Skip to main content

Information Security Education and Self-perception of Privacy Protection Risk in Mobile Web in Obstetrics Students from Peru

  • Conference paper
  • First Online:
Mobile Web and Intelligent Information Systems (MobiWIS 2021)

Abstract

The objective of the study was to determine the information security education topics developed in the training of obstetrics students and their relationship with the self-perception of privacy protection risk in mobile web during the COVID-19 pandemic at the Santiago Antúnez of Mayolo National University (UNASAM) (Huaraz-Peru). A correlational cross-sectional investigation was developed, with 164 obstetric students. The information was collected through a questionnaire applied online between November and December 2020, having determined its validity and reliability. The Chi squared statistical test (p < 0.05) was used, while the information processing was carried out using the SPSS program. It was determined that 61.6% of obstetric students perceived a high risk in the protection of their privacy in mobile web during the development of their activities in the academic cycle 2020-I. Likewise, it was evidenced that the majority of students stated that they had not developed the topics consulted with regard to information security education during their virtual studies in obstetric, especially with regard to the recommendations for the use of passwords (83.5%), privacy protection strategies (81.1%) and data management through the creation of backups (79.9%), showing a statistically significant relationship with the self-perception of privacy protection risk in mobile web (p < 0.05). It was concluded that the low development of information security education topics in the training of obstetric students is related to the self-perception of high risk in the privacy protection in mobile web during the COVID-19 pandemic.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Trabelsi, Z., Zeidan, S., Saleous, H.: Teaching emerging DDoS attacks on firewalls: a case study of the blacknurse attack. In: 2019 IEEE Global Engineering Education Conference (EDUCON), Dubai, pp. 977–985. IEEE (2019). https://doi.org/10.1109/EDUCON.2019.8725133

  2. Guan, S., Zhang, H., Cao, G., Wang, X., Han, X.: The practice of the college students’ network security quality education. In: Deng, K., Yu, Z., Patnaik, S., Wang, J. (eds.) ICMIR 2018. AISC, vol. 856, pp. 110–114. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-00214-5_14

    Chapter  Google Scholar 

  3. Wang, S., Qu, Y., Zheng, L., Xiao, Y., Shi, H.: Exploration of information security education of university students. In: Xhafa, F., Patnaik, S., Zomaya, A.Y. (eds.) IISA 2017. AISC, vol. 686, pp. 476–480. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-69096-4_66

    Chapter  Google Scholar 

  4. Løvgren, D., Li, J., Oyetoyan, T.: A data-driven security game to facilitate information security education. In: 2019 IEEE/ACM 41st International Conference on Software Engineering: Companion Proceedings (ICSE-Companion), Montreal, pp. 256–257. IEEE (2019). https://doi.org/10.1109/ICSE-Companion.2019.00102

  5. Lin, K.-Y.: Application of a blended assessment strategy to enhance student interest and effectiveness in learning: case study with information security literacy. Comput. Inform. Nurs. 38(10), 508–514 (2020). https://doi.org/10.1097/CIN.0000000000000665

    Article  Google Scholar 

  6. Park, E., Kim, J., Wile, L., Park, Y.: Factors affecting intention to disclose patients’ health information. Comput. Secur. 87, 101340 (2019). https://doi.org/10.1016/j.cose.2018.05.003

    Article  Google Scholar 

  7. Adawiyah, R., Hidayanto, A., Chandra, I., Samik, R.: Identification of how health information security awareness (HISA) influence in patient’ health information protection awareness (PHIPA). In: 2019 5th International Conference on Computing Engineering and Design (ICCED), Singapore, pp. 1–6. IEEE (2019). https://doi.org/10.1109/ICCED46541.2019.9161123

  8. Song, Y., et al.: Revision of the measurement tool for patients’ health information protection awareness. Healthc. Inf. Res. 22(3), 206–216 (2016). https://doi.org/10.4258/hir.2016.22.3.206

