Cyberthreats Facing High School Students and Methods of Addressing them
-
Published:2022-10-28
Issue:2
Volume:5
Page:116-123
-
ISSN:1658-7790
-
Container-title:Journal of Information Security and Cybercrimes Research
-
language:
-
Short-container-title:JISCR
Author:
Abdullah Alghamdi Abdulrahman1
Affiliation:
1. Department of Computer Science, College of Computing and information Technology,Shaqra Universtiy
Abstract
In this work, we provide an overview of the most common risks and threats related to information technology faced by high school students in Saudi Arabia. In this context, this work starts from the concept that using information technology is the basis of contemporary life once it has penetrated and become part of our daily activities, which also makes us challenged by the threats and risks that result from these technologies. Thus, we have written and applied a questionnaire to groups of high school students in all provinces of Saudi Arabia. The study sample of high school students who participated and completed the questionnaire was 2,312, divided into 1,128 male and 1,184 female students. In addition, these students were randomly selected from all 13 administrative regions in KSA. Specifically, we have examined the risks and threats of secondary school students using information technology, along with methods for securing their use of it in terms of awareness, envisioning, and response. Our results indicate a necessity to raise the awareness level regarding information security and the risks that come along with the use of technology through school guidance and counseling programs. Finally, we suggest that holding informational meetings and strengthening the partnership between the school and the family can be an effective way of mitigating the risks directly caused by the unsupervised use of information technology.
Publisher
Naif Arab University for Security Sciences
Subject
Materials Chemistry,Economics and Econometrics,Media Technology,Forestry
Reference26 articles.
1. [1] G. Shaffer and J. Fernback, “Cell Phones, Security and Social Capital: Examining How Perceptions of Data Privacy Violations Among Cellostly Internet Users Impact Attitudes and Behavior.”,TPRC47: The 47th Research Conference on Comm., Information and Internet Policy, 2019 [Online]. Available: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3418726. 2. [2] [2] A. M. Rahmani, S. Bayramov, and B. K. Kalejahi, “Internet of Things Applications: Opportunities and Threats,” Wirel. Pers. Commun, vol. 122, no. 1, pp. 451–476, 2022. 3. [3] S. Monteith, M. Bauer, M. Alda, J. Geddes, P. C. Whybrow, and T. Glenn, “Increasing Cybercrime Since the Pandemic: Concerns for Psychiatry,” Curr. Psychiatry Rep, vol. 23, no. 4, pp. 1–9, 2021. 4. [4] Hootsuite, “Digital 2019: Essential Insights Into How People Around The World Use The Internet, Mobile Devices, Social Media, and E-ommerce,” We Are Social & Hootsuite, New York, 2019. [Online]. Available: https://wearesocial.com/global-digital-report-2019%0D Available: https://wearesocial.com/global-digital-report-2019\%0D. 5. [5] F. M. Dias, M. L. Martens, S. F. D. P. Monken, L. F. D. Silva, and E. D. R. Santibanez-Gonzalez, “Risk management focusing on the best practices of data security systems for healthcare,” Int. J. Innov, vol. 9, no. 1, pp. 45–78, 2021.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|