| Literature DB >> 31872107 |
Isabella M Venter1, Rénette J Blignaut1, Karen Renaud2,3,4, M Anja Venter5.
Abstract
Smartphones have diffused rapidly across South African society and constitute the most dominant information and communication technologies in everyday use. That being so, it is important to ensure that all South Africans know how to secure their smart devices. Doing so requires a high level of security awareness and knowledge. As yet, there is no formal curriculum addressing cyber security in South African schools. Indeed, it seems to be left to universities to teach cyber security principles, and they currently only do this when students take computing-related courses. The outcome of this approach is that only a very small percentage of South Africans, i.e. those who take computing courses at university, are made aware of cyber security risks and know how to take precautions. In this paper we found that, because this group is overwhelmingly male, this educational strategy disproportionately leaves young South African women vulnerable to cyber-attacks. We thus contend that cyber security ought to be taught as children learn the essential "3 Rs"-delivering requisite skills at University level does not adequately prepare young South Africans for a world where cyber security is an essential skill. Starting to provide awareness and knowledge at primary school, and embedding it across the curriculum would, in addition to ensuring that people have the skills when they need them, also remove the current gender imbalance in cyber security awareness.Entities:
Keywords: Computer science; Cyber security; Education; Gender; Gendered cyber-crime; Smartphone
Year: 2019 PMID: 31872107 PMCID: PMC6909085 DOI: 10.1016/j.heliyon.2019.e02855
Source DB: PubMed Journal: Heliyon ISSN: 2405-8440
Figure 1Within country digital divide in Africa (HH = Household) (The World Bank, 2016, p. 9).
Figure 2Households with a functional landline and cellular phone (Stats South Africa: Household Survey,2015).
Figure 3Cost and speed comparison: $ per Mbps (Numbeo, 2018) (Akamai Technologies, 2017)2.
Internet penetration in 2017 by gender (ITU, 2018b).
| Type of Region | Women | Men | Gap | Total |
|---|---|---|---|---|
| Developed | 79.9 | 82.2 | 2.3 | 81 |
| Developing | 37.5 | 44.7 | 40 | |
| Least Developed | 14.1 | 21 | 18 | |
| World | 44.9 | 50.9 | 6 | 47 |
| Africa | 18.6 | 24.9 | 6.3 | 22 |
| Arab States | 39.4 | 47.7 | 8.3 | 44 |
| Asia and Pacific | 39.7 | 47.9 | 8.2 | 42 |
| CIS | 65.8 | 69.8 | 4 | 68 |
| Europe | 76.3 | 82.9 | 6.6 | 80 |
| The Americas | 66.7 | 65.1 | -1.6 | 66 |
Respondent's perceived mobile phone security or privacy issues.
| Are there any security/privacy issues when using: | CS-Women (%) (n = 31) | CS-Men(%) (n = 96) | NCS-Women (%) (n = 71) | NCS-Men (%) (n = 53) | Gender differences in CS/NCS |
|---|---|---|---|---|---|
| Social networking sites | 97 | 92 | 86 | 92 | Chi-sq = 7.7, p = 0.2630 |
| 84 | 70 | 62 | 58 | Chi-sq = 7.4, p = 0.2817 | |
| Internet searches | 55 | 65 | 61 | 58 | Chi-sq = 10.7, p = 0.0972 |
| Online Banking | 84 | 85 | 77 | 79 | Chi-sq = 6.9, p = 0.3269 |
| PayPal | 65 | 78 | 58 | 55 | Chi-sq = 19.1, p = 0.0040 |
| GPS/Google Maps | 58 | 55 | 45 | 45 | Chi-sq = 8.3, p = 0.2172 |
| Health related apps | 52 | 49 | 37 | 45 | Chi-sq = 4.7, p = 0.5891 |
| 90 | 83 | 72 | 83 | Chi-sq = 8.0, p = 0.2396 | |
| Online shopping | 77 | 82 | 75 | 68 | Chi-sq = 13.6, p = 0.0346 |
| Dating sites | 61 | 69 | 63 | 68 | Chi-sq = 3.4, p = 0.7524 |
| Uber (taxi services) | 57 | 46 | 51 | 44 | Chi-sq = 5.5, p = 0.4859 |
| Bit Torrent | 42 | 48 | 27 | 25 | Chi-sq = 29.9, p < 0.0001 |
| Bit Coins | 43 | 39 | 24 | 27 | Chi-sq = 22.4, p = 0.0010 |
| Passport style photo as a profile picture | 58 | 53 | 51 | 51 | Chi-sq = 0.5, p = 0.9094 |
Significant at a 5% level of significance.
