Recommendations for information security awareness training for college students

被引:50
作者
Kim, Eyong B. [1 ]
机构
[1] Barney School of Business, University of Hartford, West Hartford, CT
来源
Information Management and Computer Security | 2014年 / 22卷 / 01期
关键词
College students' information security awareness; Information security; Information security awareness training; Students; Training;
D O I
10.1108/IMCS-01-2013-0005
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Purpose - The purpose of this paper is to survey the status of information security awareness among college students in order to develop effective information security awareness training (ISAT). Design/methodology/approach - Based on a review of the literature and theoretical standpoints as well as the National Institute of Standards and Technology Special Publication 800-50 report, the author developed a questionnaire to investigate the attitudes toward information security awareness of undergraduate and graduate students in a business college at a mid-sized university in New England. Based on that survey and the previous literature, suggestions for more effective ISAT are provided. Findings - College students understand the importance and the need for ISAT but many of them do not participate in it. However, security topics that are not commonly covered by any installed (or built-in) programs or web sites have a significant relationship with information security awareness. It seems that students learned security concepts piecemeal from variety of sources. Practical implications - Universities can assess their ISAT for students based on the findings of this study. Originality/value - If any universities want to improve their current ISAT, or establish it, the findings of this study offer some guidelines. Copyright © 2014 Emerald Group Publishing Limited. All rights reserved.
引用
收藏
页码:115 / 126
页数:11
相关论文
共 50 条
[41]   Security Education, Training, and Awareness Programs: Literature Review [J].
Hu, Siqi ;
Hsu, Carol ;
Zhou, Zhongyun .
JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2022, 62 (04) :752-764
[42]   Determining the effects of information security knowledge on information security awareness via structural equation modelings [J].
Saracli, Sinan ;
Erdogmus, Atilgan .
HACETTEPE JOURNAL OF MATHEMATICS AND STATISTICS, 2019, 48 (04) :1201-1212
[43]   Effectiveness of and user preferences for security awareness training methodologies [J].
Tschakert, Kai Florian ;
Ngamsuriyaroj, Sudsanguan .
HELIYON, 2019, 5 (06)
[44]   Discussion on the Role of Assembly Language Course in Information Security Training [J].
Li Xiao-dong .
NATIONAL TEACHING SEMINAR ON CRYPTOGRAPHY AND INFORMATION SECURITY (2010NTS-CIS), PROCEEDINGS, 2010, :343-345
[45]   Moving beyond cyber security awareness and training to engendering security knowledge sharing [J].
Alahmari, Saad ;
Renaud, Karen ;
Omoronyia, Inah .
INFORMATION SYSTEMS AND E-BUSINESS MANAGEMENT, 2023, 21 (01) :123-158
[46]   PRACTICAL EXPERIENCE OF USING PROBLEM TRAINING IN THE FORMATION OF A KNOWLEDGE SYSTEM FOR STUDENTS IN THE FIELD OF INFORMATION SECURITY [J].
Imanbayeva, A. ;
Temirbayev, A. ;
Syzdykova, R. ;
Saduev, N. .
EDULEARN18: 10TH INTERNATIONAL CONFERENCE ON EDUCATION AND NEW LEARNING TECHNOLOGIES, 2018, :9919-9924
[47]   SOHO: Information Security Awareness in the Aspect of Contingency Planning [J].
Maurer, Jason ;
Clark, Brandon ;
Choi, Young B. .
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2015, 6 (10) :18-22
[48]   An Ontological Approach to Situational Awareness Applied to Information Security [J].
da Rosa, Diorgenes Yuri ;
Almeida, Ricardo ;
Machado, Roger ;
Yamin, Adenauer ;
Pernas, Ana Marilza .
2018 XLIV LATIN AMERICAN COMPUTER CONFERENCE (CLEI 2018), 2018, :718-727
[49]   Gamifying Digital Learning Platform for Information Security Awareness [J].
Rintanalert, Thanawat ;
Luangsodsai, Arthorn .
INNOVATIVE TECHNOLOGIES AND LEARNING, 2021, 13117 :352-364
[50]   Information security awareness in higher education: An exploratory study [J].
Rezgui, Yacine ;
Marks, Adam .
COMPUTERS & SECURITY, 2008, 27 (7-8) :241-253