Educational approach to perceptions of online risks and personal data protection
DOI:
https://doi.org/10.65598/rps.6015Keywords:
Digital education, Online risks, Online frauds and scams prevention, Personal data protection, Safe and responsible use of the InternetAbstract
Online risks associated with scams or fraud involving technological devices and personal data are becoming increasingly common, so it is important to understand how citizens perceive these risks. Some studies point to training as one of the main challenges that will help address the risks and problems arising from the use of technology, which is necessary in both urban and rural areas. In this quasi-experimental mixed-method study, a risk perception scale is applied and 15 items on the perceptions of 239 citizens and their experiences focused on relationships and communication, online fraud and scams, and personal data are analyzed. The results show that citizens perceive a lot and/or too much risk in most actions and, in general, little risk in online purchases. They report problems of identity theft due to lost mobile phones, phishing, personal data processing, and others. Some of them are associated with good practices and strategies to deal with them and thus consciously avoid adopting risky behaviors in everyday situations that are increasingly common in the digital society.
Downloads
References
Al-Qahtani, A. & Cresci, S. (2022). The COVID’19 scamdemic: A survey of phishing attacks and their countermeasures during COVID’19. IET Information Security, 16(5), 324–345. https://doi.org/10.1049/ise2.12073
Australian Bureau of Statistics (2022). Personal Fraud. Reference period: 2020-21 financial year. http://sl.ugr.es/0e1r
Beaunoyer, E., Dupéré, S. & Guitton, M. J. (2020). COVID-19 and digital inequalities: Reciprocal impacts and mitigation strategies. Computers in Human Behavior, 111, 106424. https://doi.org/10.1016/j.chb.2020.106424
Button, M. & Cross, C. (2017). Cyber Frauds, Scams and their Victims. Routledge. https://doi.org/10.4324/9781315679877
Byrne, Z.S., Dvorak, K.J., Peters, J.M., Ray, I., Howe, A. & Sanchez, D. (2016). From the User's Perspective: Perceptions of Risk Relative to Benefit Associated with Using the Internet. Computers in Human Behavior, 59, 456-468. https://doi.org/10.1016/j.chb.2016.02.024
Chatterjee, S., Kar, A.K., Dwivedi, Y.K. & Kizgin, H. (2019). Prevention of cybercrimes in smart cities of India: from a citizen’s perspective. Information Technology & People, 32(5),1153-1183. https://doi.org/10.1108/ITP-05-2018-0251
Coluccia, A., Pozza, A., Ferretti, F., Carabellese, F., Masti, A. & Gualtieri, G. (2020). Online Romance Scams: Relational Dynamics and Psychological Characteristics of the Victims and Scammers. A Scoping Review. Clinical Practice & Epidemiology in Mental Health, 1, 24-35. http://doi.org/10.2174/1745017902016010024
Cook, A. (2020). COVID-19: Companies and verticals at risk for cyber attacks. Reliaquest. http://sl.ugr.es/0e1y
Council of Europe (2001). Convention on Cybercrime. European Treaty Series, 185. https://rm.coe.int/1680081561
Council of Europe (2019). Digital Citizenship Education Handbook. https://rm.coe.int/168093586f
Cross, C., Smith, R.G. & Richards, K. (2014). Challenges of responding to online fraud victimization in Australia. Trends and issues in crime and criminal justice, (474), 1-6. http://sl.ugr.es/0e1z
Crowne-Mohammed, E., & Andreacchi, R. (2009). The (Un)availability of Commons Law Remedies for Victims of Online Gambling Fraud. Gaming Law Review and Economics, 13(4). http://doi.org/10.1089/gire.2009.13405
De Kimpe, L., Ponnet, K., Walrave, M., Snaphaan, T., Pauwels, L. & Hardyns, W. (2020). Help, I need somebody: Examining the antecedents of social support seeking among cybercrime victims. Computers in human behavior, 108, 106310. https://doi.org/10.1016/j.chb.2020.106310
Dodel, M. & Mesch, G. (2018). Inequality in digital skills and the adoption of online safety behaviors, Information, Communication & Society, 21(5), 712-728. https://doi.org/10.1080/1369118X.2018.1428652
