Cybersecurity best practices among Polish students

被引:4
|
作者
Szumski, Oskar [1 ]
机构
[1] Univ Warsaw, Fac Management, Ul Szturmowa 3, PL-02678 Warsaw, Poland
来源
KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS (KES-2018) | 2018年 / 126卷
关键词
cyber security; cyberattacks; users opinions; awareness; password protection; password management; best practices; data breaches; cyber threat; privacy protection; cybersecuritycourses; knowledge about cybersecurity; DATA PROTECTION; PRIVACY;
D O I
10.1016/j.procs.2018.08.070
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The major purpose of this article is to analyze state of knowledge within the cybersecurity area accompanied with identification of behavior patterns represented by students (seen as future users and managers of modern technology). The research was divided into: source of knowledge used as so called cybersecurity best practices and password protection aspects. The research was performed using the CAWI method in February 2017. The process included following steps: prepared questionnaire was verified and validated by cybersecurity experts, after expert assessment questionnaire was placed at servers of Faculty of Management (University of Warsaw). The following structure was applied within the article: short introduction and literature review of the researched subject, definition of research conditions and thesis, and used research method, analysis and discussion of research fmdings, and the last part was dedicated to conclusions related to the research and cybersecurity awareness represented by respondents. Author used 3 working thesis to support the research that fully were proved by collected answers. The research showed that Internet and Friends and Colleagues are the leading sources of knowledge about cybersecurity within the examined group. Based on that author got an evidence that those practices are faulty and lead to wrong behavior patterns both in internet and password protection. It also showed that people indicate lacking of reliable sources of information about cybersecurity where professional training was treated marginally comparing to the leading sources of information. Received results indicate that either employer or university was not interested in promoting good behavior patterns nor the training was the target for respondents. And it can be a reason that users of modern technology put more trust in Internet than in qualified sources of knowledge. (C) 2018 The Authors. Published by Elsevier Ltd.
引用
收藏
页码:1271 / 1280
页数:10
相关论文
共 50 条
  • [1] Cybersecurity Best Practices for Creating Resilient Control Systems
    Smith, Jess
    Pereyda, Joshua
    Gammel, Dennis
    2016 RESILIENCE WEEK (RWS), 2016, : 62 - 66
  • [2] Common Cybersecurity Requirements in IoT Standards, Best Practices, and Guidelines
    Kaksonen, Rauli
    Halunen, Kimmo
    Roning, Juha
    PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, BIG DATA AND SECURITY (IOTBDS), 2022, : 149 - 156
  • [3] College Students' Cybersecurity Risk Perceptions, Awareness, and Practices
    Sarathchandra, Dilshani
    Haltinner, Kristin
    Lichtenberg, Nicole
    2016 CYBERSECURITY SYMPOSIUM, 2016, : 68 - 73
  • [4] Assessing cybersecurity awareness among university students: implications for educational interventions
    Adeshola, Ibrahim
    Oluwajana, Dokun Iwalewa
    JOURNAL OF COMPUTERS IN EDUCATION, 2024,
  • [5] ROADMAPPING IN POLISH FORESIGHT INITIATIVES - BEST PRACTICES
    Kononiuk, Anna
    Gudanowska, Alicja E.
    9TH INTERNATIONAL SCIENTIFIC CONFERENCE - BUSINESS AND MANAGEMENT 2016, 2016,
  • [7] Education, Online Presence and Cybersecurity Implications: A Study of Information Security Practices of Computing Students in Saudi Arabia
    Saeed, Saqib
    SUSTAINABILITY, 2023, 15 (12)
  • [8] Automotive Cybersecurity Engineering Job Roles and Best Practices - Developed for the EU Blueprint Project DRIVES
    Messnarz, Richard
    Macher, Georg
    Stahl, Florian
    Wachter, Stefan
    Ekert, Damjan
    Stolfa, Jakub
    Stolfa, Svatopluk
    SYSTEMS, SOFTWARE AND SERVICES PROCESS IMPROVEMENT (EUROSPI 2020), 2020, 1251 : 499 - 510
  • [9] Cybersecurity Resiliency of Marine Renewable Energy Systems Part 2: Cybersecurity Best Practices and Risk Management
    de Peralta, Fleurdeliza A.
    Watson, Mark D.
    Bays, Ryan M.
    Boles, Joshua R.
    Powers, Ford E.
    MARINE TECHNOLOGY SOCIETY JOURNAL, 2021, 55 (02) : 104 - 116
  • [10] Implementing Cybersecurity Best Practices for Electrical Infrastructure in a Refinery: A Case Study
    George, Henry
    Arnett, Austin
    IEEE INDUSTRY APPLICATIONS MAGAZINE, 2021, 27 (04) : 18 - 24