The frequency, intensity and repercussions of information security breaches in higher education has prompted colleges and universities around the world to devote more resources to enhance technical and human controls capabilities. Research has repeatedly found that technical solutions to cybercrime are insufficient in preventing incidents. The present analysis utilizes the Health Belief Model (HBM) to explain users' computer security behavior by replicating an earlier research study. The study, however, applies the HBM model to a new context, higher education, and college students serve as the sample for this research. A validated questionnaire was employed to collect responses from 263 students attending a public state Midwestern university in the United States. Multiple Linear Regression mathematical analysis was conducted on the dataset collected to measure constructs of the information security of college students. Findings of this research suggest that perceived susceptibility, perceived benefits and self-efficacy are good determinants of information security behavior for college students at least on the sample observations. Further, the analysis supported the moderating logic of perceived severity on the effects of susceptibility, benefits, general security orientation, self-efficacy and cues to action. Findings of this research call upon higher education security administrators to enact more effective awareness and training programs based on real-work security incidents simulations and incorporating information security into the general education curricula.
Issues on Management and Governance of Data Security In HEIsijtsrd
"In higher education, Governance of data security is the data management mechanism that has to be practiced. This is an appropriate management model for the employees in the higher education institution that will understand the role to be played to secure more highly confidential data. This paper aims at issues on management and governance of data security in Higher education institutions HEIs . This will conclude on identifying the factors affecting governance of data security in private higher education system. It also enables to discover the issues in the management and provide appropriate solution for the governance of data security in the HEIs. A research model with factors was proposed for data security governance practice in HEIs. From the research findings, a governance model was derived and proposed for the all new HEIs. Janet Gabriel | Sheik Mohideen Abdul Latheef | Veluswamy Jayavardhanavelu ""Issues on Management and Governance of Data Security In HEIs"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Special Issue | International Conference on Advanced Engineering and Information Technology , November 2018, URL: https://www.ijtsrd.com/papers/ijtsrd19151.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/19151/issues-on-management-and-governance-of-data-security-in-heis/janet-gabriel"
Ics 3210 information systems security and audit - editedNelson Kimathi
This document provides a literature review of information systems security techniques from both technical and non-technical perspectives. It discusses four main approaches: functionalist, interpretivist, radical humanist, and radical structuralist. The functionalist view focuses on security policies, the interpretivist view examines the human and social aspects, the radical humanist view considers how security impacts employee development, and the radical structuralist view analyzes how security measures can create tensions. The document concludes that future research should integrate both the technical and socio-organizational characteristics of information security to develop more effective security planning and management.
Understanding User’s Acceptance of Personal Cloud Computing: Using the Techno...Maurice Dawson
Personal Cloud Computing (PCC) is a rapidly growing technology, addressing the market demand of individual users for access to available and reliable resources. But like other new technologies, concerns and issues have surfaced with the adoption of PCC. Users deciding whether to adopt PCC may be concerned about the ease of use, usefulness, or security risks in the cloud. Negative attitudes toward using a technology have been found to negatively impact the success of that technology. The purpose of this study was to understand users’ acceptance of PCC. The population sample consisted of individual users within the United States between 18 and 80 years of age. The theoretical framework utilized in this study was based on the technology acceptance model (TAM). A web survey was conducted to assess the measurement and understanding of patterns demonstrated by participants. Our results shows that in spite of the potential benefits of PCC, security and privacy risks are deterring many users from moving towards PCC.
The document discusses opportunities for collaboration between the University of Virginia School of Data Science (SDS) and NASA. It provides an overview of SDS, including its mission to be a leader in responsible data science through interdisciplinary collaboration and societal benefit. Examples are given of current SDS research projects involving NASA data on climate change and forest ecosystems. The document proposes areas for potential SDS-NASA collaboration such as courses involving NASA content, funded research projects, student fellowships and faculty positions. It aims to leverage the strengths of both organizations in responsible data science.
An Inquiry on the Self-Esteem and Self-Efficacy Level of Information Technolo...IJAEMSJORNAL
This study aimed to identify, analyze and determine the level of self-efficacy and self-esteem of B.S. Information Technology (BSIT) students of a higher learning institution in Nueva Ecija, Philippines. It was conducted during the 1st Semester of the academic year 2019-2020. This research utilized descriptive approach to describe the level of self-esteem and self-efficacy of the students and to draw valuable insights that may contribute to the improvement of the teaching and learning practices of the faculty members in the college. The researchers used random sampling to ensure that all year levels are well represented in the study. There were 285 students who voluntarily responded after the researchers explained to them the purpose of this study. Responses were tallied, summarized and interpreted. Results show that the level of self-esteem and self-efficacy of the students were moderate/medium (WM=2.03, WM=2.08). This indicates that depending on the given situation or context, students may increase or decrease the level of their self-esteem and self-efficacy. This study suggest that students may be exposed to more activities that may help them improve their self-esteem and self-efficacy to greatly contribute to their holistic development. Future studies may be conducted to a larger number of respondents and to understand the link between self-efficacy and self-esteem on their academic performance, drop-out rates, and retention rates.
This document describes a study that used a simplified sociotechnical model to assess patient safety across eight clinical units. The model included three domains - culture, process, and technology. Application of the model uncovered several key health IT safety risks at the front lines of care. These included issues with usability, training, and centralized decision-making around health IT. The study demonstrated that a simplified sociotechnical framework can effectively assess patient safety and health IT risks from the perspective of frontline caregivers.
The document discusses the University of Virginia School of Data Science (SDS) and opportunities for collaboration with NASA. It provides an overview of SDS, including its mission to be a leader in responsible data science through interdisciplinary collaboration. It describes SDS's data science framework, research areas, capabilities, and recent growth. Examples of current research projects involving NASA data on environmental monitoring and forest ecosystems are presented. The document promotes further partnership between SDS and NASA on challenges in science, medicine, and other domains.
A Model of Decision Support System for Research Topic Selection and Plagiaris...theijes
The paper proposes a model of the decision support system for deciding a research topic in academia. The biggest challenge for a student in the field of research is to identify area and topic of research. The paper explains the model which helps student to identify the most suitable area and/or topic for academic research. The model is also design to assist supervisors to explore latest areas of research as well as to get rid of non intentional plagiarism. The model facilitates the user to select either keyword bases topic search or questionnaire based topic search. The model uses local database and service of a Meta search engine in decision making activity
Issues on Management and Governance of Data Security In HEIsijtsrd
"In higher education, Governance of data security is the data management mechanism that has to be practiced. This is an appropriate management model for the employees in the higher education institution that will understand the role to be played to secure more highly confidential data. This paper aims at issues on management and governance of data security in Higher education institutions HEIs . This will conclude on identifying the factors affecting governance of data security in private higher education system. It also enables to discover the issues in the management and provide appropriate solution for the governance of data security in the HEIs. A research model with factors was proposed for data security governance practice in HEIs. From the research findings, a governance model was derived and proposed for the all new HEIs. Janet Gabriel | Sheik Mohideen Abdul Latheef | Veluswamy Jayavardhanavelu ""Issues on Management and Governance of Data Security In HEIs"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Special Issue | International Conference on Advanced Engineering and Information Technology , November 2018, URL: https://www.ijtsrd.com/papers/ijtsrd19151.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/19151/issues-on-management-and-governance-of-data-security-in-heis/janet-gabriel"
Ics 3210 information systems security and audit - editedNelson Kimathi
This document provides a literature review of information systems security techniques from both technical and non-technical perspectives. It discusses four main approaches: functionalist, interpretivist, radical humanist, and radical structuralist. The functionalist view focuses on security policies, the interpretivist view examines the human and social aspects, the radical humanist view considers how security impacts employee development, and the radical structuralist view analyzes how security measures can create tensions. The document concludes that future research should integrate both the technical and socio-organizational characteristics of information security to develop more effective security planning and management.
Understanding User’s Acceptance of Personal Cloud Computing: Using the Techno...Maurice Dawson
Personal Cloud Computing (PCC) is a rapidly growing technology, addressing the market demand of individual users for access to available and reliable resources. But like other new technologies, concerns and issues have surfaced with the adoption of PCC. Users deciding whether to adopt PCC may be concerned about the ease of use, usefulness, or security risks in the cloud. Negative attitudes toward using a technology have been found to negatively impact the success of that technology. The purpose of this study was to understand users’ acceptance of PCC. The population sample consisted of individual users within the United States between 18 and 80 years of age. The theoretical framework utilized in this study was based on the technology acceptance model (TAM). A web survey was conducted to assess the measurement and understanding of patterns demonstrated by participants. Our results shows that in spite of the potential benefits of PCC, security and privacy risks are deterring many users from moving towards PCC.
The document discusses opportunities for collaboration between the University of Virginia School of Data Science (SDS) and NASA. It provides an overview of SDS, including its mission to be a leader in responsible data science through interdisciplinary collaboration and societal benefit. Examples are given of current SDS research projects involving NASA data on climate change and forest ecosystems. The document proposes areas for potential SDS-NASA collaboration such as courses involving NASA content, funded research projects, student fellowships and faculty positions. It aims to leverage the strengths of both organizations in responsible data science.
An Inquiry on the Self-Esteem and Self-Efficacy Level of Information Technolo...IJAEMSJORNAL
This study aimed to identify, analyze and determine the level of self-efficacy and self-esteem of B.S. Information Technology (BSIT) students of a higher learning institution in Nueva Ecija, Philippines. It was conducted during the 1st Semester of the academic year 2019-2020. This research utilized descriptive approach to describe the level of self-esteem and self-efficacy of the students and to draw valuable insights that may contribute to the improvement of the teaching and learning practices of the faculty members in the college. The researchers used random sampling to ensure that all year levels are well represented in the study. There were 285 students who voluntarily responded after the researchers explained to them the purpose of this study. Responses were tallied, summarized and interpreted. Results show that the level of self-esteem and self-efficacy of the students were moderate/medium (WM=2.03, WM=2.08). This indicates that depending on the given situation or context, students may increase or decrease the level of their self-esteem and self-efficacy. This study suggest that students may be exposed to more activities that may help them improve their self-esteem and self-efficacy to greatly contribute to their holistic development. Future studies may be conducted to a larger number of respondents and to understand the link between self-efficacy and self-esteem on their academic performance, drop-out rates, and retention rates.
This document describes a study that used a simplified sociotechnical model to assess patient safety across eight clinical units. The model included three domains - culture, process, and technology. Application of the model uncovered several key health IT safety risks at the front lines of care. These included issues with usability, training, and centralized decision-making around health IT. The study demonstrated that a simplified sociotechnical framework can effectively assess patient safety and health IT risks from the perspective of frontline caregivers.
The document discusses the University of Virginia School of Data Science (SDS) and opportunities for collaboration with NASA. It provides an overview of SDS, including its mission to be a leader in responsible data science through interdisciplinary collaboration. It describes SDS's data science framework, research areas, capabilities, and recent growth. Examples of current research projects involving NASA data on environmental monitoring and forest ecosystems are presented. The document promotes further partnership between SDS and NASA on challenges in science, medicine, and other domains.
A Model of Decision Support System for Research Topic Selection and Plagiaris...theijes
The paper proposes a model of the decision support system for deciding a research topic in academia. The biggest challenge for a student in the field of research is to identify area and topic of research. The paper explains the model which helps student to identify the most suitable area and/or topic for academic research. The model is also design to assist supervisors to explore latest areas of research as well as to get rid of non intentional plagiarism. The model facilitates the user to select either keyword bases topic search or questionnaire based topic search. The model uses local database and service of a Meta search engine in decision making activity
Technological Factors Affecting Computer Aided Learning Among Students Attend...AJHSSR Journal
Computer Assisted Learning (CAL) is a method of acquiring knowledge using electronic media which is gained using electronic media which is gaining recognition among students. This requires access to computers and considerable awareness on information technology. Previous empirical studies have underscored the important roles of instructional materials in the classroom studies. The objective of this study was to determine technological factors affecting computer aided learning programs among students attending Kenya Medical Training College, Nairobi campus. This study was an analytical study, the target population was 4,490 KMTC Nairobi Campus students. The study utilized structured questionnaires for 263 respondents, analysis was done through SPSS, Ms Excel and Ms Word software’s with univariate
This document proposes using text analytics and the RapidMiner data analytics tool to analyze student data from an online learning environment to predict students' interests in various subject areas. It discusses limitations in current approaches and the need to more accurately understand student interests to refine educational offerings. The proposed approach would collect student data through the UTS online platform and use text analytics and RapidMiner to identify patterns in students' discussions that indicate their interests in different topics. This could help university authorities better tailor course content based on predicted student demand.
An EHealth Adoption Framework for Developing Countries: A Systematic Reviewhiij
This document provides a summary of a systematic literature review conducted to establish factors for developing an eHealth adoption framework for developing countries. The review analyzed 29 papers published between 2009-2021 on eHealth adoption frameworks in developing nations. The most commonly used frameworks were TAM, UTAUT, and TOE, but additional factors were identified. Based on the findings, the researchers derived a novel 8-dimension eHealth adoption framework for developing countries including socio-demographic, technology, information, socio-cultural, organization, governance, ethical/legal, and financial dimensions. Key factors identified included perceived usefulness/ease of use, cultural dimensions, organizational fit, reinforcement, age/education, financial support, and policy/regulatory
A content analysis of the emerging research on academic cyberloafingZizo Aku
Despite the diverse opportunities digital technologies offer that enhance learning and improve instructional practice, the main challenge faced by many institutions is the distracting effects of hyper-connectivity caused by mobile devices during learning activities. Some students find it difficult to balance online leisure activity with school work because of the guilty pleasures associated with using certain types of media. The failure of college students to reduce distractions from academic cyberloafing could negatively impact their achievement of academic success. This scholarly paper is designed to explore how contemporary research has investigated this emerging phenomenon to better understand important strategies for control.
This document is an annotated bibliography for an educational technology paper exploring the relationship between educational technology and inquiry-based learning. It summarizes 10 research articles that will be used to support three main arguments: 1) the role of educational technology in facilitating inquiry-based learning across contexts, 2) the role of inquiry-based learning and technology in science programs, and 3) inquiry-based learning using web-based technology. The annotations provide highlights of each article's relevance, supporting evidence and data, author credentials, date of publication, and reading level.
