<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1d1 20130915//EN" "http://jats.nlm.nih.gov/publishing/1.1d1/JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" article-type="research-article" xml:lang="en">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">SAJIM</journal-id>
<journal-title-group>
<journal-title>South African Journal of Information Management</journal-title>
</journal-title-group>
<issn pub-type="ppub">2078-1865</issn>
<issn pub-type="epub">1560-683X</issn>
<publisher>
<publisher-name>AOSIS</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">SAJIM-24-1526</article-id>
<article-id pub-id-type="doi">10.4102/sajim.v24i1.1526</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Original Research</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Make personal information security great again: A case of users&#x2019; perspectives on personal identifiable information in South Africa</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<contrib-id contrib-id-type="orcid">https://orcid.org/0000-0001-8152-2975</contrib-id>
<name>
<surname>Rajkumar</surname>
<given-names>Kavish</given-names>
</name>
<xref ref-type="aff" rid="AF0001">1</xref>
</contrib>
<contrib contrib-type="author" corresp="yes">
<contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-6403-3624</contrib-id>
<name>
<surname>Njenga</surname>
<given-names>Kennedy</given-names>
</name>
<xref ref-type="aff" rid="AF0001">1</xref>
</contrib>
<aff id="AF0001"><label>1</label>Department of Applied Information Systems, University of Johannesburg, Johannesburg, South Africa</aff>
</contrib-group>
<author-notes>
<corresp id="cor1"><bold>Corresponding author:</bold> Kennedy Njenga, <email xlink:href="knjenga@uj.ac.za">knjenga@uj.ac.za</email></corresp>
</author-notes>
<pub-date pub-type="epub"><day>17</day><month>10</month><year>2022</year></pub-date>
<pub-date pub-type="collection"><year>2022</year></pub-date>
<volume>24</volume>
<issue>1</issue>
<elocation-id>1526</elocation-id>
<history>
<date date-type="received"><day>24</day><month>02</month><year>2022</year></date>
<date date-type="accepted"><day>11</day><month>05</month><year>2022</year></date>
</history>
<permissions>
<copyright-statement>&#x00A9; 2022. The Authors</copyright-statement>
<copyright-year>2022</copyright-year>
<license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
<license-p>Licensee: AOSIS. This work is licensed under the Creative Commons Attribution License.</license-p>
</license>
</permissions>
<abstract>
<sec id="st1">
<title>Background</title>
<p>There is concern that information technology (IT) users are not taking cognisance of personal information security (PIS), with many keen to disclose personal identifiable information (PII) across connected and integrated IT systems that use the Internet. Compromised PII has led to many users being vulnerable to information security risks emanating from malicious software and hackers.</p>
</sec>
<sec id="st2">
<title>Objective</title>
<p>This article elicits perspectives from IT users in the metropole area of Johannesburg, South Africa, in an effort to raise awareness of the dangers of oversharing PII across the Internet.</p>
</sec>
<sec id="st3">
<title>Methods</title>
<p>The study uses a quantitative approach to elicit data on user perspectives. The quantitative data were collected through online surveys distributed amongst IT employees working across various companies in Johannesburg.</p>
</sec>
<sec id="st4">
<title>Results</title>
<p>The results revealed that of the four constructs drawn from the literature review, namely <italic>training, interest, awareness</italic> and <italic>action</italic> that possibly predict user predisposition to maintain information security at a personal level, of concern is that only the construct <italic>interest</italic> would not likely predict PIS.</p>
</sec>
<sec id="st5">
<title>Conclusion</title>
<p>Dangers such as identity theft and phishing attacks are exacerbated by the willingness of users to overshare PII across social networks. A concerted user awareness campaign to promote user PIS needs to be revisited whilst incorporating innovative ways to raise interest amongst users regarding these dangers. South African companies are encouraged to invest resources in bespoke ways to increase user interest, which would be seen as an ideal starting point to making PIS great again.</p>
</sec>
</abstract>
<kwd-group>
<kwd>personal identifiable information</kwd>
<kwd>personal information security</kwd>
<kwd>South Africa</kwd>
<kwd>users</kwd>
<kwd>IS threats</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec id="s0001">
<title>Introduction and background</title>
<p>Many large and mid-sized companies in South Africa have automated their operational processes using advanced technologies to make them more competitive. For example, airlines in South Africa have automated the booking process, collecting large amounts of information regarding potential customers. Customers can conveniently make online bookings, with the trade-off being to pass on identifiable information such as names, dates of birth, ages and addresses to access and use these systems. In the South African airline industry and elsewhere, these systems capture what are known as passenger name records (PNRs) (Taplin <xref ref-type="bibr" rid="CIT0034">2021</xref>). The PNR data are mostly captured when users want to transact a business with a company via online or, at times, offline services. The potential for PNRs to be exploited has been a long-established security concern understood by scholars (Argomaniz <xref ref-type="bibr" rid="CIT0005">2009</xref>), and in more recent times, scholars have used PNR as a basis for security governance across transnational borders, using algorithmic regulation (Ulbricht <xref ref-type="bibr" rid="CIT0035">2018</xref>).</p>
<p>In other South African business contexts outside of the airline industry, online tools such as LinkedIn are widespread platforms where much of people&#x2019;s personal information (similar to PNRs) are elicited. The information shared by users can be used to build personal e-profiles that can at times bear full names and addresses, meant to boost online social presence and discoverability (Adriaanse &#x0026; Rensleigh <xref ref-type="bibr" rid="CIT0001">2017</xref>). The adverse effect of not adequately protecting information was exemplified by Chigada and Madzinga (<xref ref-type="bibr" rid="CIT0009">2021</xref>). Van Niekerk (<xref ref-type="bibr" rid="CIT0036">2017</xref>) reported that there had been a consistent rise in cyberthreats, mainly threats associated with data breaches and particularly from cybercriminals as reported by Motlhabi et al. (<xref ref-type="bibr" rid="CIT0024">2022</xref>). It was also reported that in South Africa, Life Healthcare, an organisation that holds a tremendous amount of healthcare data (primarily personal health data), was attacked by cybercriminals (Chigada &#x0026; Madzinga <xref ref-type="bibr" rid="CIT0009">2021</xref>).</p>
<sec id="s20002">
<title>Personal identifiable information to personal information security</title>
<p>The PNR data and personal health data can be considered as broadly falling under the category of personal identifiable information (PII), where a user can be identified using a combination of available information and by piecing together data that can distinguish and be traced back to a specific individual (Venkatadri et al. <xref ref-type="bibr" rid="CIT0037">2018</xref>). Many see the sharing of PII data such as PNRs and other personal data on online platforms as posing an information security risk. According to a survey conducted by Grobler, Jansen van Vuuren and Zaaiman (<xref ref-type="bibr" rid="CIT0015">2011</xref>), the South African level of personal security awareness of their PII is low, with many sharing PII unknowingly using smartphones (Li &#x0026; Chen <xref ref-type="bibr" rid="CIT0021">2010</xref>).</p>
</sec>
<sec id="s20003">
<title>Exploiting and commercialising personal identifiable information</title>
<p>Notwithstanding personal security concerns, PII has been of benefit to many companies who have found ways to leverage this for commercial purposes. Studies have shown that PII can be monetised and have commercial value (Da Veiga &#x0026; Swartz <xref ref-type="bibr" rid="CIT0011">2016</xref>). Companies can use PII for targeted marketing campaigns, improved business intelligence and strategic advantage (Zenda, Vorster &#x0026; Viega <xref ref-type="bibr" rid="CIT0039">2020</xref>). Personal identifiable information is considered a tradable commodity, and new markets are emerging to trade such valuable information (Spiekermann et al. <xref ref-type="bibr" rid="CIT0033">2015</xref>). In 2018 the European Union launched its General Data Protection Regulation (GDPR), which is now considered to be the world standard for information security and controlling how PII is used or commercialised. The GDPR provides the user with the power to control PII that is collected by organisation (Satariano <xref ref-type="bibr" rid="CIT0031">2018</xref>). In South Africa, there was legislation promulgated on the 19th of November 2013, known as the Protection of Personal Information (POPI) Act, meant to protect individual PII collected, stored and processed by both public and private companies, which took effect in 2021 with the grace period elapsing in 2022 (Taplin <xref ref-type="bibr" rid="CIT0034">2021</xref>). The POPI Act prohibits companies from using PII for direct marketing without consent (Zenda et al. <xref ref-type="bibr" rid="CIT0039">2020</xref>). The POPI Act takes cognisance of personal information such as users&#x2019; gender, health, race, sex, religion, disability, age and education (Mabeka <xref ref-type="bibr" rid="CIT0022">2018</xref>). The <italic>POPI Act</italic> is regulated through the Information Regulator, a government body that has oversight on the misuse of personal information and will discipline a violation of the Act (Sekgweleo &#x0026; Mariri <xref ref-type="bibr" rid="CIT0032">2019</xref>).</p>
</sec>
<sec id="s20004">
<title>Need for research in addressing personal information security</title>
