161
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

Information Security Practices and Intervention Among Teenagers

&

References

  • Adam IO, Alhassan MD. The effect of mobile phone penetration on the quality of life. Telecomm Policy. 2021;45(4):102109. doi:10.1016/j.telpol.2021.102109.
  • Purwanto A, Fahmi K, Cahyono Y. The benefits of using social media in the learning process of students in the digital literacy era and the education 4.0 era. J Inf Syst Manage. 2023;2:1–7.
  • Zhang X. Exploring the patterns and determinants of the global mobile divide. Telemat Inf. 2017;34(1):438–49. doi:10.1016/j.tele.2016.06.010.
  • Bhaharin SH, Asma’mokhtar U, Sulaiman R, Yusof MM. Issues and trends in information security policy compliance. In 2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS); 2019 Dec; Johor Bahru: IEEE. p. 1–6.
  • Steinbart PJ, Raschke RL, Gal G, Dilla WN. The influence of a good relationship between the internal audit and information security functions on information security outcomes. Account Organ Soc. 2018;71:15–29. doi:10.1016/j.aos.2018.04.005.
  • Schlackl F, Link N, Hoehle H. Antecedents and consequences of data breaches: a systematic review. Inf Manage. 2022;59(4):103638. doi:10.1016/j.im.2022.103638.
  • Li L, He W, Xu L, Ash I, Anwar M, Yuan X. Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior. Int J Inf Manage. 2019;45:13–24. doi:10.1016/j.ijinfomgt.2018.10.017.
  • Hong Y, Furnell S. Motivating information security policy compliance: insights from perceived organizational formalization. J Comput Inf Syst. 2022;62(1):19–28. doi:10.1080/08874417.2019.1683781.
  • Ganesh A, Ndulue C, Orji R. Smartphone security and privacy–a gamified persuasive approach with protection motivation theory. In International Conference on Persuasive Technology; 2022 Mar; Cham: Springer International Publishing. p. 89–100.
  • Smahel D, Machackova H, Mascheroni G, Dedkova L, Staksrud E, Ólafsson K, Livingstone S, Hasebrink U. EU kids online 2020: survey results from 19 countries. EU Kids Online. 2020. doi:10.21953/lse.47fdeqj01ofo.
  • ITU. Facts and Figures 2021. [accessed 2023 Jan 15]. https://www.itu.int/itu-d/reports/statistics/2021/11/15/youth-internet-use/.
  • Perrin A, Jingjing J. Teens, social media and technology 2022. Pew Research Center; 2022 Aug 10 [accessed 2023 Jan 15]. https://www.pewresearch.org/internet/2022/08/10/teens-social-media-and-technology-2022/ .
  • Singh J. Violence against women in cyber world: a special reference to India. Int J Adv Res Manage Social Sci. 2015;4:60–76.
  • Iuga C, Nurse JR, Erola A. Baiting the hook: factors impacting susceptibility to phishing attacks. Hum Cent Comput Inf Sci. 2016;6(1):1–20. doi:10.1186/s13673-016-0065-2.
  • Boer M, Stevens GW, Finkenauer C, de Looze ME, van den Eijnden RJ. Social media use intensity, social media use problems, and mental health among adolescents: investigating directionality and mediating processes. Comput Human Behav. 2021;116:106645. doi:10.1016/j.chb.2020.106645.
  • Karadimce A, Bukalevska M. Threats targeting children on online social networks. WSEAS Trans Adv Eng Educ. 2023;20:25–31. doi:10.37394/232010.2023.20.4.
  • Kaur M, Saini M. Indian government initiatives on cyberbullying: a case study on cyberbullying in Indian higher education institutions. Educ Inf Technol. 2023;28(1):581–615. doi:10.1007/s10639-022-11168-4.
  • Vannucci A, Simpson EG, Gagnon S, Ohannessian CM. Social media use and risky behaviors in adolescents: a meta-analysis. J Adolesc. 2020;79(1):258–74. doi:10.1016/j.adolescence.2020.01.014.
  • Vanden Abeele MM. Mobile youth culture: a conceptual development. Mobile Media Commun. 2016;4(1):85–101. doi:10.1177/2050157915601455.
  • Baron-Polańczyk E. Reasons for the use of ICT by children and teenagers in daily practice-differentiating factors. New Educ Rev. 2021;65(3):99–109. doi:10.15804/tner.21.65.3.08.