Technology Acceptance Model for Mobile Health SystemsIOSR Journals
Abstract: The purpose of this paper is to explore the factors that influence health-related consumer’s
acceptance to use the mobile technology as a tool for receiving healthcare services. Based on technology
acceptance model (TAM), this paper provides a better understanding of antecedent of key acceptance constructs
(e.g. intention to use, perceived usefulness, perceived ease of use). The proposed research model and hypotheses
validated and tested with data collected from 302 Egyptians and Yemenis patients, health professionals, and
general health users. The results are analyzed using a number of statistical techniques including partial least
squares. The key findings obtaining from the results of the three surveyed stakeholders reveal that: (1) ninety
percent are indented to use mobile health services. (2) While intention to use has greatly influenced by
perceived usefulness, the impact of perceived ease of use varies. (3) Perceived value, perceived ease of use and
portability factors are significantly affect perceived usefulness. (4) Self-efficacy and technology anxiety have a
great impact on perceived ease of use. (5) The impact of the rest of the suggested factors ranged from medium,
low, and insignificant. The research made an in-depth exploration and examination of the factors that influence
user’s intention to use mobile health services focusing on technological, cultural, organizational, political, and
social aspects whereas most of the previous studies considered only one or two aspects together. The proposed
model can be applied to assess mobile health user’s acceptance, thereby help mobile health developers and
providers to develop better mobile health applications that meet the needs of the potential users.
Keywords: Intention to use, Mobile health, portability, Resistance to change, Technology anxiety, Technology
acceptance model
Knowledge, social media and technologies for a learning societywanzahirah
The document summarizes several papers presented in a special issue of the journal Transactions of the SDPS on the topics of knowledge, social media, and technologies for learning. The papers explore how new technologies and social media are changing learning and discuss approaches like using smartphones and scaffolding tools to enhance the learning process. They also address challenges in recommending learning resources and the role of collective intelligence in driving innovation. The goal of the special issue is to look at the future of education from a transdisciplinary perspective.
The effect of information and communication technology (ICT) in Jordanian lea...IJERA Editor
Information and communication Technology are used of electronic means which involve access storage, processing of electronic technology to handling of information, the various forms of uses it’s in order to improve Jordanian learning. The study aimed to investigate the uses and effect of ICTs for Jordanian learning from their perspective of student of higher school at the north of Jordan. The study method was a descriptive survey which uses questionnaire to collect data, questionnaire was justified and developed by the researcher to measure the effect of ICTs based on previous studies its applied to (548) student of higher school. The study was using SPSS to analyses data. The results indicate that ICTs for higher school at the north of Jordan there were a statistically significant relationship between the higher school at the north of Jordan and Jordanian learning, and seven of hypotheses reported statistically significant in the hypotheses and accepted but three hypotheses reported no a statistically significant and rejected. The study have Conclusion should gives more attention to focus on and beneficial of using ICTs applications.
IRJET- Clinical Medical Knowledge Extraction using Crowdsourcing TechniquesIRJET Journal
This document proposes a system to extract medical knowledge from crowdsourced question answering websites using truth discovery techniques. It aims to determine the trustworthiness of answers provided by doctors on these sites. The system performs medical term extraction from user queries and responses using stemming. It then calculates answer trustworthiness based on factors like doctor expertise, ethnicity, and commitment level. The highest trustworthiness responses are selected as best opinions and stored in a medical blog. A chatbot is also developed to predict disease based on user-reported symptoms. The system aims to provide users with reliable medical information and diagnoses from these crowdsourced sites.
Data security issues, ethical issues and challenges to privacy in knowledge-i...Tore Hoel
Presentation at “Finnish-Norwegian Workshop in Learning Analytics”, Helsinki, 21-22 May 2015. Organised by The Research Council of Norway and Academy of Finland
The fast development of information, communication
and technologies (ICT) has initiated an unparalleled
transformation in universities all over the world. This
development of technology and learning is offering new
techniques to represent knowledge, new practices, and new global
communities of students. E -learning is now increasing as the
advance model for teaching and learning process in higher
education. However, the integration of e-learning system in
higher education is not an easy task because of some challenges.
The aim of this paper is to analyses the impacts of demographic
factors of students on their attitudes towards e-learning. Student
attitudes and beliefs towards e-learning are regarded as success
determinants of future e-learning initiatives. An analysis of
relationships between student attitudes towards e-learning and
their demographic characteristics: gender, study year, study
program and e-learning knowledge is also included. The study
was conducted for measuring the attitude of university students
towards e -learning in University of Tetovo by taking 223
students from different study program and different study year.
In this paper was used questionnaire to collect data from a
sample of undergraduate students. Statistical techniques are used
for the analyses of data. The result revealed that students’ have
high attitude towards e-learning and their attitude scores did not
differ significantly according to gender, but on the other hand
results indicate there was difference according to study year,
study program and e-learning knowledge of students . The
reported findings might be of interest to academics,
administrators, and decision-makers involved in planning,
developing and implementation of future e-learning strategies in
Macedonia and similar developing countries. The obtained data,
from such study, can provide information about what academic
institutions can do before implementing e-learning to reduce and
overcome the challenges in implementing e-learning in
universities.
Ijdms050304A SURVEY ON EDUCATIONAL DATA MINING AND RESEARCH TRENDSijdms
Educational Data Mining (EDM) is an emerging field exploring data in educational context by applying
different Data Mining (DM) techniques/tools. It provides intrinsic knowledge of teaching and learning
process for effective education planning. In this survey work focuses on components, research trends (1998
to 2012) of EDM highlighting its related Tools, Techniques and educational Outcomes. It also highlights
the Challenges EDM.
Bioinformatics as a field of study gained popularity with the launch of the Human Genome Project. The project sought to determine the sequence of the entire human genome and generated huge amounts of data. Since then, more and more life science related data is being generated from ongoing sequencing efforts, and computation lets researchers analyze this data to locate trends, mutations, diseases and the like. More about us at http://ibab.ac.in/
1) Stereotyping of computer science as a male-dominated field has discouraged girls from pursuing related careers. Research shows using gaming to teach computing concepts at a young age and providing female mentors may help break down stereotypes.
2) Studies found that girls had lower self-efficacy and interest in computer science due to societal stereotypes. However, programs that used gaming to teach concepts and matched girls with STEM mentors were shown to increase girls' skills, knowledge of careers, and intentions to study STEM fields.
3) Research also found that using a female interface agent when teaching math and engineering concepts helped raise girls' self-efficacy, interest, and performance compared to groups without
DETERMINING FACTORS THAT INFLUENCE STUDENTS’ INTENTION TO ADOPT MOBILE BLACKB...ijma
As a newly developing academic domain, researches on Mobile learning are still in their initial stage.
Meanwhile, M-blackboard comes from Mobile learning. This study attempts to discover the factors
impacting the intention to adopt mobile blackboard. Eleven selected model on the Mobile learning
adoption were comprehensively reviewed. From the reviewed articles, the most factors are identified. Also,
from the frequency analysis, the most frequent factors in the Mobile blackboard or Mobile learning
adoption studies are performance expectancy, effort expectancy, perceived playfulness, facilitating
conditions, self-management, cost and past experiences. The descriptive statistic was performed to gather
the respondents’ demographic information. It also shows that the respondents agreed on nearly every
statement item. Pearson correlation and regression analysis were also conducted.
Cloud computing in eHealthis an emerging area for only few years. There needs to identify the state of the
art and pinpoint challenges and possible directions for researchers and applications developers. Based on
this need, we have conducted a systematic review of cloud computing in eHealth. We searched ACM
Digital Library, IEEE Xplore, Inspec, ISI Web of Science and Springer as well as relevant open-access
journals for relevant articles. A total of 237 studies were first searched, of which 44 papers met the Include
Criteria. The studies identified three types of studied areas about cloud computing in eHealth, namely (1)
cloud-based eHealth framework design (n=13);(2) applications of cloud computing (n=17); and (3)
security or privacy control mechanisms of healthcare data in the cloud (n=14). Most of the studies in the
review were about designs and concept-proof. Only very few studies have evaluated their research in the
real world, which may indicate that the application of cloud computing in eHealth is still very immature.
However, our presented review could pinpoint that a hybrid cloud platform with mixed access control and
security protection mechanisms will be a main research area for developing citizen centred home-based
healthcare applications.
This literature review summarizes 103 studies on the use of mobile learning (mLearning) for adult and post-secondary education published between 2005-2012. The studies focused on: 1) how mobile devices expand teaching and learning beyond the classroom; 2) using mobile devices to support content learning in subjects like languages and sciences; and 3) user perceptions of mobile learning. The review found mLearning is still nascent with no unified learning theories. It calls for more rigorous longitudinal studies with larger samples specifically examining learning gains. It also notes a lack of standardized terminology.
Ziyanak, sebahattin the effectiveness of survey instruments nfaerj v29 n3 2016William Kritsonis
This article examines how sociological imagination of the individuals living in southeastern Turkey is constructed through Movie, The Bliss. Traditional and modern forms of life are symbolically constructed in this movie. The framework of “honor killing,” “masculinity in southeastern Turkey," “cultural deficiency,” and “othering” will be analyzed to explicate how stereotypical southeastern characters are reproduced. Content analysis technique is applied to interpret apparent and latent contents, contexts, aspects and so forth. Developed categories are revisited through Ibn Khaldun's Typology, cultural deficiency theory, Tonnies’ theory, Durkheim’s view on society, and Goffman’s framing process.
William Allan Kritsonis, PhD - Editor-in-Chief, NATIONAL FORUM JOURNALS (Established 1982)
Appling tracking game system to measure user behavior toward cybersecurity p...IJECEIAES
This document describes a study that aimed to develop a new method for measuring user behavior toward cybersecurity policies. The researchers created a tracking game system aligned with a questionnaire to indirectly elicit users' actual behaviors. They identified cybersecurity measures and policies, developed survey questions, and transformed the questions into game scenarios. The system was tested with 119 participants. Analysis found high user acceptance, as 70% completed all questions, indicating it was easy to use. Distribution was also fast, collecting responses within a week from Saudi Arabia and other regions. Analysis of scores by age, gender and region provided insights into participants' behaviors regarding the security policies. The study demonstrated the tracking game system was an effective creative tool for measuring human behavior.
APPLYING THE HEALTH BELIEF MODEL TO CARDIAC IMPLANTED MEDICAL DEVICE PATIENTSIJNSA Journal
Wireless Implanted Medical Devices (WIMD) are helping millions of users experience a better quality of life. Because of their many benefits, these devices are experiencing dramatic growth in usage, application, and complexity. However, this rapid growth has precipitated an equally rapid growth of cybersecurity risks and threats. While it is apparent from the literature WIMD cybersecurity is a shared responsibility among manufacturers, healthcare providers, and patients; what explained what role patients should play in WIMD cybersecurity and how patients should be empowered to assume this role. The health belief model (HBM) was applied as the theoretical framework for a multiple case study which examined the question: How are the cybersecurity risks and threats related to wireless implanted medical devices being communicated to patients who have or will have these devices implanted in their bodies? The subjects of this multiple case study were sixteen cardiac device specialists in the U.S., each possessing at least one year of experience working directly with cardiac implanted medical device (CIMD) patients, who actively used cardiac device home monitoring systems. The HBM provides a systematic framework suitable for the proposed research. Because of its six-decade history of validity and its extraordinary versatility, the health belief model, more efficiently than any other model considered, provides a context for understanding and interpreting the results of this study. Thus, the theoretical contribution of this research is to apply the HBM in a setting where it has never been applied before, WIMD patient cybersecurity awareness. This analysis (using a multiple case study) will demonstrate how the HBM can assist the health practitioners, regulators, manufacturers, security practitioners, and the research community in better understanding the factors, which support WIMD patient cybersecurity awareness and subsequent adherence to cybersecurity best practices.
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?IJCNCJournal
Due to the increasingly online nature of business (e-commerce), it is essential to understand how end-users can be protected from malicious online activities such as malware. Several factors have been examined in the research on this topic. Digital native status was identified as a factor that has not been investigated thoroughly. This study examined how the security decision-making process is impacted by digital native status by looking at Protection Motivation Theory. Digital Native Status was investigated as a mediating factor in the PMT model. Intent to use antivirus was utilized as the protective measure. The findings indicate that digital native status does not mediate Fear. However, other factors, such as Fear, selfefficacy, and response efficacy, play a part in the intent to use antivirus. Conversely, the other constructs in the model, response-costs and maladaptive rewards, did not have a relationship with antivirus usage. Practically speaking, employers and eCommerce businesses could use these findings to identify factors that play into their end-user behaviors. These findings can be utilized to help guide training programs and professionals researching end-user behavior. These findings also suggest that future research should focus on factors other than age.
Technological Factors Affecting Computer Aided Learning Among Students Attend...AJHSSR Journal
Computer Assisted Learning (CAL) is a method of acquiring knowledge using electronic media which is gained using electronic media which is gaining recognition among students. This requires access to computers and considerable awareness on information technology. Previous empirical studies have underscored the important roles of instructional materials in the classroom studies. The objective of this study was to determine technological factors affecting computer aided learning programs among students attending Kenya Medical Training College, Nairobi campus. This study was an analytical study, the target population was 4,490 KMTC Nairobi Campus students. The study utilized structured questionnaires for 263 respondents, analysis was done through SPSS, Ms Excel and Ms Word software’s with univariate
This document proposes using text analytics and the RapidMiner data analytics tool to analyze student data from an online learning environment to predict students' interests in various subject areas. It discusses limitations in current approaches and the need to more accurately understand student interests to refine educational offerings. The proposed approach would collect student data through the UTS online platform and use text analytics and RapidMiner to identify patterns in students' discussions that indicate their interests in different topics. This could help university authorities better tailor course content based on predicted student demand.