<p>Many systems and processes in current use in South Africa have evolved in manner and mode regarding how PII is collected, stored and processed. In the advent of the COVID-19 pandemic, South Africans have witnessed data PII collection initiatives stemming from the pandemic mitigation measures. From swabs taken for COVID-19 testing to vaccines, modern technology has required that PII records be mapped for swabs and PII for each specific person uniquely. Each health record is easily retrievable from a quick response (QR) code that can be carried by the person, either in print form or on an electronic device such as a phone. The QR system has had the advantage of fast readability and great storage, and therefore it is easy for companies to retrieve PII quickly and easily. It is this (albeit controversial) system that has popularised PII for control, such as institutionalised vaccination policies where PII health records can quickly be retrieved.</p>
<p>There have been a lot of changes since Grobler&#x2019;s et al. (<xref ref-type="bibr" rid="CIT0015">2011</xref>) study and survey on awareness of personal security of PII data and the impact this has had on both people and companies. This research work, therefore, builds on Grobler et al.&#x2019;s (<xref ref-type="bibr" rid="CIT0015">2011</xref>) work. This research is unique because it introduces the concept of personal information security (PIS) as a mitigating measure for security threats to PII. Personal information security is a construct of security awareness that considers how public and private companies use PII that is deemed very sensitive and must be protected. Sensitive PII can be distinguished from other PII because unauthorised use of sensitive PII can be hazardous and will endanger personal security and property, damage personal reputation or cause mental health issues or embarrassment because of identity theft or blackmail (McCallister <xref ref-type="bibr" rid="CIT0023">2010</xref>).</p>
</sec>
<sec id="s20005">
<title>Research objective</title>
<p>There is a justifiable need to address perspectives regarding PII elicited from South African users, many of whom might be oblivious of the risk of oversharing PII across online platforms. The research objective is to therefore consider how South African users perceive PII and to draw from literature constructs that inform this perception. The constructs drawn from literature can then be tested with results informing policymakers on how to manage PIS better whilst making the often-overlooked personal privacy and security measures great (again) from a user perspective. Following on the research objective, we deconstruct how PII has evolved because of the changes in business operations and argue that it is necessary to determine the current understanding of PIS in light of the dangers articulated when sensitive PII falls into the wrong hands. By addressing user perspectives of PIS within the South African context, we can gain deeper insights into managing PII better and complying better with regulations such as the <italic>POPI Act</italic>.</p>
<p>To meet the stated research objective, we present the research as follows: the introduction has set contexts for the concerns around PII and, importantly, why it is necessary to protect personal information and encourage PIS. A review of literature then follows after the introduction section and points to the ongoing discourse regarding PII and PIS in the case of South Africa. The methodology section that follows the literature review outlines how we elicited user perspectives surrounding PIS and provides an account of how we developed a theoretical model that is anchored on literature for testing. We present quantitative methods and show how these methods are applied in research. The data analysis section points to how data were collected and analysed to test the model using computerised software, with the implication of results being discussed in the penultimate sections. The conclusion is provided in the last paragraph, followed by an acknowledgement of participants who contributed to this research work.</p>
</sec>
</sec>
<sec id="s0006">
<title>Literature review</title>
<p>We carried out a theoretical literature review that placed a focus on theoretical constructs examining PIS within the South African context. Whilst there have been previous theoretical literature review studies on information security (Weish&#x00E4;upl, Yasasin &#x0026; Schryen <xref ref-type="bibr" rid="CIT0038">2015</xref>), none has focused on PIS. Our theoretical literature review is meant to establish the current thematic areas South African scholars have addressed and, importantly, develop new hypotheses in PII and predict its influence on PIS. Our focus was guided by South African scholars and contexts where PII has been addressed such as Phaladi and Ngulube (<xref ref-type="bibr" rid="CIT0027">2022</xref>), who espoused information and knowledge protection ideas and insights regarding the security of corporate know-how through the knowledge-based view (KBV) and Chigada and Madzinga&#x2019;s (<xref ref-type="bibr" rid="CIT0009">2021</xref>) notable concern on the rise in cyberattacks and threats during the COVID-19 pandemic because of users&#x2019; inadvertence to information security. Our theoretical literature review was to elicit from studies the constructs that would likely predict PIS as a dependent construct determined through examining users&#x2019; perspectives. We searched online databases using the search criteria &#x2018;information security&#x2019; and &#x2018;South Africa&#x2019; on freely available databases subscribed to by our host university that included Emerald, IEEE Xplore, Sabinet African Journals, SAGE Journals Online, ScienceDirect, Scopus and SpringerLink. Our search results identified theoretical constructs common in the literature that predict how users deal with PIS: training, interest, awareness and action. We show this in <xref ref-type="table" rid="T0001">Table 1</xref> and discuss each of these theoretical constructs in detail in the following section.</p>
<table-wrap id="T0001">
<label>TABLE 1</label>
<caption><p>Theoretical literature review on personal information security.</p></caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th valign="top" align="left">Author</th>
<th valign="top" align="left">Region</th>
<th valign="top" align="left">Thematic area of study</th>
<th valign="top" align="left">Theoretical construct</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left">Arthur (<xref ref-type="bibr" rid="CIT0006">2021</xref>)</td>
<td align="left">South Africa</td>
<td align="left">Information legislation awareness of undergraduate university students</td>
<td align="left">Awareness</td>
</tr>
<tr>
<td align="left">Chigada and Madzinga (<xref ref-type="bibr" rid="CIT0009">2021</xref>)</td>
<td align="left">South Africa</td>
<td align="left">Rise in cyberattacks and threats during COVID-19</td>
<td align="left">Action</td>
</tr>
<tr>
<td align="left">Grobler et al. (<xref ref-type="bibr" rid="CIT0015">2011</xref>)</td>
<td align="left">South Africa</td>
<td align="left">Cyber security awareness in South Africa</td>
<td align="left">Awareness</td>
</tr>
<tr>
<td align="left">Nenungwi and Garaba (<xref ref-type="bibr" rid="CIT0026">2022</xref>)</td>
<td align="left">South Africa</td>
<td align="left">Knowledge management awareness in provincial government departments</td>
<td align="left">Awareness</td>
</tr>
<tr>
<td align="left">Mabeka (<xref ref-type="bibr" rid="CIT0022">2018</xref>)</td>
<td align="left">South Africa</td>
<td align="left">E-technology on law of civil procedure</td>
<td align="left">Interest</td>
</tr>
<tr>
<td align="left">Motlhabi et al. (<xref ref-type="bibr" rid="CIT0024">2022</xref>)</td>
<td align="left">South Africa</td>
<td align="left">Creating context-aware cyberthreat intelligence</td>
<td align="left">Awareness</td>
</tr>
<tr>
<td align="left">Phaladi and Ngulube (<xref ref-type="bibr" rid="CIT0027">2022</xref>)</td>
<td align="left">South Africa</td>
<td align="left">Need for training and investment in information and knowledge management practices</td>
<td align="left">Training</td>
</tr>
<tr>
<td align="left">Staunton and De Stadler (2019)</td>
<td align="left">South Africa</td>
<td align="left">Cyberincidents analysis on protection of information</td>
<td align="left">Interest</td>
</tr>
<tr>
<td align="left">Zenda et al. (<xref ref-type="bibr" rid="CIT0039">2020</xref>)</td>
<td align="left">South Africa</td>
<td align="left">Need to protect personal information used by marketers</td>
<td align="left">Interest</td>
</tr>
</tbody>
</table>
</table-wrap>
<sec id="s20007">
<title>Training</title>
<p>Widespread cyberattacks use PII in the form of phishing attacks where untrained and unwitting users whose personal data have already been compromised are tricked by a well-orchestrated plan that implores and takes advantage of trust. The key denominator is to persuade the cybervictim to click on a link which, in many circumstances, is the channel through which malicious software (malware) enters the targeted user&#x2019;s computer. Often emails may be perceived as genuine but are not (Gupta, Singhal &#x0026; Kapoor <xref ref-type="bibr" rid="CIT0017">2016</xref>). Users&#x2019; PII may be likely compromised when cyberattackers look for information that users are sharing on their online platforms, such as Facebook and LinkedIn. Information elicited from these platforms (such as where they spend time off work or who they socialise with) can be aggregated to build a user profile, which then serves as a basis for a targeted phishing attack because, over time, the cyberattacker has painted a picture of the user. Personal identifiable information can then be used to craft a specific email deliberately designed to manipulate the user and make them think it is genuine Bier and Prior (<xref ref-type="bibr" rid="CIT0007">2014</xref>). At times, the use of PII can be adverse when the cyberattack leads to identity theft or social engineering to exploit the user&#x2019;s emotions to gain information (Abawajy <xref ref-type="bibr" rid="CIT0002">2014</xref>). Social engineering often occurs when an attacker manipulates or persuades users by using psychology to give confidential information unintentionally or intentionally (Aldawood &#x0026; Skinner <xref ref-type="bibr" rid="CIT0003">2018</xref>). Employees are often perceived as weak links in the information security chain and many do not observe PIS at the level expected (Guhr, Lebek &#x0026; Breitner <xref ref-type="bibr" rid="CIT0016">2019</xref>). The South African National Standard (SANS) has proposed standards that companies can use as guidelines for instituting bespoke information security awareness programs. SANS states that &#x201C;a very important aspect is lacking, which is the human control of a human firewall&#x201D; (Murire et al., <xref ref-type="bibr" rid="CIT0025">2021</xref>, p 1). The South African National Standard considers that the smaller the company is, the more likely that it may not institute information security awareness campaigns for its employees. Indeed, smaller companies may most likely have only one employee multitasking in creating controls, who may be constrained to make follow-ups if controls placed are violated. For larger companies, training and awareness have been observed to leverage PIS. It is from this understanding that we propose the following hypothesis.</p>
