Cybersecurity best practices among Polish students

被引:4
|
作者
Szumski, Oskar [1 ]
机构
[1] Univ Warsaw, Fac Management, Ul Szturmowa 3, PL-02678 Warsaw, Poland
来源
KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS (KES-2018) | 2018年 / 126卷
关键词
cyber security; cyberattacks; users opinions; awareness; password protection; password management; best practices; data breaches; cyber threat; privacy protection; cybersecuritycourses; knowledge about cybersecurity; DATA PROTECTION; PRIVACY;
D O I
10.1016/j.procs.2018.08.070
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The major purpose of this article is to analyze state of knowledge within the cybersecurity area accompanied with identification of behavior patterns represented by students (seen as future users and managers of modern technology). The research was divided into: source of knowledge used as so called cybersecurity best practices and password protection aspects. The research was performed using the CAWI method in February 2017. The process included following steps: prepared questionnaire was verified and validated by cybersecurity experts, after expert assessment questionnaire was placed at servers of Faculty of Management (University of Warsaw). The following structure was applied within the article: short introduction and literature review of the researched subject, definition of research conditions and thesis, and used research method, analysis and discussion of research fmdings, and the last part was dedicated to conclusions related to the research and cybersecurity awareness represented by respondents. Author used 3 working thesis to support the research that fully were proved by collected answers. The research showed that Internet and Friends and Colleagues are the leading sources of knowledge about cybersecurity within the examined group. Based on that author got an evidence that those practices are faulty and lead to wrong behavior patterns both in internet and password protection. It also showed that people indicate lacking of reliable sources of information about cybersecurity where professional training was treated marginally comparing to the leading sources of information. Received results indicate that either employer or university was not interested in promoting good behavior patterns nor the training was the target for respondents. And it can be a reason that users of modern technology put more trust in Internet than in qualified sources of knowledge. (C) 2018 The Authors. Published by Elsevier Ltd.
引用
收藏
页码:1271 / 1280
页数:10
相关论文
共 50 条
  • [41] Programs for students at risk best practices in Secondary Schools. A look from the experience
    Luzon, Antonio
    Porto, Monica
    Torres, Monica
    Ritacco, Maximiliano
    PROFESORADO-REVISTA DE CURRICULUM Y FORMACION DE PROFESORADO, 2009, 13 (03): : 217 - 238
  • [42] Educational best practices
    Stuart, GW
    Burland, J
    Ganju, V
    Levounis, P
    Kiosk, S
    ADMINISTRATION AND POLICY IN MENTAL HEALTH AND MENTAL HEALTH SERVICES RESEARCH, 2002, 29 (4-5) : 325 - 333
  • [43] Benchmarking and best practices
    Hill, C
    ASQ'S 54TH ANNUAL QUALITY CONGRESS PROCEEDINGS, 2000, : 715 - 717
  • [44] Awareness and practices of contraceptive use among university students in Botswana
    Hoque, M. E.
    Ntsipe, T.
    Mokgatle-Nthabu, M.
    SAHARA J-JOURNAL OF SOCIAL ASPECTS OF HIV-AIDS, 2013, 10 (02) : 83 - 88
  • [45] Educational Best Practices
    Gail W. Stuart
    Joyce Burland
    Vijay Ganju
    Petros Levounis
    Stephen Kiosk
    Administration and Policy in Mental Health and Mental Health Services Research, 2002, 29 : 325 - 333
  • [46] Cybersecurity Education and Awareness Among Parents and Teachers: A Survey of Bahrain
    Ayyash, Mohamed
    Alsboui, Tariq
    Alshaikh, Omar
    Inuwa-Dutse, Isa
    Khan, Saad
    Parkinson, Simon
    IEEE ACCESS, 2024, 12 : 86596 - 86617
  • [47] Developing a Best Practices Guide for the Prevention of Problem Gambling Among Older Adults
    Turner, Nigel E.
    Wiebe, Jamie
    Ferentzy, Peter
    Kauffman, Nadine
    Zaheer, Salaha
    Quosai, Trudy Smit
    Sztainert, Travis
    Murray, Robert
    Hamilton, Hayley
    Sanchez, Sherald
    Matheson, Flora
    McCready, John
    Mann, Robert E.
    JOURNAL OF GAMBLING ISSUES, 2018, (39): : 112 - 165
  • [48] Bug Bounty Programs for Cybersecurity: Practices, Issues, and Recommendations
    Malladi, Suresh S.
    Subramanian, Hemang C.
    IEEE SOFTWARE, 2020, 37 (01) : 31 - 39
  • [49] Cyber Security Awareness Among College Students
    Moallem, Abbas
    ADVANCES IN HUMAN FACTORS IN CYBERSECURITY, AHFE 2018, 2019, 782 : 79 - 87
  • [50] How Students Reason about Cybersecurity Concepts
    Scheponik, Travis
    Sherman, Alan T.
    DeLatte, David
    Phatak, Dhananjay
    Oliva, Linda
    Thompson, Julia
    Herman, Geoffrey L.
    2016 IEEE FRONTIERS IN EDUCATION CONFERENCE (FIE), 2016,