IDEAS home Printed from https://ideas.repec.org/a/taf/uipsxx/v8y2012i4p3-26.html
   My bibliography  Save this article

Students Information Security Practices and Awareness

Author

Listed:
  • Ludwig Slusky
  • Parviz Partow-Navid

Abstract

As cyber threats continue to grow at an exponential rate, the need for training in information security awareness spreads far beyond the Information Technology college curriculum. Information Security proliferates into various domains of knowledge and becomes more context-aware. Consequently, the training in information awareness at a college level must cater more specifically to students' practices. This paper presents the results of the Information Security survey conducted among students of the College of Business and Economics at California State University, Los Angeles in spring 2011. The survey revealed several characteristics of students' practices and their awareness of risks and countermeasures related to computer skills, mobile computing, loss and encryption of data, online social networking, awareness training, correlation between practice and awareness, and others. The survey also revealed that the major problem with security awareness is not due to a lack of security knowledge, but in the way the students apply that knowledge in real-world situations. Simply, the compliance with information security awareness is lower than the understanding of it. The findings discussed in this paper are provided to assist colleges in designing curriculum that includes more context-based Information Security training.

Suggested Citation

  • Ludwig Slusky & Parviz Partow-Navid, 2012. "Students Information Security Practices and Awareness," Journal of Information Privacy and Security, Taylor & Francis Journals, vol. 8(4), pages 3-26, October.
  • Handle: RePEc:taf:uipsxx:v:8:y:2012:i:4:p:3-26
    DOI: 10.1080/15536548.2012.10845664
    as

    Download full text from publisher

    File URL: http://hdl.handle.net/10.1080/15536548.2012.10845664
    Download Restriction: Access to full text is restricted to subscribers.

    File URL: https://libkey.io/10.1080/15536548.2012.10845664?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Guangxu Wang & Daniel Tse & Yuanshuo Cui & Hantao Jiang, 2022. "An Exploratory Study on Sustaining Cyber Security Protection through SETA Implementation," Sustainability, MDPI, vol. 14(14), pages 1-13, July.
    2. Somia Moh. T. L. Ashafee* & Nur Haryani Zakaria & Hatim Mohamad Tahir & Norliza Katuk & Mohd Nizam Omar, 2018. "Security Behaviors on Social Network Sites Used For Academic Purposes: A Comparison of Security Preparedness and Awareness among IT and Non-IT Postgraduate Students," The Journal of Social Sciences Research, Academic Research Publishing Group, pages 839-846:6.
    3. Saqib Saeed, 2023. "Education, Online Presence and Cybersecurity Implications: A Study of Information Security Practices of Computing Students in Saudi Arabia," Sustainability, MDPI, vol. 15(12), pages 1-15, June.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:taf:uipsxx:v:8:y:2012:i:4:p:3-26. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chris Longhurst (email available below). General contact details of provider: http://www.tandfonline.com/uips .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.