<p><bold>H1:</bold> Training of users will influence personal information security positively.</p>
</sec>
<sec id="s20008">
<title>Interest</title>
<p>The proliferation of social media platforms has created numerous forms of business opportunities from commerce and recruitment to online services such as LinkedIn. According to Da Veiga and Swartz (<xref ref-type="bibr" rid="CIT0011">2016</xref>), when a user purchases a product or service, shares information on online services or even enters a competition, their personal information is collected and used by the various companies. Therefore, users have little to no control over their information regarding how it is stored or used. A study by Poushter, Bishop and Chwe (<xref ref-type="bibr" rid="CIT0028">2018</xref>) identified that over 50&#x0025; of adults own a smartphone capable of accessing and transacting on the Internet, with about 43&#x0025; of adults actively using social media sites. The same study showed that South Africans aged over 18 and under 60 presented the most significant percentage of mobile Internet users.</p>
<p>A study (Arthur <xref ref-type="bibr" rid="CIT0006">2021</xref>) showed that young South Africans concluded that students&#x2019; knowledge of the acceptance of legislation such as the POPI Act or the regulatory requirements such as the Regulation of Interception of Communication Act (RICA) was not of great importance. Whilst Arthur (<xref ref-type="bibr" rid="CIT0006">2021</xref>) reported that 95&#x0025; of South Africans were RICA registered, many were unaware of RICA requirements. We therefore propose the following hypothesis:</p>
<p><bold>H2:</bold> Interest by users will influence personal information security positively.</p>
</sec>
<sec id="s20009">
<title>Awareness</title>
<p>Nenungwi and Garaba (<xref ref-type="bibr" rid="CIT0026">2022</xref>) postulate that knowledge management awareness is lacking amongst public sector organisations (PSOs), many of which are &#x2018;unable to adapt to the rapidly changing society surrounding them&#x2019; (p. 1). Despite the apparent benefits of modern and evolving technologies and infrastructure, the potential cybersecurity threats have evolved in tandem, leaving users unaware of these new emergent threats. Users constantly engage with activities online, and with the added pressure of disclosing PII, their vulnerability has increased as they share more information online. Cybercriminals can harvest such information for nefarious reasons. Abawajy (<xref ref-type="bibr" rid="CIT0002">2014</xref>) has argued that practices such as excessive sharing of information may compromise even the strongest of the information security initiatives and could be the weak link in the information security chain. Attackers will exploit this weak link to gain access and compromise the internal network. User awareness regarding PII protection has not seemed to progress at the same rate as the evolution and use of technology. Studies on awareness as a construct of behavioural influencers were first highlighted by Rogers (<xref ref-type="bibr" rid="CIT0030">1975</xref>), who developed the protection motivation theory (PMT), which predicted peoples&#x2019; engagement in risk prevention. Building on the works of Rogers&#x2019; PMT, Hanus and Wu (<xref ref-type="bibr" rid="CIT0018">2016</xref>) studied the impact of user awareness on desktop security awareness using PMT. They found that security awareness significantly affects elements of PMT. From these studies, much emphasis has been placed on designing security awareness programmes that can be designed from PMT. Whilst most studies have considered awareness at the general institutional level, we extend this thinking to users at a personal level and postulate that awareness can be a construct to consider when the focus is given to PIS and propose the following:</p>
<p><bold>H3:</bold> Awareness will influence personal information security positively.</p>
</sec>
<sec id="s20010">
<title>Action</title>
<p>Many South African companies are shifting towards adopting cloud computing. One of the reasons given is adopting a new work model, such as working from home, in the advent of the COVID-19 pandemic. Remote working is now popular with many companies. Even though South Africa is steadily easing restrictions, companies have realised that hybrid models that incorporate onsite and work-from-home prove to be popular and cost-efficient. As hybrid models become popular, users find that they store more PII on the cloud to save storage space on their home devices. Although it is often implied that cloud computing has many benefits, some question the total privacy and confidentiality of data that is stored in the cloud. As pointed out, the critical risk is the human actions that lead to the use of cloud computing resources, notably described as the weakest link (Aleem, Wakefield &#x0026; Button <xref ref-type="bibr" rid="CIT0004">2013</xref>). Human activity has an array of elements, including errors and mistakes made and inadvertent omissions of tasks that ultimately may lead to security risk, not only to the companies but also to employees:</p>
<p><bold>H4:</bold> Actions of users will influence personal information security positively.</p>
</sec>
<sec id="s20011">
<title>Theoretical framework</title>
<p>From the given discussions, we have developed a theoretical framework that points to the possible factors that would lead to a better PIS posture. The theoretical framework is shown in <xref ref-type="fig" rid="F0001">Figure 1</xref>.</p>
<fig id="F0001">
<label>FIGURE 1</label>
<caption><p>Possible factors leading to improved personal information security.</p></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="SAJIM-24-1526-g001.tif"/>
</fig>
</sec>
</sec>
<sec id="s0012">
<title>Research design and methodology</title>
<p>To test the theoretical framework depicted in <xref ref-type="fig" rid="F0001">Figure 1</xref>, we carried out quantitative research (Goertzen <xref ref-type="bibr" rid="CIT0014">2017</xref>). We outline the quantitative approach as the scientific research advocating for a proper approach to investigating claims. Once appropriate investigations are carried out and claims are supported, practical solutions to social problems can be found. The research made use of a 5-point Likert scale questionnaire that tested the four constructs shown in <xref ref-type="fig" rid="F0001">Figure 1</xref> elicited from the literature review.</p>
<sec id="s20013">
<title>Research approach</title>
<p>The research used a deductive positivist approach to answer the &#x2018;what&#x2019; and &#x2018;why&#x2019; quantifiable types of questions (Hjalmarson &#x0026; Moskal <xref ref-type="bibr" rid="CIT0019">2018</xref>). The research was also descriptive in the sense that the population and situations were objectively elicited and accurately and systematically tested.</p>
</sec>
<sec id="s20014">
<title>Population sampling</title>
<p>The population sample was centred on employees using IT across the city of Johannesburg, considered the most prominent commercial hub in South Africa, which attracts those working with IT systems. The online survey research method was used, targeting over 100 employees around Johannesburg in two phases. Online surveys were useful because advancements in technology enabled these to be deployed online. The LinkedIn platform focusing on IT professionals was used to solicit responses. The first phase solicited help from 30 participants and the second phase solicited help from 70 participants after a preliminary review of feedback obtained from the first phase. The second phase assured the importance of incorporating experts in possession of specialists&#x2019; skills and knowledge in IT and information security to provide valuable data (Creswell &#x0026; Creswell <xref ref-type="bibr" rid="CIT0010">2017</xref>). We computed the sample size using online scientific software developed by Raosoft (<xref ref-type="bibr" rid="CIT0029">2004</xref>) that followed the following criteria:</p>
<disp-formula id="FD1"><alternatives><mml:math display="block" id="M1"><mml:mrow><mml:mi>x</mml:mi><mml:mo>=</mml:mo><mml:mi>Z</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>c</mml:mi><mml:mo>/</mml:mo><mml:mn>100</mml:mn><mml:mo stretchy="false">)</mml:mo><mml:mn>2</mml:mn><mml:mi>r</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mn>100</mml:mn><mml:mo>&#x2212;</mml:mo><mml:mi>r</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:math><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="SAJIM-24-1526-e001.tif"/></alternatives><label>[Eqn 1]</label></disp-formula>
<disp-formula id="FD2"><alternatives><mml:math display="block" id="M2"><mml:mrow><mml:mi>n</mml:mi><mml:mo>=</mml:mo><mml:mi>N</mml:mi><mml:mtext>&#x2009;</mml:mtext><mml:mi>x</mml:mi><mml:mo>/</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:mi>N</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn><mml:mo stretchy="false">)</mml:mo><mml:mi>E</mml:mi><mml:mn>2</mml:mn><mml:mo>+</mml:mo><mml:mi>x</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:math><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="SAJIM-24-1526-e002.tif"/></alternatives><label>[Eqn 2]</label></disp-formula>
