Skip to main content

Enculturation of Cyber Safety Awareness for Communities in South Africa

  • Conference paper
  • First Online:
Information Systems: Research, Development, Applications, Education (SIGSAND/PLAIS 2019)

Part of the book series: Lecture Notes in Business Information Processing ((LNBIP,volume 359))

Included in the following conference series:

  • 637 Accesses

Abstract

The internet has become so integrated with users’ daily activities, that cyber users interweave their daily activities automatically between the physical and cyberspace without noticing. Cyberspace can be referred to as a virtual computer world, which includes the connectivity of multiple networks. These connections between multiple networks within cyberspace form a global computer network to enable online communication between cyber users. Cyber users connect to cyberspace for socialising, work and educational purposes. The advantages of cyberspace are enormous and to a great benefit to all cyber users and cyber business. However, cyberspace opens the door to a number of possible cyber risks and cybercrimes that can affect cyber users. Cybercrimes and risks relate to either financial loss, disruption or damage to the reputation of a cyber user or organisation. These cybercrimes can include hacking, phishing or identity theft. Cyber users may not be aware of or knowledgeable regarding cyber risks and cybercrimes. The cyber user needs to be cyber safety conscious in order to be protected against cyber risks and cybercrimes. In many instances, cyber users within the industrial sector are being made aware of cyber risks through education and training programmes within their working environment. However, many cyber users within communities in South Africa are not working in industry and therefore do not have access to opportunities regarding cyber safety awareness. This research aims to investigate the level of cyber safety awareness within communities and propose a number of approaches that can be used to create and implement cyber-safety awareness programmes and material within different communities. Differently communities within South Africa have different needs that can range from different languages, learning approaches and community-defined processes and procedures. A quantitative research method and random sampling were used to obtain data about cyber safety awareness within communities. In the research, a survey with full ethical clearance was used.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kortjan, N., Von Solms, R.: A conceptual framework for cyber-security awareness and education in SA. South African Comput. J. 52, 29–41 (2014)

    Article  Google Scholar 

  2. Kritzinger, E.: Growing a cyber-safety culture amongst school learners in South Africa through gaming. South African Comput. J. 29, 16–35 (2017)

    Article  Google Scholar 

  3. Broadhurst, R., Choo, K.-K.R.: Cybercrime and online safety in cyberspace. In: Routledge Handbook of International Criminology, pp. 153–165 (2011). Chap. 16

    Google Scholar 

  4. Fourkas, V.: What is cyberspace? March 2004, 123–153 (2011)

    Google Scholar 

  5. Nick, R.: Charts: visualizing the top global risks of 2019, 18 January 2019. https://www.visualcapitalist.com/top-global-risks-2019/. Accessed 14 May 2019

  6. Danny, P.: Data breaches, cyberattacks are top global risks alongside natural disasters and climate change—ZDNet, 16 January 2019. https://www.zdnet.com/article/data-breaches-cyber-attacks-are-top-global-risks-alongside-natural-disasters-and-climate-change/. Accessed 14 May 2019

  7. Shanice, N.: Cyber crime is advancing fast—Weekend Argus, 15 December 2018. https://www.iol.co.za/weekend-argus/news/cyber-crime-is-advancing-fast-18516412. Accessed 14 May 2019

  8. Carin, S.: Mobile wallets a drawcard for cyber criminals – Kaspersky expert—Fin24, 2 May 2019. https://www.fin24.com/Companies/ICT/mobile-wallets-a-drawcard-for-cyber-criminals-kaspersky-expert-20190502-2. Accessed 20 May 2019

  9. Simon, K.: Digital in 2018: World’s internet users pass the 4 billion mark - We Are Social UK - Global Socially-Led Creative Agency, 30 January 2018. https://wearesocial.com/uk/blog/2018/01/global-digital-report-2018. Accessed 14 May 2019

  10. Grey, A.: Cybersafety in early childhood education. Australas. J. Early Child. 36(2), 77–81 (2019)

    Article  MathSciNet  Google Scholar 

  11. Saha, D., Mukhopadhyay, A., Sadhukhan, S.K., Chatterjee, S., Mahanti, A.: Cyber-risk decision models: to insure IT or not? Decis. Support Syst. 56, 11–26 (2013)

    Article  Google Scholar 

  12. Wall, D.: CYBERCRIME: what is it and what do we do about it? - Mapping out and policing cybercrimes (2011)

    Google Scholar 

  13. Betternet: The major types of cybercrime, 21 February 2018. https://www.betternet.co/blog/the-major-types-of-cybercrime/. Accessed 09 May 2019

