Affiliation:
1. Technology and Information Security Department, Jazan University, Jazan 82817, Saudi Arabia
2. Technical and Vocational Training Corporation, Bisha College, Bisha 67714, Saudi Arabia
3. Information Systems Department, King Khalid University, Abha 62529, Saudi Arabia
Abstract
People are the weakest link in the cybersecurity chain when viewed in the context of technological advancement. People become vulnerable to trickery through contemporary technical developments such as social media platforms. Information accessibility and flow have increased rapidly and effectively; however, due to this increase, new electronic risks, or so-called cybercrime, such as phishing, scams, and hacking, lead to privacy breaches and hardware sabotage. Therefore, ensuring data privacy is vital, particularly in an educational institute where students constitute the large majority of users. Students or trainees violate cybersecurity policies due to their lack of awareness about the cybersecurity environment and the consequences of cybercrime. This paper aims to assess the level of awareness of cybersecurity, users’ activities, and user responses to cybersecurity issues. This paper collected data based on a distributed questionnaire among trainees in the Technical and Vocational Training Corporation (TVTC) to demonstrate the necessity of increasing user awareness and training. In this study, quantitative research techniques were utilized to analyze the responses from trainees using tests such as the Chi-Squared test. Proof of the reliability of the survey was provided using Cronbach’s alpha test. This research identifies the deficiencies in cybersecurity awareness among TVTC trainees. After analyzing the gathered data, recommendations for tackling these shortcomings were offered, with the aim of enhancing trainees’ decision-making skills regarding privacy and security using the Nudge model.
Funder
Deanship of Scientific Research at King Khalid University
Subject
Artificial Intelligence,Computer Science Applications,Information Systems,Management Information Systems
Reference49 articles.
1. A survey of emerging threats in cybersecurity;Nepal;J. Comput. Syst. Sci.,2014
2. Reis, J., Amorim, M., Melão, N., and Matos, P. Digital transformation: A literature review and guidelines for future research. Proceedings of the World Conference on Information Systems and Technologies.
3. Alharbi, T., and Tassaddiq, A. (2021). Assessment of cybersecurity awareness among students of Majmaah University. Big Data Cogn. Comput., 5.
4. Nudges for privacy and security: Understanding and assisting users’ choices online;Acquisti;ACM Comput. Surv. (CSUR),2017
5. An automatic mechanism to provide privacy awareness and control over unwittingly dissemination of online private information;Guarino;Comput. Netw.,2022
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献