Advertisement

Cyber Security Awareness Among College Students

  • Abbas Moallem
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 782)

Abstract

This study reports the early results of a study aimed to investigate student awareness and attitudes toward cyber security and the resulting risks in the most advanced technology environment: the Silicon Valley in California, USA. The composition of students in Silicon Valley is very ethnically diverse. The objective was to see how much the students in such a tech-savvy environment are aware of cyber-attacks and how they protect themselves against them. The early statistical analysis suggested that college students, despite their belief that they are observed when using the Internet and that their data is not secure even on university systems, are not very aware of how to protect their data. Also, it appears that educational institutions do not have an active approach to improve awareness among college students to increase their knowledge on these issues and how to protect themselves from potential cyber-attacks, such as identity theft or ransomware.

Keywords

Cyber security Awareness Trust Privacy Cyber security user behavior Two-factor authentication 

References

  1. 1.
    White Gillian, N.: A Cybersecurity Breach at Equifax Left Pretty Much Everyone’s Financial Data Vulnerable (2017). The Atlantic. https://www.theatlantic.com/business/archive/2017/09/equifax-cybersecurity-breach/539178/. Accessed 7 Sept 2017
  2. 2.
    Cuthbertson, A.: Ransomware Attacks rise 250 percent in 2017, Hitting U.S. Hardest (2017). Newsweek. http://www.newsweek.com/ransomware-attacks-rise-250-2017-us-wannacry-614034. Accessed 28 Sept 2017
  3. 3.
    Reyns, W.B.: Stalking in the twilight zone: extent of cyberstalking victimization. J. Deviant Behav. 33(1) (2012). http://www.tandfonline.com/doi/abs/10.1080/01639625.2010.538364
  4. 4.
    Farzan, A.: College students are not as worried as they should be about the threat of identity theft (2015). Business Insider. http://www.businessinsider.com/students-identity-theft-2015-6. Accessed 9 June 2015
  5. 5.
    Dakss B.: College Students Prime Target for ID Theft (2007). CBS News. https://www.cbsnews.com/news/college-students-prime-target-for-id-theft/. Accessed 21 Aug 2007
  6. 6.
    Slusky, L., Partow-Navid, P.: Students information security practices and awareness. J. Inf. Priv. Secur. 3–26 (2014). http://www.tandfonline.com/doi/abs/10.1080/15536548.2012.10845664. Published 7 July 2014CrossRefGoogle Scholar
  7. 7.
    Al-Janabi, S., Al-Shourbaji, I.: A study of cyber security awareness in educational environment in the middle east. Inf. Knowl. Manag. 15 (2016). Article No. 1650007, 30 pages.  https://doi.org/10.1142/S0219649216500076
  8. 8.
    Senthilkumar, K., Easwaramoorthy, S.: A survey on cyber security awareness among college students in Tamil Nadu. In: IOP Conference Series: Materials Science and Engineering. Computation and Information Technology, vol. 263 (2017)CrossRefGoogle Scholar
  9. 9.
    Grainne, H., et al.: Factors for social networking site scam victimization among Malaysian students. Cyberpsychol. Behav. Soc. Netw. (2017).  https://doi.org/10.1089/cyber.2016.0714
  10. 10.
    SJSU, Institutional Effectiveness and Analytics. http://www.iea.sjsu.edu/Students/QuickFacts/default.cfm?version=graphic. Accessed Nov. 2007
  11. 11.
    Schwartz, J.: Report: 7 in 10 Employees Struggle with Cyber Awareness (2017). https://www.mediapro.com/blog/2017-state-privacy-security-awareness-report/
  12. 12.
    OECD: OECD Guidelines for the Security of Information Systems and Networks: Towards a Culture of Security, European Union Agency for Network and Information Security (2002). https://www.enisa.europa.eu/topics/threat-risk-management/risk-management/current-risk/laws-regulation/corporate-governance/oecd-guidelines. Accessed 25 July 2002
  13. 13.
    Moallem, A.: Do you really trust “Privacy Policy” or “Terms of Use” agreements without reading them? In: Nicholson, D. (ed.) Advances in Human Factors in Cybersecurity, pp. 290–295. Springer, Cham (2017)Google Scholar
  14. 14.
    Haggerty, J., et al.: Hobson’s choice: security and privacy permissions in Android and iOS devices. In: Tryfonas, T., Askoxylakis, I. (eds.) Human Aspects of Information Security, Privacy, and Trust. Springer, Cham (2015)Google Scholar
  15. 15.
    Govani, T., Pashley, H.: Student Awareness of the Privacy Implications When Using Facebook (2009). http://lorrie.cranor.org/courses/fa05/tubzhlp.pdf
  16. 16.
    Jan Boehmer, J., et al.: Determinants of online safety behaviour: towards an intervention strategy for college students. J. Behav. Inf. Technol. 34(10), 1022–1035 (2015). https://scholars.opb.msu.edu/en/publications/determinants-of-online-safety-behaviour-towards-an-intervention-s-3CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2019

Authors and Affiliations

  1. 1.UX Experts, LLCCupertinoUSA
  2. 2.San Jose State UniversitySan JoseUSA

Personalised recommendations