Scale for Efficacy in the Safe Use of the Internet for Students
Main Article Content
Abstract
College understudies are overwhelming clients of the Internet contrasted with the overall public, and they assume a pivotal part in securing the Internet, and assurance of PCs is left to the activity of the clients. The main aim of the study is to investigate self-efficacy in the safe use of the internet for students. The volunteer participants used in this study consisted of a total of 99. The questionnaire is made up of 4 dimensions SNS, MS, WSS and CS which had 35 items altogether in total. The participants answered to items on 5 Likert Scale. The questionnaire reliability was calculated as 0.72. A questionnaire was used to collect data and was analyzed and interpreted using SPSS. Frequency and percentage, Independent sample t-test, ANOVA, methods were used during the analysis process. According to the results of the study, students have good awareness of computer security on a general note, but specifically in terms of social networking sites, web security and malicious software, the majority of the students have little awareness of them. As a result, the study could help universities, government and even parents of students, in Cyprus and in other countries, to be able to access the Internet safely.
Keywords: computer security; internet security; malicious software; social network sites; student perceptions;
Downloads
Article Details
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
References
Aboud, S. J. (2012). An overview of cybercrime in Iraq. The Research Bulletin of Jordan ACM, 2 (2), 31-34.
Baaij, E. (2012). Safe internet use how a website can stimulate internet safety(MA Thesis).Philosophy of Science, Technology and Society Science and Technology Studies.
Bagachi, K. & Udo G. (2003) An analysis of the growth of computer and internet security breaches. Communications of the AIS, 12, 684-700.
Genis-Gruber, A., Gonul, M. S. & Tas, B. K. O. (2012). Obstacles to online shopping: impact of gender and internet security issues. Dokuz Eylul Universitesi Ä°ktisadi ve Ä°dari Bilimler Fakultesi Dergisi, 27 (2), 27-54.
Hachman, M. (2012). Anonymous: Symantec offered $50K for stolen code, plus a lie, PC Magazine. Retrieved from http://www.pcmag.com/article2/0,2817,2399912,00.asp on 12/2/2012. Hsiao, H., Tu, Y. & Chung, H. (2012). Perceived social supports, computer self-efficacy, and computer use among high school students. The Turkish Online Journal of Educational Technology, 11 (2), 167-177.
Kim, J. & Lee, J. E. R. (2011). The Facebook paths to happiness: Effects of the number of Facebook friends and self-presentation on subjective well-being. Cyberpsychology Behavior and Social Networking, 14 (6), 359–364.
Kross, E., Verduyn, P., Demiralp, E., Park, J., Lee, D. S. & Lin, N.(2013). Facebook use predicts declines in subjective well-being in young adults. PLoS ONE, 8 (8), 12-24.
Kuss, D. J. & Griffiths, M. D. (2011). Online social networking and addiction – A review of the psychological literature. International Journal of Environmental Research and Public Health, 8 (9), 3528–3552.
Liang, H. & Xue, Y. (2010). East Carolina understanding security behaviors in personal computer usage: A threat avoidance perspective. Journal of the Association for Information Systems, 11 (7), 394-413.
Liu, C.-Y. & Yu, C.-P. (2013). Can Facebook use induce well-being? Cyberpsychology, Behavior and Social Networking, 16 (9), 674–678.
Orchard, L. J., Fullwood, C., Galbraith, N. & Morris, N. (2014). Individual differences as predictors of social networking. Journal of Computer-Mediated Communication, 4, 12-19.
Reinecke, L. & Trepte, S. (2014). Authenticity and well-being on social network sites: A two-wave longitudinal study on the effects of online authenticity and the positivity bias in SNS communication. Computers in Human Behavior, 30, 95–102.
Shin, D. H. & Shin, Y. J. (2011). Why do people play social network games? Computers in Human Behavior, 27 (2), 852–861.
Shukla, J.B., Singh, G., Shukla, P. & Tripathi, A. (2014). Modeling and analysis of the effects of antivirus software on an infected computer network. Applied Mathematics and Computation, 227, 11–18.
Sipahi, B., Yurtkoru, E. S. & Cinko, M. (2010). Sosyal bilimlerde SPSS’le veri analizi. Istanbul: Beta Yayinlari.
Stephen J. Cutler, Hendricks, J. & Guyer, A. (2003). Age sifferences in home computer availability and use. Journal of Gerontology, 58 (5), 271–280.
Suri, G. & Sharma, S. (2013). The impact of gender on attitude towards computer technology and e-learning: An exploratory study of Punjab University, India. International Journal of Engineering Research, 2 (2), 132-136.