Table 3.
Interview protocol
Items | Details | Interviewees |
---|---|---|
Demographic characteristics |
Name of country Nature of business No. of years as a trader |
Small-scale African migrant traders |
Perceived vulnerability |
Questions related to perceived susceptibility to cybersecurity threats Questions related to perceived severity of cybersecurity threats |
|
Security measures efficacy | Questions related to cybersecurity measures | |
Self-efficacy | Questions related to awareness of cybersecurity threats | |
Intention to comply with security protocols | Questions related to support mechanisms | Representatives of African migrant business associations |