Skip to main navigation Skip to search Skip to main content

A cross cultural investigation into adoption of user controls in cyberstalking protection: a case study of Nigeria and the United Kingdom

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Citations (Scopus)

Abstract

Cyberstalking has been identified as a major threat to users of technology, most importantly social and electronic media tools. The utilisation of available user controls which are aimed at protecting users from cyberstalking have not been fully explored in literatures from a cultural point of view. This paper aims to address this issue by using two distinct cultural group to understand and investigate the adoption of user controls in cyberstalking protection. The Hofstede Cultural index and a few other cultural models will be used in comparing the two selected cultural group.
Original languageEnglish
Title of host publication2017 Seventh International Conference on Innovative Computing Technology (INTECH)
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781509039890
ISBN (Print)9781509039906
DOIs
Publication statusPublished - 9 Nov 2017
Event2017 Seventh International Conference on Innovative Computing Technology (INTECH) - Luton
Duration: 16 Aug 201718 Aug 2017
http://dirf.org/intech/

Conference

Conference2017 Seventh International Conference on Innovative Computing Technology (INTECH)
CityLuton
Period16/08/1718/08/17
Other2017 Seventh International Conference on Innovative Computing Technology (INTECH) (16/08/2017-18/08/2017, Luton)
Internet address

UN SDGs

This output contributes to the following UN Sustainable Development Goals (SDGs)

  1. SDG 16 - Peace, Justice and Strong Institutions
    SDG 16 Peace, Justice and Strong Institutions

Keywords

  • Cybercrime
  • Cyberstalking
  • Social Media
  • cross-cultural data
  • culture
  • cyber harassment

Fingerprint

Dive into the research topics of 'A cross cultural investigation into adoption of user controls in cyberstalking protection: a case study of Nigeria and the United Kingdom'. Together they form a unique fingerprint.

Cite this