Journal of Pedagogical Sociology and Psychology
Does threat knowledge influence protective behaviors of students in the context of cyber security in remote learning amid COVID-19 crisis?
Erwin Rotas 1 * , Michael Cahapay 2
More Detail
1 Department of Education, General Santos City, Philippines
2 College of Education, Mindanao State University, Philippines
* Corresponding Author
Open Access Full Text (PDF)
ARTICLE INFO

Journal of Pedagogical Sociology and Psychology, 2021 - Volume 3 Issue 1, pp. 45-53
https://doi.org/10.33902/JPSP.2021167595

Article Type: Research Article

Published Online: 03 Mar 2021

Views: 429 | Downloads: 192

ABSTRACT
Amid the current period of massive migration to remote learning, it can be practically assumed in the context of cyber security that giving students threat knowledge will increase their protective behaviors. An emerging stance in behavior theories, however, offer an interesting ground on the dissociation between knowledge and behavior. This article is a preliminary study with the aim to test if threat knowledge influence protective behaviors of students in the context of cyber security in remote learning amid the COVID-19 crisis. Gathering data from a sample of students from a teacher education department of a Philippine university, modified questionnaires were used in online surveys. The results revealed that the students are somewhat knowledgeable about the possible threats and they sometimes practice protective behaviors in remote learning. This indicates a practical need to heighten the cyber security of the students. This study further found no significant relationship between threat knowledge and protective behaviors of the students. While this outcome contributes a piece of evidence in the current debate in behavior theories, further validation in other contexts is necessary.
KEYWORDS
In-text citation: (Rotas & Cahapay, 2021)
Reference: Rotas, E., & Cahapay, M. (2021). Does threat knowledge influence protective behaviors of students in the context of cyber security in remote learning amid COVID-19 crisis?. Journal of Pedagogical Sociology and Psychology, 3(1), 45-53. https://doi.org/10.33902/JPSP.2021167595
In-text citation: (1), (2), (3), etc.
Reference: Rotas E, Cahapay M. Does threat knowledge influence protective behaviors of students in the context of cyber security in remote learning amid COVID-19 crisis?. Journal of Pedagogical Sociology and Psychology. 2021;3(1), 45-53. https://doi.org/10.33902/JPSP.2021167595
In-text citation: (1), (2), (3), etc.
Reference: Rotas E, Cahapay M. Does threat knowledge influence protective behaviors of students in the context of cyber security in remote learning amid COVID-19 crisis?. Journal of Pedagogical Sociology and Psychology. 2021;3(1):45-53. https://doi.org/10.33902/JPSP.2021167595
In-text citation: (Rotas and Cahapay, 2021)
Reference: Rotas, Erwin, and Michael Cahapay. "Does threat knowledge influence protective behaviors of students in the context of cyber security in remote learning amid COVID-19 crisis?". Journal of Pedagogical Sociology and Psychology 2021 3 no. 1 (2021): 45-53. https://doi.org/10.33902/JPSP.2021167595
In-text citation: (Rotas and Cahapay, 2021)
Reference: Rotas, E., and Cahapay, M. (2021). Does threat knowledge influence protective behaviors of students in the context of cyber security in remote learning amid COVID-19 crisis?. Journal of Pedagogical Sociology and Psychology, 3(1), pp. 45-53. https://doi.org/10.33902/JPSP.2021167595
In-text citation: (Rotas and Cahapay, 2021)
Reference: Rotas, Erwin et al. "Does threat knowledge influence protective behaviors of students in the context of cyber security in remote learning amid COVID-19 crisis?". Journal of Pedagogical Sociology and Psychology, vol. 3, no. 1, 2021, pp. 45-53. https://doi.org/10.33902/JPSP.2021167595
REFERENCES
  • Abawajy, J. (2012). User preference of cyber security awareness delivery methods. Behavior and Information Technology, 33(3), 237-248. https://doi.org/10.1080/0144929X.2012.708787
  • Abawajy, J. & Kim, T. (2010). Performance analysis of cyber security awareness delivery methods. Communications in Computer and Information Science, 122, 142-148. https://doi.org/10.1007/978-3-642-17610-4_16
  • Affia, A. A. O., Nolte, A. & Matulevičius, R. (2020). Developing and evaluating a hackathon approach to foster cyber security learning. International Conference on Collaboration Technologies and Social Computing, 3-19. https://doi.org/10.1007/978-3-030-58157-2_1
