Cybersecurity best practices among Polish students

被引:4
|
作者
Szumski, Oskar [1 ]
机构
[1] Univ Warsaw, Fac Management, Ul Szturmowa 3, PL-02678 Warsaw, Poland
来源
KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS (KES-2018) | 2018年 / 126卷
关键词
cyber security; cyberattacks; users opinions; awareness; password protection; password management; best practices; data breaches; cyber threat; privacy protection; cybersecuritycourses; knowledge about cybersecurity; DATA PROTECTION; PRIVACY;
D O I
10.1016/j.procs.2018.08.070
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The major purpose of this article is to analyze state of knowledge within the cybersecurity area accompanied with identification of behavior patterns represented by students (seen as future users and managers of modern technology). The research was divided into: source of knowledge used as so called cybersecurity best practices and password protection aspects. The research was performed using the CAWI method in February 2017. The process included following steps: prepared questionnaire was verified and validated by cybersecurity experts, after expert assessment questionnaire was placed at servers of Faculty of Management (University of Warsaw). The following structure was applied within the article: short introduction and literature review of the researched subject, definition of research conditions and thesis, and used research method, analysis and discussion of research fmdings, and the last part was dedicated to conclusions related to the research and cybersecurity awareness represented by respondents. Author used 3 working thesis to support the research that fully were proved by collected answers. The research showed that Internet and Friends and Colleagues are the leading sources of knowledge about cybersecurity within the examined group. Based on that author got an evidence that those practices are faulty and lead to wrong behavior patterns both in internet and password protection. It also showed that people indicate lacking of reliable sources of information about cybersecurity where professional training was treated marginally comparing to the leading sources of information. Received results indicate that either employer or university was not interested in promoting good behavior patterns nor the training was the target for respondents. And it can be a reason that users of modern technology put more trust in Internet than in qualified sources of knowledge. (C) 2018 The Authors. Published by Elsevier Ltd.
引用
收藏
页码:1271 / 1280
页数:10
相关论文
共 50 条
  • [31] Validity and reliability of Cybersecurity Judgment Questionnaire for middle and high school students: A validation study with Rasch analysis
    Yan, Zheng
    Yang, Panpan
    Xue, Yukang
    Lou, Yaosheng
    Nealon, Melissa
    HUMAN BEHAVIOR AND EMERGING TECHNOLOGIES, 2021, 3 (05) : 776 - 787
  • [32] Teaching Psychological Principles to Cybersecurity Students
    Taylor, Jacqui
    McAlaney, John
    Hodge, Sarah
    Thackray, Helen
    Richardson, Christopher
    James, Susie
    Dale, John
    PROCEEDINGS OF 2017 IEEE GLOBAL ENGINEERING EDUCATION CONFERENCE (EDUCON2017), 2017, : 1782 - 1789
  • [33] Empowering Students for Cybersecurity Awareness Management in the Emerging Digital Era: The Role of Cybersecurity Attitude in the 4.0 Industrial Revolution Era
    Ahamed, Bulbul
    Polas, Mohammad Rashed Hasan
    Kabir, Ahmed Imran
    Sohel-Uz-Zaman, Abu Saleh Md.
    Al Fahad, Abdullah
    Chowdhury, Saima
    Dey, Mrittika Rani
    SAGE OPEN, 2024, 14 (01):
  • [34] Engaging Secondary Students in Computing and Cybersecurity
    Nite, Sandra B.
    Gray, Trenton J.
    Lee, Seonhu
    Stebenne, Sheri
    PRACTICE AND EXPERIENCE IN ADVANCED RESEARCH COMPUTING 2024, PEARC 2024, 2024,
  • [35] Exploring SME cybersecurity practices in developing countries
    Kabanda, Salah
    Tanner, Maureen
    Kent, Cameron
    JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE, 2018, 28 (03) : 269 - 282
  • [36] The Impact of Cybersecurity Practices on Cyberattack Damage: The Perspective of Small Enterprises in Saudi Arabia
    Alharbi, Fawaz
    Alsulami, Majid
    AL-Solami, Abdullatif
    Al-Otaibi, Yazeed
    Al-Osimi, Meshaal
    Al-Qanor, Fahad
    Al-Otaibi, Khalid
    SENSORS, 2021, 21 (20)
  • [37] Privacy and Security Best Practices for IoT Solutions
    Anedda, Matteo
    Floris, Alessandro
    Girau, Roberto
    Fadda, Mauro
    Ruiu, Pietro
    Farina, Massimo
    Bonu, Alessandro
    Giusto, Daniele D.
    IEEE ACCESS, 2023, 11 : 129156 - 129172
  • [38] INSuRE: Collaborating Centers of Academic Excellence Engage Students in Cybersecurity Research
    Sherman, Alan
    Dark, Melissa
    Chan, Agnes
    Chong, Rylan
    Morris, Thomas
    Oliva, Linda
    Springer, John
    Thuraisingham, Bhavani
    Vatcher, Christopher
    Verma, Rakesh
    Wetzel, Susanne
    IEEE SECURITY & PRIVACY, 2017, 15 (04) : 72 - 78
  • [39] Cybersecurity among University Students from Generation Z: A Comparative Study of the Undergraduate Programs in Administration and Public Accounting in two Mexican Universities
    Mendoza, Adan Lopez
    Hernandez, Rolando Salazar
    Quezada, Ma. Teresa Prieto
    Hernandez, Ramon Ventura
    TEM JOURNAL-TECHNOLOGY EDUCATION MANAGEMENT INFORMATICS, 2023, 12 (01): : 503 - 511
  • [40] Towards a 3-D Approach to Cybersecurity Awareness for College Students
    Muhirwe, Jackson
    SIGITE'16: PROCEEDINGS OF THE 17TH ANNUAL CONFERENCE ON INFORMATION TECHNOLOGY EDUCATION, 2016, : 105 - 105