<disp-formula id="FD3"><alternatives><mml:math display="block" id="M3"><mml:mrow><mml:mi>E</mml:mi><mml:mo>=</mml:mo><mml:mi>S</mml:mi><mml:mi>q</mml:mi><mml:mi>r</mml:mi><mml:mi>t</mml:mi><mml:mrow><mml:mo>[</mml:mo><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>N</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mi>n</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mi>x</mml:mi><mml:mo>/</mml:mo><mml:mi>n</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>N</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn><mml:mo stretchy="false">)</mml:mo></mml:mrow><mml:mo>]</mml:mo></mml:mrow></mml:mrow></mml:math><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="SAJIM-24-1526-e003.tif"/></alternatives><label>[Eqn 3]</label></disp-formula>
<p>Our population size <italic>N</italic> was used to determine our sample, from a margin of error <italic>E</italic>. Our estimate of <italic>E</italic> used a 5&#x0025; margin of error, and using a fraction of responses (<italic>r</italic>), we were interested in obtaining Z and critical value for the confidence interval (<italic>c</italic>) of 95&#x0025;; thus, we were able to estimate our sample size of 100.</p>
</sec>
<sec id="s20015">
<title>Questionnaire design</title>
<p>As pointed out earlier, our closed-ended questionnaire used a 5-point Likert scale that was distributed online using Google Forms. The questionnaire consisted of the following sections:</p>
<list list-type="order">
<list-item><p>Biographical questions about the participant.</p></list-item>
<list-item><p>Questions that elicit insights regarding participants&#x2019; perspectives of personal information security.</p></list-item>
<list-item><p>Questions that test the variables of <italic>training, interest, awareness</italic> and <italic>actions</italic>.</p></list-item>
</list>
<p>Section 1 was used primarily to filter out vulnerable participants who, for purposes of meeting and addressing the ethical requirements for the study, needed to be protected. In this regard, only participants meeting the requirements of being more than 18 years of age and those not older than 65 years of age were incorporated in the study. The questions asked were all original and pertained to the four constructs drawn from the literature that helped us formulate these original questions. Whilst Krause (<xref ref-type="bibr" rid="CIT0020">2002</xref>) suggested that questions may essentially come from three sources, namely from existing scales, modified scales or from scratch, in our case, our questions were developed from scratch. As our objective was to elicit various user perspectives relating to how they understood PII and the effect this had on PIS, the questions were designed accordingly.</p>
</sec>
<sec id="s20016">
<title>Research procedure and analysis of data</title>
<p>Whilst we acknowledged that there would have been many methods that would have been ideal for collecting data, we restricted ourselves to adopting the above-discussed methods deemed appropriate for a quantitative methodology study. The data obtained were analysed using the Statistical Package for the Social Sciences (SPSS) software tool. The software allowed the data collected from Google Forms to be analysed because it was easy to import it into SPSS without incurring any errors.</p>
</sec>
<sec id="s20017">
<title>Ethical considerations</title>
<p>Ethical clearance was granted by the university where the study was domiciled. A web link was given to study participants for consent to be obtained before commencement. All participants were informed prior to the study that their involvement was voluntary in the cover letter issued to them. No participant was forced to complete the questionnaire. Each participant was also informed that the data collected from the study was to be strictly kept confidential between the researcher and participant.</p>
</sec>
</sec>
<sec id="s0018">
<title>Data analysis</title>
<sec id="s20019">
<title>Online participation and information security awareness</title>
<p>The first section of the questionnaire sought to obtain the participant&#x2019;s demographic profile. The distribution of the gender shows that men comprised 60&#x0025; of participants, whilst women comprised 36.67&#x0025; of participants. The participants&#x2019; age demographics was also considered, and the findings showed that the majority of the participants were aged between 19 and 29 years (53.33&#x0025;). Those aged between 30 and 39 years comprised 16.67&#x0025; of participants whilst those aged between 40 and 59 comprised 30&#x0025; of participants. The study participants were also questioned about their qualifications, and participants holding bachelor&#x2019;s degrees comprised the majority of participants with 43.33&#x0025; of the sample size. Those with a South African matric qualification comprised 30&#x0025; of the sample whilst few held a diploma, comprising 26.67&#x0025; of the sample.</p>
<p>The second part of the questionnaire elicited insights regarding participants&#x2019; predispositions regarding PIS. The questions ranged from how active they were online to whether they conscientiously shared information that would reveal details about themselves online. <xref ref-type="table" rid="T0002">Table 2</xref> points to how the participants responded.</p>
<table-wrap id="T0002">
<label>TABLE 2</label>
<caption><p>The questions and averages from participants in the questionnaire.</p></caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th valign="top" align="left">Question</th>
<th valign="top" align="left">Discussion</th>
<th valign="top" align="center">Value (&#x0025;)</th>
<th valign="top" align="center">Mean</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left">How often do you share or post information online (WhatsApp status, Instagram, Facebook, other online services, etc.)?</td>
<td align="left">Once every day or more in a week. Of research concern was how much data personal data were being revealed by participants daily regarding PII.</td>
<td align="center">53.0</td>
<td align="center">4.00</td>
</tr>
<tr>
<td align="left">Have you ever found a virus or Trojan on your personal computer or other devices?</td>
<td align="left"><bold>Yes:</bold> Participants had an operational knowledge of the risk of a virus or Trojan. Of research concern was the 46&#x0025; who did not.</td>
<td align="center">56.0</td>
<td align="center">2.07</td>
</tr>
<tr>
<td align="left">Do you know how to tell if your computer is hacked or infected?<xref ref-type="table-fn" rid="TFN0001">&#x2020;</xref></td>
<td align="left"><bold>No:</bold> Participants did not know at the current state the level of risk exposure to virus or Trojan infection or whether their systems were compromised. Of research concern was the 46&#x0025; who did not.</td>
<td align="center">56.0</td>
<td align="center">3.27</td>
</tr>
<tr>
<td align="left">Is antivirus currently installed, updated and enabled on your computer or devices?<xref ref-type="table-fn" rid="TFN0001">&#x2020;</xref></td>
<td align="left"><bold>Yes:</bold> Participants had taken security measures to protect their devices. Of research concern was the 10&#x0025; who did not.</td>
<td align="center">90.0</td>
<td align="center">1.23</td>
</tr>
<tr>
<td align="left">Do you know who to contact in case you are hacked or if your computer is infected?<xref ref-type="table-fn" rid="TFN0001">&#x2020;</xref></td>
<td align="left"><bold>Yes:</bold> Participants were aware of the contact person in case of a security breach. Of research concern was the 10&#x0025; who did not.</td>
<td align="center">50.0</td>
<td align="center">2.87</td>
</tr>
<tr>
<td align="left">Can you use your own personal devices, such as your mobile phone, to transfer or share work related information?</td>
<td align="left"><bold>Yes:</bold> This is of research concern because 70&#x0025; of participants use unprotected personal devices, which are vulnerable and could compromise corporate networks.</td>
<td align="center">70.0</td>
<td align="center">4.13</td>
</tr>
<tr>
<td align="left">My friends and family would not send me anything malicious or scams through email or external hard drives.</td>
<td align="left"><bold>True:</bold> Participants held a na&#x00EF;ve optimism that their friends and families&#x2019; systems were not compromised to the level of distributing malicious software. This was of great concern to the research.</td>
<td align="center">86.7</td>
<td align="center">4.47</td>
</tr>
<tr>
<td align="left">If you format a hard drive (such as a USB) or erase the files on it, all the information on it is permanently lost.<xref ref-type="table-fn" rid="TFN0001">&#x2020;</xref></td>
<td align="left"><bold>True:</bold> Participants believed that formatting a hard drive completely erases all files stored. This was na&#x00EF;ve optimism that is of concern to the research.</td>
<td align="center">83.3</td>
<td align="center">4.33</td>
</tr>
<tr>
<td align="left">A hacker would never be interested in me or my devices.</td>
<td align="left"><bold>Neutral:</bold> Participants held the viewpoint they their PII might not be useful, and this was of concern to the research.</td>
<td align="center">30.0</td>
<td align="center">2.77</td>
</tr>
<tr>
<td align="left">I do not post anything that will cause me to be a victim of identity theft.</td>
<td align="left"><bold>Neutral:</bold> Participants did not recognise their level of exposure to external threats and the value of their PII. This was of concern to the study.</td>
<td align="center">46.0</td>
<td align="center">2.33</td>
</tr>
<tr>
<td align="left">I am interested in increasing my information security knowledge and skills.</td>
<td align="left"><bold>Neutral:</bold> Participants expressed indifference to taking measures for personal information security (PIS), which was of concern to the study.</td>
<td align="center">46.0</td>
<td align="center">2.73</td>
</tr>
<tr>
<td align="left">My passwords are strong enough. Nobody can guess them. I am security conscious.</td>
<td align="left"><bold>Agreed:</bold> Participants held a na&#x00EF;ve optimism that their passwords were strong. Of concern to the research was the 60&#x0025; who acknowledged that they passwords they used were not strong.</td>
<td align="center">40.0</td>
<td align="center">3.63</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<fn id="TFN0001"><p>This question was excluded from further analysis as it did not load onto our component model (principal component analysis shown in <xref ref-type="table" rid="T0003">Table 3</xref>).&#x2020;</p></fn>
