employees to comply with security rules and
regulations (Bulgurcu et al., 2010).
Question 4: In general, which is more important
to you: CONVENIENCE or PRIVACY? The data
analysis showed that 33.3% answered “Convenience”
and 66.7 answered “Convenience”. According to the
reviewed literature, the convenience and efficiency
brought by IoT applications also bring privacy and
security to the spotlight (Pu et al., 2019).
Question 5: Content providers have the right to
resell information about its users to other companies?
The analysis showed that 13.3% “Agreed”, 6.7%
“Strongly Agreed”, 13.3% “Disagreed”, 60%
“Strongly Disagreed” and 6.7% were “Neutral”.
According to the literature that was reviewed, to
benefit from important shopper and value-based
information on versatile applications, organisations
should utilise ethical decisions and strategies that can
reduce privacy concerns, because such concerns
present critical challenges for corporate social duty
(Libaque-Sáenz, 2020).
Question 6: The organisation should update user
privacy notices and privacy policies?
The responses for the question were 46.7%
“Agreed”, 40% “Strongly Agreed” 6.7% “Strongly
Disagreed” and 6.7% were “Neutral”. Basic elements
were associated with privacy policy. The
organisations require principles to govern their
information practices and to ensure that a process
compliance is put into daily operations (Pfadenhauer,
et al., 2019). Privacy policy should reflect fair
information practices (FIPs)
What is digital literacy?
(How to examine the credibility of information –
the level of digital literacy while interacting with
technological platforms?).
Question 7: How often do you use PC/Laptop at
work? The data collected and analysed from this
question showed that 97.3% “Regularly” used the
PC/Laptop at work and 6.7% “Never” used the
PC/Laptop at work. Bawden (2001) argued that, as
digital technology is ever-present in whatever we do,
workers would need to increase in number in an effort
to acquire appropriate sets of digital abilities to gain
access and process information, using digital systems
and tools.
Question 8: How do you acquire digital literacy
skill? (Experience – on the job learning) The analysis
of the data showed that 53.3% “Strongly Agreed” and
46.7% “Agreed” that respondents acquired digital
literacy through experience (on the job learning).
A number of studies among adults finding “that only
about 10 percent of learning represents formal
learning in the work-place, compared with 70 per cent
self- or on-the-job learning and 20 percent peer-to-
peer learning” (Grant-Clement, 2017), provide
further evidence of this.
What are the challenges experienced on digital
platforms?
Question 9: Cannot use the databases? The
responses to the question were as follows: 60%
“Strongly disagreed”, 33.3% “Disagreed” and 6.7%
“Agreed”. Database technologies are a centre
segment of many processing frameworks. They
permit data to be held and shared electronically and
the measure of data contained in these frameworks
keeps on developing at a dramatic rate and so does the
need to safeguard the integrity of the data and secure
the data from unintended access (Murray, 2010).
Question 10: Cannot fully apply security features
as and when required? The responses were that 33.3%
“Agreed”, 33.3% “Disagreed”, 6.7% “Strongly
Agreed” and 26.7 “Strongly disagreed”. Security
features control how users and systems interact with
systems. Access controls give organisations the
ability to control, restrict, monitor, and protect
resource availability, integrity and confidentiality. It
is of importance to impart such skills to those who
have been given the authority to administer such.
According to Jaeger (2013), the major causes of data
breaches is errors committed by employees, rather
than hackers.
What interventions to put in place to address the
shortcomings of digital literacy?
Question 11: Intervention -Information security
(passwords, data security, etc).
Among respondents, 86.7% see this intervention
as “Very Essential”, 6.7% as “Essential” and 6.7% as
“Quite Essential”. Information security implies
ensuring data (information) and data systems from
unapproved access, use, revelation, interruption,
adjustment, or obliteration.
Information security management is a cycle of
characterising security controls to ensure information
resources/assets.
(Kissel, 2011) creation of information security
awareness is more effective than other measures.
However, this requires support from management, as
top management participation in information security
management has a significant influence on
employees’ attitude and behaviour over compliance
with information security policies (Hu, Dinev, Hart &
Cooke, 2012).