An EHealth Adoption Framework for Developing Countries: A Systematic Reviewhiij
This document provides a summary of a systematic literature review conducted to establish factors for developing an eHealth adoption framework for developing countries. The review analyzed 29 papers published between 2009-2021 on eHealth adoption frameworks in developing nations. The most commonly used frameworks were TAM, UTAUT, and TOE, but additional factors were identified. Based on the findings, the researchers derived a novel 8-dimension eHealth adoption framework for developing countries including socio-demographic, technology, information, socio-cultural, organization, governance, ethical/legal, and financial dimensions. Key factors identified included perceived usefulness/ease of use, cultural dimensions, organizational fit, reinforcement, age/education, financial support, and policy/regulatory
A content analysis of the emerging research on academic cyberloafingZizo Aku
Despite the diverse opportunities digital technologies offer that enhance learning and improve instructional practice, the main challenge faced by many institutions is the distracting effects of hyper-connectivity caused by mobile devices during learning activities. Some students find it difficult to balance online leisure activity with school work because of the guilty pleasures associated with using certain types of media. The failure of college students to reduce distractions from academic cyberloafing could negatively impact their achievement of academic success. This scholarly paper is designed to explore how contemporary research has investigated this emerging phenomenon to better understand important strategies for control.
This document is an annotated bibliography for an educational technology paper exploring the relationship between educational technology and inquiry-based learning. It summarizes 10 research articles that will be used to support three main arguments: 1) the role of educational technology in facilitating inquiry-based learning across contexts, 2) the role of inquiry-based learning and technology in science programs, and 3) inquiry-based learning using web-based technology. The annotations provide highlights of each article's relevance, supporting evidence and data, author credentials, date of publication, and reading level.
Technology Acceptance Model for Mobile Health SystemsIOSR Journals
Abstract: The purpose of this paper is to explore the factors that influence health-related consumer’s
acceptance to use the mobile technology as a tool for receiving healthcare services. Based on technology
acceptance model (TAM), this paper provides a better understanding of antecedent of key acceptance constructs
(e.g. intention to use, perceived usefulness, perceived ease of use). The proposed research model and hypotheses
validated and tested with data collected from 302 Egyptians and Yemenis patients, health professionals, and
general health users. The results are analyzed using a number of statistical techniques including partial least
squares. The key findings obtaining from the results of the three surveyed stakeholders reveal that: (1) ninety
percent are indented to use mobile health services. (2) While intention to use has greatly influenced by
perceived usefulness, the impact of perceived ease of use varies. (3) Perceived value, perceived ease of use and
portability factors are significantly affect perceived usefulness. (4) Self-efficacy and technology anxiety have a
great impact on perceived ease of use. (5) The impact of the rest of the suggested factors ranged from medium,
low, and insignificant. The research made an in-depth exploration and examination of the factors that influence
user’s intention to use mobile health services focusing on technological, cultural, organizational, political, and
social aspects whereas most of the previous studies considered only one or two aspects together. The proposed
model can be applied to assess mobile health user’s acceptance, thereby help mobile health developers and
providers to develop better mobile health applications that meet the needs of the potential users.
Keywords: Intention to use, Mobile health, portability, Resistance to change, Technology anxiety, Technology
acceptance model
Knowledge, social media and technologies for a learning societywanzahirah
The document summarizes several papers presented in a special issue of the journal Transactions of the SDPS on the topics of knowledge, social media, and technologies for learning. The papers explore how new technologies and social media are changing learning and discuss approaches like using smartphones and scaffolding tools to enhance the learning process. They also address challenges in recommending learning resources and the role of collective intelligence in driving innovation. The goal of the special issue is to look at the future of education from a transdisciplinary perspective.
The effect of information and communication technology (ICT) in Jordanian lea...IJERA Editor
Information and communication Technology are used of electronic means which involve access storage, processing of electronic technology to handling of information, the various forms of uses it’s in order to improve Jordanian learning. The study aimed to investigate the uses and effect of ICTs for Jordanian learning from their perspective of student of higher school at the north of Jordan. The study method was a descriptive survey which uses questionnaire to collect data, questionnaire was justified and developed by the researcher to measure the effect of ICTs based on previous studies its applied to (548) student of higher school. The study was using SPSS to analyses data. The results indicate that ICTs for higher school at the north of Jordan there were a statistically significant relationship between the higher school at the north of Jordan and Jordanian learning, and seven of hypotheses reported statistically significant in the hypotheses and accepted but three hypotheses reported no a statistically significant and rejected. The study have Conclusion should gives more attention to focus on and beneficial of using ICTs applications.
IRJET- Clinical Medical Knowledge Extraction using Crowdsourcing TechniquesIRJET Journal
This document proposes a system to extract medical knowledge from crowdsourced question answering websites using truth discovery techniques. It aims to determine the trustworthiness of answers provided by doctors on these sites. The system performs medical term extraction from user queries and responses using stemming. It then calculates answer trustworthiness based on factors like doctor expertise, ethnicity, and commitment level. The highest trustworthiness responses are selected as best opinions and stored in a medical blog. A chatbot is also developed to predict disease based on user-reported symptoms. The system aims to provide users with reliable medical information and diagnoses from these crowdsourced sites.
Data security issues, ethical issues and challenges to privacy in knowledge-i...Tore Hoel
Presentation at “Finnish-Norwegian Workshop in Learning Analytics”, Helsinki, 21-22 May 2015. Organised by The Research Council of Norway and Academy of Finland
The fast development of information, communication
and technologies (ICT) has initiated an unparalleled
transformation in universities all over the world. This
development of technology and learning is offering new
techniques to represent knowledge, new practices, and new global
communities of students. E -learning is now increasing as the
advance model for teaching and learning process in higher
education. However, the integration of e-learning system in
higher education is not an easy task because of some challenges.
The aim of this paper is to analyses the impacts of demographic
factors of students on their attitudes towards e-learning. Student
attitudes and beliefs towards e-learning are regarded as success
determinants of future e-learning initiatives. An analysis of
relationships between student attitudes towards e-learning and
their demographic characteristics: gender, study year, study
program and e-learning knowledge is also included. The study
was conducted for measuring the attitude of university students
towards e -learning in University of Tetovo by taking 223
students from different study program and different study year.
In this paper was used questionnaire to collect data from a
sample of undergraduate students. Statistical techniques are used
for the analyses of data. The result revealed that students’ have
high attitude towards e-learning and their attitude scores did not
differ significantly according to gender, but on the other hand
results indicate there was difference according to study year,
study program and e-learning knowledge of students . The
reported findings might be of interest to academics,
administrators, and decision-makers involved in planning,
developing and implementation of future e-learning strategies in
Macedonia and similar developing countries. The obtained data,
from such study, can provide information about what academic
institutions can do before implementing e-learning to reduce and
overcome the challenges in implementing e-learning in
universities.
Ijdms050304A SURVEY ON EDUCATIONAL DATA MINING AND RESEARCH TRENDSijdms
Educational Data Mining (EDM) is an emerging field exploring data in educational context by applying
different Data Mining (DM) techniques/tools. It provides intrinsic knowledge of teaching and learning
process for effective education planning. In this survey work focuses on components, research trends (1998
to 2012) of EDM highlighting its related Tools, Techniques and educational Outcomes. It also highlights
the Challenges EDM.
Bioinformatics as a field of study gained popularity with the launch of the Human Genome Project. The project sought to determine the sequence of the entire human genome and generated huge amounts of data. Since then, more and more life science related data is being generated from ongoing sequencing efforts, and computation lets researchers analyze this data to locate trends, mutations, diseases and the like. More about us at http://ibab.ac.in/
1) Stereotyping of computer science as a male-dominated field has discouraged girls from pursuing related careers. Research shows using gaming to teach computing concepts at a young age and providing female mentors may help break down stereotypes.
2) Studies found that girls had lower self-efficacy and interest in computer science due to societal stereotypes. However, programs that used gaming to teach concepts and matched girls with STEM mentors were shown to increase girls' skills, knowledge of careers, and intentions to study STEM fields.
3) Research also found that using a female interface agent when teaching math and engineering concepts helped raise girls' self-efficacy, interest, and performance compared to groups without
DETERMINING FACTORS THAT INFLUENCE STUDENTS’ INTENTION TO ADOPT MOBILE BLACKB...ijma
As a newly developing academic domain, researches on Mobile learning are still in their initial stage.
Meanwhile, M-blackboard comes from Mobile learning. This study attempts to discover the factors
impacting the intention to adopt mobile blackboard. Eleven selected model on the Mobile learning
adoption were comprehensively reviewed. From the reviewed articles, the most factors are identified. Also,
from the frequency analysis, the most frequent factors in the Mobile blackboard or Mobile learning
adoption studies are performance expectancy, effort expectancy, perceived playfulness, facilitating
conditions, self-management, cost and past experiences. The descriptive statistic was performed to gather
the respondents’ demographic information. It also shows that the respondents agreed on nearly every
statement item. Pearson correlation and regression analysis were also conducted.
Cloud computing in eHealthis an emerging area for only few years. There needs to identify the state of the
art and pinpoint challenges and possible directions for researchers and applications developers. Based on
this need, we have conducted a systematic review of cloud computing in eHealth. We searched ACM
Digital Library, IEEE Xplore, Inspec, ISI Web of Science and Springer as well as relevant open-access
journals for relevant articles. A total of 237 studies were first searched, of which 44 papers met the Include
Criteria. The studies identified three types of studied areas about cloud computing in eHealth, namely (1)
cloud-based eHealth framework design (n=13);(2) applications of cloud computing (n=17); and (3)
security or privacy control mechanisms of healthcare data in the cloud (n=14). Most of the studies in the
review were about designs and concept-proof. Only very few studies have evaluated their research in the
real world, which may indicate that the application of cloud computing in eHealth is still very immature.
However, our presented review could pinpoint that a hybrid cloud platform with mixed access control and
security protection mechanisms will be a main research area for developing citizen centred home-based
healthcare applications.
This literature review summarizes 103 studies on the use of mobile learning (mLearning) for adult and post-secondary education published between 2005-2012. The studies focused on: 1) how mobile devices expand teaching and learning beyond the classroom; 2) using mobile devices to support content learning in subjects like languages and sciences; and 3) user perceptions of mobile learning. The review found mLearning is still nascent with no unified learning theories. It calls for more rigorous longitudinal studies with larger samples specifically examining learning gains. It also notes a lack of standardized terminology.
Ziyanak, sebahattin the effectiveness of survey instruments nfaerj v29 n3 2016William Kritsonis
This article examines how sociological imagination of the individuals living in southeastern Turkey is constructed through Movie, The Bliss. Traditional and modern forms of life are symbolically constructed in this movie. The framework of “honor killing,” “masculinity in southeastern Turkey," “cultural deficiency,” and “othering” will be analyzed to explicate how stereotypical southeastern characters are reproduced. Content analysis technique is applied to interpret apparent and latent contents, contexts, aspects and so forth. Developed categories are revisited through Ibn Khaldun's Typology, cultural deficiency theory, Tonnies’ theory, Durkheim’s view on society, and Goffman’s framing process.
William Allan Kritsonis, PhD - Editor-in-Chief, NATIONAL FORUM JOURNALS (Established 1982)
Appling tracking game system to measure user behavior toward cybersecurity p...IJECEIAES
This document describes a study that aimed to develop a new method for measuring user behavior toward cybersecurity policies. The researchers created a tracking game system aligned with a questionnaire to indirectly elicit users' actual behaviors. They identified cybersecurity measures and policies, developed survey questions, and transformed the questions into game scenarios. The system was tested with 119 participants. Analysis found high user acceptance, as 70% completed all questions, indicating it was easy to use. Distribution was also fast, collecting responses within a week from Saudi Arabia and other regions. Analysis of scores by age, gender and region provided insights into participants' behaviors regarding the security policies. The study demonstrated the tracking game system was an effective creative tool for measuring human behavior.
APPLYING THE HEALTH BELIEF MODEL TO CARDIAC IMPLANTED MEDICAL DEVICE PATIENTSIJNSA Journal
Wireless Implanted Medical Devices (WIMD) are helping millions of users experience a better quality of life. Because of their many benefits, these devices are experiencing dramatic growth in usage, application, and complexity. However, this rapid growth has precipitated an equally rapid growth of cybersecurity risks and threats. While it is apparent from the literature WIMD cybersecurity is a shared responsibility among manufacturers, healthcare providers, and patients; what explained what role patients should play in WIMD cybersecurity and how patients should be empowered to assume this role. The health belief model (HBM) was applied as the theoretical framework for a multiple case study which examined the question: How are the cybersecurity risks and threats related to wireless implanted medical devices being communicated to patients who have or will have these devices implanted in their bodies? The subjects of this multiple case study were sixteen cardiac device specialists in the U.S., each possessing at least one year of experience working directly with cardiac implanted medical device (CIMD) patients, who actively used cardiac device home monitoring systems. The HBM provides a systematic framework suitable for the proposed research. Because of its six-decade history of validity and its extraordinary versatility, the health belief model, more efficiently than any other model considered, provides a context for understanding and interpreting the results of this study. Thus, the theoretical contribution of this research is to apply the HBM in a setting where it has never been applied before, WIMD patient cybersecurity awareness. This analysis (using a multiple case study) will demonstrate how the HBM can assist the health practitioners, regulators, manufacturers, security practitioners, and the research community in better understanding the factors, which support WIMD patient cybersecurity awareness and subsequent adherence to cybersecurity best practices.
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?IJCNCJournal
Due to the increasingly online nature of business (e-commerce), it is essential to understand how end-users can be protected from malicious online activities such as malware. Several factors have been examined in the research on this topic. Digital native status was identified as a factor that has not been investigated thoroughly. This study examined how the security decision-making process is impacted by digital native status by looking at Protection Motivation Theory. Digital Native Status was investigated as a mediating factor in the PMT model. Intent to use antivirus was utilized as the protective measure. The findings indicate that digital native status does not mediate Fear. However, other factors, such as Fear, selfefficacy, and response efficacy, play a part in the intent to use antivirus. Conversely, the other constructs in the model, response-costs and maladaptive rewards, did not have a relationship with antivirus usage. Practically speaking, employers and eCommerce businesses could use these findings to identify factors that play into their end-user behaviors. These findings can be utilized to help guide training programs and professionals researching end-user behavior. These findings also suggest that future research should focus on factors other than age.