</table-wrap-foot>
</table-wrap>
</sec>
<sec id="s20020">
<title>Reliability analysis</title>
<p>We carried out an exploratory factor analysis to identify relationships between constructs as suggested by (Fabrigar &#x0026; Wegener <xref ref-type="bibr" rid="CIT0013">2011</xref>). We present results in <xref ref-type="table" rid="T0003">Table 3</xref>. From the results, we then carried out reliability analysis using Cronbach&#x2019;s alpha to measure the closeness and significance of relationships the constructs had with each other (Bland &#x0026; Altman <xref ref-type="bibr" rid="CIT0008">1997</xref>). Generally, acceptable levels of reliability should show Cronbach&#x2019;s alpha values between 0.6 and 0.8 or higher, indicating good levels (Bland &#x0026; Altman <xref ref-type="bibr" rid="CIT0008">1997</xref>). Values for our constructs&#x2019; tests fell within this range, suggesting good levels.</p>
<table-wrap id="T0003">
<label>TABLE 3</label>
<caption><p>Exploratory factor analysis.</p></caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th valign="top" align="left" rowspan="2">Question</th>
<th valign="top" align="center" colspan="5">Component<hr/></th>
</tr>
<tr>
<th valign="top" align="center">1</th>
<th valign="top" align="center">2</th>
<th valign="top" align="center">3</th>
<th valign="top" align="center">4</th>
<th valign="top" align="center">5</th>
</tr>
</thead>
<tbody>
<tr>
<td colspan="6" align="left"><bold>Component matrix<xref ref-type="table-fn" rid="TFN0002">&#x2020;</xref></bold></td>
</tr>
<tr>
<td align="left"><bold>Action:</bold> Have you ever found a virus or Trojan on your personal computer?</td>
<td align="center">-</td>
<td align="center">-</td>
<td align="center">-</td>
<td align="center">0.557</td>
<td align="center">-</td>
</tr>
<tr>
<td align="left"><bold>Action:</bold> I do not post anything that will cause me to be a victim.</td>
<td align="center">-</td>
<td align="center">-</td>
<td align="center">-</td>
<td align="center">0.570</td>
<td align="center">-</td>
</tr>
<tr>
<td align="left"><bold>Training:</bold> Can you use your own personal devices such as your mobile phone?</td>
<td align="center">-</td>
<td align="center">-</td>
<td align="center">0.715</td>
<td align="center">-</td>
<td align="center">-</td>
</tr>
<tr>
<td align="left"><bold>Training:</bold> How often do you share post information online?</td>
<td align="center">-</td>
<td align="center">-</td>
<td align="center">0.715</td>
<td align="center">-</td>
<td align="center">-</td>
</tr>
<tr>
<td align="left"><bold>Interest:</bold> A hacker would never be interested in me or my devices.</td>
<td align="center">0.784</td>
<td align="center">-</td>
<td align="center">-</td>
<td align="center">-</td>
<td align="center">-</td>
</tr>
<tr>
<td align="left"><bold>Interest:</bold> I am interested in increasing my information security knowledge.</td>
<td align="center">0.640</td>
<td align="center">-</td>
<td align="center">-</td>
<td align="center">-</td>
<td align="center">-</td>
</tr>
<tr>
<td align="left"><bold>Personal information security:</bold> My passwords are strong enough. Nobody can guess them. I am security conscious.</td>
<td align="center">-</td>
<td align="center">0.694</td>
<td align="center">-</td>
<td align="center">-</td>
<td align="center">-</td>
</tr>
<tr>
<td align="left"><bold>Awareness:</bold> My friends and family would not send me anything malicious.</td>
<td align="center">-</td>
<td align="center">-</td>
<td align="center">-</td>
<td align="center">-</td>
<td align="center">0.582</td>
</tr>
<tr>
<td align="left" colspan="6"><bold>Extraction method:</bold> Principal component analysis.</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<fn id="TFN0002"><label>&#x2020;</label><p>, Five components extracted.</p></fn>
</table-wrap-foot>
</table-wrap>
</sec>
<sec id="s20021">
<title>Kaiser&#x2013;Meyer&#x2013;Olkin test and Bartlett&#x2019;s test of sphericity</title>
<p>The Kaiser&#x2013;Meyer&#x2013;Olkin (KMO) carried out on the constructs reflected a significant level of less than 0.05, indicating that the constructs to be tested were useful, and is shown in <xref ref-type="table" rid="T0004">Table 4</xref>.</p>
<table-wrap id="T0004">
<label>TABLE 4</label>
<caption><p>Kaiser&#x2013;Meyer&#x2013;Olkin and Bartlett&#x2019;s test.</p></caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th valign="top" colspan="2" align="left">Kaiser&#x2013;Meyer&#x2013;Olkin and Bartlett&#x2019;s test</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left">Kaiser&#x2013;Meyer&#x2013;Olkin measure of sampling adequacy</td>
<td align="left">0.794</td>
</tr>
<tr>
<td align="left" colspan="2">Bartlett&#x2019;s test of sphericity</td>
</tr>
<tr>
<td align="left">Approximately chi-square</td>
<td align="left">88.002</td>
</tr>
<tr>
<td align="left">df</td>
<td align="left">66.000</td>
</tr>
<tr>
<td align="left">Sig.</td>
<td align="left">0.000</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<fn><p>df, Degree of freedom; Sig, Significant at the 0.001 level.</p></fn>
</table-wrap-foot>
</table-wrap>
</sec>
<sec id="s20022">
<title>Questionnaire analysis</title>
<p>We observed that the participants had operational risk awareness regarding posting PII on social platforms, but more worrisome was that these were in the minority. The majority did understand that they needed to take precautionary measures to use social media responsibly, but calls for reliable protection of PII went unheeded. For instance, 46&#x0025; of participants said they were interested in information security knowledge and skills, with 86.7&#x0025; holding a wrong belief that friends and family would not send anything malicious through email or by sharing external hard drives.</p>
</sec>
<sec id="s20023">
<title>Regression analysis</title>
<p>This part of the research examined the proposed model and interpreted regression results carried out using SPSS, a statistical software. Guided by Dhakal (<xref ref-type="bibr" rid="CIT0012">2018</xref>), we carried out a multiple linear regression with personal information security as a dependent variable and training, interest, awareness and action as independent variables to infer a causal relationship with these variables. The results are shown in <xref ref-type="table" rid="T0005">Table 5</xref>, and we discuss these in the discussion section that follows.</p>
<table-wrap id="T0005">
<label>TABLE 5</label>
<caption><p>The results of the correlation analysis.</p></caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th valign="top" align="left" rowspan="2">Model</th>
<th valign="top" align="center" colspan="2">Unstandardised coefficients<hr/></th>
<th valign="top" align="center">Standardised coefficients<hr/></th>
<th valign="top" align="center" rowspan="2"><italic>t</italic></th>
<th valign="top" align="center" rowspan="2">Sig.</th>
</tr>
<tr>
<th valign="top" align="center">B</th>
<th valign="top" align="center">Standard error</th>
<th valign="top" align="center">Beta</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" colspan="6"><bold>Coefficients<xref ref-type="table-fn" rid="TFN0003">&#x2020;</xref></bold></td>
</tr>
<tr>
<td align="left">Training</td>
<td align="center">0.399</td>
<td align="center">0.208</td>
<td align="center">0.374</td>
<td align="center">0.337</td>
<td align="center">0.013</td>
</tr>
<tr>
<td align="left">Interest</td>
<td align="center">0.089</td>
<td align="center">0.238</td>
<td align="center">0.080</td>
<td align="center">1.214</td>
<td align="center">0.832</td>
</tr>
<tr>
<td align="left">Awareness</td>
<td align="center">0.411</td>
<td align="center">0.166</td>
<td align="center">0.364</td>
<td align="center">0.112</td>
<td align="center">0.031</td>
</tr>
<tr>
<td align="left">Action</td>
<td align="center">0.476</td>
<td align="center">0.262</td>
<td align="center">0.410</td>
<td align="center">0.115</td>
<td align="center">0.024</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<fn><p>Sig, Significant at the 0.001 level.</p></fn>
<fn id="TFN0003"><label>&#x2020;</label><p>, Dependent variable: Personal information security.</p></fn>
</table-wrap-foot>
</table-wrap>
<p><xref ref-type="fig" rid="F0002">Figure 2</xref> is a visual representation of the regression analysis.</p>
<fig id="F0002">
<label>FIGURE 2</label>
<caption><p>Results of analysis.</p></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="SAJIM-24-1526-g002.tif"/>
</fig>
</sec>
</sec>
<sec id="s0024">
<title>Discussions</title>
<p><xref ref-type="fig" rid="F0002">Figure 2</xref> confirms our observation from the cross-tabulation analysis by indicating that participants lacked interest in PIS. Whilst the three other constructs correlate to PIS, it remained of concern that interest does not correlate with PIS. According to <xref ref-type="fig" rid="F0002">Figure 2</xref>, training has a positive correlation coefficient, <italic>&#x03C1;</italic> = 0.374&#x002A; to PIS, demonstrating that when organisations initiate good training campaigns, these can effectively increase PIS awareness and improve PIS. The construct awareness also had a positive correlation coefficient, <italic>&#x03C1;</italic> = 0.364&#x002A;. As mentioned in the previous sections, the lack of interest will hinder employees of an organisation from protecting themselves in the best possible way. Indeed, as pointed out in <xref ref-type="fig" rid="F0002">Figure 2</xref>, the correlation coefficient, <italic>&#x03C1;</italic> = &#x2212;0.80 for interest is not significant. Finally, we also observed that correct effort and measures by both the organisation and system users would yield positive results in testing the construct action. Indeed, as <xref ref-type="fig" rid="F0002">Figure 2</xref> points out, actions have a positive correlation coefficient, <italic>&#x03C1;</italic> = 0.410&#x002A;. Based on the data analysis, we can conclude that the study participants&#x2019; knowledge of PIS is inadequate. More effort is needed to encourage PIS to become a pertinent part of South African organisations&#x2019; overall information security strategy. We have shown that there is still a long way to go to enable users to be interested in their security of information and avoid oversharing PII data across social platforms by striking a balance between using online tools and protecting PII. We believe this balance can be achieved.</p>