European Commission (2021). 2030 Digital Compass: the European way for the Digital Decade. Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions. http://sl.ugr.es/0e1q
Fenge, L.A., & Lee, S. (2018). Understanding the Risks of Financial Scams as Part of Elder Abuse Prevention. The British Journal of Social Work 48(4), 906–923. https://doi.org/10.1093/bjsw/bcy037
Federal Trade Commissión [FTC]. (2023). As Nationwide Fraud Losses Top $10 Billion in 2023, FTC Steps Up Efforts to Protect the Public. https://www.ftc.gov/news-events/news/press-releases/2024/02/nationwide-fraud-losses-top-10-billion-2023-ftc-steps-efforts-protect-public
Harrell, E. & Langton L. (2013). Victims of identity theft. Bureau of Justice Statistics. http://www.bjs.gov/content/pub/pdf/vit12.pdf
Hsieh, H. & Shannon, S. (2005). Three approaches to qualitative content analysis. Qualitative Health Research, 15(9), 1277-1288. https://doi.org/10.1177/1049732305276687
Hu, L., Jiang, Y. & Li, Y. (2019). Optimization Design of Internet Fraud Case Based on Knowledge Graph and Case Teaching. In Proceedings of the 7th International Conference on Information and Education Technology, 301-305. https://doi.org/10.1145/3323771.3323806
Hussain, D., Ross, P. & Bednar, P. (2018). The Perception of the Benefits and Drawbacks of Internet Usage by the Elderly People. In C. Rossignoli, F. Virili, & S. Za (Eds.), Digital Technology and Organizational Change. Lecture Notes in Information Systems and Organisation, 23,199-212. Springer. https://doi.org/10.1007/978-3-319-62051-0_17
Kaspersky. (2020). Kaspersky Security Bulletin Statistics. http://sl.ugr.es/0e1w
Kirwan, G., Fullwood, C. & Brendan, R. (2018). Risk Factors for Social Networking Site Scam Victimization Among Malaysian Students. Cyberpsychology, Behavior, and Social Networking, 123-128. http://hdl.handle.net/2436/620689
Kopp C., Layton R., Sillitoe J. & Gondal, I. (2015). The Role of Love stories in Romance Scams: A Qualitative Analysis of Fraudulent Profiles. International Journal of Cyber Criminology, 9(2), 205-217. http://sl.ugr.es/0e1t
Kumaran, N., & Lugani, S. (2020). Protecting businesses against cyber threats during COVID-19 and beyond. Google Cloud Bolg http://sl.ugr.es/0e1v
Levin, I. & Mamlok, D. (2021). Culture and society in the digital age. Information, 12(2) 68. https://doi.org/10.3390/info12020068
Ma, K.W.F. & McKinnon, T. (2022). COVID-19 and cyber fraud: emerging threats during the pandemic, Journal of Financial Crime, 29 (2), 433-446. https://doi.org/10.1108/JFC-01-2021-0016
Mayer, L. (2018). Criminological Elements for the Criminal Legal Analysis of Cybercrime. Ius et Praxis, 24(1), 159-206. http://dx.doi.org/10.4067/S0718-00122018000100159
Mitchell,K., Finkelhor, D. & Becker-Blease, K.A. (2006). Classification of Adults with Problematic Internet Experiences: Linking Internet and Conventional Problems from a Clinical Perspective. CyberPsychology & Behavior, 10(3), 381–392. https://doi.org/10.1089/cpb.2006.9941
Mitchell, V. (1999). Consumer perceived risk: conceptualisations and models. European Journal of Marketing, 33(1/2),163-195. https://doi.org/10.1108/03090569910249229
Muniesa, P., Herrera, D., Guerrero, O., Martínez, F., Rubio, M., Gil, V., Santiago, A. & Gómez, M. (2022). Informe sobre la cibercriminalidad en España. Ministerio del Interior. http://sl.ugr.es/0e1p
Norris, G. & Brookes, A. (2021). Personality, Emotion and Individual Differences in Response to Online Fraud. Personality and Individual Differences, 169, 109847. https://doi.org/10.1016/j.paid.2020.109847
Norris, G., Brookes, A. & Dowell, D. (2019). The Psychology of Internet Fraud Victimisation: A Systematic Review. Journal of Police and Criminal Psychology, 34(3), 231-245. https://doi.org/10.1007/s11896-019-09334-5
Phiri, J., Lavhengwa, N. & Segooa, M. (2024). Online banking fraud detection: A comparative study of cases from South Africa and Spain. South African Journal of Information Management, 26(1), https://doi.org/10.4102/sajim.v26i1.1763
Purkait, S., Kumar De, S. & Suar, D. (2014). An Empirical Investigation of the Factor that Influence Internet User’s Ability to Correctly Identify a Phishing Website. Information Management & Computer Security, 22(3), 194-234. https://doi.org/10.1108/IMCS-05-2013-0032