This document discusses cybersecurity issues facing universities and how to encourage safe online behavior among students. It covers how students are more vulnerable due to lack of experience but also examines internal and external threats universities face. Protection Motivation Theory is discussed as a framework for understanding how to motivate protective behaviors through threat and coping appraisals. While warnings can be effective in moderation, too little or too much fear may not inspire change. Developing a personalized safety plan and accountability can encourage habitual safe online practices over time.
Electronic Healthcare Record Security and Management in Healthcare Organizationsijtsrd
"This study aim sat identifying the current countermeasures used in protecting the Electronic Healthcare Record and how employees share their knowledge about the existence Electronic Healthcare Record security as well as countermeasures used in mitigating the threats and data breaches in healthcare organizations. A case study of Aminu Kano Teaching Hospital, Nigeria was used and qualitative research method was adopted where purposive and stratified random sampling was used. This led to construction of eleven relevant questions to four categories of staff. A conceptual frame work was proposed to quid the study and the findings we reevaluated using the proposed frame work. There sults revealed that there is lack of knowledge sharing among employees and some factors were found to be the resistance factors, this include educational background, behavior, low security awareness, personality differences and lack of management commitment. On the other hand, deterrent, preventive and organizational actions were partially practiced as countermeasures used to mitigate the threats and vulnerability of data breaches of Electronic Healthcare Records in Aminu Kano Teaching Hospital in Nigeria. Attahiru Saminu, CLN ""Electronic Healthcare Record Security and Management in Healthcare Organizations"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Special Issue | International Conference on Advanced Engineering and Information Technology , November 2018, URL: https://www.ijtsrd.com/papers/ijtsrd19124.pdf
Paper URL: https://www.ijtsrd.com/other-scientific-research-area/other/19124/electronic-healthcare-record-security-and-management-in-healthcare-organizations/attahiru-saminu-cln"
By applying the emerging approach Soft Systems Methodology (SSM) the authors try to develop Information Systems Security Model for the Ethiopian Banking Industry that can be used as a base or initial concept for those wish to undertake a more and detail study on security aspects of Financial industries.
Application of Soft Systems Methodology (SSM) to develop Information Systems ...Dawit Mekonnen
By applying the emerging approach Soft Systems Methodology (SSM) the authors try to develop Information Systems Security Model for the Ethiopian Banking Industry that can be used as a base or initial concept for those wish to undertake a more and detail study on security aspects of Financial industries.
Intelligent solution for automatic online exam monitoring IJECEIAES
E-learning has shown significant growth in recent years due to its unavoidable benefits in unexpected situations such as the coronavirus disease 2019 (COVID-19) pandemic. Indeed, online exam is a very important component of an online learning program. It allows higher education institutions to assess student learning outcomes. However, cheating in exams is a widespread phenomenon worldwide, which creates several challenges in terms of integrity, reliability and security of online examinations. In this study, we propose a continuous authentication system for online exam. Our intelligent inference system based on machine learning algorithms and rules, detects continuously any inappropriate behavior in order to limit and prevent fraud. The proposed model includes several modules to enhance security, namely the registration module, the continuous students’ identity verification and control module, the live video stream and the end-to-end sessions recording.
Toward Automated Reduction of Human Errors based on Cognitive AnalysisSherif Zahran
Following the immense development of cyber society where various activities including e-commerce take place,
the demands for security is rapidly growing. Among major
causes of security flaws is human error, which is unintentionally
caused by humans. To cope with that, we intend to build
a human error database that automatically develops further.
We conducted a survey on human factors and concluded that
the root causes of human errors are related to the internal
mental processes, and the cognitive-psychological methodology
is a feasible for the estimation of them. Based on that this
paper proposes a framework that consists of data collection
methods and data structure. It also explores the usability of
the data by presenting use cases of human error prevention
and incident handling.
A Bring Your Own Device Risk Assessment ModelCSCJournals
Bring Your Own Device (BYOD), a technology where individuals or employees use their own devices on the organization’s network to perform tasks assigned to them by the organization has been widely embraced. The reasons for adoption are diverse in every organization. In spite of the security control strategies implemented by these organizations to safeguard their information resources, there has been an upsurge in information security breaches as a result of existing vulnerabilities in these systems and the legacy systems in use. Various approaches have been employed to deal with security challenges in BYOD, but according to literature, risk assessment has proved to be the first key step towards improving security of the BYOD environment in an enterprise. Risk assessment models have been proposed by various researchers, although, most are largely influenced by the degree of technological advancement and utilization as well as the working cultures within institutions. The existing models were largely developed in technologically advanced countries and thus do not fit well in developing countries. This study sought to develop flexible BYOD risk assessment model that can be adopted by varied institutions to secure their information resources. The study was carried out in Five (5) purposively selected state universities in Kenya. The research adopted a mixed research design approach with mixed sampling technique utilized to select the participants. Reliability and validity of data collection tools were evaluated and recommended by IT security and network experts. The qualitative and quantitative data was collected by interviewing experts and administering a questionnaire to sampled participants. The developed model was validated both statistically and by experts. The findings revealed that threats and vulnerabilities contributed to 39.9% and 69.2% respectively to the risk of the BYOD environment while Data Encryption (DE) and Software Updates (SU) came out strongly as intervening variables which have a major impact on the relationship between the dependent and independent variables.
Assimilation Of Security-Related Policies In U.S. Firms An Empirical Study O...Angie Miller
This study examines the assimilation of security-related policies in U.S. firms, with a focus on how web assimilation and related knowledge impact policy adoption. The researchers surveyed over 500 organizations about their assimilation of policies like acceptable use, security, privacy, business continuity, and disaster recovery plans. They analyze how an organization's web strategy, web-based business activities, and security-related knowledge predict greater assimilation of protective policies. The goal is to understand what drives organizations to adopt comprehensive security measures beyond just technologies.
Assessing the Knowledge on Internet Addiction and Cybersecurity: A Literature...AJHSSR Journal
ABSTRACT : The Internet of Things (IoT) is a significant research topic with many challenges and affects
many areas of our lives, including healthcare. The purpose of this paper is to examine the current state of
knowledge on Internet addiction and online privacy and security issues, with a focus on identifying gaps in the
literature, quantifying the research, and areas in need of further research. This paper aims to provide guidance
for creating insightful and helpful systematic literature review articles in the field of International Business. In
this paper, we present a thorough review of the different security and privacy risks, which threaten the wellbeing of OSN users in general, and children in particular. We also present an overview of existing solutions that
can provide better protection, security, and privacy for OSN user’s identities, identities, and lives. In addition,
we provide a comprehensive survey on how recent and ongoing advances in technology have motivated the
development of affordable healthcare gadgets and connected health services using IoT. The COVID-19
pandemic has led to new cyber security threats and privacy issues.
KEYWORDS : Internet of Things, Literature Review, Internet Addiction, Cybersecurity
This document discusses teaching ethical hacking skills as part of computer security education programs. It acknowledges that while hands-on labs teaching offensive techniques are important for developing security professionals, they also carry risks of inappropriate student behavior. The paper analyzes student behavior data and surveys to examine these risks. It recommends that computer security programs include both defensive and offensive hands-on labs, alongside lectures, but take steps to minimize risks and reduce liability, such as providing ethical guidelines for students and monitoring their online activities. The goal is to produce skilled security professionals while preventing illegal or unethical student conduct.
Healthcares Vulnerability to Ransomware AttacksResearch questioSusanaFurman449
Healthcare's Vulnerability to Ransomware Attacks
Research question: To what extent is the healthcare system vulnerable to ransomware attacks?
This research aims to explain how the healthcare sector can become vulnerable to ransomware attacks. It will also discuss how the ransomware topic can influence practice. Methods and relevance for computer nursing to secure health information technology will be reviewed. Ransomware is a cyber-attack form that can damage a company and its IT infrastructure. A ransomware attack is a criminal cyber-attack using malware or software that blackmails a company to gain a money lift from its systems (Slayton, 2018). The software can delete personal data from computer systems except when a payment is made, and the cyber attacker provides the decryption key for unlocking the system. Many types of ransomware are available, and Intel Corp's McAfee Labs predict that these attacks will continue and their prevalence will increase. Comment by Mary Lind: nursing makes no sense here Comment by Mary Lind: what do you mean by form? Comment by Mary Lind: what is a money lift? Comment by Mary Lind: what software - the ransomware can delete anythign
This study examines the motivation of healthcare professionals to use theoretical protection theory (PMT) and deterrence theory to adopt security measures against ransomware attacks in a hospital setting (Rogers, 1975). These include perceived severe threats and perceived fear-mediated vulnerability. Misfitting rewards and reaction costs both have an important negative impact on motivation for protection. Effectiveness as a major coping factor is demonstrated. The results help to utilize fear and PMT in ransomware threats to influence protection motivation for healthcare devices. Comment by Mary Lind: for computers users in the hospital.
Target population
This research targets healthcare professionals, patients, and the general population because of the constant vulnerability of healthcare systems to ransomware attacks.
Methodology
In this research, we analyze the Healthcare's Vulnerability to Ransomware Attacks using quantitative research. Research involves healthcare professionals, patients, and the general population. The research will also review the safeguards that healthcare system users have implemented. Data will be analyzed via the Variance Analysis (ANOVA) various hypotheses that arise in the course of the research.
Findings
This makes the medical industry extremely sensitive to this criminal cyber-attack like ransomware due to advances in technology and extensive use of electronic medical documents. Many hospitals, such as Erie County Medical Center, have recently been affected by ransomware (ECMC). In April 2017, ECMC was affected by a ranking attack that shut down its IT systems after refusing to pay $30,000 to unlock it. Following the attack, they were obliged to return to the paper charts and maintained power outage operations by introducing urgent plans. Ransomwar ...
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxjeanettehully
Running head: POLICIES FOR MANAGING PRIVACY
1
POLICIES FOR MANAGING PRIVACY
5
Online Policies for Enabling Financial Companies to Manage Privacy Issues
Name: Sunil Kumar Parisa
Date:03/29/2020
University of Cumberland’s
ABSTRACT
Financial companies are under constant threats in the face of cyber-attacks, which are growing by the day. The companies usually implement measures that primarily focus on the deployment of technologies for suppressing the attacks. They do not consider user policies as essential elements that help curb the vulnerabilities. The policies put in place have a low level of enforceability, which lowers the impact of the plans. The research project will determine the relationship between policy enforceability and the vulnerabilities posed to a system by the internal and external users.
INTRODUCTION
Business companies in the financial sector have the responsibility of ensuring the data that belong to the customers are fully protected. Cyber-crimes are on the rise, and the approaches employed today are not entirely practical. Technological tools and measures are not efficient. They should be complemented by the behavioral standards that suppress the vulnerabilities in all the IT domains (Vincent, Higgs & Pinsker, 2015). Enforceable policies will ensure there is an integration of behavioral and technological measures for promoting data security and privacy.
LITERATURE REVIEW
Financial companies usually emphasize policies that guide the collection of customer and storage as well as access to the data by the internal and external users. These policies are relevant as they promote best practices at both levels. The companies have a belief that these are the areas that need closer monitoring and evaluation. However, the policies put in place are not always enforceable. A lack of enforceability creates a situation where the desired outcomes are not realized (Yeganeh, 2019). It explains why data breaches are still experienced even after such policies are formulated and implemented.
RESEARCH METHOD
To investigate the relationship between enforceability of the policies and the vulnerabilities that business organizations are exposed to, a case study method will be used. It is an essential tool that helps determine a causal relationship (White & McBurney, 2012). Also, it will provide insights that will inform the recommendations that need to be considered by the multiple business organizations in the financial sector. Credible data that are free of confounding variables must be collected, analyzed, and inferences drawn. Two data collection procedures will be utilized as follows.
i. Semi-structured interviews will be conducted to collect diverse data on the design and implementation of user and online policies. The interviewees will offer data that expound on the security and privacy positions of the systems.
ii. Independent observations will be made to inform the behaviors of the users, both internally and externally. The observation ...
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxglendar3
Running head: POLICIES FOR MANAGING PRIVACY
1
POLICIES FOR MANAGING PRIVACY
5
Online Policies for Enabling Financial Companies to Manage Privacy Issues
Name: Sunil Kumar Parisa
Date:03/29/2020
University of Cumberland’s
ABSTRACT
Financial companies are under constant threats in the face of cyber-attacks, which are growing by the day. The companies usually implement measures that primarily focus on the deployment of technologies for suppressing the attacks. They do not consider user policies as essential elements that help curb the vulnerabilities. The policies put in place have a low level of enforceability, which lowers the impact of the plans. The research project will determine the relationship between policy enforceability and the vulnerabilities posed to a system by the internal and external users.
INTRODUCTION
Business companies in the financial sector have the responsibility of ensuring the data that belong to the customers are fully protected. Cyber-crimes are on the rise, and the approaches employed today are not entirely practical. Technological tools and measures are not efficient. They should be complemented by the behavioral standards that suppress the vulnerabilities in all the IT domains (Vincent, Higgs & Pinsker, 2015). Enforceable policies will ensure there is an integration of behavioral and technological measures for promoting data security and privacy.
LITERATURE REVIEW
Financial companies usually emphasize policies that guide the collection of customer and storage as well as access to the data by the internal and external users. These policies are relevant as they promote best practices at both levels. The companies have a belief that these are the areas that need closer monitoring and evaluation. However, the policies put in place are not always enforceable. A lack of enforceability creates a situation where the desired outcomes are not realized (Yeganeh, 2019). It explains why data breaches are still experienced even after such policies are formulated and implemented.
RESEARCH METHOD
To investigate the relationship between enforceability of the policies and the vulnerabilities that business organizations are exposed to, a case study method will be used. It is an essential tool that helps determine a causal relationship (White & McBurney, 2012). Also, it will provide insights that will inform the recommendations that need to be considered by the multiple business organizations in the financial sector. Credible data that are free of confounding variables must be collected, analyzed, and inferences drawn. Two data collection procedures will be utilized as follows.
i. Semi-structured interviews will be conducted to collect diverse data on the design and implementation of user and online policies. The interviewees will offer data that expound on the security and privacy positions of the systems.
ii. Independent observations will be made to inform the behaviors of the users, both internally and externally. The observation.
