Cybersecurity best practices among Polish students

被引:5
作者
Szumski, Oskar [1 ]
机构
[1] Univ Warsaw, Fac Management, Ul Szturmowa 3, PL-02678 Warsaw, Poland
来源
KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS (KES-2018) | 2018年 / 126卷
关键词
cyber security; cyberattacks; users opinions; awareness; password protection; password management; best practices; data breaches; cyber threat; privacy protection; cybersecuritycourses; knowledge about cybersecurity; DATA PROTECTION; PRIVACY;
D O I
10.1016/j.procs.2018.08.070
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The major purpose of this article is to analyze state of knowledge within the cybersecurity area accompanied with identification of behavior patterns represented by students (seen as future users and managers of modern technology). The research was divided into: source of knowledge used as so called cybersecurity best practices and password protection aspects. The research was performed using the CAWI method in February 2017. The process included following steps: prepared questionnaire was verified and validated by cybersecurity experts, after expert assessment questionnaire was placed at servers of Faculty of Management (University of Warsaw). The following structure was applied within the article: short introduction and literature review of the researched subject, definition of research conditions and thesis, and used research method, analysis and discussion of research fmdings, and the last part was dedicated to conclusions related to the research and cybersecurity awareness represented by respondents. Author used 3 working thesis to support the research that fully were proved by collected answers. The research showed that Internet and Friends and Colleagues are the leading sources of knowledge about cybersecurity within the examined group. Based on that author got an evidence that those practices are faulty and lead to wrong behavior patterns both in internet and password protection. It also showed that people indicate lacking of reliable sources of information about cybersecurity where professional training was treated marginally comparing to the leading sources of information. Received results indicate that either employer or university was not interested in promoting good behavior patterns nor the training was the target for respondents. And it can be a reason that users of modern technology put more trust in Internet than in qualified sources of knowledge. (C) 2018 The Authors. Published by Elsevier Ltd.
引用
收藏
页码:1271 / 1280
页数:10
相关论文
共 30 条
[1]  
[Anonymous], HARVARD BUSINESS REV
[2]  
[Anonymous], 2015, 2015 Cost of data breach study
[3]  
Arntz Pieter, 2016, EXPLAINED ADV PERSIS
[5]  
Cranor Lorrie, 2017, YOU ADDED 1 YOUR PAS
[6]  
Dobrian J., 2015, Journal Of Property Management, V80, P8
[7]  
Drolet Michelle, 2017, 8 CYBERSECURITY TREN
[8]  
Ekstrom, 2011, P 2011 C INF TECHN E, P113, DOI DOI 10.1145/2047594.2047628
[9]  
Ellingwood J., 2015, 7 SECURITY MEASURES
[10]  
Folga Kamil, 2014, BEZPIECZENSTWO IPV6