Security awareness.
| CS-Women (%) (n = 31) | CS-Men (%) (n = 96) | NCS-Women (%) (n = 71) | NCS-Men (%) (n = 53) | Gender differences in CS/NCS | |
|---|---|---|---|---|---|
| Do you ever encrypt data on your mobile phone? | 32 | 40 | 27 | 26 | Chi-sq = 4.2, p = 0.2440 |
| Could explain what encryption is | 62 | 51 | 27 (n = 66) | 37 | Chi-sq = 25.7, p = 0.0003 |
| Could identify phishing attempts | 55 | 64 | 37 | 33 | Chi-sq = 18.2, p = 0.0004 |
| Thinks public media provides helpful security advice | 29 | 25 | 15 | 26 | Chi-sq = 6.4, p = 0.7041 |
| Thinks social media provides helpful security advice | 63 | 53 | 46 | 45 | Chi-sq = 8.8930, p = 0.4472 |
Significant at a 5% level of significance.
Figure 4Where security advice is found.
Password behaviour.
| CS-Women (%) (n = 31) | CS-Men (%) (n = 96) | NCS-Women (%) (n = 71) | NCS-Men (%) (n = 53) | |
|---|---|---|---|---|
| Use PIN/password | 71 | 84 | 79 | 72 |
| Share password | 71 | 65 | 81 | 59 |
| Shared password and regretted it | 13 | 14 | 17 | 19 |
| Believe it is easy to bypass their smartphone's access control mechanism | 20 | 26 | 37 | 31 |
| Hide password when unlocking phone at friends | 16 | 23 | 23 | 25 |
| Can protect one's privacy on a mobile phone | 60 | 60 | 43 | 53 |
Behaviour in terms of the device.
| CS-Women (%) (n = 31) | NCS-Women (%) (n = 71) | CS-Men (%) (n = 96) | NCS-Men (%) (n = 53) | Gender differences in CS/NCS Chi-sq, p-value | |
|---|---|---|---|---|---|
| Do delete Apps from phone | 65 | 66 | 78 | 70 | Chi-sq = 9.7, p = 0.3189 |
| Install system updates and upgrades | 74 | 73 | 78 | 74 | Chi-sq = 1.5, p = 0.9569 |
| Have a record of the phone's IMEI number | 52 | 48 | 49 | 42 | Chi-sq = 4.9, p = 0.1758 |
| Know how to lock or wipe phone when stolen or lost | 45 | 23 | 47 | 36 | Chi-sq = 13.7, p = 0.0335 |
| Take precautions when selling or giving phone away | 71 | 59 | 81 | 74 | Chi-sq = 10.0, p = 0.0186 |
| Back-up data on phone regularly | 71 | 35 | 53 | 53 | Chi-sq = 12.2, p = 0.0067 |
| Do you have any anti-virus software on your phone? | 35 | 30 | 41 | 40 | Chi-sq = 2.5, p = 0.4688 |
Significant at a 5% level of significance.
Social behaviour in terms of mobile usage.
| CS-Women (%) (n = 31) | NCS-Women (%) (n = 71) | CS-Men (%) (n = 96) | NCS-Men (%) (n = 53) | Gender differences in CS/NCS, Chi-sq, p-value | |
|---|---|---|---|---|---|
| Offer security advice to other smartphone users | 35 | 17 | 38 | 15 | Chi-sq = 21.1 |
| Can be held liable for re-tweeting, liking or sharing tweets | 58 | 48 | 44 | 40 | Chi-sq = 8.5, p = 0.4892 |
| Made a friend online | 58 | 56 | 78 | 73 | Chi-sq = 15.6, p = 0.0752 |
Significant at a 5% level of significance.
Figure 5Reconsidering the South African security education approach.