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxtodd581
Running head: POLICIES FOR MANAGING PRIVACY
1
POLICIES FOR MANAGING PRIVACY
5
Online Policies for Enabling Financial Companies to Manage Privacy Issues
Name: Sunil Kumar Parisa
Date:03/29/2020
University of Cumberland’s
ABSTRACT
Financial companies are under constant threats in the face of cyber-attacks, which are growing by the day. The companies usually implement measures that primarily focus on the deployment of technologies for suppressing the attacks. They do not consider user policies as essential elements that help curb the vulnerabilities. The policies put in place have a low level of enforceability, which lowers the impact of the plans. The research project will determine the relationship between policy enforceability and the vulnerabilities posed to a system by the internal and external users.
INTRODUCTION
Business companies in the financial sector have the responsibility of ensuring the data that belong to the customers are fully protected. Cyber-crimes are on the rise, and the approaches employed today are not entirely practical. Technological tools and measures are not efficient. They should be complemented by the behavioral standards that suppress the vulnerabilities in all the IT domains (Vincent, Higgs & Pinsker, 2015). Enforceable policies will ensure there is an integration of behavioral and technological measures for promoting data security and privacy.
LITERATURE REVIEW
Financial companies usually emphasize policies that guide the collection of customer and storage as well as access to the data by the internal and external users. These policies are relevant as they promote best practices at both levels. The companies have a belief that these are the areas that need closer monitoring and evaluation. However, the policies put in place are not always enforceable. A lack of enforceability creates a situation where the desired outcomes are not realized (Yeganeh, 2019). It explains why data breaches are still experienced even after such policies are formulated and implemented.
RESEARCH METHOD
To investigate the relationship between enforceability of the policies and the vulnerabilities that business organizations are exposed to, a case study method will be used. It is an essential tool that helps determine a causal relationship (White & McBurney, 2012). Also, it will provide insights that will inform the recommendations that need to be considered by the multiple business organizations in the financial sector. Credible data that are free of confounding variables must be collected, analyzed, and inferences drawn. Two data collection procedures will be utilized as follows.
i. Semi-structured interviews will be conducted to collect diverse data on the design and implementation of user and online policies. The interviewees will offer data that expound on the security and privacy positions of the systems.
ii. Independent observations will be made to inform the behaviors of the users, both internally and externally. The observation.
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...IJNSA Journal
This document provides a summary of a literature review on social engineering defense mechanisms and information security policies. It discusses previous research on social engineering attacks and defenses. It also describes a taxonomy of social engineering targets and defenses developed by the authors. Surveys were conducted to measure employee awareness of defenses and the incorporation of information security policies in organizations. The results found over half of employees were unaware of social engineering and organizations only incorporated about 50% of recommended security policies on average. This highlights the need for better education and policies to protect against social engineering attacks.
Similar to INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAVIOR USING A VALIDATED MULTIPLE REGRESSION MODELS (20)
Home security is of paramount importance in today's world, where we rely more on technology, home
security is crucial. Using technology to make homes safer and easier to control from anywhere is
important. Home security is important for the occupant’s safety. In this paper, we came up with a low cost,
AI based model home security system. The system has a user-friendly interface, allowing users to start
model training and face detection with simple keyboard commands. Our goal is to introduce an innovative
home security system using facial recognition technology. Unlike traditional systems, this system trains
and saves images of friends and family members. The system scans this folder to recognize familiar faces
and provides real-time monitoring. If an unfamiliar face is detected, it promptly sends an email alert,
ensuring a proactive response to potential security threats.
In the era of data-driven warfare, the integration of big data and machine learning (ML) techniques has
become paramount for enhancing defence capabilities. This research report delves into the applications of
big data and ML in the defence sector, exploring their potential to revolutionize intelligence gathering,
strategic decision-making, and operational efficiency. By leveraging vast amounts of data and advanced
algorithms, these technologies offer unprecedented opportunities for threat detection, predictive analysis,
and optimized resource allocation. However, their adoption also raises critical concerns regarding data
privacy, ethical implications, and the potential for misuse. This report aims to provide a comprehensive
understanding of the current state of big data and ML in defence, while examining the challenges and
ethical considerations that must be addressed to ensure responsible and effective implementation.
Cloud Computing, being one of the most recent innovative developments of the IT world, has been
instrumental not just to the success of SMEs but, through their productivity and innovative contribution to
the economy, has even made a remarkable contribution to the economic growth of the United States. To
this end, the study focuses on how cloud computing technology has impacted economic growth through
SMEs in the United States. Relevant literature connected to the variables of interest in this study was
reviewed, and secondary data was generated and utilized in the analysis section of this paper. The findings
of this paper revealed that there have been meaningful contributions that the usage of virtualization has
made in the commercial dealings of small firms in the United States, and this has also been reflected in the
economic growth of the country. This paper further revealed that as important as cloud-based software is,
some SMEs are still skeptical about how it can help improve their business and increase their bottom line
and hence have failed to adopt it. Apart from the SMEs, some notable large firms in different industries,
including information and educational services, have adopted cloud computing technology and hence
contributed to the economic growth of the United States. Lastly, findings from our inferential statistics
revealed that no discernible change has occurred in innovation between small and big businesses in the
adoption of cloud computing. Both categories of businesses adopt cloud computing in the same way, and
their contribution to the American economy has no significant difference in the usage of virtualization.
Energy-constrained Wireless Sensor Networks (WSNs) have garnered significant research interest in
recent years. Multiple-Input Multiple-Output (MIMO), or Cooperative MIMO, represents a specialized
application of MIMO technology within WSNs. This approach operates effectively, especially in
challenging and resource-constrained environments. By facilitating collaboration among sensor nodes,
Cooperative MIMO enhances reliability, coverage, and energy efficiency in WSN deployments.
Consequently, MIMO finds application in diverse WSN scenarios, spanning environmental monitoring,
industrial automation, and healthcare applications.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication. IJCSIT publishes original research papers and review papers, as well as auxiliary material such as: research papers, case studies, technical reports etc.
With growing, Car parking increases with the number of car users. With the increased use of smartphones
and their applications, users prefer mobile phone-based solutions. This paper proposes the Smart Parking
Management System (SPMS) that depends on Arduino parts, Android applications, and based on IoT. This
gave the client the ability to check available parking spaces and reserve a parking spot. IR sensors are
utilized to know if a car park space is allowed. Its area data are transmitted using the WI-FI module to the
server and are recovered by the mobile application which offers many options attractively and with no cost
to users and lets the user check reservation details. With IoT technology, the smart parking system can be
connected wirelessly to easily track available locations.
Welcome to AIRCC's International Journal of Computer Science and Information Technology (IJCSIT), your gateway to the latest advancements in the dynamic fields of Computer Science and Information Systems.
Computer-Assisted Language Learning (CALL) are computer-based tutoring systems that deal with
linguistic skills. Adding intelligence in such systems is mainly based on using Natural Language
Processing (NLP) tools to diagnose student errors, especially in language grammar. However, most such
systems do not consider the modeling of student competence in linguistic skills, especially for the Arabic
language. In this paper, we will deal with basic grammar concepts of the Arabic language taught for the
fourth grade of the elementary school in Egypt. This is through Arabic Grammar Trainer (AGTrainer)
which is an Intelligent CALL. The implemented system (AGTrainer) trains the students through different
questions that deal with the different concepts and have different difficulty levels. Constraint-based student
modeling (CBSM) technique is used as a short-term student model. CBSM is used to define in small grain
level the different grammar skills through the defined skill structures. The main contribution of this paper
is the hierarchal representation of the system's basic grammar skills as domain knowledge. That
representation is used as a mechanism for efficiently checking constraints to model the student knowledge
and diagnose the student errors and identify their cause. In addition, satisfying constraints and the number
of trails the student takes for answering each question and fuzzy logic decision system are used to
determine the student learning level for each lesson as a long-term model. The results of the evaluation
showed the system's effectiveness in learning in addition to the satisfaction of students and teachers with its
features and abilities.
In the realm of computer security, the importance of efficient and reliable user authentication methods has
become increasingly critical. This paper examines the potential of mouse movement dynamics as a
consistent metric for continuous authentication. By analysing user mouse movement patterns in two
contrasting gaming scenarios, "Team Fortress" and "Poly Bridge," we investigate the distinctive
behavioral patterns inherent in high-intensity and low-intensity UI interactions. The study extends beyond
conventional methodologies by employing a range of machine learning models. These models are carefully
selected to assess their effectiveness in capturing and interpreting the subtleties of user behavior as
reflected in their mouse movements. This multifaceted approach allows for a more nuanced and
comprehensive understanding of user interaction patterns. Our findings reveal that mouse movement
dynamics can serve as a reliable indicator for continuous user authentication. The diverse machine
learning models employed in this study demonstrate competent performance in user verification, marking
an improvement over previous methods used in this field. This research contributes to the ongoing efforts to
enhance computer security and highlights the potential of leveraging user behavior, specifically mouse
dynamics, in developing robust authentication systems.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
Image segmentation and classification tasks in computer vision have proven to be highly effective using neural networks, specifically Convolutional Neural Networks (CNNs). These tasks have numerous
practical applications, such as in medical imaging, autonomous driving, and surveillance. CNNs are capable
of learning complex features directly from images and achieving outstanding performance across several
datasets. In this work, we have utilized three different datasets to investigate the efficacy of various preprocessing and classification techniques in accurssedately segmenting and classifying different structures
within the MRI and natural images. We have utilized both sample gradient and Canny Edge Detection
methods for pre-processing, and K-means clustering have been applied to segment the images. Image
augmentation improves the size and diversity of datasets for training the models for image classification
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
This research aims to further understanding in the field of continuous authentication using behavioural
biometrics. We are contributing a novel dataset that encompasses the gesture data of 15 users playing
Minecraft with a Samsung Tablet, each for a duration of 15 minutes. Utilizing this dataset, we employed
machine learning (ML) binary classifiers, being Random Forest (RF), K-Nearest Neighbors (KNN), and
Support Vector Classifier (SVC), to determine the authenticity of specific user actions. Our most robust
model was SVC, which achieved an average accuracy of approximately 90%, demonstrating that touch
dynamics can effectively distinguish users. However, further studies are needed to make it viable option
for authentication systems. You can access our dataset at the following
link:https://github.com/AuthenTech2023/authentech-repo
This paper discusses the capabilities and limitations of GPT-3 (0), a state-of-the-art language model, in the
context of text understanding. We begin by describing the architecture and training process of GPT-3, and
provide an overview of its impressive performance across a wide range of natural language processing
tasks, such as language translation, question-answering, and text completion. Throughout this research
project, a summarizing tool was also created to help us retrieve content from any types of document,
specifically IELTS (0) Reading Test data in this project. We also aimed to improve the accuracy of the
summarizing, as well as question-answering capabilities of GPT-3 (0) via long text
In the realm of computer security, the importance of efficient and reliable user authentication methods has
become increasingly critical. This paper examines the potential of mouse movement dynamics as a
consistent metric for continuous authentication. By analysing user mouse movement patterns in two
contrasting gaming scenarios, "Team Fortress" and "Poly Bridge," we investigate the distinctive
behavioral patterns inherent in high-intensity and low-intensity UI interactions. The study extends beyond
conventional methodologies by employing a range of machine learning models. These models are carefully
selected to assess their effectiveness in capturing and interpreting the subtleties of user behavior as
reflected in their mouse movements. This multifaceted approach allows for a more nuanced and
comprehensive understanding of user interaction patterns. Our findings reveal that mouse movement
dynamics can serve as a reliable indicator for continuous user authentication. The diverse machine
learning models employed in this study demonstrate competent performance in user verification, marking
an improvement over previous methods used in this field. This research contributes to the ongoing efforts to
enhance computer security and highlights the potential of leveraging user behavior, specifically mouse
dynamics, in developing robust authentication systems.
Image segmentation and classification tasks in computer vision have proven to be highly effective using neural networks, specifically Convolutional Neural Networks (CNNs). These tasks have numerous
practical applications, such as in medical imaging, autonomous driving, and surveillance. CNNs are capable
of learning complex features directly from images and achieving outstanding performance across several
datasets. In this work, we have utilized three different datasets to investigate the efficacy of various preprocessing and classification techniques in accurssedately segmenting and classifying different structures
within the MRI and natural images. We have utilized both sample gradient and Canny Edge Detection
methods for pre-processing, and K-means clustering have been applied to segment the images. Image
augmentation improves the size and diversity of datasets for training the models for image classification.
This work highlights transfer learning’s effectiveness in image classification using CNNs and VGG 16 that
provides insights into the selection of pre-trained models and hyper parameters for optimal performance.
We have proposed a comprehensive approach for image segmentation and classification, incorporating preprocessing techniques, the K-means algorithm for segmentation, and employing deep learning models such
as CNN and VGG 16 for classification.
- The document presents 6 different models for defining foot size in Tunisia: 2 statistical models, 2 neural network models using unsupervised learning, and 2 models combining neural networks and fuzzy logic.
- The statistical models (SM and SHM) are based on applying statistical equations to morphological foot data.
- The neural network models (MSK and MHSK) use self-organizing Kohonen maps to cluster foot data and model full and half sizes.
- The fuzzy neural network models (MSFK and MHSFK) incorporate fuzzy logic into the neural network learning process to better account for uncertainty in foot sizes.
