Personal Computer Usage and Security Threats in the New Juaben Municipality, Ghana

Authors

  • Sarah Dsane-Nsor Koforidua Technical University P. O. Box kf 981 Koforidua, Ghana
  • Akyene Tetteh University of Mines and Technology P.O. Box 237, Tarkwa, Ghana
  • Joseph Akubire Kojo Nsor Ghana Atomic Energy Commission P.O. Box LG 80, Accra, Ghana

Keywords:

Personal Computer, Ghana, Security Threats

Abstract

Personal computer (PC) usage in Ghana is on the rise but its security threat lacks behind because most PC owners do not know how to guard themselves and unaware of it danger.  This paper studies the current state of PC security threat in the New Juaben Municipality, Eastern Region Ghana. SPSS was used to analyze the questionnaires gathered. The results suggest that (i) good authentic password does not guarantee PC owners safety, (ii) lapse in anti-virus routine update empowers malicious attackers to attack personal computers and (iii) PC’s owners are not free from privacy threat so far as they subscribe to free email accounts.

Author Biographies

  • Sarah Dsane-Nsor, Koforidua Technical University P. O. Box kf 981 Koforidua, Ghana
    Computer Science Lecturer
  • Akyene Tetteh, University of Mines and Technology P.O. Box 237, Tarkwa, Ghana

    Department of Management Studies

    Lecturer

References

Whitman M.E, Mattord H.J., Principle of Information Security, Thomson Course Technology, USA, 2003.

Lampson B.W., “Computer security in the real worldâ€, IEEE Computer, vol. 37, pp. 37-46, 2004.

Chen J., Paik M., McCabe K., “Exploring Internet Security Perceptions and Practices in Urban Ghanaâ€, In Symposium on Usable Privacy and Security (SOUPS), 2014.

Proctor R.W., Lien M.C., Vu K.P.L. Schultz E.E., Salvendy G., “Improving computer security for authentication of users: Influence of proactive password restrictionsâ€, Behavior Research Methods, Instruments & Computers, vol. 34, no. 2, pp. 163-169, 2002.

Bleha, S., Slivinsky, C., Hussien, B., “Computer-access security systems using keystroke dynamicsâ€, Pattern Analysis and Machine Intelligence, IEEE Transactions, vol. 12, no. 12, pp. 1217-1222, 1990.

Bonneau, J., Herley, C., van Oorschot, P. C., Stajano, F., “Passwords and the evolution of imperfect authenticationâ€, Communications of the ACM, vol. 58, no. 7, pp. 78-87, 2015.

McGraw, G., Software security: Building Security In (Vol. 1), Addison-Wesley Professional, USA, 2006.

Landwehr, Carl E., Alan R. Bull, John P. McDermott, and William S. Choi., “A taxonomy of computer program security flawsâ€, ACM Computing Surveys (CSUR) vol. 26, no. 3, pp. 211-254, 1994.

Banday, M. T., Qadri, J. A., & Shah, N. A., “Study of Botnets and their threats to Internet Securityâ€, Working Papers on Information Security, 2009.

Zviran, M., & Erlich, Z., “Identification and authentication: technology and implementation issuesâ€, Communications of the Association for Information Systems, vol. 17, no. 1, pp. 1- 4, 2006.

Keith, M., Shao, B., & Steinbart, P., “A behavioral analysis of passphrase design and effectivenessâ€, Journal of the Association for Information Systems, vol. 10, no. 2, pp. 63-89, 2009.

Zhang, J., Luo, X., Akkaladevi, S., & Ziegelmayer, J., “Improving multiple-password recall: An empirical studyâ€, European Journal of Information Systems, vol. 18, no. 2, pp. 165-176, 2009.

Ariss, S. S. “Computer monitoring: benefits and pitfalls facing managementâ€, Information & Management, vol. 39, no. 7, pp. 553-558, 2002.

Downloads

Published

2017-06-30

Issue

Section

Articles

How to Cite

Personal Computer Usage and Security Threats in the New Juaben Municipality, Ghana. (2017). Asian Journal of Computer and Information Systems, 5(2). https://ajouronline.com/index.php/AJCIS/article/view/4824

Similar Articles

11-20 of 55

You may also start an advanced similarity search for this article.