Malware victimisation and organisational survival: A multi-method exploration of emerging market
-
Published:2023
Issue:3, special issue
Volume:12
Page:377-388
-
ISSN:2306-6784
-
Container-title:Journal of Governance and Regulation
-
language:en
-
Short-container-title:JGR
Author:
Ogar James Ajor1, Okpa John Thompson1ORCID, Abang Thelma Aya1ORCID, Opoh Fredrick Awhen1, Uyang Francis Abul1ORCID, Ikpeme Bassey Ballantyne1ORCID, Eneji Rosemary Ine1, Bassey Augustine Eze1, Bisong Patrick Owan1, Ezikeudu Chukwudi Charles1, Ebong Edem1
Abstract
The internet has gained widespread acceptance globally since its inception. However, the escalating threats associated with this acceptance are alarming, as cyber fraudsters continually imitate and execute grievous attacks on corporate entities. While much is known about the various dimensions of malware attacks and defense (Sharmeen et al., 2019), little attention has been given to how malware affects the socio-economic survival of organizations in Nigeria, particularly in Cross River State. This article aims to bridge this knowledge gap by presenting empirical evidence on how malware victimization impacts organizational survival in the study area. Through the use of questionnaires and in-depth interviews, a sample of 1,074 research participants, including bank staff, industrial workers, and telecommunication staff, was selected from Cross River State using a multi-stage sampling technique. The findings reveal a significant increase in malware victimization among corporate organizations in Cross River State, resulting in severe consequences for their socio-economic development. To mitigate these risks, the study recommends that organizations strengthen their network security, implement comprehensive cybersecurity awareness training programs for employees, adopt advanced detection and response technologies, and employ mobile security solutions or business internet traffic security measures to ensure their safety.
Publisher
Virtus Interpress
Subject
Strategy and Management,Public Administration,Economics and Econometrics,Finance,Business and International Management
Reference39 articles.
1. Abdulhamza, S. M. (2022). The Iraqi legislative policy to protect national cyber security a study in the light of the principles of public international law. Lark Journal for Philosophy, Linguistics and Social Sciences, 3(46), 522–540. https://www.iasj.net/iasj/article/236956 2. Abdul-Rasheed, S. L., Lateef, I., Yinusa, M. A., & Abdullateef, R. (2016). Cybercrime and Nigeria’s external image: A critical assessment. Africology: The Journal of Pan African Studies, 9(6), 119–132. http://jpanafrican.org/docs/vol9no6/9.6-9-Abdual-Rasheed.pdf 3. Abroshan, H. (2021). A hybrid encryption solution to improve cloud computing security using symmetric and asymmetric cryptography algorithms. International Journal of Advanced Computer Science and Applications, 12(6), 31–37. https://doi.org/10.14569/IJACSA.2021.0120604 4. Ajah, B. O., & Chukwuemeka, O. D. (2019). Neo-economy and militating effects of Africa’s profile on cybercrime. International Journal of Cyber Criminology, 13(2), 326–342. http://surl.li/jijhw 5. Akrim, A., & Dalle, J. (2021). Mobile phone and family happiness, mediating role of marital communication: An attachment theory perspective. International Journal of Interactive Mobile Technologies, 15(21), 107–118. https://doi.org/10.3991/ijim.v15i21.17811
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|