IDEAS home Printed from https://ideas.repec.org/a/arp/tjssrr/2018p839-846.html
   My bibliography  Save this article

Security Behaviors on Social Network Sites Used For Academic Purposes: A Comparison of Security Preparedness and Awareness among IT and Non-IT Postgraduate Students

Author

Listed:
  • Somia Moh. T. L. Ashafee*

    (School of Computing, Universiti Utara, Malaysia)

  • Nur Haryani Zakaria

    (School of Computing, Universiti Utara, Malaysia)

  • Hatim Mohamad Tahir

    (School of Computing, Universiti Utara, Malaysia)

  • Norliza Katuk

    (School of Computing, Universiti Utara, Malaysia)

  • Mohd Nizam Omar

    (School of Computing, Universiti Utara, Malaysia)

Abstract

Security and privacy issues are a major concern to users of social network sites (SNS). These issues range from unauthorized access to personal information to cyber bullying. Previous researchers have been exerting different perspectives including technical, psychological and law to study privacy and security issues. However, the issues of security and privacy seems to be ongoing. In view of the security threats and privacy issues of student using SNS, this study sets out to examine the security awareness, preparedness towards cyber-attacks and security behaviors among IT and Non-IT postgraduate students. As such, 400 postgraduate students were surveyed using a self-administered questionnaire. The findings reported in this study revealed that IT students have significantly high security awareness and behavior as compared to Non-IT students. However, there is no significant difference between the preparedness towards cyber-attacks of both IT and Non-IT students. Finally, this study demonstrates that there is a significant relationship between preparedness towards cyber-attacks and security behaviors. The theoretical and practical implications of this study highlight the importance of security awareness and understanding of technical-know how in preempting security attacks among SNS users.

Suggested Citation

  • Somia Moh. T. L. Ashafee* & Nur Haryani Zakaria & Hatim Mohamad Tahir & Norliza Katuk & Mohd Nizam Omar, 2018. "Security Behaviors on Social Network Sites Used For Academic Purposes: A Comparison of Security Preparedness and Awareness among IT and Non-IT Postgraduate Students," The Journal of Social Sciences Research, Academic Research Publishing Group, pages 839-846:6.
  • Handle: RePEc:arp:tjssrr:2018:p:839-846
    as

    Download full text from publisher

    File URL: https://www.arpgweb.com/pdf-files/spi6.180.839-846.pdf
    Download Restriction: no

    File URL: https://www.arpgweb.com/journal/7/special_issue/12-2018/6/4
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Mark A. Harris & Steven Furnell & Karen Patten, 2014. "Comparing the Mobile Device Security Behavior of College Students and Information Technology Professionals," Journal of Information Privacy and Security, Taylor & Francis Journals, vol. 10(4), pages 186-202, October.
    2. Roberto J. Mejias & Pierre A. Balthazard, 2014. "A Model of Information Security Awareness for Assessing Information Security Risk for Emerging Technologies," Journal of Information Privacy and Security, Taylor & Francis Journals, vol. 10(4), pages 160-185, October.
    3. Ludwig Slusky & Parviz Partow-Navid, 2012. "Students Information Security Practices and Awareness," Journal of Information Privacy and Security, Taylor & Francis Journals, vol. 8(4), pages 3-26, October.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Joseph Vella & Åsa Wallström & Mana Farshid, 2017. "Financial services Apps: What makes the difference between a great and a ghastly review?," Journal of Financial Services Marketing, Palgrave Macmillan, vol. 22(3), pages 132-138, September.
    2. Guangxu Wang & Daniel Tse & Yuanshuo Cui & Hantao Jiang, 2022. "An Exploratory Study on Sustaining Cyber Security Protection through SETA Implementation," Sustainability, MDPI, vol. 14(14), pages 1-13, July.
    3. Harris, Mark A. & Brookshire, Robert & Chin, Amita Goyal, 2016. "Identifying factors influencing consumers’ intent to install mobile applications," International Journal of Information Management, Elsevier, vol. 36(3), pages 441-450.
    4. Teklemariam, Mekuria Haile, 2021. "Developing a tailored strategy for mobile applications’ adoption across diffusion levels: A panel data analysis," Technology in Society, Elsevier, vol. 66(C).
    5. Saqib Saeed, 2023. "Education, Online Presence and Cybersecurity Implications: A Study of Information Security Practices of Computing Students in Saudi Arabia," Sustainability, MDPI, vol. 15(12), pages 1-15, June.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:arp:tjssrr:2018:p:839-846. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Managing Editor (email available below). General contact details of provider: http://arpgweb.com/?ic=journal&journal=7&info=aims .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.