The phenomenon of data loss and cyber security issues in Ghana

Author:

Adu Kofi Koranteng,Adjei Emmanuel

Abstract

Purpose This study aims to investigate the cyber security awareness and policies within corporate organisations in Ghana. Design/methodology/approach Using both quantitative and qualitative approaches underpinned by questionnaire and document analysis, data were collected from 100 participants centred on cyber security awareness and information policies. Findings The study underscored that, although corporate organisations had a good knowledge of IT, their awareness of cyber security remains limited. It observed that most organisations in Ghana are not integrating legal aspects into their information security policies. It proposed the need to increase the security awareness of corporate organisation, particularly because of the vulnerabilities they are exposed to. Research limitations/implications The implication of the paper with respect to theory, practice and future research lies in the recommendations the authors have proffered, such as the implementation of security awareness training programme, need assessment and the outsourcing of qualified service providers. Practical implications The study is useful for policy makers in the management of Ghana’s IT infrastructure. Originality/value This study is being undertaken at a period when Ghana has made progressive development and giant steps in the IT industry compared to its counterparts in sub-Saharan Africa. The developed nature of Ghana’s IT infrastructure requires the development of policies for cyber security to prevent data loses and protect the national infrastructure from threats. Undertaking a study on cyber security in an environment where cyber issues are hardly discussed is worthwhile.

Publisher

Emerald

Subject

Business and International Management,Management of Technology and Innovation

Reference44 articles.

1. Adu, K.K. (2015), “Framework for digital preservation of electronic government in Ghana”, Doctoral dissertation, University of South Africa.

2. Africa Cyber Report (2016), “Achieving cyber security resilience: enhancing visibility and increasing awareness”, available at: www.serianu.com (accessed 5 July 2017).

3. Improving information security awareness and behaviour through dialogue, participation and collective reflection;An Intervention Study, Computer and Security,2010

4. Problems of information security of the firm and a way of their decision;Vestnik IKBFU,2013

5. Ashford, W. (2015), Top 10 Cyber crime stories of 2015 Computer Weekly, available at: www.computerweekly.com/news/4500260419/Top-10-cyber-crime-stories-of-2015 (accessed 20 January 2018).

Cited by 10 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. The lived experiences of St. John’s Grammar senior high school students: understanding the relevance of crime-related matters in Ghana;Cogent Arts & Humanities;2024-04-08

2. Determinants of Cyberattack Prevention in UAE Financial Organizations: Assessing the Mediating Role of Cybersecurity Leadership;Applied Sciences;2023-05-09

3. Smart Home IoT Cybersecurity Survey: A Systematic Mapping;2023 Conference on Information Communications Technology and Society (ICTAS);2023-03

4. References;Operational Risk Management in Banks and Idiosyncratic Loss Theory: A Leadership Perspective;2022-12-07

5. The Prevalence and Mechanisms of cyber fraud activities among Ghanaian Youths; Routine Activity, Space Transition, and Rational Choice from Differential Association Perspective;2022 IEEE International Symposium on Technology and Society (ISTAS);2022-11-10

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3