The security of Electric Vehicle (EV) charging has gained momentum after the increase in the EV adoption
in the past few years. Mobile applications have been integrated into EV charging systems that mainly use a
cloud-based platform to host their services and data. Like many complex systems, cloud systems are
susceptible to cyberattacks if proper measures are not taken by the organization to secure them. In this
paper, we explore the security of key components in the EV charging infrastructure, including the mobile
application and its cloud service. We conducted an experiment that initiated a Man in the Middle attack
between an EV app and its cloud services. Our results showed that it is possible to launch attacks against
the connected infrastructure by taking advantage of vulnerabilities that may have substantial economic and
operational ramifications on the EV charging ecosystem. We conclude by providing mitigation suggestions
and future research directions.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAVIOR USING A VALIDATED MULTIPLE REGRESSION MODELS
1. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
DOI: 10.5121/ijcsit.2018.10608 81
INVESTIGATING THE DETERMINANTS OF
COLLEGE STUDENTS INFORMATION SECURITY
BEHAVIOR USING A VALIDATED MULTIPLE
REGRESSION MODELS
Mofleh Al-diabat
Department of Computer Science, Al Albayt University, Jordan
ABSTRACT
The frequency, intensity and repercussions of information security breaches in higher education has
prompted colleges and universities around the world to devote more resources to enhance technical and
human controls capabilities. Research has repeatedly found that technical solutions to cybercrime are
insufficient in preventing incidents. The present analysis utilizes the Health Belief Model (HBM) to explain
users' computer security behavior by replicating an earlier research study. The study, however, applies the
HBM model to a new context, higher education, and college students serve as the sample for this research.
A validated questionnaire was employed to collect responses from 263 students attending a public state
Midwestern university in the United States. Multiple Linear Regression mathematical analysis was
conducted on the dataset collected to measure constructs of the information security of college students.
Findings of this research suggest that perceived susceptibility, perceived benefits and self-efficacy are good
determinants of information security behavior for college students at least on the sample observations.
Further, the analysis supported the moderating logic of perceived severity on the effects of susceptibility,
benefits, general security orientation, self-efficacy and cues to action. Findings of this research call upon
higher education security administrators to enact more effective awareness and training programs based
on real-work security incidents simulations and incorporating information security into the general
education curricula.
KEYWORDS
Computer Security; Simulated Training; Security Indicators, Security Awareness
1. INTRODUCTION
A study by the Information and Communication Technology department at the University of
Maryland reported that 55% of help desk queries involved the compromise of users’ accounts [1].
EDUCAUSE, the leading non-profit organization in information security in higher education,
reported that information security is the top Information Technology (IT) concern facing
American universities and colleges in their IT divisions[2]. Many studies have established low
levels of information security practice among college students, a serious problem posing them
and their information to cyber criminals. Attempting to address the persistent knowledge and
behavioral gap among students in regard to information protection measures, universities are
taking more vigorous and aggressive approaches to improve the awareness, education, security
and most importantly the practice of Information Systems (ISs) on their campuses[3,4,5].
In the quest against cybercrime such as phishing, governments have legislated national and
international measures hoping to curb the frequency and intensity of information security
incidents[5]. Further, private industry leaders have invested in the research and development of
2. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
82
new simulation programs, intelligent algorithms and protocols enhancing the overall security of
information systems [7,8,9,10,11,12]. Despite the superiority of the technical solution such as
machine learning technology to information security problems, the role of the machine in
identifying, reporting, addressing and treating the incident, the human element of the problem is
still the leading cause of information security breaches[13]. College students have exhibited low
levels of awareness in identifying and effectively managing information security incidents.
Therefore, universities are actively engaging students and staff in information security education
and best practices aspiring to improve their information security performance.
While most tertiary education providers have formal information security policies, a small
percentage of their students’ body is aware of it, let alone practice its recommended information
security behaviors. Therefore, the influence of such manuals and proposals on the attitudes,
awareness, education, training and practice of students concerning information security is
minimal. Further, such information security policies are often designed without reference to the
observed empirical evidence concerning the predictors of college students’ information security
practice[3,5]. Theories of Planned Behavior, Protection Motivation, Deterrence, Health Belief,
Use and Acceptance of Technology and others have been directly linked to students’ information
security behavior. Protection Motivation Theory and the Health Belief Model (HBM) have
proven to be good frameworks encouraging students to implement measures of information
security[14].
This study adds on[15] research on the determinants of information security behavior using new
environment anddata sample for evaluating models of information security;this study scope is
limited to college students in tertiary education rather than employees. The study formulates a
new conceptual model based on the validated behavioral research model referred to as the
HBM[16]. The research attempts to identify whether the HBM constitutes a good theoretical
framework for evaluating college students’ information security behavior. Based on the findings,
the study designs an empirically-based program to be administered to college students in order to
increase their education, awareness, and practice of information security.
The HBM is an appropriate framework since information security behavior, the outcome, is a
good behavior attained through avoiding its risk factors, low education, awareness, training and
efficacy related to information security risks[17]. To prevent incidents, students must possess
high knowledge, skills and abilities associated with information security averting the dangers of
not securing the outcome, good information security practice[18]. The findings of this study assist
stakeholders specially students in the information security discipline establish the invariance,
consistency and robustness of relationships linking the HBM to information security behavior
across contexts.
2. LITERATURE REVIEW
Research on students’ computer security behavior is an emerging area and still limited. In a 2010
study conducted by [19]at the Rochester Institute of Technology campus, students who have used
non-conventional operating systems, Windows or Apple, such as Linux or Unix have higher
safety practices compared to others. The same study concluded that the use of strict passwords
was only found among 33% of the sample. The low information security adoption rate is
consistent with an earlier investigation at the Indiana University of Pennsylvania where forty
percent of respondents indicated that they do not update their anti-virus capability [20]. The same
survey found that about fifty percent of respondents did not use passwords conforming to best
security standards. The low computer security practice among students is confirmed by a 2017
Pew Research study that found only twelve percent of Americans to use a password management
software and only three percent indicated that they use such functionality when selecting a
password[21].
3. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
83
Few investigations have explicitly tested validated theories in explaining the variation of
students’ adoption and implementation of computer security. Studies have utilized several
theories including the Theory of Planned Behavior, Protection Motivation Theory, Technology
Acceptance Model and the Unified Theory of Use and Acceptance of Technology[22].
[22]classified technology and its related applications into two types: positive technologies and
protective technologies. Computer security, as the authors concluded, is considered a preventive
measure against information security risks, and therefore protective/preventive technology-
oriented models suit its study more than positive technology models.
Computer security behavior is more inclusive than simply adopting a new useful technology. It
protects critical information related to users including financial data, healthcare records and
academic documents[23,24].Thus, models linked to healthcare like the HBM are relevant to
investigating the security behavior of users. Further, in the literature on information security, no
elaborate models exist compelling researchers to look elsewhere such as the behavioral science to
model the computer security behavior.
The HBM has developed in the 1950s as a behavioral tool explaining the link between patients’
attitudes towards their illnesses and their likelihoods of avoiding exacerbating actions to their
conditions. The HBM is a value-expectancy based approach to healthcare outcomes. Expectancy
represents the performance of the behavior done by the individual while value constitutes
incentives, motives or barriers associated with the behavior in question. The attitude associated
with the behavior is determined by the probability of the outcomes related to the behavior
occurring and how much value attached by the individual to such outcomes [25]. The HBM has
been widely applied in healthcare to study the likelihood of patients to engage in good nutritional,
exercise and preventive healthcare behaviors. The model has also been applied to studying
behaviors outside of healthcare including compliance with information security policies in
organizations and immigration [26,27].
The HBM posits that an individual’s perception of healthcare condition threat and her perception
of the efficacy of an action to remedy the threat determine her adoption of the behavior in
question[28]. Perception of threat is determined by two variables: perceived susceptibility to the
threat and perceived severity of the threat. Perceived efficacy of the action addressing the threat,
the attitudes towards the behavior, is determined by perceived benefits and barriers associated
with it. In addition to those variables, three other important indicators compose the HBM: cues to
action, self-efficacy, and general health orientation [29].
The explanatory constructs in the HBM applies nicely to the study of computer security.
Perceived susceptibility and severity associated with healthcare threats are analogous to the
threats associated with information security risks[30]. Users can potentially be damaged severely
and are likely to fall victim to cyber criminals especially phishing attacks. Further, the cues to
action and self-efficacy constructs in the HBM extends to information security where the users’
confidence in her abilities to remedy and incident, and her understanding of the overall context
surrounding the incident or a potential attack inform her behavior concerning information
security[31]. Moreover, the perceived benefits and barriers of information security practice
inform the users’ decision to adopt or implement security measures such as changing passwords
routinely[32,33].
3. PROPOSED MODEL
Much of survey-based studies model the dependent variable as the intention or the probability of
engaging in the behavior contingent on the respondent’s perception. This research follows the
same logic behind [15] where the outcome is the self-reported engagement level in the behavior,
4. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
the intensity of information security practice. Both modelling techniques suffer from self
bias. Nevertheless, reporting about the engagement in the behavior itself is more objective
compared to subjective perceptions
presents the proposed model which wasinspired by HBM of [15]. Nevertheless, our proposed
model measures the information security indicators behavior rather than perception and therefore,
all components including perceived benefits, perceived barriers and perceived susceptibility
among others have been changed in the proposed model. This is since we are evaluating these
elements in a computer security prospective and for tertiary education students r
organization.
3.1 Perceived Susceptibility
Perceived susceptibility represents the judgment of respondents’ concerning the likelihood of
possessing a health condition or a risk associated with the outcome in
greatly with respect to their perceptions on this construct. On the one hand, one respondent may
express sheer denial of developing the risk or the condition while another may confess a high
likelihood of catching the disease, en
information security, perceived susceptibility refers to the perceived likelihood of an information
security risk or breech taking place. Presented with the same scenario, respondents will likely
differ on their subjective judgments concerning perceived susceptibility. Given such information,
one is more likely to hypothesize that:
H1 Higher perceptions of perceived susceptibility are positively associated with improved levels
of information security behavior among college students.
3.2 Perceived Benefits
Perceived benefits represent the wide array of health
behavior in diminishing the risk of developing a disease or risk factor associated with the health
condition. For instance, the wide range of health
represent the perceived benefits of such an action in its effectiveness in reducing the risk of many
health-related conditions. In the information security c
multitude of positive gains obtained from implementing computer security behaviors. Based on
this logic, one hypothesizes that:
H2 More positive perceptions of the perceived benefits of computer security are associa
an increase in computer security behavior among college students.
3.3 Perceived Barriers
Perceived Barriers display the plethora of obstacles, challenges, and discomfort associated with
engaging in an action to decrease the likelihood of devel
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
the intensity of information security practice. Both modelling techniques suffer from self
bias. Nevertheless, reporting about the engagement in the behavior itself is more objective
compared to subjective perceptions about the intention or likelihood to engage in it.Figure 1
presents the proposed model which wasinspired by HBM of [15]. Nevertheless, our proposed
model measures the information security indicators behavior rather than perception and therefore,
ents including perceived benefits, perceived barriers and perceived susceptibility
among others have been changed in the proposed model. This is since we are evaluating these
elements in a computer security prospective and for tertiary education students r
Figure 1. Proposed Model
Perceived susceptibility represents the judgment of respondents’ concerning the likelihood of
possessing a health condition or a risk associated with the outcome in question. Individuals vary
greatly with respect to their perceptions on this construct. On the one hand, one respondent may
express sheer denial of developing the risk or the condition while another may confess a high
likelihood of catching the disease, engaging in the risk factor or the behavior. With regards to
information security, perceived susceptibility refers to the perceived likelihood of an information
security risk or breech taking place. Presented with the same scenario, respondents will likely
iffer on their subjective judgments concerning perceived susceptibility. Given such information,
one is more likely to hypothesize that:
H1 Higher perceptions of perceived susceptibility are positively associated with improved levels
ty behavior among college students.
Perceived benefits represent the wide array of health-related advantages associated with the
behavior in diminishing the risk of developing a disease or risk factor associated with the health
ondition. For instance, the wide range of health-related benefits associated with quitting smoking
represent the perceived benefits of such an action in its effectiveness in reducing the risk of many
related conditions. In the information security context, perceived benefits refer to the
multitude of positive gains obtained from implementing computer security behaviors. Based on
this logic, one hypothesizes that:
H2 More positive perceptions of the perceived benefits of computer security are associa
an increase in computer security behavior among college students.
Perceived Barriers display the plethora of obstacles, challenges, and discomfort associated with
engaging in an action to decrease the likelihood of developing a health condition. For instance,
International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
84
the intensity of information security practice. Both modelling techniques suffer from self-report
bias. Nevertheless, reporting about the engagement in the behavior itself is more objective
about the intention or likelihood to engage in it.Figure 1
presents the proposed model which wasinspired by HBM of [15]. Nevertheless, our proposed
model measures the information security indicators behavior rather than perception and therefore,
ents including perceived benefits, perceived barriers and perceived susceptibility
among others have been changed in the proposed model. This is since we are evaluating these
elements in a computer security prospective and for tertiary education students rather in
Perceived susceptibility represents the judgment of respondents’ concerning the likelihood of
question. Individuals vary
greatly with respect to their perceptions on this construct. On the one hand, one respondent may
express sheer denial of developing the risk or the condition while another may confess a high
gaging in the risk factor or the behavior. With regards to
information security, perceived susceptibility refers to the perceived likelihood of an information
security risk or breech taking place. Presented with the same scenario, respondents will likely
iffer on their subjective judgments concerning perceived susceptibility. Given such information,
H1 Higher perceptions of perceived susceptibility are positively associated with improved levels
related advantages associated with the
behavior in diminishing the risk of developing a disease or risk factor associated with the health
related benefits associated with quitting smoking
represent the perceived benefits of such an action in its effectiveness in reducing the risk of many
ontext, perceived benefits refer to the
multitude of positive gains obtained from implementing computer security behaviors. Based on
H2 More positive perceptions of the perceived benefits of computer security are associated with
Perceived Barriers display the plethora of obstacles, challenges, and discomfort associated with
oping a health condition. For instance,
5. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
85
an obesity patient may find it inconvenient to quit eating or drinking certain foods and beverages.
Regarding computer security behavior, one may find it difficult to learn computer security
standards or deem them as obstacles to effective work performance. Based on this logic, one
hypothesizes:
H3 Higher perceptions of perceived barriers associated with computer security behavior are
negatively associated with computer security behavior implementation among college students.