  • Ahola, M. (2019, October 18). The Role of Human Error in Successful Cyber Security Breaches. Usecure. Retrieved from https://blog.usecure.io/the-role-of-human-error-in-successful-cyber-security-breaches
  • Ajzen, I., Joyce, N., Sheikh, S., & Cote, N. G. (2011). Knowledge and the prediction of behavior: The role of information accuracy in the theory of planned behavior. Basic and Applied Social Psychology, 33(2), 101-117. https://doi.org/10.1080/01973533.2011.568834
  • Akhilesh, K. B. & Möller, D. P. F. (2020). Smart technologies: Scope and applications. Springer. https://doi.org/10.1007/978-981-13-7139-4
  • Ananth, P., & Koopman, C. (2003). HIV/AIDS knowledge, beliefs, and behavior among women of childbearing age in India. AIDS education and prevention: Official publication of the International Society for AIDS Education, 15(6), 529–546. https://doi.org/10.1521/aeap.15.7.529.24049
  • Bandara, I., Ioras, F. & Maher, K. (2014). Cyber security concerns in E-learning education. ICERI2014 Conference, 0728-0734.
  • Bandura A. (2004). Health promotion by social cognitive means. Health Education Behavior, 31(2):143–164. https://doi.org/10.1177/1090198104263660
  • Brown, S. (2010). Likert scale examples for surveys. Retrieved from https://www.extension.iastate.edu/Documents/ANR/LikertScaleExamplesforSurveys.pdf
  • Burgess, S. & Sievertsen, H. H. (2020, April 01). Schools, skills, and learning: The impact of COVID-19 on education. Retrieved from https://voxeu.org/article/impact-covid-19-education
  • Cahapay, M. B. & Ramirez, R. P. B. (2020). Relationship between Science Literacy and Disaster Preparedness: The Possible Role of Curriculum in Behavior Theories. Asian Journal of Science Education, 2(2), 78-86. https://doi.org/10.24815/ajse.v2i2.16803
  • Cain, A. A., Edwards, M. E. & Still, J. D. (2018). An exploratory study of cyber hygiene behaviors and knowledge. Journal of Information Security, 42, 36-45. https://doi.org/10.1016/j.jisa.2018.08.002
  • CHED COVID Advisory No. 7. Guidelines for the prevention, control and mitigation of the spread of Coronavirus Disease 2019 (COVID-19) in higher education institutions (HEIs). Retrieved from https://ched.gov.ph/
  • Chen, Y. & He, W. (2013). Security risks and protection in online learning: A survey. International Review of Research in Open and Distance Learning, 14(5), 108-127. https://doi.org/10.19173/irrodl.v14i5.1632
  • Chen, Y. & Zahedi, F. M. (2016). Individuals' internet security perceptions and behaviors: Poly-contextual contrasts between the United States and China. MIS Quarterly, 40(1), 205-222. https://doi.org/10.25300/MISQ/2016/40.1.09
  • Colby, C. & Profis, S. (2020). 9 rules for strong passwords: How to create and remember your login credentials. Retrieved from https://www.cnet.com/how-to/9-rules-for-strong-passwords-how-to-create-and-remember-your-login-credentials/
  • Curran, K. (2020). Cyber security and the remote workforce. Computer Fraud and Security, 2020(6), 11-12. https://doi.org/10.1016/S1361-3723(20)30063-4
  • Dela Cruz, R. T. (2016, July 9). How to ecome a cybersecurity expert. Retrieved from https://manilastandard.net/mobile/article/210365
  • Freedman, M. (2020, October 14). 18 ways to secure your devices from hackers. Business News Daily. https://www.businessnewsdaily.com/
  • Furnell, S. M. & Karweni, T. (2001). Security issues in online distance learning. VINE, 31(2), 28-35. https://doi.org/10.1108/03055720010803998
  • Guerra, C. E., Dominguez, F., & Shea, J. A. (2005). Literacy and knowledge, attitudes, and behavior about colorectal cancer screening. Journal of Health Communication, 10(7), 651–663. https://doi.org/10.1080/10810730500267720
  • Gummesson, E. (1991). Qualitative methods in management research. London: SAGE.
  • Hadlington, L. (2018). Employees attitude towards cyber security and risky online behaviours: An empirical assessment in the United Kingdom. International Journal of Cyber Criminology, 12(1), 269-281. https://doi.org/10.5281/zenodo.1467909
  • Hajj, A. A. & Rony, M. (2020). Cyber security in the age of COVID-19: An analysis of cyber-crime and attacks. International Journal for Research in Applied Science & Engineering Technology, 8(8), 1476-1480. https://doi.org/10.22214/ijraset.2020.31216
  • Hobfoll, S. E., Jackson, A. P., Lavin, J., Britton, P. J., & Shepherd, J. B. (1994). Reducing inner-city women's AIDS risk activities: a study of single, pregnant women. Health Psychology: Official journal of the Division of Health Psychology, American Psychological Association, 13(5), 397–403. https://doi.org/10.1037/0278-6133.13.5.397