  • Eginli AT, Tas NO. Interpersonal communication in social networking sites: an investigation in the framework of uses and gratification theory. Online J Commun Media Technol. 2018;8(2):81–104. doi:10.12973/ojcmt/2355.
  • Taha N, Dahabiyeh L. College students information security awareness: a comparison between smartphones and computers. Educ Inf Technol. 2021;26(2):1721–36. doi:10.1007/s10639-020-10330-0.
  • Whiting A, Williams D. Why people use social media: a uses and gratifications approach. Qual Mark Res. 2013;16(4):362–69. doi:10.1108/QMR-06-2013-0041.
  • Orben A. Teenagers, screens and social media: a narrative review of reviews and key studies. Soc Psych Psych Epid. 2020;55(4):407–14. doi:10.1007/s00127-019-01825-4.
  • Kaplan AM, Haenlein M. Users of the world, unite! The challenges and opportunities of social media. Bus Horiz. 2010;53(1):59–68. doi:10.1016/j.bushor.2009.09.003.
  • Aichner T, Grünfelder M, Maurer O, Jegeni D. Twenty-five years of social media: a review of social media applications and definitions from 1994 to 2019. Cyberpsychol Behav Soc Netw. 2021;24(4):215–22. doi:10.1089/cyber.2020.0134.
  • Popoola M. New media usage for communication and self concept among journalism and mass communication students in Oyo State, Nigeria. New Media Mass Commun. 2014;26:22–34.
  • Collin P, Rahilly K, Richardson I, Third A. The benefits of social networking services. 2011.
  • Jorgensen Z, Chen J, Gates CS, Li N, Proctor RW, Yu T. Dimensions of risk in mobile applications: a user study. In Proceedings of the 5th ACM Conference on Data and Application Security and Privacy; 2015 Mar; Texas, USA p. 49–60.
  • Ismailova R, Muhametjanova G. Cyber crime risk awareness in Kyrgyz republic. Inf Secur J. 2016;25(1–3):32–38. doi:10.1080/19393555.2015.1132800.
  • Herath TB, Khanna P, Ahmed M. Cybersecurity practices for social media users: a systematic literature review. J Cybersecur Privacy. 2022;2(1):1–18. doi:10.3390/jcp2010001.
  • Eyadat MS. Information security: SETA program status at Jordanian universities. Int J Inf Privacy Secur. 2015;11(3):174–81. doi:10.1080/15536548.2015.1073535.
  • Lebek B, Uffen J, Neumann M, Hohler B, Breitner MH. Information security awareness and behavior: a theory-based literature review. Manag Res Rev. 2014;37(12):1049–92. doi:10.1108/MRR-04-2013-0085.
  • Jones BH, Chin AG, Aiken P. Risky business: students and smartphones. TechTrends. 2014;58(6):73–83. doi:10.1007/s11528-014-0806-x.
  • Henson B, Reyns BW, Fisher BS. Security in the 21st century: examining the link between online social network activity, privacy, and interpersonal victimization. Crim Justice Rev. 2011;36(3):253–68. doi:10.1177/0734016811399421.
  • Zwilling M, Klien G, Lesjak D, Wiechetek Ł, Cetin F, Basim HN. Cyber security awareness, knowledge and behavior: a comparative study. J Comput Inf Syst. 2020;62(1):1–16. doi:10.1080/08874417.2020.1712269.
  • Hooper V, Blunt C. Factors influencing the information security behaviour of IT employees. Behav Inf Technol. 2020;39(8):862–74. doi:10.1080/0144929X.2019.1623322.
  • Tsohou A, Karyda M, Kokolakis S, Kiountouzis E. Managing the introduction of information security awareness programmes in organisations. Eur J Inf Syst. 2015;24(1):38–58. doi:10.1057/ejis.2013.27.
  • Moallem A. Cybersecurity awareness among students and faculty. Boca Raton (FL): CRC Press; 2019.
  • Saxena P, Kotiyal B, Goudar RH. A cyber era approach for building awareness in cyber security for educational system in India. Int J Inf Educ Technol. 2012;2(2):167. doi:10.7763/IJIET.2012.V2.102.
  • Parsons K, Calic D, Pattinson M, Butavicius M, McCormac A, Zwaans T. The human aspects of information security questionnaire (HAIS-Q): two further validation studies. Comput Secur. 2017;66:40–51. doi:10.1016/j.cose.2017.01.004.