<sec id="s20025">
<title>Implications of theory</title>
<p>There have been many studies that guide South African organisations on the best information security management measures to be taken on risk prevention methods. However, few studies have focused on fostering interest amongst users regarding PIS. We bring this important theoretical understanding to the fore whilst adding this to the body of knowledge. By shedding light on the level of interest participants have in PIS, we believe better information security strategies can be designed.</p>
</sec>
<sec id="s20026">
<title>Implications to practice</title>
<p>The model provides guidance to organisations within and outside of South Africa to prioritise the construct of <italic>interest</italic> as the main hindrance to effective information security practices. By understanding interest it is possible to approach information security management differently whilst encouraging users and employees to be co-creators of policies that keep their and their organisations&#x2019; information secure.</p>
</sec>
<sec id="s20027">
<title>Study limitations and suggestions for future studies</title>
<p>We believe that whilst the study was more quantitative, with the testing of constructs, we believe the limitations of the quantitative approach can be complemented by a study that applies qualitative methods. The qualitative approach can delve deeper and provide deep insights into the reasons why people overshare information on social media platforms and why they are disinterested in PIS.</p>
</sec>
</sec>
<sec id="s0028">
<title>Conclusion</title>
<p>To conscientise users on the importance of PIS and make this belief great again, it is paramount that organisations foster interest. The study&#x2019;s objective was to show that the oversharing of PII would be detrimental to achieving the desired security of a person&#x2019;s information. We have demonstrated this by carrying out a quantitative study and reporting the results. South Africans could be at risk when they overshare information on online platforms, mainly because new and advanced technologies make it easy for external threats from hackers to compromise on PII. With the growth of social networking platforms and the need for user validation using personal information, the challenge of PIS is exacerbated. We hope this work raises that awareness and offers a way that South African companies can start thinking about increasing interest in information security.</p>
</sec>
</body>
<back>
<ack>
<title>Acknowledgements</title>
<p>The authors would like to acknowledge the participants who took part in this study and extend gratitude for their scientific contribution.</p>
<sec id="s20029" sec-type="COI-statement">
<title>Competing interests</title>
<p>The authors declare that they have no financial or personal relationships that may have inappropriately influenced them in writing this article.</p>
</sec>
<sec id="s20030">
<title>Authors&#x2019; contributions</title>
<p>K.N. drafted the article, which is based on the data collected by K.R. on his studies (Hons project). K.N. was the supervisor.</p>
</sec>
<sec id="s20031">
<title>Funding information</title>
<p>This research received no specific grant from any funding agency in the public, commercial or not-for-profit sectors.</p>
</sec>
<sec id="s20032">
<title>Data availability</title>
<p>Data are available from the corresponding author (K.N.) upon request.</p>
</sec>
<sec id="s20033">
<title>Disclaimer</title>
<p>The views and opinions expressed in this article are those of the authors and do not necessarily reflect the official policy or position of any affiliated agency of the authors.</p>
</sec>
</ack>
<ref-list id="references">
<title>References</title>
<ref id="CIT0001"><mixed-citation publication-type="conference"><person-group person-group-type="author"><string-name><surname>Adriaanse</surname>, <given-names>L.S</given-names></string-name>., &#x0026; <string-name><surname>Rensleigh</surname>, <given-names>C</given-names></string-name></person-group>., <year>2017</year>, &#x2018;<article-title>E-visibility to enhance knowledge sharing</article-title>&#x2019;, in <conf-name>Africa Research Group Conference</conf-name>, <conf-loc>Long Beach Golf and Spa, Mauritius</conf-loc>, <conf-date>August 29&#x2013;31, 2017</conf-date>, pp. <fpage>1</fpage>&#x2013;<lpage>12</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.13140/RG.2.2.17191.24489">https://doi.org/10.13140/RG.2.2.17191.24489</ext-link></comment></mixed-citation></ref>
<ref id="CIT0002"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Abawajy</surname>, <given-names>J</given-names></string-name></person-group>., <year>2014</year>, &#x2018;<article-title>User preference of cyber security awareness delivery methods</article-title>&#x2019;, <source><italic>Behaviour &#x0026; Information Technology</italic></source> <volume>33</volume>(<issue>3</issue>), <fpage>237</fpage>&#x2013;<lpage>248</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1080/0144929X.2012.708787">https://doi.org/10.1080/0144929X.2012.708787</ext-link></comment></mixed-citation></ref>
<ref id="CIT0003"><mixed-citation publication-type="conference"><person-group person-group-type="author"><string-name><surname>Aldawood</surname>, <given-names>H</given-names></string-name>. &#x0026; <string-name><surname>Skinner</surname>, <given-names>G</given-names></string-name></person-group>., <year>2018</year>, &#x2018;<article-title>Educating and raising awareness on cyber security social engineering: A literature review</article-title>&#x2019;, <conf-name>2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering</conf-name>, <conf-date>December 4&#x2013;7</conf-date>, <publisher-loc>IEEE TALE, Wollongong, NSW Australia</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0004"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Aleem</surname>, <given-names>A</given-names></string-name>., <string-name><surname>Wakefield</surname>, <given-names>A</given-names></string-name>. &#x0026; <string-name><surname>Button</surname>, <given-names>M</given-names></string-name></person-group>., <year>2013</year>, &#x2018;<article-title>Addressing the weakest link: Implementing converged security</article-title>&#x2019;, <source><italic>Security Journal</italic></source> <volume>26</volume>(<issue>4</issue>), <fpage>236</fpage>&#x2013;<lpage>248</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1057/sj.2013.14">https://doi.org/10.1057/sj.2013.14</ext-link></comment></mixed-citation></ref>
<ref id="CIT0005"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Argomaniz</surname>, <given-names>J</given-names></string-name></person-group>., <year>2009</year>, &#x2018;<article-title>When the EU is the &#x201C;Norm-taker&#x201D;: The passenger name records agreement and the EU&#x2019;s internalization of US border security norms</article-title>&#x2019;, <source><italic>European Integration</italic></source> <volume>31</volume>(<issue>1</issue>), <fpage>119</fpage>&#x2013;<lpage>136</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1080/07036330802503981">https://doi.org/10.1080/07036330802503981</ext-link></comment></mixed-citation></ref>
<ref id="CIT0006"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Arthur</surname>, <given-names>J</given-names></string-name></person-group>., <year>2021</year>, &#x2018;<article-title>The information legislation (PAIA, POPI, RICA) awareness of undergraduate university students: A longitudinal study</article-title>&#x2019;, <source><italic>South African Journal of Information Management</italic></source> <volume>23</volume>(<issue>1</issue>), <fpage>a1363</fpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.4102/sajim.v23i1.1363">https://doi.org/10.4102/sajim.v23i1.1363</ext-link></comment></mixed-citation></ref>
<ref id="CIT0007"><mixed-citation publication-type="conference"><person-group person-group-type="author"><string-name><surname>Bier</surname>, <given-names>C</given-names></string-name>. &#x0026; <string-name><surname>Prior</surname>, <given-names>J</given-names></string-name></person-group>., <year>2014</year>, &#x2018;<article-title>Detection and labeling of personal identifiable information in e-mails</article-title>&#x2019;, in <person-group person-group-type="editor"><string-name><given-names>N.</given-names> <surname>Cuppens-Boulahia</surname></string-name>, <string-name><given-names>F.</given-names> <surname>Cuppens</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Jajodia</surname></string-name>, <string-name><given-names>A.A.</given-names> <surname>El Kalam</surname></string-name> &#x0026; <string-name><given-names>T.</given-names> <surname>Sans</surname></string-name> (eds.)</person-group>, <conf-name>IFIP International Information Security Conference</conf-name>, <conf-loc>Springer, Berlin, Heidelberg</conf-loc>, <conf-date>June, 2014</conf-date>, pp. <fpage>351</fpage>&#x2013;<lpage>358</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/978-3-642-55415-5_29">https://doi.org/10.1007/978-3-642-55415-5_29</ext-link></comment></mixed-citation></ref>
<ref id="CIT0008"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Bland</surname>, <given-names>J.M</given-names></string-name>. &#x0026; <string-name><surname>Altman</surname>, <given-names>D.G</given-names></string-name></person-group>., <year>1997</year>, &#x2018;<article-title>Statistics notes: Cronbach&#x2019;s alpha</article-title>&#x2019;, <source><italic>BMJ</italic></source> <volume>314</volume>, <fpage>572</fpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1136/bmj.314.7080.572">https://doi.org/10.1136/bmj.314.7080.572</ext-link></comment></mixed-citation></ref>
<ref id="CIT0009"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Chigada</surname>, <given-names>J</given-names></string-name>. &#x0026; <string-name><surname>Madzinga</surname>, <given-names>R</given-names></string-name></person-group>., <year>2021</year>, &#x2018;<article-title>Cyberattacks and threats during COVID-19: A systematic literature review</article-title>&#x2019;, <source><italic>South African Journal of Information Management</italic></source> <volume>23</volume>(<issue>1</issue>), <fpage>a1277</fpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.4102/sajim.v23i1.1277">https://doi.org/10.4102/sajim.v23i1.1277</ext-link></comment></mixed-citation></ref>