    Article  Google Scholar 

  9. Kumar, R., et al.: Fuzzy-based symmetrical multi-criteria decision-making procedure for evaluating the impact of harmful factors of healthcare information security. Symmetry 12(4), 664 (2020). https://doi.org/10.3390/SYM12040664

    Article  Google Scholar 

  10. Park, E., Kim, J., Park, Y.: The role of information security learning. Comput. Secur. 65, 64–76 (2017). https://doi.org/10.1016/j.cose.2016.10.011

    Article  Google Scholar 

  11. Espíritu, W., Machuca, C., Subauste, D.: Reference model for health data security management supported in a blockchain platform. In: VI Iberoamerican Conference of Computer Human Interaction, HCI 2020, Arequipa, pp. 185–193. CEUR-WS (2020)

    Google Scholar 

  12. Instituto Nacional de Estadística e Informática: Encuesta nacional de hogares. INEI, Lima (2018)

    Google Scholar 

  13. World Medical Association. Declaration of Helsinki – Ethical principles for medical research involving human subjects. https://www.wma.net/policies-post/wma-declaration-of-helsinki-ethical-principles-for-medical-research-involving-human-subjects/. Accessed 9 Jan 2021

  14. Song, O., Connie, T., Sayeed, M.: Security and Authentication: Perspectives, Management and Challenges. Nova Science Publishers Inc., Melaka (2017)

    Google Scholar 

  15. Qian, J.: Practice path and security mechanism of “Internet + Education” in the era of artificial intelligence. In: Atiquzzaman, M., Yen, N., Zheng, Xu. (eds.) Big Data Analytics for Cyber-Physical System in Smart City: BDCPS 2020, 28–29 December 2020, Shanghai, China, pp. 1002–1011. Springer, Singapore (2021). https://doi.org/10.1007/978-981-33-4572-0_144

    Chapter  Google Scholar 

  16. Maserat, E., Jafari, F., Mohammadzadeh, Z., Alizadeh, M., Torkamannia, A.: COVID-19 & an NGO and university developed interactive portal: a perspective from Iran. Heal. Technol. 10(6), 1421–1426 (2020). https://doi.org/10.1007/s12553-020-00470-1

    Article  Google Scholar 

  17. Cha, K., Song, Y.: Factors associated with practice of health information protection among nursing students. J. Korean Acad. Fundam. Nurs. 27(1), 73–80 (2020). https://doi.org/10.7739/jkafn.2020.27.1.73

    Article  Google Scholar 

  18. Bocharov, M., Simonova, I., Mogarov, M.: The effect of systematically teaching information security on the children’s anxiety level. Perspektivy Nauki i Obrazovania 40(4), 169–182 (2019). https://doi.org/10.32744/pse.2019.4.14

    Article  Google Scholar 

  19. Bocharov, M., Simonova, I., Bocharova, T., Zaika, A.: Information security education system in secondary school and assessment of the level of anxiety of schoolchildren. In: 17th International Conference on Cognition and Exploratory Learning in Digital Age, CELDA 2020, Lisbon, pp. 11–18. IADIS Press (2020)

    Google Scholar 

  20. Hanyu, L.: Research on data confidentiality and security of computer network password. J. Phys. Conf. Ser. 1648, 022078 (2020). https://doi.org/10.1088/1742-6596/1648/2/022078

  21. He, S., Fu, J., Chen, C., Guo, Z.: Research on password cracking technology based on improved transformer. J. Phys. Conf. Ser. 1631, 012161 (2020). https://doi.org/10.1088/1742-6596/1631/1/012161

  22. Walia, K., Shenoy, S., Cheng, Y.: An empirical analysis on the usability and security of passwords. In: 2020 IEEE 21st International Conference on Information Reuse and Integration for Data Science (IRI), Las Vegas, pp. 1–8. IEEE (2020). https://doi.org/10.1109/IRI49571.2020.00009

