Journal of Pedagogical Sociology and Psychology
Awareness of cyber security aspects in distance education
Hassan Hadi M.A Al-Fatlawi 1 *
More Detail
1 Ministry of Oil, Petroleum Research and Development Center, Baghdad, Iraq
* Corresponding Author
Open Access Full Text (PDF)
ARTICLE INFO

Journal of Pedagogical Sociology and Psychology, 2024 - Volume 6 Issue 1, pp. 77-88
https://doi.org/10.33902/jpsp.202424403

Article Type: Research Article

Published Online: 10 Mar 2024

Views: 231 | Downloads: 200

ABSTRACT
In the ever-evolving landscape of information technology, its remarkable advancements are accompanied by a dark underbelly - the surge of digital crime. This necessitates the establishment of robust security measures within the digital realm. Cybersecurity is a pivotal technological development on the global stage, safeguarding data, networks, and electronic systems from debilitating attacks that jeopardize their integrity and wield significant influence in international relations. This study delves into assessing cyber security awareness in distance education, encompassing participants ranging from employees and university students to researchers and academics. The primary objective of this research is to underscore the pivotal role of cybersecurity education and the importance of cultivating an awareness of security threats in the education reform process. Furthermore, this paper posits the potential evolution of instructional techniques for cybersecurity through implementing machine learning and security analytics models. It provides a comprehensive overview of the contemporary cybersecurity landscape and technological advancements. Employing a quantitative descriptive analytical approach, the study reveals that participants exhibit moderate awareness regarding cyber security concepts, risks, and violations. Notably, there are no statistically significant differences at the 0.05 level. To enhance public awareness and facilitate active engagement in disseminating cyber security awareness, the study recommends the development of tailored distance learning curricula and the creation of sophisticated virtual learning environments. These measures are pivotal in fortifying our digital defenses and ensuring a safer digital future.
KEYWORDS
In-text citation: (Al-Fatlawi, 2024)
Reference: Al-Fatlawi, H. H. M. (2024). Awareness of cyber security aspects in distance education. Journal of Pedagogical Sociology and Psychology, 6(1), 77-88. https://doi.org/10.33902/jpsp.202424403
In-text citation: (1), (2), (3), etc.
Reference: Al-Fatlawi HHM. Awareness of cyber security aspects in distance education. Journal of Pedagogical Sociology and Psychology. 2024;6(1), 77-88. https://doi.org/10.33902/jpsp.202424403
In-text citation: (1), (2), (3), etc.
Reference: Al-Fatlawi HHM. Awareness of cyber security aspects in distance education. Journal of Pedagogical Sociology and Psychology. 2024;6(1):77-88. https://doi.org/10.33902/jpsp.202424403
In-text citation: (Al-Fatlawi, 2024)
Reference: Al-Fatlawi, Hassan Hadi M.A. "Awareness of cyber security aspects in distance education". Journal of Pedagogical Sociology and Psychology 2024 6 no. 1 (2024): 77-88. https://doi.org/10.33902/jpsp.202424403
In-text citation: (Al-Fatlawi, 2024)
Reference: Al-Fatlawi, H. H. M. (2024). Awareness of cyber security aspects in distance education. Journal of Pedagogical Sociology and Psychology, 6(1), pp. 77-88. https://doi.org/10.33902/jpsp.202424403
In-text citation: (Al-Fatlawi, 2024)
Reference: Al-Fatlawi, Hassan Hadi M.A "Awareness of cyber security aspects in distance education". Journal of Pedagogical Sociology and Psychology, vol. 6, no. 1, 2024, pp. 77-88. https://doi.org/10.33902/jpsp.202424403
REFERENCES