<ref id="CIT0010"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Creswell</surname>, <given-names>J.W</given-names></string-name>. &#x0026; <string-name><surname>Creswell</surname>, <given-names>J.D</given-names></string-name></person-group>., <year>2017</year>, <source><italic>Research design: Qualitative, quantitative, and mixed methods approaches</italic></source>, <publisher-name>Sage Publications</publisher-name>, <publisher-loc>Los Angeles, CA</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0011"><mixed-citation publication-type="conference"><person-group person-group-type="author"><string-name><surname>Da Veiga</surname>, <given-names>A</given-names></string-name>. &#x0026; <string-name><surname>Swartz</surname>, <given-names>P</given-names></string-name></person-group>., <year>2016</year>, &#x2018;<article-title>PoPI Act-opt-in and opt-out compliance from a data value chain perspective: A South African insurance industry experiment</article-title>&#x2019;, <conf-name>Proceedings of the 15th Inter national Information Security for South Africa Conference, IEEE</conf-name>, <conf-loc>Johannesburg, South Africa</conf-loc>, <conf-date>Aug 17&#x2013;18, 2016</conf-date>, pp. <fpage>9</fpage>&#x2013;<lpage>17</lpage>.</mixed-citation></ref>
<ref id="CIT0012"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Dhakal</surname>, <given-names>C</given-names></string-name></person-group>., <year>2018</year>, &#x2018;<article-title>Interpreting the basic outputs (SPSS) of multiple linear regression</article-title>&#x2019;, <source><italic>International Journal of Science and Research</italic></source> <volume>8</volume>(<issue>6</issue>), <fpage>1448</fpage>&#x2013;<lpage>1452</lpage>.</mixed-citation></ref>
<ref id="CIT0013"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Fabrigar</surname>, <given-names>L.R</given-names></string-name>. &#x0026; <string-name><surname>Wegener</surname>, <given-names>D.T</given-names></string-name></person-group>., <year>2011</year>, <source><italic>Exploratory factor analysis</italic></source>, <publisher-name>Oxford University Press</publisher-name>, <publisher-loc>Oxford, U.K</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0014"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Goertzen</surname>, <given-names>M.J</given-names></string-name></person-group>., <year>2017</year>, &#x2018;<article-title>Introduction to quantitative research and data</article-title>&#x2019;, <source><italic>Library Technology Reports</italic></source> <volume>53</volume>(<issue>4</issue>), <fpage>12</fpage>&#x2013;<lpage>18</lpage>.</mixed-citation></ref>
<ref id="CIT0015"><mixed-citation publication-type="conference"><person-group person-group-type="author"><string-name><surname>Grobler</surname>, <given-names>M</given-names></string-name>., <string-name><surname>Jansen van Vuuren</surname>, <given-names>J</given-names></string-name>. &#x0026; <string-name><surname>Zaaiman</surname>, <given-names>J</given-names></string-name></person-group>., <year>2011</year>, &#x2018;<article-title>Evaluating cyber security awareness in South Africa</article-title>,&#x2019; <conf-name>Proceedings of the 10th European Conference on Information Warfare and Security, The Institute of Cybernetics at the Tallinn University of Technology Tallinn</conf-name>, <conf-date>July 7&#x2013;8, 2011</conf-date>, <publisher-loc>Estonia</publisher-loc>, p. <fpage>9</fpage>.</mixed-citation></ref>
<ref id="CIT0016"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Guhr</surname>, <given-names>N</given-names></string-name>., <string-name><surname>Lebek</surname>, <given-names>B</given-names></string-name>. &#x0026; <string-name><surname>Breitner</surname>, <given-names>M.H</given-names></string-name></person-group>., <year>2019</year>, &#x2018;<article-title>The impact of leadership on employees&#x2019; intended information security behaviour: An examination of the full-range leadership theory</article-title>&#x2019;, <source><italic>Information Systems Journal</italic></source> <volume>29</volume>(<issue>2</issue>), <fpage>340</fpage>&#x2013;<lpage>362</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1111/isj.12202">https://doi.org/10.1111/isj.12202</ext-link></comment></mixed-citation></ref>
<ref id="CIT0017"><mixed-citation publication-type="conference"><person-group person-group-type="author"><string-name><surname>Gupta</surname>, <given-names>S</given-names></string-name>., <string-name><surname>Singhal</surname>, <given-names>A</given-names></string-name>. &#x0026; <string-name><surname>Kapoor</surname>, <given-names>A</given-names></string-name></person-group>., <year>2016</year>, <month>April</month>, &#x2018;<article-title>A literature survey on social engineering attacks: Phishing attack</article-title>&#x2019;, in <conf-name>2016 international conference on computing, communication and automation (ICCCA), IEEE Xplore</conf-name>, <conf-date>April 29&#x2013;30, 2016</conf-date>, <conf-loc>Greater Noida, India</conf-loc>, pp. <fpage>537</fpage>&#x2013;<lpage>540</lpage>.</mixed-citation></ref>
<ref id="CIT0018"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Hanus</surname>, <given-names>B</given-names></string-name>. &#x0026; <string-name><surname>Wu</surname>, <given-names>Y.A</given-names></string-name></person-group>., <year>2016</year>, &#x2018;<article-title>Impact of users&#x2019; security awareness on desktop security behavior: A protection motivation theory perspective</article-title>&#x2019;, <source><italic>Information Systems Management</italic></source> <volume>33</volume>(<issue>1</issue>), <fpage>2</fpage>&#x2013;<lpage>16</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1080/10580530.2015.1117842">https://doi.org/10.1080/10580530.2015.1117842</ext-link></comment></mixed-citation></ref>
<ref id="CIT0019"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Hjalmarson</surname>, <given-names>M.A</given-names></string-name>. &#x0026; <string-name><surname>Moskal</surname>, <given-names>B</given-names></string-name></person-group>., <year>2018</year>, &#x2018;<article-title>Quality considerations in education research: Expanding our understanding of quantitative evidence and arguments</article-title>&#x2019;, <source><italic>Journal of Engineering Education</italic></source> <volume>107</volume>(<issue>2</issue>), <fpage>179</fpage>&#x2013;<lpage>185</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1002/jee.20202">https://doi.org/10.1002/jee.20202</ext-link></comment></mixed-citation></ref>
<ref id="CIT0020"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Krause</surname>, <given-names>N</given-names></string-name></person-group>., <year>2002</year>, &#x2018;<article-title>A comprehensive strategy for developing closed-ended survey items for use in studies of older adults</article-title>&#x2019;, <source><italic>The Journals of Gerontology: Series B</italic></source> <volume>57</volume>(<issue>5</issue>), <fpage>S263</fpage>&#x2013;<lpage>S274</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1093/geronb/57.5.S263">https://doi.org/10.1093/geronb/57.5.S263</ext-link></comment></mixed-citation></ref>
<ref id="CIT0021"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Li</surname>, <given-names>N</given-names></string-name>. &#x0026; <string-name><surname>Chen</surname>, <given-names>G</given-names></string-name></person-group>., <year>2010</year>, &#x2018;<article-title>Sharing location in online social networks</article-title>&#x2019;, <source><italic>IEEE Network</italic></source> <volume>24</volume>(<issue>5</issue>), <fpage>20</fpage>&#x2013;<lpage>25</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1109/MNET.2010.5578914">https://doi.org/10.1109/MNET.2010.5578914</ext-link></comment></mixed-citation></ref>
<ref id="CIT0022"><mixed-citation publication-type="thesis"><person-group person-group-type="author"><string-name><surname>Mabeka</surname>, <given-names>N.Q</given-names></string-name></person-group>., <year>2018</year>, &#x2018;<article-title>The impact of e-technology on law of civil procedure in South Africa</article-title>&#x2019;, <comment>Doctoral dissertation</comment>, <publisher-name>University of South Africa</publisher-name>.</mixed-citation></ref>
<ref id="CIT0023"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>McCallister</surname>, <given-names>E</given-names></string-name></person-group>., <year>2010</year>, <source><italic>Guide to protecting the confidentiality of personally identifiable information</italic></source>, vol. <volume>800</volume>, no. <issue>122</issue>, <publisher-name>Diane Publishing</publisher-name>, <publisher-loc>Collingdale, PA</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0024"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Motlhabi</surname>, <given-names>M</given-names></string-name>., <string-name><surname>Pantsi</surname>, <given-names>P</given-names></string-name>., <string-name><surname>Mangoale</surname>, <given-names>B</given-names></string-name>., <string-name><surname>Netshiya</surname>, <given-names>R</given-names></string-name>. &#x0026; <string-name><surname>Chishiri</surname>, <given-names>S</given-names></string-name></person-group>., <year>2022</year>, &#x2018;<article-title>Context-aware cyber threat intelligence exchange platform</article-title>&#x2019;, <source><italic>International Conference on Cyber Warfare and Security</italic></source> <volume>17</volume>(<issue>1</issue>), <fpage>201</fpage>&#x2013;<lpage>210</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.34190/iccws.17.1.42">https://doi.org/10.34190/iccws.17.1.42</ext-link></comment></mixed-citation></ref>
<ref id="CIT0025"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Murire</surname>, <given-names>O.T</given-names></string-name>., <string-name><surname>Flowerday</surname>, <given-names>S</given-names></string-name>., <string-name><surname>Strydom</surname>, <given-names>K</given-names></string-name>. &#x0026; <string-name><surname>Fourie</surname>, <given-names>C.J.S</given-names></string-name></person-group>., <year>2021</year>, &#x2018;<article-title>Narrative review: Social media use by employees and the risk to institutional and personal information security compliance in South Africa</article-title>&#x2019;, <source><italic>Journal for Transdisciplinary Research in Southern Africa</italic></source> <volume>17</volume>(<issue>1</issue>). <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.4102/td.v17i1.909">https://doi.org/10.4102/td.v17i1.909</ext-link></comment></mixed-citation></ref>