  23. Zhang, J., Li, W., Gong, L., Gu, Z., Wu, J.: Targeted malicious email detection using hypervisor-based dynamic analysis and ensemble learning. In: 2019 IEEE Global Communications Conference (GLOBECOM), Waikoloa, pp. 1–6. IEEE (2019). https://doi.org/10.1109/GLOBECOM38437.2019.9014069

  24. Suresh, S., Mohan, M., Thyagarajan, C., Kedar, R.: Detection of ransomware in emails through anomaly based detection. In: Hemanth, D.J., Kumar, V.D.A., Malathi, S., Castillo, O., Patrut, B. (eds.) COMET 2019. LNDECT, vol. 35, pp. 604–613. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-32150-5_59

    Chapter  Google Scholar 

  25. Liginlal, D.: HIPAA and human error: the role of enhanced situation awareness in protecting health information. In: Gkoulalas-Divanis, A., Loukides, G. (eds.) Medical Data Privacy Handbook, pp. 679–696. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-23633-9_25

    Chapter  Google Scholar 

  26. Mohamed, A., Chen, L.: Data privacy protection: a study on students awareness of personal data privacy protection in an e-health environment. Adv. Sci. Lett. 23(6), 5299–5303 (2017). https://doi.org/10.1166/asl.2017.7363

    Article  Google Scholar 

  27. Peng, Z., Feng, X., Tang, L., Zhai, M.: A data recovery method for NTFS files system. In: Niu, W., et al. (eds.) ATIS 2015. CCIS, vol. 557, pp. 379–386. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-48683-2_34

    Chapter  Google Scholar 

  28. Gaidamakin, N., Gibilinda, R., Sinadskiy, N.: File operations information collecting software package used in the information security incidents investigation. In: 2020 Ural Symposium on Biomedical Engineering, Radioelectronics and Information Technology (USBEREIT), Yekaterinburg, pp. 559–562. IEEE (2020). https://doi.org/10.1109/USBEREIT48449.2020.9117671.

  29. Chen, Y., Wen, C.: Taiwanese university students’ smartphone use and the privacy paradox. Comunicar 27(60), 61–70 (2019). https://doi.org/10.3916/C60-2019-06

    Article  Google Scholar 

  30. Dogruel, L., Jöckel, S.: Risk perception and privacy regulation preferences from a cross-cultural perspective. A qualitative study among German and U.S. smartphone users. Int. J. Commun. 13, 1764–1783 (2019)

    Google Scholar 

  31. Bai, Y., Gao, C., Goda, B.: Lessons learned from teaching cybersecurity courses during Covid-19. In: Proceedings of the 21st Annual Conference on Information Technology Education, SIGITE 2020, New York, pp. 308–313. Association for Computing Machinery (2020). https://doi.org/10.1145/3368308.3415394

  32. Parthasarathy, S., Murugesan, S.: Overnight transformation to online education due to the COVID-19 pandemic: lessons learned. eLearn 9(1) (2020). https://doi.org/10.1145/3424971.3421471

Download references

Acknowledgements

Our most sincere thanks to the obstetrics students of UNASAM, for their collaboration in the development of this study, as well as to the authorities of the research units of UNASAM, for their support in the corresponding administrative process.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Augusto Felix Olaza-Maguiña .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Olaza-Maguiña, A.F., De La Cruz-Ramirez, Y.M. (2021). Information Security Education and Self-perception of Privacy Protection Risk in Mobile Web in Obstetrics Students from Peru. In: Bentahar, J., Awan, I., Younas, M., Grønli, TM. (eds) Mobile Web and Intelligent Information Systems. MobiWIS 2021. Lecture Notes in Computer Science(), vol 12814. Springer, Cham. https://doi.org/10.1007/978-3-030-83164-6_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-83164-6_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-83163-9

  • Online ISBN: 978-3-030-83164-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics