Cyberthreats Facing High School Students and Methods of Addressing them

Author:

Abdullah Alghamdi Abdulrahman1

Affiliation:

1. Department of Computer Science, College of Computing and information Technology,Shaqra Universtiy

Abstract

In this work, we provide an overview of the most common risks and threats related to information technology faced by high school students in Saudi Arabia. In this context, this work starts from the concept that using information technology is the basis of contemporary life once it has penetrated and become part of our daily activities, which also makes us challenged by the threats and risks that result from these technologies. Thus, we have written and applied a questionnaire to groups of high school students in all provinces of Saudi Arabia. The study sample of high school students who participated and completed the questionnaire was 2,312, divided into 1,128 male and 1,184 female students. In addition, these students were randomly selected from all 13 administrative regions in KSA. Specifically, we have examined the risks and threats of secondary school students using information technology, along with methods for securing their use of it in terms of awareness, envisioning, and response. Our results indicate a necessity to raise the awareness level regarding information security and the risks that come along with the use of technology through school guidance and counseling programs. Finally, we suggest that holding informational meetings and strengthening the partnership between the school and the family can be an effective way of mitigating the risks directly caused by the unsupervised use of information technology.

Publisher

Naif Arab University for Security Sciences

Subject

Materials Chemistry,Economics and Econometrics,Media Technology,Forestry

Reference26 articles.

1. [1] G. Shaffer and J. Fernback, “Cell Phones, Security and Social Capital: Examining How Perceptions of Data Privacy Violations Among Cellostly Internet Users Impact Attitudes and Behavior.”,TPRC47: The 47th Research Conference on Comm., Information and Internet Policy, 2019 [Online]. Available: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3418726.

2. [2] [2] A. M. Rahmani, S. Bayramov, and B. K. Kalejahi, “Internet of Things Applications: Opportunities and Threats,” Wirel. Pers. Commun, vol. 122, no. 1, pp. 451–476, 2022.

3. [3] S. Monteith, M. Bauer, M. Alda, J. Geddes, P. C. Whybrow, and T. Glenn, “Increasing Cybercrime Since the Pandemic: Concerns for Psychiatry,” Curr. Psychiatry Rep, vol. 23, no. 4, pp. 1–9, 2021.

4. [4] Hootsuite, “Digital 2019: Essential Insights Into How People Around The World Use The Internet, Mobile Devices, Social Media, and E-ommerce,” We Are Social & Hootsuite, New York, 2019. [Online]. Available: https://wearesocial.com/global-digital-report-2019%0D Available: https://wearesocial.com/global-digital-report-2019\%0D.

5. [5] F. M. Dias, M. L. Martens, S. F. D. P. Monken, L. F. D. Silva, and E. D. R. Santibanez-Gonzalez, “Risk management focusing on the best practices of data security systems for healthcare,” Int. J. Innov, vol. 9, no. 1, pp. 45–78, 2021.

Cited by 1 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3