<ref id="CIT0026"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Nenungwi</surname>, <given-names>F</given-names></string-name>. &#x0026; <string-name><surname>Garaba</surname>, <given-names>F</given-names></string-name></person-group>., <year>2022</year>, &#x2018;<article-title>Knowledge management awareness in South African provincial government departments: The case of KwaZulu-Natal Department of Public Works, Pietermaritzburg</article-title>&#x2019;, <source><italic>South African Journal of Information Management</italic></source> <volume>24</volume>(<issue>1</issue>), <fpage>a1456</fpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.4102/sajim.v24i1.1456">https://doi.org/10.4102/sajim.v24i1.1456</ext-link></comment></mixed-citation></ref>
<ref id="CIT0027"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Phaladi</surname>, <given-names>M</given-names></string-name>. &#x0026; <string-name><surname>Ngulube</surname>, <given-names>P</given-names></string-name></person-group>., <year>2022</year>, &#x2018;<article-title>Mitigating risks of tacit knowledge loss in state-owned enterprises in South Africa through knowledge management practices</article-title>&#x2019;, <source><italic>South African Journal of Information Management</italic></source> <volume>24</volume>(<issue>1</issue>), <fpage>a1462</fpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.4102/sajim.v24i1.1462">https://doi.org/10.4102/sajim.v24i1.1462</ext-link></comment></mixed-citation></ref>
<ref id="CIT0028"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Poushter</surname>, <given-names>J</given-names></string-name>., <string-name><surname>Bishop</surname>, <given-names>C</given-names></string-name>. &#x0026; <string-name><surname>Chwe</surname>, <given-names>H</given-names></string-name></person-group>., <year>2018</year>, <source><italic>Social media use continues to rise in developing countries but plateaus across developed ones</italic></source>, vol. <volume>22</volume>, pp. <fpage>2</fpage>&#x2013;<lpage>19</lpage>, <publisher-name>Pew Research Center</publisher-name>, <publisher-loc>Washington, DC</publisher-loc>, <comment>viewed 13 October 2022, <ext-link ext-link-type="uri" xlink:href="https://medienorge.uib.no/files/Eksterne_pub/Pew-Research-Center_Global-Tech-Social-Media-Use_2018.06.19.pdf">https://medienorge.uib.no/files/Eksterne_pub/Pew-Research-Center_Global-Tech-Social-Media-Use_2018.06.19.pdf</ext-link>.</comment></mixed-citation></ref>
<ref id="CIT0029"><mixed-citation publication-type="book"><person-group person-group-type="author"><collab>Raosoft</collab></person-group>, <year>2004</year>, <source><italic>Sample size calculator</italic></source>, <publisher-name>Raosoft, Inc.</publisher-name> <publisher-loc>Seattle, WA</publisher-loc>, <comment>viewed 07 June 2002, from <ext-link ext-link-type="uri" xlink:href="http://www.raosoft.com/samplesize.html">http://www.raosoft.com/samplesize.html</ext-link>.</comment></mixed-citation></ref>
<ref id="CIT0030"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Rogers</surname>, <given-names>R.W</given-names></string-name></person-group>., <year>1975</year>, &#x2018;<article-title>A protection motivation theory of fear appeals and attitude change</article-title>&#x2019;, <source><italic>Journal of Phycology</italic></source> <volume>91</volume>(<issue>1</issue>), <fpage>93</fpage>&#x2013;<lpage>114</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1080/00223980.1975.9915803">https://doi.org/10.1080/00223980.1975.9915803</ext-link></comment></mixed-citation></ref>
<ref id="CIT0031"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Satariano</surname>, <given-names>A</given-names></string-name></person-group>., <year>2018</year>, <source><italic>GDPR, a New Privacy Law, Makes Europe World &#x02BC; s Leading Tech Watchdog</italic></source>, <publisher-name>The New York Times</publisher-name>, <publisher-loc>NY</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0032"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Sekgweleo</surname>, <given-names>T</given-names></string-name>. &#x0026; <string-name><surname>Mariri</surname>, <given-names>M</given-names></string-name></person-group>., <year>2019</year>, &#x2018;<article-title>Critical analysis of PoPI Act within the organisation</article-title>&#x2019;, <source><italic>International Journal of Computer Science and Information Security (IJCSIS)</italic></source> <volume>17</volume>(<issue>9</issue>), <fpage>64</fpage>&#x2013;<lpage>69</lpage>.</mixed-citation></ref>
<ref id="CIT0033"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Spiekermann</surname>, <given-names>S</given-names></string-name>., <string-name><surname>Acquisti</surname>, <given-names>A</given-names></string-name>., <string-name><surname>B&#x00F6;hme</surname>, <given-names>R</given-names></string-name>. &#x0026; <string-name><surname>Hui</surname>, <given-names>K.L</given-names></string-name></person-group>., <year>2015</year>, &#x2018;<article-title>The challenges of personal data markets and privacy</article-title>&#x2019;, <source><italic>Electronic markets</italic></source> <volume>25</volume>(<issue>2</issue>), <fpage>161</fpage>&#x2013;<lpage>167</lpage>.</mixed-citation></ref>
<ref id="CIT0034"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Taplin</surname>, <given-names>K</given-names></string-name></person-group>., <year>2021</year>, &#x2018;<article-title>South Africa&#x2019;s PNR regime: Privacy and data protection</article-title>&#x2019;, <source><italic>Computer Law &#x0026; Security Review</italic></source> <volume>40</volume>, <fpage>105524</fpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.clsr.2020.105524">https://doi.org/10.1016/j.clsr.2020.105524</ext-link></comment></mixed-citation></ref>
<ref id="CIT0035"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ulbricht</surname>, <given-names>L</given-names></string-name></person-group>., <year>2018</year>, &#x2018;<article-title>When big data meet securitization. Algorithmic regulation with passenger name records</article-title>&#x2019;, <source><italic>European Journal for Security Research</italic></source> <volume>3</volume>(<issue>2</issue>), <fpage>139</fpage>&#x2013;<lpage>161</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1007/s41125-018-0030-3">https://doi.org/10.1007/s41125-018-0030-3</ext-link></comment></mixed-citation></ref>
<ref id="CIT0036"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Van Niekerk</surname>, <given-names>B</given-names></string-name></person-group>., <year>2017</year>, &#x2018;<article-title>An analysis of cyber-incidents in South Africa</article-title>&#x2019;, <source><italic>The African Journal of Information and Communication</italic></source> <volume>20</volume>, <fpage>113</fpage>&#x2013;<lpage>132</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.23962/10539/23573">https://doi.org/10.23962/10539/23573</ext-link></comment></mixed-citation></ref>
<ref id="CIT0037"><mixed-citation publication-type="conference"><person-group person-group-type="author"><string-name><surname>Venkatadri</surname>, <given-names>G</given-names></string-name>., <string-name><surname>Andreou</surname>, <given-names>A</given-names></string-name>., <string-name><surname>Liu</surname>, <given-names>Y</given-names></string-name>., <string-name><surname>Mislove</surname>, <given-names>A</given-names></string-name>., <string-name><surname>Gummadi</surname>, <given-names>K.P</given-names></string-name>., <string-name><surname>Loiseau</surname>, <given-names>P</given-names></string-name>. <etal>et al.</etal></person-group>, <year>2018</year>, &#x2018;<article-title>Privacy risks with Facebook&#x2019;s PII-based targeting: Auditing a data broker&#x2019;s advertising interface</article-title>,&#x2019; in <conf-name>2018 IEEE Symposium on Security and Privacy (SP), IEEE</conf-name>, <conf-loc>San Francisco, CA</conf-loc>, <conf-date>21&#x2013;23 May, 2018</conf-date>, pp. <fpage>89</fpage>&#x2013;<lpage>107</lpage>.</mixed-citation></ref>
<ref id="CIT0038"><mixed-citation publication-type="conference"><person-group person-group-type="author"><string-name><surname>Weish&#x00E4;upl</surname>, <given-names>E</given-names></string-name>., <string-name><surname>Yasasin</surname>, <given-names>E</given-names></string-name>. &#x0026; <string-name><surname>Schryen</surname>, <given-names>G</given-names></string-name></person-group>., <year>2015</year>, &#x2018;<article-title>A multi-theoretical literature review on information security investments using the resource-based view and the organizational learning theory</article-title>&#x2019;, <conf-name>Proceedings of the International Conference on Information Systems - Exploring the Information Frontier, ICIS 2015</conf-name>, <conf-loc>Fort Worth, Texas, USA</conf-loc>, <conf-date>13&#x2013;16 December, 2015</conf-date>.</mixed-citation></ref>
<ref id="CIT0039"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Zenda</surname>, <given-names>B</given-names></string-name>., <string-name><surname>Vorster</surname>, <given-names>R</given-names></string-name>. &#x0026; <string-name><surname>Viega</surname>, <given-names>A.D</given-names></string-name></person-group>., <year>2020</year>, &#x2018;<article-title>Protection of personal information: An experiment involving data value chains and the use of personal information for marketing purposes in South Africa</article-title>&#x2019;, <source><italic>South African Computer Journal</italic></source> <volume>32</volume>(<issue>1</issue>), <fpage>113</fpage>&#x2013;<lpage>132</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.18489/sacj.v32i1.712">https://doi.org/10.18489/sacj.v32i1.712</ext-link></comment></mixed-citation></ref>
</ref-list>
<fn-group>
<fn><p><bold>How to cite this article:</bold> Rajkumar, K. &#x0026; Njenga, K., 2022, &#x2018;Make personal information security great again: A case of users&#x2019; perspectives on personal identifiable information in South Africa&#x2019;, <italic>South African Journal of Information Management</italic> 24(1), a1526. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.4102/sajim.v24i1.1526">https://doi.org/10.4102/sajim.v24i1.1526</ext-link></p></fn>
</fn-group>
</back>
</article>