Journal Screenshot

International Journal of Academic Research in Progressive Education and Development

Open Access Journal

ISSN: 2226-6348

Factors Influencing Cybersecurity: A Focus Group Approach

Anesu R. Dikito, M Shamim Kaiser, J. Philip Vincent

http://dx.doi.org/10.6007/IJARPED/v13-i4/23539

Open access

Cybersecurity has become a critical concern for organizations and individuals alike, driven by the increasing frequency and sophistication of cyber threats. This study explores the factors influencing cybersecurity through a focus group approach, engaging professionals from the banking sectors to gain insights into the challenges and best practices in maintaining robust cybersecurity measures. A focus group approach was employed to collect data from information technology experts and senior managers from risk and audit departments in Zimbabwean commercial banks. The findings highlight human factors and technological factors, offering a comprehensive understanding of the multifaceted nature of cybersecurity. The results showed that human factors influencing cybersecurity were awareness, top management support, information sharing, cyber-response teams, research teams, enactment of cyber-laws, cyber governance framework and crafting of cybersecurity policy. The technical factors were application security, network security, database security, physical security, and internet security.

Brown, A., & Smith, J. (2023). Secure Coding Practices and Application Security: An Overview. Journal of Software Security, 19(2), 142-159.
Bulgurcu, Cavusoglu, & Benbasat. (2010). Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness. MIS Quarterly, 34(3), 523. https://doi.org/10.2307/25750690
Carter, J., & Kockelman, K. (2022). Risk Perception and Cybersecurity Engagement: Insights from Focus Groups. Cybersecurity Review, 11(4), 75-89.
Cavusoglu, H., Cavusoglu, H., & Raghunathan, S. (2018). Emerging issues in responsible information security management. MIS Quarterly Executive, 17(2), 105-120.
Chang, S. E., & Ho, C. B. (2006). Organizational factors to the effectiveness of implementing information security management. Industrial Management & Data Systems, 106(3), 345-361.
Chen, L., & Liu, M. (2023). The Role of HTTPS in Internet Security: A Comprehensive Study. Cybersecurity Journal, 21(3), 115-128.
Datta, A., Jajodia, S., & Brodsky, A. (2009). Foundations of Data Security and Privacy. Springer.
Egan, T. M. (2002). Grounded Theory Research and Theory Building. Advances in Developing Human Resources, 4(3), 227–295.
Fielder, A., Panaousis, E., Malacaria, P., Hankin, C., & Smeraldi, F. (2016). Decision support approaches for cyber security investment. Decision Support Systems, 86, 13-23.
Garcia, R., Lee, H., & Patel, A. (2024). Modern Anti-Malware Solutions: Advances and Challenges. Journal of Cyber Defense, 30(4), 212-229.
Hadlington, L. (2017). Human factors in cybersecurity; examining the link between Internet addiction, impulsivity, attitudes towards cybersecurity, and risky cybersecurity behaviours. Heliyon, 3(7), e00346.
Ho, D. (2006). The focus group Interview: Rising to the challenge in focus qualitative research. Australian Review of Applied Linguistics, 29(1), 1–19.
Jansen, J., & Leukfeldt, R. (2016). Under a Creative Commons Attribution-NonCommercial- ShareAlike 4.0 International (CC BY-NC-SA 4.0) License Phishing and Malware Attacks on Online Banking Customers in the Netherlands: A Qualitative Analysis of Factors Leading to Victimization. International Journal of Cyber Criminology, 10(1), 79–91. https://doi.org/10.5281/zenodo.58523
Kamarulzaman, Y. (2011). A Focus Group Study of Consumer Motivations for e-Shopping: UK versus Malaysia. African Journal of Business Management, 5(16), 6778–6784.
Khan, A., & Sebastian, M. P. (2018). Understanding the Human, Managerial and Organizational Aspects of Information Security Management: A Literature Review. Indian Institute of Management Kozhikode Working papers, (225).
Krause, M., & Tipton, H. F. (2002). Handbook of Information Security Management. CRC Press.
Krueger, R. A., & Casey, M. A. (2000). Focus Groups: A Practical Guide for Applied Research (3rd ed.). SAGE PublicationsSage UK: London, England.
Lee, J., & Kim, Y. (2024). Real-Time Database Auditing: Techniques and Benefits. Database Management Journal, 27(3), 144-159.
Lewis, M., & Li, Y. (2022). Compliance and Cybersecurity Strategies: A Focus Group Study on GDPR Impact. Cyberlaw and Regulation, 19(2), 45-60.
McGraw, G. (2012). Software security: Building security in. Datenschutz und Datensicherheit-DuD, 36(9), 662-665.
Mughairi, B.M.A, Hajri,H.A., Karim, A. M, Hossain, M. I. (2019). An Innovative Cyber Security based Approach for National Infrastructure Resiliency for Sultanate of Oman. International Journal of Academic Research in Business and Social Sciences, 9(3) 1180–1195.
Patel, D., & Kumar, R. (2024). The Importance of Network Segmentation in Cybersecurity. Network Security Review, 23(1), 54-68.
Patel, S., & Shah, A. (2023). Advancements in Cryptography and Technical Security. Journal of Information Security and Privacy, 16(2), 112-126.
Peltier, T. R. (2016). Information Security Policies, Procedures, and Standards: guidelines for effective information security management. CRC press.
Reyns, B. W. (2013). Online Routines and Identity Theft Victimization: Further Expanding Routine Activity Theory beyond Direct-Contact Offenses. Journal of Research in Crime and Delinquency, 50(2), 216–238.
https://doi.org/10.1177/0022427811425539
Schneider, B. (1999). Secrets and Lies: Digital Security in a Networked World. Wiley.
Singh, N., Brown, J., & Thomas, R. (2023). Next-Generation Firewalls and IDS: Innovations and Impact. Cyber Defense Quarterly, 18(3), 89-104.
Smith, J., Anderson, H., & Green, R. (2023). User Attitudes and Cybersecurity Training: Focus Group Insights. Journal of Cyber Behavior, 12(1), 98-115.
Stallings, W. (2013). Network Security Essentials: Applications and Standards. Pearson.
Stewart, D. W. (2018). Focus groups. In The SAGE Encyclopedia of Educational Research, Measurement, and Evaluation (pp. 687–692). SAGE Publications, Ltd.
Williams, E., Anderson, J., & Roberts, T. (2024). Proactive Vulnerability Management: Best Practices and Strategies. Journal of Cybersecurity, 22(1), 67-82.
Zhang, X., Wang, Y., & Liu, J. (2023). Enhancing Database Security through Encryption and Access Controls. Information Security Journal, 29(2), 134-150.

Dikito, A. R., Kaiser, M. S., & Vincent, J. P. (2024). Factors Influencing Cybersecurity: A Focus Group Approach. International Journal of Academic Research in Progressive Education and Development, 13(4), 754–767.