IDEAS home Printed from https://ideas.repec.org/a/gam/jsusta/v15y2023i12p9426-d1169124.html
   My bibliography  Save this article

Education, Online Presence and Cybersecurity Implications: A Study of Information Security Practices of Computing Students in Saudi Arabia

Author

Listed:
  • Saqib Saeed

    (SAUDI ARAMCO Cybersecurity Chair, Department of Computer Information Systems, College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, P.O. Box 1982, Dammam 31441, Saudi Arabia)

Abstract

Information technology is considered as a key enabler to achieve “education for all” as a sustainable development goal; however, involvement in the education sector has introduced security risks along with benefits. Students’ exposure to the internet has increased the probability of cybersecurity attacks. To foster a more sustainable use of technology, it is crucial that students are made aware of information security risks and can keep themselves protected in the online sphere. In this paper, we present the results of a cross-sectional study that explores information-security awareness among students in Saudi Arabia. Empirical data were collected using an online questionnaire and a factor analysis was conducted using partial least-squares structured equation modelling. Based on the existing literature, we focused on four key constructs: password management, infrastructure management, email management, and the perception of security. The results of this study have highlighted that email management and infrastructure management were seen as relevant factors, whereas password management and the perception of security were not considered relevant factors by the respondents. We have also chalked out recommendations to improve cybersecurity awareness among students. The findings of this study will potentially help educational institutions and parents to prepare students in adopting security practices while they are online.

Suggested Citation

  • Saqib Saeed, 2023. "Education, Online Presence and Cybersecurity Implications: A Study of Information Security Practices of Computing Students in Saudi Arabia," Sustainability, MDPI, vol. 15(12), pages 1-15, June.
  • Handle: RePEc:gam:jsusta:v:15:y:2023:i:12:p:9426-:d:1169124
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/2071-1050/15/12/9426/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/2071-1050/15/12/9426/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Myeonggil Choi, 2016. "Leadership of Information Security Manager on the Effectiveness of Information Systems Security for Secure Sustainable Computing," Sustainability, MDPI, vol. 8(7), pages 1-21, July.
    2. Guangxu Wang & Daniel Tse & Yuanshuo Cui & Hantao Jiang, 2022. "An Exploratory Study on Sustaining Cyber Security Protection through SETA Implementation," Sustainability, MDPI, vol. 14(14), pages 1-13, July.
    3. Ludwig Slusky & Parviz Partow-Navid, 2012. "Students Information Security Practices and Awareness," Journal of Information Privacy and Security, Taylor & Francis Journals, vol. 8(4), pages 3-26, October.
    4. Saqib Saeed, 2023. "Digital Workplaces and Information Security Behavior of Business Employees: An Empirical Study of Saudi Arabia," Sustainability, MDPI, vol. 15(7), pages 1-20, March.
    5. Alotaibi, Norah Basheer & Mukred, Muaadh, 2022. "Factors affecting the cyber violence behavior among Saudi youth and its relation with the suiciding: A descriptive study on university students in Riyadh city of KSA," Technology in Society, Elsevier, vol. 68(C).
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Somia Moh. T. L. Ashafee* & Nur Haryani Zakaria & Hatim Mohamad Tahir & Norliza Katuk & Mohd Nizam Omar, 2018. "Security Behaviors on Social Network Sites Used For Academic Purposes: A Comparison of Security Preparedness and Awareness among IT and Non-IT Postgraduate Students," The Journal of Social Sciences Research, Academic Research Publishing Group, pages 839-846:6.
    2. Petro Mlyakado, Budeba & Li, Jessica Chi-Mei & Xinshan Jia, Cindy, 2023. "Online sexual exploitation of adolescents in Tanzania: Explaining help-seeking intention using the theory of planned behaviour," Children and Youth Services Review, Elsevier, vol. 154(C).
    3. Freddy Marilahimbilu Mgiba & Thozama Mxotwa, 2024. "Communicating Banking Cyber-security Measures, Customer Ethical Concerns, Experience, and Loyalty Intentions: A Developing Economy’s Perspective," International Review of Management and Marketing, Econjournals, vol. 14(3), pages 123-135, May.
    4. Jong Hyuk Park, 2019. "Advanced IT-Based Future Sustainable Computing (2017–2018)," Sustainability, MDPI, vol. 11(8), pages 1-6, April.
    5. Guangxu Wang & Daniel Tse & Yuanshuo Cui & Hantao Jiang, 2022. "An Exploratory Study on Sustaining Cyber Security Protection through SETA Implementation," Sustainability, MDPI, vol. 14(14), pages 1-13, July.
    6. Binglong Zheng & Daniel Tse & Jiajing Ma & Xuanyi Lang & Yinli Lu, 2023. "An Empirical Study of SETA Program Sustaining Educational Sector’s Information Security vs. Information Systems Misuse," Sustainability, MDPI, vol. 15(17), pages 1-17, August.
    7. Saleem, Sumera & Khan, Naurin Farooq & Zafar, Saad & Raza, Najla, 2022. "Systematic literature reviews in cyberbullying/cyber harassment: A tertiary study," Technology in Society, Elsevier, vol. 70(C).
    8. Moon, Yun Ji & Choi, Myeonggil & Armstrong, Deborah J., 2018. "The impact of relational leadership and social alignment on information security system effectiveness in Korean governmental organizations," International Journal of Information Management, Elsevier, vol. 40(C), pages 54-66.
    9. Shiann Ming Wu & Tsung-chun Chen & Yenchun Jim Wu & Miltiadis Lytras, 2018. "Smart Cities in Taiwan: A Perspective on Big Data Applications," Sustainability, MDPI, vol. 10(1), pages 1-14, January.
    10. Jong Hyuk Park & Han-Chieh Chao, 2017. "Advanced IT-Based Future Sustainable Computing," Sustainability, MDPI, vol. 9(5), pages 1-4, May.
    11. Amanda M. Y. Chu & Mike K. P. So, 2020. "Organizational Information Security Management for Sustainable Information Systems: An Unethical Employee Information Security Behavior Perspective," Sustainability, MDPI, vol. 12(8), pages 1-25, April.
    12. Ahmed M. Al-Wathinani & Dennis G. Barten & Marta Borowska-Stefańska & Paweł Gołda & Noora A. AlDulijan & Mohammad A. Alhallaf & Lujain O. Samarkandi & Abdullah S. Almuhaidly & Mariusz Goniewicz & Wale, 2023. "Driving Sustainable Disaster Risk Reduction: A Rapid Review of the Policies and Strategies in Saudi Arabia," Sustainability, MDPI, vol. 15(14), pages 1-20, July.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jsusta:v:15:y:2023:i:12:p:9426-:d:1169124. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.