  • Abawajy, J., & Kim, T. H. (2010). Performance analysis of cyber security awareness delivery methods. In T. Kim, W. Fang, M. K. Khan, K. P. Arnett, H. Kang, & D. Slezak (Eds.), Security technology, disaster recovery, and business continuity (pp. 142-148). Springer. https://doi.org/10.1007/978-3-642-17610-4_16
  • Adams, A. and Blandford, A. (2003). Security and online learning: to protect or prohibit. In C. Ghaoui (Ed.), Usability evaluation of online learning programs (pp. 331–359). IDEA Publishing. https://doi.org/10.4018/978-1-59140-105-6.ch018
  • Agulla, E. G., Rifón, L. A., Castro, J. L. A., & Mateo, C. G. (2008). Is my student at the other side? Applying biometric web authentication to e-learning environments. In Commission (Ed.), 2008 Eighth IEEE international conference on advanced learning technologies (pp. 551-553). IEEE. https://doi.org/10.1109/ICALT.2008.184
  • Al-Janabi, S., & Al-Shourbaji, I. (2016). A study of cyber security awareness in educational environment in the Middle East. Journal of Information & Knowledge Management, 15(01), 1650007. https://doi.org/10.1142/S0219649216500076
  • Alwi, N.H., Fan, I. S. (2010). Information security threats analysis for e-learning. In M. D. Lytras (Ed.), Technology enhanced learning. quality of teaching and educational reform. TECH-EDUCATION 2010: Communications in computer and information science. Springer. https://doi.org/10.1007/978-3-642-13166-0_41
  • Amao, S. (2015). Active cyber defense to fight cybercrime (Publication No. 1606336) [Master’s thesis, Utica College]. ProQuest Dissertations and Theses Global.
  • Barik, N., & Karforma, S. (2012). Risks and remedies in e-learning system. International Journal of Network Security & Its Applications, 4(1), 51-59. https://doi.org/10.5121/ijnsa.2012.4105
  • Cain, A., Edwards, M. E., & Still, J. D. (2018). An exploratory study of cyber hygiene behaviors and knowledge. Journal of Information Security Applications, 42, 36-45. https://doi.org/10.1016/j.jisa.2018.08.002
  • Chen, Y. & He, W. (2013). Security Risks and Protection in Online Learning: A Survey. The International Review of Research in Open and Distance Learning, 14(5), 109-127. https://doi.org/10.19173/irrodl.v14i5.1632
  • Costinela-Luminiţa, C. D., & Nicoleta-Magdalena, C. I. (2012). E-learning security vulnerabilities. Procedia-Social and Behavioral Sciences, 46, 2297-2301. https://doi.org/10.1016/j.sbspro.2012.05.474
  • Dai, J. (2018). Situation awareness-oriented cyber security education. IEEE Frontiers in Education Conference, 2018, 1-8. https://doi.org/10.1109/FIE.2018.8658929
  • Eminağaoğlu, M., Uçar, E., & Eren, Ş. (2009). The positive outcomes of information security awareness training in companies – a case study. Information Security Technical Report, 14, 223-229. https://doi.org/10.1016/j.istr.2010.05.002
  • Furnell, S. M., & Vasileiou, I. (2022). A holistic view of cyber security education requirements. In M. Khosrow-Pour (Eds.), Research anthology on advancements in cybersecurity education (pp. 289–307). IGI Global. https://doi.org/10.4018/978-1-6684-3554-0.ch013
  • Garba, A., Maheyzah, B., Siti, H., & Dauda, I. (2020). Cyber security awareness among university students: a case study. Journal of Science Proceedings Series, 2(1), 82-86. https://doi.org/10.31580/sps.v2i1.1320
  • Hadlington, L. & Parsons, K. (2017). Can cyberloafing and internet addiction affect organizational information security? Cyberpsychology, Behavior, and Social Networking, 20(9), 567-571. https://doi.org/10.1089/cyber.2017.0239
  • Hair, J. F., Black, W. C., Babin, B. J., & Anderson, R. E. (2018). Multivariate data analysis. Cengage Learning, EMEA.
  • Kruger, H., Drevin, L., & Steyn, T. (2010). A vocabulary test to assess information security awareness. Information Management & Computer Security, 18(5), 316–327. https://doi.org/10.1108/09685221011095236