  14. Farina, K.A.: Cyber crime: identity theft. Int. Encycl. Soc. Behav. Sci. Second Ed. 5, 633–637 (2015)

    Google Scholar 

  15. Cho, S., Lee, J.M.: Explaining physical, verbal, and social bullying among bullies, victims of bullying, and bully-victims: assessing the integrated approach between social control and lifestyles-routine activities theories. Child Youth Serv. Rev. 91(February), 372–382 (2018)

    Article  Google Scholar 

  16. Kircaburun, K., Jonason, P.K., Griffiths, M.D.: The dark tetrad traits and problematic social media use: the mediating role of cyberbullying and cyberstalking. Pers. Individ. Dif. 135(June), 264–269 (2018)

    Article  Google Scholar 

  17. Qabajeh, I., Thabtah, F., Chiclana, F.: A recent review of conventional vs. automated cybersecurity anti-phishing techniques. Comput. Sci. Rev. 29, 44–55 (2018)

    Article  Google Scholar 

  18. Strawser, B.J., Joy, D.J.: Cyber security and user responsibility: surprising normative differences. Procedia Manuf. 3(Ahfe), 1101–1108 (2015)

    Article  Google Scholar 

  19. Cheryl, K.: 2019: What to expect from cyber criminals, 30 November 2018. https://www.thesouthafrican.com/news/2019-expect-cyber-criminals/. Accessed 20 May 2019

  20. Cheryl, K.: The top five scams that fooled South Africans in 2018, 28 December 2018. https://www.thesouthafrican.com/news/top-five-scams-fooled-south-africans-2018/. Accessed 24 May 2019

  21. Aslin, H., Brown, V.: Towards whole of community engagement: a practical toolkit, pp. 1–146 (2004)

    Google Scholar 

  22. Paula, G.: SA embraces safer internet day—ITWeb, 6 February 2018. https://www.itweb.co.za/content/j5alrvQlPa1qpYQk. Accessed 25 May 2019

  23. Department of Justice and Constitutional Development (2019). http://www.justice.gov.za/cybersafety/cybersafety.html. Accessed 25 May 2019

  24. ISPA (1996). https://ispa.org.za/. Accessed 25 May 2019

  25. Cybercrime Organization (2019). http://cybercrime.org.za/international-resources/. Accessed 25 May 2019

  26. Sutherland, E.: Governance of cybersecurity – the case of South Africa. African J. Inf. Commun. 20, 83–112 (2018)

    Google Scholar 

  27. Andrews, M., Manning, N.: Draft for consultation a guide to peer-to-peer learning (2016). https://www.effectiveinstitutions.org/media/The_EIP_P_to_P_Learning_Guide.pdf. Accessed 14 Feb 2018

  28. Swapnali Gazulaa, P.P., McKennab, L., Cooper, S.: A systematic review of reciprocal peer tutoring within tertiary health profession educational programs. Heal. Prof. Educ. 3(2), 64–78 (2016)

    Article  Google Scholar 

  29. Damon, W., Phelps, E.: Critical distinctions among three methods of peer education. Int. J. Educ. Res. 13, 9–19 (1989)

    Article  Google Scholar 

  30. Kelly, P., David, B.: How to help your employees learn from each other, 8 November 2018. https://hbr.org/2018/11/how-to-help-your-employees-learn-from-each-other. Accessed 25 May 2019

  31. LaMesha, C.: Peer-to-peer learning: the most powerful tool in the workplace  » Community—GovLoop, 12 March 2018. https://www.govloop.com/community/blog/the-most-powerful-tool-in-the-workplace/. Accessed 25 May 2019

Download references

Acknowledgement

The cyber-safety awareness workbooks were created by Professor E Kritzinger that is also one of the authors of this paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Elmarie Kritzinger .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Scholtz, D., Kritzinger, E. (2019). Enculturation of Cyber Safety Awareness for Communities in South Africa. In: Wrycza, S., Maślankowski, J. (eds) Information Systems: Research, Development, Applications, Education. SIGSAND/PLAIS 2019. Lecture Notes in Business Information Processing, vol 359. Springer, Cham. https://doi.org/10.1007/978-3-030-29608-7_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-29608-7_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-29607-0

  • Online ISBN: 978-3-030-29608-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics