Original Research

Towards online security: Key drivers of poor user behaviour and recommendations for appropriate interventions

M. J. Butler
South African Journal of Business Management | Vol 45, No 4 | a138 | DOI: https://doi.org/10.4102/sajbm.v45i4.138 | © 2018 M. J. Butler | This work is licensed under CC Attribution 4.0
Submitted: 05 April 2018 | Published: 31 December 2014

About the author(s)

M. J. Butler, University of Stellenbosch Business School, South Africa

Full Text:


Share this article

Bookmark and Share


Online commerce has grown significantly and securing this channel of commerce is of vital importance for organisations. In the quest to secure the online world, users are often referred to as the weakest link in online security since their
behaviour could impact negatively on systems security. User education and awareness programmes to develop and enhance the required skills and appropriate frame of mind are common approaches to improve online security.

Focussing on the drivers of change in user's online security behaviour can assist in defining appropriate interventions. Key human behaviour models where used to define these drivers. The drivers of change in online security behaviour was
used to design an instrument used to survey South African online consumers to determine the prevalence, or not, of factors that determine secure or unsecure behaviour.

The data from the survey was analysed to highlight the Knowledge, Capability and Motivation to behave in a secure manner, as well as te st for potential aspects that have influenced past behaviour and that could potentially influence
future behaviour. Based on the determinants of behaviour, as well as identified deficiencies in password behaviour as identified by the survey, a list of potential considerations for the designers ofiS security interventions is presented.


No related keywords in the metadata.


Total abstract views: 1329
Total article views: 694


Crossref Citations

1. Holistic cyber hygiene education: Accounting for the human factors
Alexis R. Neigel, Victoria L. Claypoole, Grace E. Waldfogle, Subrata Acharya, Gabriella M. Hancock
Computers & Security  vol: 92  first page: 101731  year: 2020  
doi: 10.1016/j.cose.2020.101731