3.4 Cues to Action
Cues to action refer to critical events signaling taking charge or initiative on the part of the
respondent. For instance, coughing blood is an event where the patient learns about the severity of
her case prompting action to be taken reducing the likelihood of developing a disease. In the
computer security realm, students may receive emails on phishing incidents on campus or learn
about information security scandals in their classrooms increasing their awareness and
implementation of computer security behavior. Based on this understanding, one hypothesizes
that:
H4 Higher perceptions of cues of action are positively associated with computer security behavior
implementation among college students.
3.5 General Security Orientation
Broadly speaking, in the application of HBM, the general health orientation refers to the overall
health well-being behavior sought by the individual. For instance, some people are found to
practice health-related practices more than others. In other sub-disciplines within medical or
public health research, this construct is referred to as healthcare literacy, knowledge or
consciousness. Concerning information security behavior, some individuals may be predisposed
more than others to practice privacy, confidentiality, or best security practices. Contingent on this
interpretation, one hypothesizes:
H5 Higher levels of general security orientation are associated with higher levels of computer
security behavior among college students.
3.6 Self-Efficacy
Self-efficacy refers to the overall level of confidence the individual possess regarding her ability
to excel at a given behavior or practice [34]. In healthcare, self-efficacy oftentimes refer to the
perceived ability of patients to follow recommended guidelines prescribed by physicians and
healthcare staff to reduce the severity and risk of the associated disease. Within information
security literature, self-efficacy represents the individual confidence in her ability to identify,
address and remedy a potential or actual information security incident. Therefore, one
hypothesizes:
H6 Higher levels of self-efficacy are associated with higher levels of computer security behavior
among college students.
3.7 Perceived Severity
Perceived severity displays the individuals’ judgement regarding the danger levels of the
healthcare behavior or condition. Patients are likely to engage in behaviors reducing the
likelihood of developing a disease evading the severity of the condition[35]. Within information
security, the severity of incidents may result in loss of financial assets, reputational damage and
6. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
86
litigation. They may also just simply compromise the privacy of individuals’ information. At any
rate, based on such logic, one hypothesizes that
H7 Higher levels of perceived severity are associated with higher levels of computer security
behavior engagement among college students.
Consistent with previous research in information security behavior, perceived security is expected
to moderate the relationship between all other determinants of the HBM and information security
behavior. This is due to nature of information security behavior. Individuals try to avoid severe
consequences linkedinability to comply with computer security standards, and thus the
consequences impact vulnerability, barriersand self-efficacy of the individual.
Perceived severity is directly related to perceived susceptibility summing up to form perceived
threat of a disease or an information risk. Therefore, once perceived severity increases, perceived
susceptibility is expected to increase as well. Previous research has theorized that an individual
has heightened perceptions of the severity of an outcome, they will take serious measures to
shield herself from falling into that risk or negative outcome. Based on this logic, one
hypothesizes that
H7a Perceived severity maximizes the impact of perceived susceptibility on college students’
engagement in computer information security behavior.
Hypothesized that perceived severity minimizes the impacts of perceived barriers and benefits on
computer information security behavior[15]. They argued that if the individual is facing a
significant danger, she will be more likely to take serious protective measures downplaying the
costs or inconvenience associated with the behavior, barriers. By the same token, the
effectiveness of the measures become less important to the individual once she feels at danger and
assume an active role in protecting herself from the risks associated with the disease or the
information security risk.
H7b Perceived severity minimizes the impact of perceived benefits on college students’ computer
information security behavior.
H7c Perceived severity minimizes the impact of perceived barriers on college students’ computer
information security behavior.
On the other hand, cues to action aggrandize the protective behavior of individuals once outcomes
are deemed significant. Individuals who perceive threats to be severe will take cures of action
more seriously. By the same token, if individuals already practice standards and guidelines of
security, their protective behavior is likely to increase once they believe the dangers associated
with the outcome severe. Based on such logic, one hypothesizes:
H7d Perceived severity maximizes the impact of cues of action on college students’ computer
information security behavior.
H7e Perceived severity maximizes the impact of security orientation on college students’
computer information security behavior.
Finally, perceived severity minimizes the impact of self-efficacy on computer information
security behavior. Once individuals identify high potential risklinked with the behavior, they
become protective regardless their confidence levels. Individuals across the board will be more
alert and protective trying to avoid harsh consequences even if they lack any skills, abilities or
knowledge regarding the behavior or measure. Based on this understanding, one hypothesizes
that:
7. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
87
H7f Perceived severity minimizes the impact of self-efficacy on college students’ computer
information security behavior.
4. RESEARCH DESIGN
The research strategy followed was the descriptive correlational design based on survey data
collected from college students. The questionnaire developed for the analysis implemented best
practices in item development and survey validation such as in [15]. We identify several domains
of each construct then produced a pool of items measuring the specific elements of the construct.
Face validity was established through consulting information security experts.
Previous research on the HBM has suffered from psychometric problems failing to report
appropriate measures of reliability and validity. Further, informationsecurity research has not
widely applied the HBM. Given such concerns, the present analysis utilizesquestionnaire that has
been validated and its items carefully assessed and chosen.
The dependent variable, computer security behavior, is measured through respondents’ reported
care when opening emails with attachments. Computer security behavior ranges from routinely
changing passwords to purchasing the most up-to-date security software. One of the most basic
and common practices among college students is exercising caution when opening emails
avoiding phishing schemes and other information security related risks. Therefore, this analysis
utilizes such measure as to operationalizing the dependent variable.
4.2 Survey Validation
Survey validation entails the evaluation of the psychometric properties of the questionnaire. In the
present study, an assessment of face, content and construct validity, as well as internal
consistency as a reliability measure were conducted. Face validity refers to the judgement of the
researcher and a panel of experts regarding the extent to which a pool of items on a questionnaire
measure the intended construct. Following a series of interviews with academic and industry
experts on information securitythe questionnaire has been refined to reflect changes
recommended and validity was established. Content validity refers to the representation of items
utilized in the questionnaire across the domains covered by the literature on the concerned
constructs. Items utilized to form the questionnaire were drawn from previous studies.
Further[15] reported conceptual validity statistics, Cohen Kappa’s of 0.83 and placement ratio of
93% indicating high validity scores.
Table 1 displays the items and their corresponding constructs. The administration of the
questionnaire followed the best practices guidelines recommended by survey research experts
[39]. Such recommendations include the presentation of items in a neat layout and colored panels
indicating higher credibility and legitimacy for conducting the research. Further, prior to the
administration of the surveys on students, a pilot study with ten students was taken to indicate the
clarity and ease of readability for the items indicating a 92% agreement rates with the phrases
“items were easy to read and understand” and “items were clear.” Notice that detailed instructions
and examples were also provided in order to guide students’ in their response patterns. The
questionnaire was organized into distinct sections with defining statements preceding the items
provided.
The survey was distributed to 10 classrooms at a large public Midwestern university in the United
States. The classes ranged from introductory to advanced courses in Information Technology,
Mathematics, Political Science, and Biology. The choice of courses was informed by the desire to
obtain a wide range of college majors and disciplinary variation. Approvals from departments and
8. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
88
instructors were obtained prior to the administration of the survey. The number of completed
surveys that were all filled out after the conclusion of the classes and offered extra credit by the
instructor were 263 out of 531 possible responses, generating a response rate of 49% which was
higher than the rate of 31% in [15].
Table 1. Construct and Items
Construct Item Source
Behavior (BEH) BEH1: Investigate the subject
header of an email and the sender
before reading the email.
(agree/disagree)
[15]
BEH2: Investigate if the filename
of the attachment makes sense
before reading the email.
(agree/disagree)
[15]
BEH3: when receiving an email
attachment I should be careful as
it may contain a virus.
(agree/disagree)
[15]
BEH4: I do not open email
attachments if the email content
seems suspicious. (agree/disagree)
[15]
Perceived Susceptibility
(SUS)
SUS1: The chances of receiving
an email attachment with virus are
high. (agree/disagree)
[15]
SUS2: There is a good possibility
that I will receive an email
attachment with virus.
(agree/disagree)
[15]
SUS3: I am likely to receive an
email attachment with virus.
(agree/disagree)
[15]
Perceived Severity (SEV) SEV1: Having my computing
machine infected by a virus once
opening a suspicious email
attachment is a serious issue for
me. (agree/disagree)
[37]
SEV2: Losing organizational data
as a result of opening a suspicious
email attachment is a serious issue
for me. (agree/disagree)
[37]
SEV3: If my computer is infected
by a virus as a result of opening a
suspicious email attachment, my
daily work could be negatively
affected. (agree/disagree)
[15]
Perceived benefits (BEN) BEN1: Checking if the sender and
subject make sense is
(definitely/not) effective in
preventing viruses from infecting
my computer.
[15]
BEN2: Checking if the filename
of the email attachment makes
sense is (definitely/not) effective
in preventing viruses from
infecting my computer.
[15]
9. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
89
BEN3: Exercising care before
opening email attachments is
(definitely/not) effective in
preventing viruses from infecting
my computer.
[15]
Perceived barriers (BAR) BAR1: Exercising care when
reading emails with attachments is
inconvenient. (agree/disagree)
[15]
BAR2: Exercising care when
reading emails with attachments is
time-consuming. (agree/disagree)
[38]
BAR3: Exercising care when
reading emails with attachments
would require considerable
investment of effort other than
time. (agree/disagree)
[37]
BAR4: Exercising care when
reading emails with attachments
would require starting a new
habit, which is difficult.
(agree/disagree)
[38]
Cues to action (CUE) CUE1: My organization
distributes security newsletters or
articles. (never/always)
[15]
CUE2: My organization organizes
security talks. (never/always)
[15]
CUE3: My organizations’ IT
helpdesk sends out alert
messages/emails concerning
security. (never/always)
[15]
CUE4: My organization
constantly reminds me to practice
computer security.
(agree/disagree)
[15]
General security orientation
(GEN)
GEN1: I read information security
bulletins or newsletters.
(agree/disagree)
[15]
GEN2: I am concerned about
security incidents and try to take
action to prevent them.
(agree/disagree)
[39]
GEN3: I am interested in
information about computer
security. (agree/disagree)
[39]
GEN4: I am constantly mindful
about computer security.
(agree/disagree)
[15]
Self-efficacy (SEF) SEF1: I am confident of
recognizing a suspicious email.
(agree/disagree)
[15]
SEF2: I am confident of
recognizing suspicious email
headers. (agree/disagree)
[15]
SEF3: I am confident of
recognizing suspicious email
headers. (agree/disagree)
[15]
SEF4: I can recognize a [40]
10. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
90
suspicious email attachment even
if there was no one around to help
me. (agree/disagree)
Technical controls (CON1) My organization ensures that my
computer is protected from
viruses by installing anti-virus
software on my computer and/or
the email server. (agree/disagree)
[15]
Security familiarity (CON2) How would you rate yourself in
terms of familiarity with computer
security practices? (very
familiar/not at all familiar)
[15]
Table 2 displays the results of validity and reliability analysis. First, Exploratory Factor Analysis
generated a total number of 8 dimensions as specified by the proposed model in Figure 1. Second,
the loadings indicated a direct relationship between each item and its specified construct as Table
1 suggested, confirming the face, content, and conceptual validity findings reported above. The
right-most column displays the Cronbach’s alphas per dimension indicating a reliable result,
above the threshold of 0.70 suggested by [36]. Findings from Table 2 indicate adequate
psychometric results obtained from the data for the survey utilized in this research.
Table 2. Reliability and validity tests
Construct and items Loading Cronbach alpha
BEH 0.71
BEH2 0.74
BEH3 0.72
BEH4 0.69
BEH1 0.62
SUS 0.81
SUS2 0.79
SUS3 0.73
SUS1 0.71
SEV 0.73
SEV1 0.82
SEV2 0.78
SEV3 0.64
BEN 0.77
BEN2 0.72
BEN1 0.61
BEN3 0.54
BAR 0.87
BAR1 0.82
BAR4 0.78
BAR3 0.76
BAR2 0.63
GEN 0.81
GEN2 0.85
GEN3 0.70
GEN1 0.64
GEN4 0.58
CUE 0.82
CUE4 0.89
CUE2 0.81
CUE1 0.71
11. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
91
CUE3 0.65
SEF 0.81
SEF3 0.81
SEF1 0.72
SEF4 0.68
SEF2 0.59
To fit the model to the collected data, Multiple Linear Regression Analysis is utilized. This
technique is suitable for evaluating the direction and strength of relationships among quantitative
variables. Further, it helps researchers predict the value of a single dependent variable based on
estimates of a set of independent variables. The method has been widely used in the information
security literature and its output easily understood and incorporated into concrete
recommendations for devising robust solutions to pressing problems such as the one in the
present study is attempting to mitigate. The study proposed three models. The first model
contains the seven independent variables on the left in Figure 1 and the information security
behavior as the dependent variable. The second model utilizes interaction terms between
perceived severity and the seven variables to test the moderating hypotheses. Finally, the third
model incorporates control variables including students’ status, age, major and college affiliation.
5. RESULTS ANALYSIS
Table 3 displays the demographic information of the sample surveyed at the university. Notice
that most participants are relatively young reflecting the vulnerability of college students to
potential cybercrime due to their lack of practical security experience. More males filled out the
survey since many of the courses featured STEM classrooms where males disproportionally
surpass females in numbers in such fields. Regarding the college affiliation, many courses were in
Information Technology and Systems reflecting an advantage for the College of Technology and
Business over others. This is consistent with the students’ status variable where 42% of
respondents indicated an IT-related major. The majority of the sample was enrolled in bachelors
and masters programs.
Table 3 Demographics of respondents
Demographic Category Percentage (%)
Age 18-22 61
23-30 23
31-40 9
>=41 7
Gender Male 59
Female 41
College College of Technology 31
College of Business 27
College of Arts and Sciences 17
College of Education 12
College of Health and Human
Services
13
Student Status Undergraduate 58
Masters 29
Doctorate 6
Other 7
Major IT-Related 42
Non IT-Related 58
12. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
92
Prior to the interpretation of the Multiple Regression Analysis output, a note on the fulfillment of
the statistical technique assumptions is warranted. The inspection of tolerance values and
Variance Inflation Factors indicated that the model possesses no serious violations of the
multicollinearity assumption. Further, inspecting the residuals plot against predicted values
indicated an adequate linear fit signaling no serious violations for the linearity, as well as the
homoskedasticity assumptions.
