Cybersecurity best practices among Polish students

被引:4
|
作者
Szumski, Oskar [1 ]
机构
[1] Univ Warsaw, Fac Management, Ul Szturmowa 3, PL-02678 Warsaw, Poland
来源
KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS (KES-2018) | 2018年 / 126卷
关键词
cyber security; cyberattacks; users opinions; awareness; password protection; password management; best practices; data breaches; cyber threat; privacy protection; cybersecuritycourses; knowledge about cybersecurity; DATA PROTECTION; PRIVACY;
D O I
10.1016/j.procs.2018.08.070
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The major purpose of this article is to analyze state of knowledge within the cybersecurity area accompanied with identification of behavior patterns represented by students (seen as future users and managers of modern technology). The research was divided into: source of knowledge used as so called cybersecurity best practices and password protection aspects. The research was performed using the CAWI method in February 2017. The process included following steps: prepared questionnaire was verified and validated by cybersecurity experts, after expert assessment questionnaire was placed at servers of Faculty of Management (University of Warsaw). The following structure was applied within the article: short introduction and literature review of the researched subject, definition of research conditions and thesis, and used research method, analysis and discussion of research fmdings, and the last part was dedicated to conclusions related to the research and cybersecurity awareness represented by respondents. Author used 3 working thesis to support the research that fully were proved by collected answers. The research showed that Internet and Friends and Colleagues are the leading sources of knowledge about cybersecurity within the examined group. Based on that author got an evidence that those practices are faulty and lead to wrong behavior patterns both in internet and password protection. It also showed that people indicate lacking of reliable sources of information about cybersecurity where professional training was treated marginally comparing to the leading sources of information. Received results indicate that either employer or university was not interested in promoting good behavior patterns nor the training was the target for respondents. And it can be a reason that users of modern technology put more trust in Internet than in qualified sources of knowledge. (C) 2018 The Authors. Published by Elsevier Ltd.
引用
收藏
页码:1271 / 1280
页数:10
相关论文
共 50 条
  • [21] The Local Government's Position in the Polish Cybersecurity System
    Karpiuk, Miroslaw
    LEX LOCALIS-JOURNAL OF LOCAL SELF-GOVERNMENT, 2021, 19 (03): : 609 - 620
  • [22] Making the Best Use of Cybersecurity Economic Models
    Rue, Rachel
    Pfleeger, Shari Lawrence
    IEEE SECURITY & PRIVACY, 2009, 7 (04) : 52 - 60
  • [23] Mobile Security: Threats and Best Practices
    Weichbroth, Pawel
    Lysik, Lukasz
    MOBILE INFORMATION SYSTEMS, 2020, 2020
  • [24] Lifestyle Practices Among Medical Students: An Observational Study
    Pandey, Arvind Kumar
    Kotian, Sushma R.
    Souza, Anne D.
    Vishal, Kavitha
    Acharya, Raviraj V.
    Guruprasad, Sneha
    ADVANCED SCIENCE LETTERS, 2017, 23 (03) : 1943 - 1945
  • [25] The Use and Non-Use of Cybersecurity Tools Among Consumers: Do They Want Help?
    Dupuis, Marc
    Geiger, Tamara
    Slayton, Marshelle
    Dewing, Frances
    PROCEEDINGS OF THE 20TH ANNUAL CONFERENCE ON INFORMATION TECHNOLOGY EDUCATION (SIGITE '19), 2019, : 81 - 86
  • [26] Best practices with revenue sharing authentic assessment of preschool students' learning problems
    Rasul, Rashidah Mohd
    Zagan, Madhya
    KNOWLEDGE, SERVICE, TOURISM & HOSPITALITY, 2016, : 113 - 117
  • [27] Cybersecurity Awareness Level: The Case of Saudi Arabia University Students
    Aljohni, Wejdan
    Elfadil, Nazar
    Jarajreh, Mutsam
    Gasmelsied, Mwahib
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (03) : 276 - 281
  • [28] Best Practices in the Development of Transversal Competences among Youths in Vulnerable Situations
    Villardon-Gallego, Lourdes
    Flores-Moncada, Lirio
    Yanez-Marquina, Lara
    Garcia-Montero, Roberto
    EDUCATION SCIENCES, 2020, 10 (09): : 1 - 15
  • [29] The Adoption of Business Continuity Management Best Practices Among Malaysian Organizations
    Abu Bakar, Zahari
    Yaacob, Noorulsadiqin Azbiya
    Udin, Zulkifli Mohamed
    Hanaysha, Jalal Rajeh
    Loon, Lee Khai
    ADVANCED SCIENCE LETTERS, 2017, 23 (09) : 8484 - 8491
  • [30] Best Practices Among Child Nutrition Programs in Ontario: Evaluation Findings
    Russell, Jacqueline A.
    Evers, Susan
    Dwyer, J. M.
    Uetrecht, Connie
    Macaskill, Lesley
    JOURNAL OF HUNGER & ENVIRONMENTAL NUTRITION, 2008, 2 (2-3) : 111 - 127