Table 3.
Interview protocol
| Items | Details | Interviewees |
|---|---|---|
| Demographic characteristics |
Name of country Nature of business No. of years as a trader |
Small-scale African migrant traders |
| Perceived vulnerability |
Questions related to perceived susceptibility to cybersecurity threats Questions related to perceived severity of cybersecurity threats |
|
| Security measures efficacy | Questions related to cybersecurity measures | |
| Self-efficacy | Questions related to awareness of cybersecurity threats | |
| Intention to comply with security protocols | Questions related to support mechanisms | Representatives of African migrant business associations |