Table 4 demonstrates the results from the Multiple Regression Analysis. Three models were fitted
where the first model only included the direct effects, the second model included the interaction
terms, and the third (complete model) included control variables. Notice that the addition of
control variables(age, gender, students’ status, college affiliation and whether the student is
enrolled in an IT or non-IT major) does not change the explanatory power of the model, R2
, by
much (5% change). It should be noted that perceived benefits, perceived susceptibility, self-
efficacy and general security orientation were supported. Whereas, perceived severity, perceived
barriers and cues to action were not able to statistically explain the disparity in computer security
behavior. In addition, five interactive terms were derived to be significant in relation to the impact
of perceived severity; these are cues to action, general security orientation, perceived benefits,
perceived susceptibility and self-efficacy. All in all, the results of the analysis suggested that H1,
H2, 5 and H6 were supported while H3, H4 and H7 were not. Further, H7a, H7b, H7d, H7e and
H7f were supported while H7c was not.
This result confirms findings reported earlier, i.e.[15]. The first difference observed in both
results was the significance of H5 in this study. Second, H7a was reported to be not significant by
[15] while significant in this study, the moderating effect of perceived severity on perceived
susceptibility and information security behavior. Despite such differences, the HBM seems to be
an appropriate framework in explaining college students’ behavior towards information security.
Table 4. Regression Models
Model Model 1 Model 2 Model 3
Main effects Interaction
effects
Full
Variables Coefficient Coefficient Coefficient Results
Perceived susceptibility 0.41 0.39 0.38 H1 supported
Perceived Benefits 0.34 0.31 0.33 H2 supported
Perceived Barriers 0.11 0.08 0.07 H3 not supported
Cues to Action 0.04 0.02 0.03 H4 not supported
General Security
Orientation
0.21 0.19 0.17 H5 not supported
Self-efficacy 0.38 0.33 0.36 H6 supported
Perceived Severity 0.08 0.07 0.07 H7 not supported
Perceived Severity x
perceived susceptibility
0.18 0.17 H7a not supported
Perceived Severity x
Perceived Benefits
-0.21 -0.19 H7b supported
Perceived Severity x
Perceived Barriers
0.09 0.7 H7c not supported
Perceived Severity x Cues
to Action
0.22 0.19 H7d supported
Perceived Severity x
General Security
Orientation
0.24 0.21 H7e supported
Perceived Severity x self-
efficacy
-0.24 -0.19 H7f supported
Gender 0.11
Age 0.01
IT or non-IT 0.03
13. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
93
College Affiliation 0.04
R² 0.51 0.64 0.69
Change in R² 0.114 0.012
Adjusted R² 0.450 0.549 0.551
6. CONCLUSIONS, IMPLICATIONS AND FUTURE WORK
This research investigated different constructs related to HBM to address risks associated with
information security for tertiary education students. Primary data from 263 students attending a
public state Midwestern university in the United States have been collected based on designed
questionnaire to achieve the aim(s) of the study. More importantly, Multiple Linear Regression
mathematical analysis was conducted on the gathered observations to measure constructs of the
information security especially when it comes to cybersecurity risks. Findings of this research
show useful indicators to college students’ information security behavior including perceived
benefits, general security orientation, perceived susceptibility, and self-efficacy as they have been
derived by performing due diligence when students are checking their emails. First, perceived
susceptibility and perceived benefits are classic pre-cautionary measures taken by the user to
reduce the chances of falling into a cybercrime scheme. Such measures are reinforced by a
general security orientation where the user is more likely to exercise due diligence when opening
emails with attachments. Further, the confidence level of the user in identifying and addressing
the incident, self-efficacy, has been repeatedly found to be a positive predictor of information
security behavior adoption and implementation.
This research revealed that cues to action, perceived barriers and perceived severity to be
statistically not significant in forecasting information security behavior of college students at least
on the dataset considered. First, perceived barriers indicate the information security care is
inconvenient or difficult to learn by users. Such convictions are non-existent for the study’s
sample. First, college students are computer literate and have been previously exposed to
cybercrime either through their circles, media or classrooms. Second, about 50% of the sample
reported that their majors are IT-related indicating a high learning ability for computer security
behavior. Therefore, students seemed to be more comfortable implementing information security
practices and did not consider security as an inconvenience.
This study found cues to action to be a non-significant determinant for information security
behavior. Cues to action are unclear and difficult to fathom by students. Personal computers are
not equipped with visual software calling students for immediate action. By the same token,
emails could be manipulated to seem real victimizing students to fall into phishing schemes.
Further, students are not regularly reminded by the information security policy or the security
program available through their college decreasing their awareness about information security.
Therefore, the relationship between cues to action and information security behavior was not
found to be strong by this research. One important findings of this study showed that perceived
severity was not reported to be a good predictor of information security behavior. Such findings
allude to the possibility that perceived severity may not be influential on its own in making
college students practice security behavior. It is effective once interacted with other determinants
such as cues to action and perceived benefits. Therefore, for a revised model to be constructed,
perceived severity could not be eliminated since it was found to interact with other factors in the
system.
This research marks one of the first systematic analyses investigating the determinants of
information’s security behavior among college students. It hasused a new sample confirming
earlier findings. Such exercise is important for the development of theoretically-based solutions to
information security problems facing students. New programs and initiatives should take into
consideration the importance of significant constructs. This indicates that that universities should
14. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
94
raise the awareness of benefits associated with information’s security behavior. Further,
universities should focus on practical training increasing the self-efficacy of students in
addressing information security risks.
In near future we are going to investigate cybersecurity risks associated with college students
particularly phishing attacks. Phishing involves stealing sensitive information from users such as
usernames and passwords in order to access financial assets. Since phishers often targetnovice
users who lack cybersecurity knowledge and computer self-efficacy. Therefore, educating novice
users such as tertiary education students becomes crucial to keep them safe from cybersecurity
attacks especially phishing. One promising approach to raise awareness is to develop interactive
material (online, mobile, or simulated training) on the severity of phishing attacks, especially
when they are surfing the internet. We will conduct simulated practical workshops possibly at the
orientation level when students join the university to simulate real-world scenarios involving
cybersecurity attacks on their users in a safe environment in order to track their vulnerability to
phishing.At the end of the training, participantsarethen given the detailed report on the outcome
informing them about their vulnerability to cybersecurity attacks and providing them with
computer security material. We will then conduct in depth analyses on the data collection from
the workshop to possibly proposed a visualization model for detecting phishing attacks. Finally,
we are going also to investigate cybersecurity attacks by using mobile game. This cybersecurity
awareness mobile game will be expose students to several scenarios related to information
security especially cybersecurity attacks.
REFERENCES
1. UMBC (2017). Why College Campuses Are Big Targets for Cyber Attacks Ever wonder why YOUR
account would ever be hacked? Retrieved from https://doit.umbc.edu/news/?id=70678
2. Dahlstrom, E., and Bichsel, J. (2014). ECAR Study of Undergraduate Students and Information
Technology, 2014. Washington, DC: Educause.
3. Kim, B. (2014). Recommendations for information security awareness training for college students.
Information Management & Computer Security, 22(1), 115-126.
4. Lin, Q., Wang, K., and Gao, L. (2015). Exploration on the Education Mode of Effectively
Strengthening Security Awareness and Ability of Female College Students. Paris: Atlantis Press.
5. Shropshire, J., Warkentin, M., and Sharma, S. (2015). Personality, attitudes, and intentions: Predicting
initial adoption of information security behavior. Computers & Security, 49, 177-191.
6. Peltier, T. (2016). Information Security Policies, Procedures, and Standards: guidelines for effective
information security management. Boca Raton, Fl: Auerbach Publications.
7. Mohammad R., Thabtah F., McCluskey L., (2014) Predicting Phishing Websites based on Self-
Structuring Neural Network. Journal of Neural Computing and Applications, (3)1-16. Springer.
8. Thabtah F., Kamalov F. (2017) Phishing Detection: A Case Analysis on Classifiers with Rules using
Machine Learning. Journal of Information and Knowledge Management. World Scientific.
9. Thabtah F., Abdelhamid N. (2016) Deriving Correlated Sets of Website Features for Phishing
Detection: A Computational Intelligence Approach. Journal of Information and Knowledge
Management. 15, 1650042 (2016) [17 pages]. World Scientific.
10. Abdelhamid N, Ayesh A., Thabtah F. (2013) Phishing Detection using Associative Classification
Data Mining. ICAI'13 - The 2013 International Conference on Artificial Intelligence, pp. (491-499).
USA.
15. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
95
11. Mohammad R., Thabtah F., McCluskey L., (2013) Intelligent Rule based Phishing Websites
Classification. Journal of Information Security (2), 1-17. ISSN 17518709. IET.
12. Qabajeh I, Thabtah F, Chiclana F (2018) A recent review of conventional vs. automated cybersecurity
anti-phishing techniques. Computer Science Review 29, 44-55.
13. AlShboul R, Thabtah F, Abdelhamid N, Al-diabat M (2018) A visualization cybersecurity method
based on features’ dissimilarity Computers & Security 77, 289-303. 2018
14. Hajli, N., and Lin, X. (2016). Exploring the security of information sharing on social networking
sites: The role of perceived control of information. Journal of Business Ethics, 133(1), 111-123.
15. Ng, B., Kankahali, A., and Xu, Y. (2009). Studying users’ computer security behavior: a health belief
perspective. Decision Support Systems, 46, 815-825.
16. Skinner, C., Tiro, J., and Champion, V. (2015). The health belief model. In Health behavior: theory,
research, and practice, 5th ed. San Francisco (US): Jossey-Bass, 75-94.
17. Jones, C., Smith, H., and Llewellyn, C. (2014). Evaluating the effectiveness of health belief model
interventions in improving adherence: a systematic review. Health psychology review, 8(3), 253-269.
18. Merkow, M., and Breithaupt, J. (2014). Information security: Principles and practices. London:
Pearson Education.
19. L. Reznik, V. J. Buccigrossi III, J. Lewis, A. Dipon, S. Milstead, N. LaFontaine, K. Beck, and H.
Silvia, “Security of computer use practice: The case of ordinary users survey,” in Proceedings of the
5th Annual Symposium on Information Assurance (ASIA ’11),), June 7-8, 2011, ser. SOUPS ’07.
New York, NY, USA: ACM, June 2011, pp. 167–168.
20. Tekerek, M., and Tekerek, A. (2013). A research on students’ information security awareness.
Turkish Journal of Education, 2(3).
21. Smith, A. (2017). Americans and Cybersecurity: Password Management and Mobile Security.
Retrieved from http://www.pewinternet.org/2017/01/26/2-password-management-and-mobile-
security/
22. Ngoqo, B., and Flowerday, S. (2015). Exploring the relationship between student mobile information
security awareness and behavioural intent. Information & Computer Security, 23(4), 406-420.
23. Kang, R., Dabbish, L., Fruchter, N., and Kiesler, S. (2015, July). “My data just goes everywhere:”
user mental models of the internet and implications for privacy and security. In Symposium on Usable
Privacy and Security (SOUPS) (pp. 39-52). Berkeley, CA: USENIX Association.
24. Safa, N., Von Solms, R., and Futcher, L. (2016). Human aspects of information security in
organisations. Computer Fraud & Security, 2016(2), 15-18.
25. Abraham, C., and Sheeran, P. (2005). The health belief model. In M. Conner, P. Norman (Eds.),
Predicting Health Behaviour, Ch. 2. Berkshire (UK): Open University Press.
26. Groenewold, G., Bruijn, B., and Bilsborrow, R. (2006). Migration of the Health Belief Model (HBM):
Effects of psychosocial and migrant network characteristics on emigration intentions in five countries
in West Africa and the Mediterranean Region. The Population Association of America 2006 Annual
Meeting, March 30–April 1, Los Angeles, CA, 2006.
27. Janz, N. and Becker, M. (1984). The health belief model: a decade later. Health Education Quarterly
11.
28. Rosenstock, I. (1974). The health belief model and preventive health behavior. Health Education
Monographs 2.
16. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 6, December 2018
96
29. Rosenstock, I., Strecher, V., and Becker, M. (1988). Social learning theory and the health belief
model. Health Education Quarterly 15.
30. Conner, M. and Norman, P. (2005). Predicting health behaviour: a social cognition approach. In M.
Conner and P. Norman (Eds.), Predicting Health Behaviour, Ch. 1. Berkshire, UK: Open University
Press.
31. Chung, W., Chen, H., Chang, W., and Chou, S. (2006). Fighting Cybercrime: a review and the
Taiwan experience. Decision Support Systems, 41 (2006).
32. Davis, F. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information
technology. MIS Quarterly, 13(3).
33. Eccles, J. and Wigfield, A. (2002). Motivational beliefs, values, and goals. Annual Review
Psychology, 53.
34. Compeau, D., and Higgins, C. (1995). Computer self-efficacy: development of a measure and initial
test. MIS Quarterly, 19(2).
35. Cheung, C., Lee, Z., and Chan, T. (2015). Self-disclosure in social networking sites: the role of
perceived cost, perceived benefits and social influence. Internet Research, 25(2), 279-299.
36. Nunally, J. (1978). Psychometric. New York: McGraw Hill.
37. Woon, I., Tan, G., and Low, R. (2005). A protection motivation theory approach to home wireless
security. Proceedings of the Twenty-Sixth International Conference on Information Systems, Las
Vegas, Nevada, USA.
38. Champion, V. (1984). Instrument development for health belief model constructs. Advances in
Nursing Science, 6(3)
39. Chan, M., Woon, I., and Kankanhalli, A. (2005). Perceptions of information security in the
workplace: linking information security climate to compliant behavior. Journal of Information Privacy
and Security, 1(3).
40. Jayanti, R. and Burns, A. (1998). The antecedents of preventive health care behavior: an empirical
study. Academy of Marketing Science Journal 26(1).