Scale for Efficacy in the Safe Use of the Internet for Students

Main Article Content

Nadire Cavus
Alaa A. Mohammed

Abstract

College understudies are overwhelming clients of the Internet contrasted with the overall public, and they assume a pivotal part in securing the Internet, and assurance of PCs is left to the activity of the clients. The main aim of the study is to investigate self-efficacy in the safe use of the internet for students. The volunteer participants used in this study consisted of a total of 99. The questionnaire is made up of 4 dimensions SNS, MS, WSS and CS which had 35 items altogether in total. The participants answered to items on 5 Likert Scale. The questionnaire reliability was calculated as 0.72. A questionnaire was used to collect data and was analyzed and interpreted using SPSS. Frequency and percentage, Independent sample t-test, ANOVA, methods were used during the analysis process. According to the results of the study, students have good awareness of computer security on a general note, but specifically in terms of social networking sites, web security and malicious software, the majority of the students have little awareness of them. As a result, the study could help universities, government and even parents of students, in Cyprus and in other countries, to be able to access the Internet safely.
Keywords: computer security; internet security; malicious software; social network sites; student perceptions;

Downloads

Download data is not yet available.

Article Details

How to Cite
Cavus, N., & Mohammed, A. A. (2017). Scale for Efficacy in the Safe Use of the Internet for Students. New Trends and Issues Proceedings on Humanities and Social Sciences, 3(3), 227–234. https://doi.org/10.18844/prosoc.v3i3.1557
Section
Articles

References

Aboud, S. J. (2012). An overview of cybercrime in Iraq. The Research Bulletin of Jordan ACM, 2 (2), 31-34.

Baaij, E. (2012). Safe internet use how a website can stimulate internet safety(MA Thesis).Philosophy of Science, Technology and Society Science and Technology Studies.

Bagachi, K. & Udo G. (2003) An analysis of the growth of computer and internet security breaches. Communications of the AIS, 12, 684-700.

Genis-Gruber, A., Gonul, M. S. & Tas, B. K. O. (2012). Obstacles to online shopping: impact of gender and internet security issues. Dokuz Eylul Universitesi Ä°ktisadi ve Ä°dari Bilimler Fakultesi Dergisi, 27 (2), 27-54.

Hachman, M. (2012). Anonymous: Symantec offered $50K for stolen code, plus a lie, PC Magazine. Retrieved from http://www.pcmag.com/article2/0,2817,2399912,00.asp on 12/2/2012. Hsiao, H., Tu, Y. & Chung, H. (2012). Perceived social supports, computer self-efficacy, and computer use among high school students. The Turkish Online Journal of Educational Technology, 11 (2), 167-177.

Kim, J. & Lee, J. E. R. (2011). The Facebook paths to happiness: Effects of the number of Facebook friends and self-presentation on subjective well-being. Cyberpsychology Behavior and Social Networking, 14 (6), 359–364.

Kross, E., Verduyn, P., Demiralp, E., Park, J., Lee, D. S. & Lin, N.(2013). Facebook use predicts declines in subjective well-being in young adults. PLoS ONE, 8 (8), 12-24.

Kuss, D. J. & Griffiths, M. D. (2011). Online social networking and addiction – A review of the psychological literature. International Journal of Environmental Research and Public Health, 8 (9), 3528–3552.

Liang, H. & Xue, Y. (2010). East Carolina understanding security behaviors in personal computer usage: A threat avoidance perspective. Journal of the Association for Information Systems, 11 (7), 394-413.

Liu, C.-Y. & Yu, C.-P. (2013). Can Facebook use induce well-being? Cyberpsychology, Behavior and Social Networking, 16 (9), 674–678.

Orchard, L. J., Fullwood, C., Galbraith, N. & Morris, N. (2014). Individual differences as predictors of social networking. Journal of Computer-Mediated Communication, 4, 12-19.

Reinecke, L. & Trepte, S. (2014). Authenticity and well-being on social network sites: A two-wave longitudinal study on the effects of online authenticity and the positivity bias in SNS communication. Computers in Human Behavior, 30, 95–102.

Shin, D. H. & Shin, Y. J. (2011). Why do people play social network games? Computers in Human Behavior, 27 (2), 852–861.

Shukla, J.B., Singh, G., Shukla, P. & Tripathi, A. (2014). Modeling and analysis of the effects of antivirus software on an infected computer network. Applied Mathematics and Computation, 227, 11–18.

Sipahi, B., Yurtkoru, E. S. & Cinko, M. (2010). Sosyal bilimlerde SPSS’le veri analizi. Istanbul: Beta Yayinlari.

Stephen J. Cutler, Hendricks, J. & Guyer, A. (2003). Age sifferences in home computer availability and use. Journal of Gerontology, 58 (5), 271–280.

Suri, G. & Sharma, S. (2013). The impact of gender on attitude towards computer technology and e-learning: An exploratory study of Punjab University, India. International Journal of Engineering Research, 2 (2), 132-136.