning: leveraging social empowering open media platforms educational for resources. International Journal of e-Learning and Higher Education (IJELHE), 19(1), 83-106.
Adewusi, M. A., Odekeye, T., Egbowon, E. S., Alade, R., & Akindoju, O. G. (2022). Requirement Engineering in Learning Analytics (Machine Learning) in an Indigenously Designed Learning Platform: A Case Study. Advances in Multidisciplinary and Journal, 1, 119-126.
Scientific Research Allioui, H., & Mourdi, Y. (2023). Exploring the full potentials of IoT for better financial growth and stability: A comprehensive survey. Sensors, 23(19), 8015.
Aslam, U. (2023). Understanding the usability of retail fashion brand chatbots: Evidence from customer expectations and experiences. Journal of Retailing and Consumer Services, 74, 103377.
Petrovčič, A., Reisdorf, B. C., Grošelj, D., & Prevodnik, K. (2023). A typology of aging internet users: exploring digital gradations in internet skills and uses. Social Science Computer Review, 41(5), 1921-1940.
Naeem, M., Ozuem, W., Howell, K., & Ranfagni, S. (2023). A step-by-step process of thematic analysis to develop a conceptual model in qualitative research. International Journal of Qualitative Methods, 22, 16094069231205789.
Adewusi, M. A., Asiimwe, S., & Odekeye, O. T. (2024). PHILOSOPHY OF KNOWLEDGE-THE EPISTEMIC EXPLORATIONS INTO THE DEPTHS OF KNOWLEDGE AND. . . ResearchGate. https://www.researchgate.net/publication/379732 176_PHILOSOPHY_OF_KNOWLEDGE THE_EPISTEMIC_EXPLORATIONS_INTO_T HE_DEPTHS_OF_KNOWLEDGE_AND_WIS DOM-ISBN-978-620-7-48534-5
Heino, O., & Huotari, V. (2023). How considering memory as an analogy to preparedness reveals its weaknesses. Risk, Hazards & Crisis in Public Policy, 14(3), 209-225.
Ashraf, A., König, C. J., Javed, M., & Mustafa, M. (2023). " Stalking is immoral but not illegal": Understanding Security, Cyber Crimes and Threats in Pakistan. In Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023) (pp. 37-56).
Nguyen, M. T., & Tran, M. Q. (2023). Balancing security and privacy in the digital age: an in-depth analysis of legal and regulatory frameworks impacting cybersecurity practices. International Journal of Intelligent Automation and Computing, 6(5), 1 12.
Nguyen, M. T., & Tran, M. Q. (2023). Balancing security and privacy in the digital age: an in-depth analysis of legal and regulatory frameworks impacting cybersecurity practices. International Journal of Intelligent Automation and Computing, 6(5), 1 12. An, C., Huang, M., Lu, X. et al. Polar code-based secure transmission with higher message rate combining channel entropy and computational entropy. Cybersecurity 7, 36 (2024). https://doi.org/10.1186/s42400-024-00229-5
Spencer, M., & Pizio, D. (2023). The de-perimeterisation of information security: The Jericho Forum, zero trust, and narrativity. Social Studies of Science, 03063127231221107.
Abulibdeh, A., Zaidan, E., & Abulibdeh, R. (2024). Navigating the confluence of artificial intelligence and education for sustainable development in the era of industry 4.0: Challenges, opportunities, and ethical dimensions. Journal of Cleaner Production, 140527.
Gastaldi, L., Appio, F. P., Trabucchi, D., Buganza, T., & Corso, M. (2023). commensalism: From mutualism to Assessing the evolving relationship between complementors and digital platforms. Information Systems Journal.
Cooper, D. A., Yalcin, T., Nistor, C., Macrini, M., & Pehlivan, E. (2023). Privacy considerations for online advertising: A stakeholder’s perspective to programmatic advertising. Journal of Consumer Marketing, 40(2), 235-247.
Colabianchi, S. (2023). Humans in cyber resilience: managerial and operational opportunities.
Alqahtani, H. S. D. (2023). Analysis and evaluation of cybersecurity awareness using a game-based approach (Doctoral dissertation, Macquarie University).
Mock, K. O., Moyer, A., & Lobel, M. (2023). Explaining sex discrepancies in sterilization rates in the United States: An evidence‐informed commentary. Perspectives on Sexual and Reproductive Health, 55(3), 116-121

Get In Touch