Personal Computer Usage and Security Threats in the New Juaben Municipality, Ghana

Sarah Dsane-Nsor, Akyene Tetteh, Joseph Akubire Kojo Nsor


Personal computer (PC) usage in Ghana is on the rise but its security threat lacks behind because most PC owners do not know how to guard themselves and unaware of it danger.  This paper studies the current state of PC security threat in the New Juaben Municipality, Eastern Region Ghana. SPSS was used to analyze the questionnaires gathered. The results suggest that (i) good authentic password does not guarantee PC owners safety, (ii) lapse in anti-virus routine update empowers malicious attackers to attack personal computers and (iii) PC’s owners are not free from privacy threat so far as they subscribe to free email accounts.


Personal Computer, Ghana, Security Threats

Full Text:



Whitman M.E, Mattord H.J., Principle of Information Security, Thomson Course Technology, USA, 2003.

Lampson B.W., “Computer security in the real world”, IEEE Computer, vol. 37, pp. 37-46, 2004.

Chen J., Paik M., McCabe K., “Exploring Internet Security Perceptions and Practices in Urban Ghana”, In Symposium on Usable Privacy and Security (SOUPS), 2014.

Proctor R.W., Lien M.C., Vu K.P.L. Schultz E.E., Salvendy G., “Improving computer security for authentication of users: Influence of proactive password restrictions”, Behavior Research Methods, Instruments & Computers, vol. 34, no. 2, pp. 163-169, 2002.

Bleha, S., Slivinsky, C., Hussien, B., “Computer-access security systems using keystroke dynamics”, Pattern Analysis and Machine Intelligence, IEEE Transactions, vol. 12, no. 12, pp. 1217-1222, 1990.

Bonneau, J., Herley, C., van Oorschot, P. C., Stajano, F., “Passwords and the evolution of imperfect authentication”, Communications of the ACM, vol. 58, no. 7, pp. 78-87, 2015.

McGraw, G., Software security: Building Security In (Vol. 1), Addison-Wesley Professional, USA, 2006.

Landwehr, Carl E., Alan R. Bull, John P. McDermott, and William S. Choi., “A taxonomy of computer program security flaws”, ACM Computing Surveys (CSUR) vol. 26, no. 3, pp. 211-254, 1994.

Banday, M. T., Qadri, J. A., & Shah, N. A., “Study of Botnets and their threats to Internet Security”, Working Papers on Information Security, 2009.

Zviran, M., & Erlich, Z., “Identification and authentication: technology and implementation issues”, Communications of the Association for Information Systems, vol. 17, no. 1, pp. 1- 4, 2006.

Keith, M., Shao, B., & Steinbart, P., “A behavioral analysis of passphrase design and effectiveness”, Journal of the Association for Information Systems, vol. 10, no. 2, pp. 63-89, 2009.

Zhang, J., Luo, X., Akkaladevi, S., & Ziegelmayer, J., “Improving multiple-password recall: An empirical study”, European Journal of Information Systems, vol. 18, no. 2, pp. 165-176, 2009.

Ariss, S. S. “Computer monitoring: benefits and pitfalls facing management”, Information & Management, vol. 39, no. 7, pp. 553-558, 2002.



  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.