Research Article

The Behavioural Economics of Cybersecurity, Emphasizing the Role of Human Behaviour, Cultural Influences, and Cognitive Biases in Shaping Cybersecurity Vulnerabilities and Solutions.

by  Ali Munhaimin, Jerome Ofori-Kyeremeh, Bright Osei Amankwatia
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 187 - Issue 39
Published: September 2025
Authors: Ali Munhaimin, Jerome Ofori-Kyeremeh, Bright Osei Amankwatia
10.5120/ijca2025925698
PDF

Ali Munhaimin, Jerome Ofori-Kyeremeh, Bright Osei Amankwatia . The Behavioural Economics of Cybersecurity, Emphasizing the Role of Human Behaviour, Cultural Influences, and Cognitive Biases in Shaping Cybersecurity Vulnerabilities and Solutions.. International Journal of Computer Applications. 187, 39 (September 2025), 67-76. DOI=10.5120/ijca2025925698

                        @article{ 10.5120/ijca2025925698,
                        author  = { Ali Munhaimin,Jerome Ofori-Kyeremeh,Bright Osei Amankwatia },
                        title   = { The Behavioural Economics of Cybersecurity, Emphasizing the Role of Human Behaviour, Cultural Influences, and Cognitive Biases in Shaping Cybersecurity Vulnerabilities and Solutions. },
                        journal = { International Journal of Computer Applications },
                        year    = { 2025 },
                        volume  = { 187 },
                        number  = { 39 },
                        pages   = { 67-76 },
                        doi     = { 10.5120/ijca2025925698 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2025
                        %A Ali Munhaimin
                        %A Jerome Ofori-Kyeremeh
                        %A Bright Osei Amankwatia
                        %T The Behavioural Economics of Cybersecurity, Emphasizing the Role of Human Behaviour, Cultural Influences, and Cognitive Biases in Shaping Cybersecurity Vulnerabilities and Solutions.%T 
                        %J International Journal of Computer Applications
                        %V 187
                        %N 39
                        %P 67-76
                        %R 10.5120/ijca2025925698
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

The increasing sophistication and prevalence of cyber threats necessitate a re-evaluation of the human element in cybersecurity. While technological advances provide robust security measures, human behaviour remains a critical vulnerability and, conversely, a potential strength within the cyber domain. As cybersecurity remains a vital pillar of the digital ecosystem, understanding the human element is crucial to safeguarding systems and ensuring resilience. Human factors encompass a wide range of components, including cognitive capabilities, decision-making processes and behavioural patterns, all of which directly influence the efficacy of cybersecurity measures. This paper examines how individuals respond to cyber threats, the psychological underpinnings of cybersecurity awareness and the educational strategies required to foster a culture of digital security. The target groups for this paper are children, market women who are perceived to be semi-literate and how the literate group also react to cyber threats. Central to this exploration is the recognition that the strength of a cybersecurity framework lies in collective vigilance; any lapse in adherence to protective measures may compromise the entire system. The insights presented aim to advance the development of positive behavioural attitudes toward achieving robust cybersecurity practices across diverse contexts. Through a systematic review of recent literature, this paper offers insights into the dynamic interaction between humans and technology within the cybersecurity domain, proposing recommendations to mitigate risks and cultivate a more secure digital environment.

References
  • Bellovin, S.M. Layered Insecurity. IEEE Secur. Priv. 2019, 17, 95–96.
  • Craig, T. Net of Insecurity: A Flaw in the Design. The Internets Founders Saw Its Promise But Didn't Foresee Users Attacking One Another. USA, 2015. Available online:https://www.washingtonpost.com/sf/business/2015/05/30/net-of-insecurity-part-1/ (accessed on 22 October 2021).
  • Kahneman, D., & Tversky, A. (1974). Judgment under uncertainty: Heuristics and biases. Science, 185(4157), 1124–1131.
  • Ghana Statistical Service. (2021). Population and Housing Census.
  • KEMP. (2024). Internet statistics in Ghana.
  • Lu, Y. (2020). The Fintech industry: Challenges and opportunities. Journal of Financial Innovation, 15(3), 210–227.
  • Sasu, D. (2024). Smartphone penetration in Ghana.
  • World Bank & Ghana Cybersecurity Authority. (2021). Strengthening cyber resilience in Ghana.
  • "Elimination by Aspects: A Theory of Choice," Psychological Review, 79 (1972), 281-299.
  • Tirumala, S.S.; Sarrafzadeh, A.; Pang, P. A survey on Internet usage and cybersecurity awareness in students. In Proceedings of the 2016 14th Annual Conference on Privacy, Security and Trust (PST), Auckland, New Zealand, 12–14 December 2016; pp. 223–228.
  • Zwilling, M.; Lesjak, D.; Natek, S.; Phusavat, K.; Anussornnitisarn, P. How to deal with the awareness of cyber hazards and security in (Higher) education. In Proceedings of the Thriving on Future Education, Industry, Business and Society. Proceedings of the Makelearn and TIIM International Conference, Piran, Slovenia, 15–17 May 2019; pp. 433–439.
  • Rahman, N.; Sairi, I.; Zizi, N.; Khalid, F. The importance of cybersecurity education in school. Int. J. Inf. Educ. Technol. 2020, 10, 378–382.
  • Ameen, N., Tarhini, A., Shah, M., Madichie, N., Paul, J., & Choudrie, J. (2020). Keeping customers' data secure: A cross-cultural study of cybersecurity compliance among the Gen-Mobile workforce. Computers in Human Behaviour, 114, 106531. https://doi.org/10.1016/j.chb.2020.106531
  • Shah, M. U., Iqbal, F., Rehman, U., & Hung, P. C. K. (2023). A comparative assessment of human factors in cybersecurity: Implications for cyber governance. IEEE Access, 11, 87970–87984.
  • https://statsghana.gov.gh/gssmain/fileUpload/pressrelease/2021 PHC General Report Vol 3D_Literacy and Education.pdf
  • Vervier, L.; Zeissig, E.M.; Lidynia, C.; Ziefle, M. Perceptions of Digital Footprints and the Value of Privacy. In Proceedings of the IoTBDS, Prague, Czech Republic, 7–9 May 2017; pp. 80–91. [Google Scholar]
  • Levy, Y.; Gafni, R. Introducing the concept of cybersecurity footprint. Inf. Comput. Secur. 2021, 29, 724–736. [Google Scholar] [CrossRef]
  • Krombholz, H. H., Huber, M., & Weippl, E. (2015). Advanced social engineering attacks. Journal of Information Security and Applications, 22, 113–122. DOI: 10.1016/j.jisa.2014.09.005
  • Contel, N. Y., & Schmick, P. J. (2016). Cybersecurity: Risks, Vulnerabilities and countermeasures to prevent social engineering attacks. International Journal of Advanced Computer Research, 6(23), 31–38. DOI: 10.19101IJACR.2016.623006
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Cybersecurity Human Factor behavioural Economics Cyber Threats Cybersecurity Awareness

Powered by PhDFocusTM