Reynolds, L. & Parker, L. (2018). Digital resilience: Stronger citizens online. Institute for Strategic Dialogue. http://sl.ugr.es/0cGT
Ribble, M., Bailey, G. & Ross, T. (2004). Digital Citizenship, addressing appropriate technology behavior. Learning & Leading with Technology, 32(1). https://files.eric.ed.gov/fulltext/EJ695788.pdf
Ross, M., Grossmann, I. & Schryer, E. (2014). Contrary to psychological and popular opinion, there is no compelling evidence that older adults are disproportionately victimized by consumer fraud. Perspectives on Psychological Science, 9(4), 427-442. https://doi.org/10.1177/1745691614535935
Segura, J. (2017). Compromised LinkedIn accounts used to send phishing links via private message and InMail. Malwarebytes Labs http://sl.ugr.es/0e1x
Sorell, T. & Whitty, M. (2019). Online Romance Scams and Victimhood. Security Journal, 32(3), 342–361. https://doi.org/10.1057/s41284-019-00166-w
Torres-Hernández, N., Gallego-Arrufat, M.J., & García-Ruiz, M.M. (2023). Citizens’ reflections on an open, distance intergenerational program for online risk prevention. Digital Education Review. Universidad de Barcelona. 41, 35-53. https://revistes.ub.edu/index.php/der/article/download/41067/41068/124507
Torres-Hernández, N., García-Martínez, I., & Gallego-Arrufat, M.-J. (2022) Internet Risk Perception. Development and Validation of a Scale for Adults. Eur. J. Investig. Health Psychol. Educ. 12, 1581–1593. https://doi.org/ 10.3390/ejihpe12110111
Wang, Q., Wang, L., Zhang, X., Mao, Y. & Wang, P. (2017). The impact research of online reviews’ sentiment polarity presentation on consumer purchase decisions. Information Technology & People, 30(3), 522-541. https://doi.org/10.1108/ITP-06-2014-0116
Wei. R., Liu., X.S. & Liu, X. (2019). Examining the Perceptual and Behavioral Effects of Mobile Internet Fraud: A Social Network Approach. Telematics and Informatics, 41,103-113. https://doi.org/10.1016/j.tele.2019.04.002
Whittaker,J., Edwards, M.,Cross, C. & Button, M. (2023). I Have Only Checked after the Event. Consumer Approaches to Safe Online Shopping, Victims & Offenders, 18(7), 1259-1281. https://doi.org/10.1080/15564886.2022.2130486
Williams, E.J., Beardmore, A. & Joinson, A. (2017). Individual Differences in Susceptibility to Online Influence: A Theoretical Review. Computer in Human Behavior, 72, 412-421. https://doi.org/10.1016/j.chb.2017.03.002
Zhang Z. & Ye Z. (2022). The role of social-psychological factors of victimity on victimization of online fraud in China. Frontiers in Psychology, 13, 1030670. https://doi.org/10.3389/fpsyg.2022.1030670
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 Authors retain copyright and transfer to the journal the right of first publication and publishing rights

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Those authors who publish in this journal accept the following terms:
-
Authors retain copyright.
-
Authors transfer to the journal the right of first publication. The journal also owns the publishing rights.
-
All published contents are governed by an Attribution-NoDerivatives 4.0 International License.
Access the informative version and legal text of the license. By virtue of this, third parties are allowed to use what is published as long as they mention the authorship of the work and the first publication in this journal. If you transform the material, you may not distribute the modified work. -
Authors may make other independent and additional contractual arrangements for non-exclusive distribution of the version of the article published in this journal (e.g., inclusion in an institutional repository or publication in a book) as long as they clearly indicate that the work was first published in this journal.
- Authors are allowed and recommended to publish their work on the Internet (for example on institutional and personal websites), following the publication of, and referencing the journal, as this could lead to constructive exchanges and a more extensive and quick circulation of published works (see The Effect of Open Access).











