Towards Determining the Effect of Age and Educational Level on
Cyber-Hygiene
- URL: http://arxiv.org/abs/2103.06621v1
- Date: Thu, 11 Mar 2021 11:42:23 GMT
- Title: Towards Determining the Effect of Age and Educational Level on
Cyber-Hygiene
- Authors: Celestine Ugwu, Casmir Ani, Modesta Ezema, Caroline Asogwa, Uchenna
Ome, Adaora Obayi, Deborah Ebem, Aminat Atanda and Elochukwu Ukwandu
- Abstract summary: Authors of this paper undertook an online pilot study among students and employees of University of Nigeria, Nsukka.
The survey seeks to find out the effect of age and level of education on the cyber hygiene knowledge and behaviour of the respondents.
Our findings show wide adoption of internet in institution of higher learning, whereas, significant number of the internet users do not have good cyber hygiene knowledge and behaviour.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: As internet related challenges increase such as cyber-attacks, the need for
safe practises among users to maintain computer system's health and online
security have become imperative, and this is known as cyber-hygiene. Poor
cyber-hygiene among internet users is a very critical issue undermining the
general acceptance and adoption of internet technology. It has become a global
issue and concern in this digital era when virtually all business transactions,
learning, communication and many other activities are performed online. Virus
attack, poor authentication technique, improper file backups and the use of
different social engineering approaches by cyber-attackers to deceive internet
users into divulging their confidential information with the intention to
attack them have serious negative implications on the industries and
organisations, including educational institutions. Moreover, risks associated
with these ugly phenomena are likely to be more in developing countries such as
Nigeria. Thus, authors of this paper undertook an online pilot study among
students and employees of University of Nigeria, Nsukka and a total of 145
responses were received and used for the study. The survey seeks to find out
the effect of age and level of education on the cyber hygiene knowledge and
behaviour of the respondents, and in addition, the type of devices used and
activities they engage in while on the internet. Our findings show wide
adoption of internet in institution of higher learning, whereas, significant
number of the internet users do not have good cyber hygiene knowledge and
behaviour. Hence, our findings can instigate an organised training for students
and employees of higher institutions in Nigeria.
Related papers
- Countering Autonomous Cyber Threats [40.00865970939829]
Foundation Models present dual-use concerns broadly and within the cyber domain specifically.
Recent research has shown the potential for these advanced models to inform or independently execute offensive cyberspace operations.
This work evaluates several state-of-the-art FMs on their ability to compromise machines in an isolated network and investigates defensive mechanisms to defeat such AI-powered attacks.
arXiv Detail & Related papers (2024-10-23T22:46:44Z) - Navigating the road to automotive cybersecurity compliance [39.79758414095764]
The automotive industry is compelled to adopt robust cybersecurity measures to safeguard both vehicles and data against potential threats.
The future of automotive cybersecurity lies in the continuous development of advanced protective measures and collaborative efforts among all stakeholders.
arXiv Detail & Related papers (2024-06-29T16:07:48Z) - knowCC: Knowledge, awareness of computer & cyber ethics between CS/non-CS university students [0.0]
This research focuses on the relations between cybersecurity awareness, cyber knowledge, computer ethics, cyber ethics, and cyber behavior.
The findings express that while internet users are alert of cyber threats, they only take the most elementary and easy-to-implement precautions.
arXiv Detail & Related papers (2023-10-19T12:29:26Z) - Systemization of Knowledge (SoK)- Cross Impact of Transfer Learning in Cybersecurity: Offensive, Defensive and Threat Intelligence Perspectives [25.181087776375914]
This paper presents a comprehensive survey of transfer learning applications in cybersecurity.
The survey highlights the significance of transfer learning in addressing critical issues in cybersecurity.
The paper identifies future research directions and challenges that require community attention.
arXiv Detail & Related papers (2023-09-12T00:26:38Z) - Graph Mining for Cybersecurity: A Survey [61.505995908021525]
The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe consequences on society.
Traditional Machine Learning (ML) based methods are extensively used in detecting cyber threats, but they hardly model the correlations between real-world cyber entities.
With the proliferation of graph mining techniques, many researchers investigated these techniques for capturing correlations between cyber entities and achieving high performance.
arXiv Detail & Related papers (2023-04-02T08:43:03Z) - Cyberbullying in Text Content Detection: An Analytical Review [0.0]
Online social networks increase the user's exposure to life-threatening situations such as suicide, eating disorder, cybercrime, compulsive behavior, anxiety, and depression.
To tackle the issue of cyberbullying, most existing literature focuses on developing approaches to identifying factors and understanding the textual factors associated with cyberbullying.
This paper conducts a comprehensive literature review to provide an understanding of cyberbullying detection.
arXiv Detail & Related papers (2023-03-18T21:23:06Z) - Global Pandemics Influence on Cyber Security and Cyber Crimes [5.8010446129208155]
COVID-19 has caused widespread damage across many areas of life and has made humans more dependent on the internet and technology.
This paper examines the different types of security threats and cyber crimes that people faced in the pandemic time and the need for a safe and secure cyber infrastructure.
arXiv Detail & Related papers (2023-02-24T05:26:42Z) - Cyberbullying Indicator as a Precursor to a Cyber Construct Development [0.0]
This study proposes a cyberbullying framework based on the identification of some observable behavioral indicators.
Using a self-administered measurement instrument from 30-respondents, the study observed the probability of a cyberbully construct.
arXiv Detail & Related papers (2022-03-31T07:55:51Z) - Framework for Managing Cybercrime Risks in Nigerian Universities [0.0]
The study is based on literature review and propose how an actionable framework that Nigerian Universities can adopt to setoff cybersecurity programs can be developed.
We conclude that the framework provides a lucrative starting point for Nigerian universities to setoff efficient and effective cyber security program.
arXiv Detail & Related papers (2021-08-22T15:24:32Z) - Disinformation in the Online Information Ecosystem: Detection,
Mitigation and Challenges [35.0667998623823]
A large fraction of the common public turn to social media platforms for news and even information regarding highly concerning issues such as COVID-19 symptoms.
There is a significant amount of ongoing research in the directions of disinformation detection and mitigation.
We discuss the online disinformation problem, focusing on the recent 'infodemic' in the wake of the coronavirus pandemic.
arXiv Detail & Related papers (2020-10-18T21:44:23Z) - Adversarial Machine Learning Attacks and Defense Methods in the Cyber
Security Domain [58.30296637276011]
This paper summarizes the latest research on adversarial attacks against security solutions based on machine learning techniques.
It is the first to discuss the unique challenges of implementing end-to-end adversarial attacks in the cyber security domain.
arXiv Detail & Related papers (2020-07-05T18:22:40Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.