Malware, Data Theft and Emotional Distress as Risk Factors of Phishing in Nigeria
Keywords:
Cybersecurity, Data Theft, Emotional Distress, Phishing Attacks, Social MediaAbstract
This study investigates malware, data theft, and emotional distress as risk factors contributing to phishing vulnerability among Nigerian internet users. Data were collected from 2,016 participants through purposive and convenience sampling, using a quantitative cross-sectional survey design. The analyses focused on platform exposure, behavioural patterns, and sociodemographic predictors of emotional reactions to phishing incidents. Findings revealed that phishing threats vary across social media, with Instagram, Twitter, and Facebook being most affected. Emotional distress is highest when users experience real consequences, while overconfidence and exposure fatigue reduce vigilance. Sociodemographic factors such as age, gender, education, and occupation significantly predict emotional reactions to attacks. It is therefore recommended that phishing prevention in Nigeria requires joint efforts from various agencies, associations, and the Ministry of Health to implement cybersecurity education, block threats in real time, train self-employed users, provide emotional support, and involve technology companies in user protection through reporting systems, safety tools, and targeted awareness initiatives.
References
Alabdan, R. (2020). Phishing attacks survey: Types, vectors, and technical approaches. Future internet, 12(10), 168. https://doi.org/10.3390/fi12100168
Andrey, S., Rand, A., Masoodi, M. J. & Tran, S. (2021). Private Messaging, Public Harms. Retrieved from https://www.cybersecurepolicy.ca/privatemessaging
Arroyabe, M. F., Arranz, C. F., De Arroyabe, I. F., & de Arroyabe, J. C. F. (2024). Revealing the realities of cybercrime in small and medium enterprises: Understanding fear and taxonomic perspectives. Computers & Security, 141, 103826. https://doi.org/10.1016/j.cose.2024.103826
Bada, M., & Nurse, J. R. (2020). The social and psychological impact of cyberattacks. In Emerging cyber threats and cognitive vulnerabilities (pp. 73-92). Academic press. https://doi.org/10.1016/B978-0-12-816203-3.00004-6
Badescu, R. (2024). Phishing Threats in the Age of Social Media: A User-Centric Approach. Informatica Economica, 28(4), 83-101. https://doi.org/10.24818/issn14531305/28.4.2024.07
Baillon, A., De Bruin, J., Emirmahmutoglu, A., Van De Veer, E., & Van Dijk, B. (2019). Informing, simulating experience, or both: A field experiment on phishing risks. PloS one, 14(12), e0224216. https://doi.org/10.1371/journal.pone.0224216
Boysen, S., Hewitt, B., Gibbs, D., & McLeod, A. (2019). Refining the threat calculus of technology threat avoidance theory. Communications of the Association for Information Systems, 45(5), 95-115. https://doi.org/10.17705/1CAIS.04505
Budimir, S., Fontaine, J. R., Huijts, N. M., Haans, A., Loukas, G., & Roesch, E. B. (2021). Emotional reactions to cybersecurity breach situations: scenario-based survey study. Journal of medical Internet research, 23(5), e24879. https://doi.org/10.2196/24879
Carpenter, D., Young, D. K., Barrett, P., & McLeod, A. J. (2019). Refining technology threat avoidance theory. Communications of the Association for Information Systems, 44(22), 380-407. https://doi.org/10.17705/1CAIS.04422
Cheng, C., Chan, L., & Chau, C. L. (2020). Individual differences in susceptibility to cybercrime victimization and its psychological aftermath. Computers in Human Behavior, 108, 106311. https://doi.org/10.1016/j.chb.2020.106311
DataReportal (2023). Digital 2023: Nigeria. Retrieved from https://datareportal.com/reports/digital-2023-nigeria
Eliot, B. and Maxime, C. (2024). Phishing Trends Report (Updated for 2024). [online] Hoxhunt.com. Retrieved from https://hoxhunt.com/guide/phishing-trends-report.
Gainsbury, S. M., Browne, M., & Rockloff, M. (2019). Identifying risky Internet use: Associating negative online experience with specific online behaviours. New Media & Society, 21(6), 1232-1252. https://doi.org/10.1177/1461444818815442
Ghani, N. M., Bakar, M. A. A., & Rosli, H. (2023). Cybercrime experience’s impact on women’s emotions: A case study in Penang. Malaysian Journal of Tropical Geography (MJTG), 49(2), 48-67.
INTERPOL (2021). INTERPOL report identifies top cyberthreats in Africa. [online] www.interpol.int. Retrieved from https://www.interpol.int/en/News-and-Events/News/2021/INTERPOL-report-identifies-top-cyberthreats-in-Africa.
Liang, H., & Xue, Y. (2009). Avoidance of information technology threats: A theoretical perspective. MIS Quarterly, 33(1), 71-90. https://doi.org/10.2307/20650279
Lindsay, M., Booth, J. M., Messing, J. T., & Thaller, J. (2016). Experiences of online harassment among emerging adults: Emotional reactions and the mediating role of fear. Journal of Interpersonal Violence, 31(19), 3174-3195. https://doi.org/10.1177/0886260515584344
Mangut, P. N., & Datukun, K. A. (2021). The current phishing techniques–perspective of the Nigerian environment. World Journal of Innovative Research, 10(1). https://doi.org/10.31871/WJIR.10.1.9
Parker, H. J., & Flowerday, S. V. (2020). Contributing factors to increased susceptibility to social media phishing attacks. South African Journal of Information Management, 22(1), 1-10.
Petrauskaite, A. (2020). Society resilience to contemporary threats: The impact of education. Public Security and Public Order, 24, 329-337. https://doi.org/10.13165/PSPO-20-24-20
Silic, M., & Back, A. (2016). The dark side of social networking sites: Understanding phishing risks. Computers in Human Behavior, 60, 35-43. https://doi.org/10.1016/j.chb.2016.02.050
Stadler, J. (2013). Screen media violence and the socialisation of young viewers. Youth violence: Sources and solutions in South Africa, 319-345.
Vila, J., Briggs, P., Branley-Bell, D., Gomez, Y., & Coventry, L. (2021). Behavioural issues in cybersecurity. In Security Risk Models for Cyber Insurance (pp. 27-48). 6000 Broken Sound Parkway NW, Suite 300, Boca Raton, FL 33487-2742: CRC Press.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Lateef Junior Adeyemo, Isaiah Oden David, Tirimisiyu Yemi Olabulo

This work is licensed under a Creative Commons Attribution 4.0 International License.