  • Imgraben, J., Engelbrecht, A. & Choo, K. R. (2014). Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users. Behaviour and Information Technology, 33(12), 1347-1360. https://doi.org/10.1080/0144929X.2014.934286
  • Khan, N. A., Zaman, N. & Brohi, S. N. (2020). Ten deadly cyber security threats amid COVID-19 pandemic. TechRxiv. https://doi.org/10.36227/techrxiv.12278792.v1
  • Lancaster, C. (1990). Personal practices of and beliefs about breast self-examination m students of nursing (Unpublished honours dissertation) Western Australia College of Advanced Education, Perth.
  • Luminita, D. C. (2011). Information security in E-learning platforms. Procedia- Social and Behavioral Sciences, 15, 2689-2693. https://doi.org/10.1016/j.sbspro.2011.04.171
  • Malecki, A. (2018). Cybersecurity in the classroom: Bridging the gap between computer access and online safety. Cyber Security Capstone Research Project Reports, 1. Retrieved from https://scholar.valpo.edu/cscrpr/1/
  • May, M. & George, S. (2011). Privacy concerns in e-Learning: Is using a tracking system a threat? International Journal of Information and Education Technology, 1(1). Available: http://liris.cnrs.fr/Documents/Liris-5266.pdf
  • McCombes, S. (2019). Correlational research. Retrieved from https://cacb.ca/
  • McCormac, A., Calic, D., Parsons, K., Butavicius, M., Pattinson, M. & Lillie, M. (2018). The effect of resilience and job stress on information security awareness. Information and Computer Security, 26(3). Available: https://www.emerald.com/insight/content/doi/10.1108/ICS-03-2018-0032/full/html
  • Natonton, O. R. R. (2018). Cybersecurity awareness among selected educational institutions in Butuan City PH. Mindanao Peace Studies & Conference 4, 1-14.
  • Paige, S. R., Bonnar, K. K., Black, D. R., & Coster, D. C. (2018). Risk factor knowledge, perceived threat, and protective health behaviors: Implications for type 2 diabetes control in rural communities. The Diabetes educator, 44(1), 63–71. https://doi.org/10.1177/0145721717747228
  • Parsons, K., McCormac, A., Butavicius, M., Pattinson, M. & Jerram, C. (2014). Determining employee awareness using the human aspects of information security questionnaire (HAIS-Q). Computer and Security, 42, 165-176. https://doi.org/10.1016/j.cose.2013.12.003
  • Reid, R. & van Niekerk, J. (2016). Decoding audience interpretations of awareness campaign messages. Information and Computer Security, 24(2), 177-193. https://doi.org/10.1108/ICS-01-2016-0003
  • Richard, K. (2019, September 16). Changing People’s Behavior: Awareness Alone Is Not Enough. Design and Critical Thinking. Retrieved from https://medium.com/human-centered-thinking-switzerland/changing-peoples-behavior-awareness-alone-is-not-enough-8de3b3204e35
  • Safa, N. S., von Solms, R. & Furnell, S. (2016). Information security policy compliance model in organisations. Computers and Security, 56, 1-13. https://doi.org/10.1016/j.cose.2015.10.006
  • Schlueter L. A. (1982). Knowledge and beliefs about breast cancer and breast self-examination among athletic and nonathletic women. Nursing research, 31(6), 348–353. https://pubmed.ncbi.nlm.nih.gov/6924219/
  • Schultz, E. (2005). The human factor in security. Computer and Security, 24(6), 425-426. https://doi.org/10.1016/j.cose.2005.07.002fle
  • Sheeran, P., & Taylor, S. (1999). Predicting intentions to use condoms: A meta-analysis and comparison of the theories of reasoned action and planned behavior. Journal of Applied Social Psychology, 29(8), 1624–1675. https://doi.org/10.1111/j.1559-1816.1999.tb02045.x
  • Silver Wallace, L. (2002). Osteoporosis prevention in college women: Application of the expanded health belief model. American Journal of Health Behavior, 26(3), 163–172. https://doi.org/10.5993/AJHB.26.3.1
  • Spirito A, Esposito-Smythers C, Wolff J, Uhl K, Cognitive-behavioral therapy for adolescent depression and suicidality, Child and Adolescent Psychiatric Clinics of North America. https://doi.org/10.1016/j.chc.2011.01.012
  • Tunggal, A. T. (2020, October 20). What is a cyber threat? Cybersecurity & Risk Management Blog. https://www.upguard.com/
  • Umali, T. (2018, November 12). Cybersecurity in the Philippine academe to bridge skills gap. Open Government. Retrieved from https://opengovasia.com/cybersecurity-in-the-philippine-academe-to-bridge-skills-gap/
  • Zwilling, M., Klien, G., Lesjak, D., Wiechetek, L., Cetin, F., & Basim, H. N. (2020). Cyber security awareness, knowledge and behavior: A comparative study. Journal of Computer Information Systems. https://doi.org/10.1080/08874417.2020.1712269
LICENSE
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.