  • McDaniel, E. A. (2013). Securing the information and communications technology global supply chain from exploitation: Developing a strategy for education, training, and awareness. Issues in Informing Science and Information Technology, 10, 313–324. https://doi.org/10.28945/1813
  • Nayak, M., & Yasser, L. (2012). Cybercrime: A threat to network security. Internal Security Journal, 12(2), 84-88. https://doi.org/10.1016/S1353-4858(12)70020-X
  • Oncu, S., & Cakir, H. (2011). Research in online learning environments: Priorities and methodologies. Computers & Education, 57(1), 1098-1108. https://doi.org/10.1016/j.compedu.2010.12.009
  • Patel, A., Al-Janabi, S., AlShourbaji, I., & Pedersen, J. (2015). A novel methodology towards a trusted environment in mashup web applications. Computers & Security, 49, 107–122. https://doi.org/10.1016/j.cose.2014.10.009
  • Pawlowski, S.D. & Jung, Y. (2015). Social representations of cybersecurity by university students and implications for instructional design. Journal of Information Systems Education, 26, 281-294.
  • Poepjes, R., & Lane, M. (2012). An information security awareness capability model (ISACM) [Paper presentation]. 10th Australian Information Security Management Conference, AISM 2012.
  • Rezgui, Y., & Marks, A. (2008). Information security awareness in higher education: An exploratory study. Computers & Security, 27(7–8), 241–253. https://doi.org/10.1016/j.cose.2008.07.008
  • Shaw, R. S., Chen, C. C., Harris, A. L., & Huang, H. J. (2009). The impact of information richness on information security awareness training effectiveness. Computer Education, 52, 92–100. https://doi.org/10.1016/j.compedu.2008.06.011
  • Simonet, J., & Teufel, S. (2019). The influence of organizational, social, and personal factors on cybersecurity awareness and behavior of home computer users. In G. Dhillon (Ed.), SEC 2019, IFIP AICT, 562, 194–208. https://doi.org/10.1007/978-3-030-22312-0_14
  • Skripak, I. A., Aynazarova, S. N., Vladimirovna, E., Tkachenko, A. E., & Erina, L. S. (2020). Digital virtualization technologies in distance learning. Advanced Trends in Computer Science and Engineering, 9(2), 1808–1813. https://doi.org/10.30534/ijatcse/2020/138922020
  • Srivastava, A., & Sinha, S. (2013). Information security through e-learning using VTE. International Journal of Electronics and Computer Science Engineering, 2(18), 528-531.
  • UAE Today. (2010). Internet virus infects Ministry of Education. Emaratalyoum. http://www.emaratalyoum.com
  • Varakuti, D., & Shwethashri, K. (2023). Cybersecurity Awareness in Online Education: A Case Study Analysis. International Research Journal of Modernization in Engineering Technology and Science, 5(7), 1785.
  • Villanueva, J. A., Lacatan, L. L., Vinluan, A. A. (2020). Information technology security infrastructure malware detector system. International Journal of Advanced Trends in Computer Science and Engineering, 9(2), 1583–1587. https://doi.org/10.30534/ijatcse/2020/103922020
  • Weippl, E. & Ebner, M. (2008). Security & privacy challenges in e-learning 2.0 [Paper presentation]. E-Learn: World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education, Las Vegas, Nevada.
  • Yeo, A. C., Rahim, M. M. & Miri, L. (2007). Understanding factors affecting the success of information security risk assessment: The case of an Australian higher educational institution [Paper presentation]. Pacific Asia Conference on Information Systems (PACIS), New Zealand.
  • Zainudin, A. (2015). SEM made simple: a gentle approach to learning structural equation modeling. MPWS Rich Publication.
LICENSE
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.