Malware victimisation and organisational survival: A multi-method exploration of emerging market

Author:

Ogar James Ajor1,Okpa John Thompson1ORCID,Abang Thelma Aya1ORCID,Opoh Fredrick Awhen1,Uyang Francis Abul1ORCID,Ikpeme Bassey Ballantyne1ORCID,Eneji Rosemary Ine1,Bassey Augustine Eze1,Bisong Patrick Owan1,Ezikeudu Chukwudi Charles1,Ebong Edem1

Affiliation:

1. University of Calabar

Abstract

The internet has gained widespread acceptance globally since its inception. However, the escalating threats associated with this acceptance are alarming, as cyber fraudsters continually imitate and execute grievous attacks on corporate entities. While much is known about the various dimensions of malware attacks and defense (Sharmeen et al., 2019), little attention has been given to how malware affects the socio-economic survival of organizations in Nigeria, particularly in Cross River State. This article aims to bridge this knowledge gap by presenting empirical evidence on how malware victimization impacts organizational survival in the study area. Through the use of questionnaires and in-depth interviews, a sample of 1,074 research participants, including bank staff, industrial workers, and telecommunication staff, was selected from Cross River State using a multi-stage sampling technique. The findings reveal a significant increase in malware victimization among corporate organizations in Cross River State, resulting in severe consequences for their socio-economic development. To mitigate these risks, the study recommends that organizations strengthen their network security, implement comprehensive cybersecurity awareness training programs for employees, adopt advanced detection and response technologies, and employ mobile security solutions or business internet traffic security measures to ensure their safety.

Publisher

Virtus Interpress

Subject

Strategy and Management,Public Administration,Economics and Econometrics,Finance,Business and International Management

Reference39 articles.

1. Abdulhamza, S. M. (2022). The Iraqi legislative policy to protect national cyber security a study in the light of the principles of public international law. Lark Journal for Philosophy, Linguistics and Social Sciences, 3(46), 522–540. https://www.iasj.net/iasj/article/236956

2. Abdul-Rasheed, S. L., Lateef, I., Yinusa, M. A., & Abdullateef, R. (2016). Cybercrime and Nigeria’s external image: A critical assessment. Africology: The Journal of Pan African Studies, 9(6), 119–132. http://jpanafrican.org/docs/vol9no6/9.6-9-Abdual-Rasheed.pdf

3. Abroshan, H. (2021). A hybrid encryption solution to improve cloud computing security using symmetric and asymmetric cryptography algorithms. International Journal of Advanced Computer Science and Applications, 12(6), 31–37. https://doi.org/10.14569/IJACSA.2021.0120604

4. Ajah, B. O., & Chukwuemeka, O. D. (2019). Neo-economy and militating effects of Africa’s profile on cybercrime. International Journal of Cyber Criminology, 13(2), 326–342. http://surl.li/jijhw

5. Akrim, A., & Dalle, J. (2021). Mobile phone and family happiness, mediating role of marital communication: An attachment theory perspective. International Journal of Interactive Mobile Technologies, 15(21), 107–118. https://doi.org/10.3991/ijim.v15i21.17811

Cited by 1 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Editorial: Pairing old with the new: Firm performance, ESG, and big data;Corporate Governance and Organizational Behavior Review;2023

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3