  • Park EH, Kim J, Park YS. The role of information security learning and individual factors in disclosing patients’ health information. Comput Secur. 2017;65:64–76. doi:10.1016/j.cose.2016.10.011.
  • Kim EB. Information security awareness status of business college: undergraduate students. Inf Secur J. 2013;22(4):171–79. doi:10.1080/19393555.2013.828803.
  • Reveraert M, Sauer T. A four-part typology to assess organizational and individual security awareness. Inf Secur J. 2020;31(1):1–19. doi:10.1080/19393555.2020.1855374.
  • Moletsane T, Tsibolane P. Mobile information security awareness among students in higher education: an exploratory study. In 2020 Conference on Information Communications Technology and Society (ICTAS); 2020 Mar; Durban (South Africa): IEEE. p. 1–6.
  • Slusky L, Partow-Navid P. Students information security practices and awareness. Int J Inf Privacy Secur. 2012;8(4):3–26. doi:10.1080/15536548.2012.10845664.
  • Rogers RW. A protection motivation theory of fear appeals and attitude change1. J Psychol. 1975;91(1):93–114. doi:10.1080/00223980.1975.9915803.
  • Farooq A, Isoaho J, Virtanen S, Isoaho J. Information security awareness in educational institution: an analysis of students’ individual factors. In 2015 IEEE Trustcom/BigDataSE/ISPA. Vol. 1; 2015 Aug; Helsinki (Finland): IEEE. p. 352–59.
  • Mou J, Cohen JF, Bhattacherjee A, Kim J. A test of protection motivation theory in the information security literature: a meta-analytic structural equation modeling approach in search advertising. J Assoc Inf Syst. 2022;23(1):196–236. doi:10.17705/1jais.00723.
  • Velki T, Solic K, Gorjanac V, Nenadic K. Empirical study on the risky behavior and security awareness among secondary school pupils-validation and preliminary results. In 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO); 2017 May; Opatija (Croatia): IEEE. p. 1280–84.
  • Saracli S, Erdoğmuş A. Determining the effects of information security knowledge on information security awareness via structural equation modelings. Hacettepe J Math Stat. 2019;48(4):1201–12. doi:10.15672/HJMS.2018.641.
  • Calderwood F, Popova I. Smartphone cyber security awareness in developing countries: a case of Thailand. In International Conference on Emerging Technologies for Developing Countries; 2018 May; Cham: Springer. p. 79–86.
  • Bryant K, Campbell J. User behaviours associated with password security and management. Australas J Inf Syst. 2006;14(1). doi:10.3127/ajis.v14i1.9.
  • Filippidis AP, Hilas CS, Filippidis G, Politis A. Information security awareness of Greek higher education students—preliminary findings. In 2018 7th International Conference on Modern Circuits and Systems Technologies (MOCAST); 2018 May; IEEE. p. 1–4.
  • Sreehari A, Abinanth KJ, Sujith B, Unnikuttan PS, Jayashree M. A study of awareness of cyber crime among college students with special reference to Kochi. Int J Pure Appl Math. 2018;119:1353–60.
  • Riley S. Password security: what users know and what they actually do. Usability News. 2006;8:2833–36.
  • Alzubaidi A. Measuring the level of cyber-security awareness for cybercrime in Saudi Arabia. Heliyon. 2021;7(1):e06016. doi:10.1016/j.heliyon.2021.e06016.
  • Adebiaye R, Ajani T. Information technology usage: quantitative analysis of smartphone security awareness and practices among undergraduate students in the United States. Int J Eng Tech Mgmt Res. 2018;5(3):270–84. doi:10.29121/ijetmr.v5.i3.2018.201.
  • Senthilkumar K, Easwaramoorthy S. A survey on cyber security awareness among college students in Tamil Nadu. IOP Conf Ser. 2017;263(4):042043. doi:10.1088/1757-899X/263/4/042043.
  • Kruger H, Drevin L, Steyn T. A Vocabulary test to assess information security awareness. Inf Manag Comput Secur. 2010;1(5).
  • CBSE. Cyber Safety Manual [accessed 2023 Feb 24]. https://cbseacademic.nic.in/web_material/Manuals/Cyber_Safety_Manual.pdf .
  • Ministry of Home Affairs. Cyber Safety Manual; 2018 [accessed 2023 Feb 15]. https://www.mha.gov.in/sites/default/files/CyberSafety_English_Web_03122018_0.pdf.
  • WCF. Cyber Security Awareness Program - #ThinkTalkTeach – Internet Safety for Youth (English). 2019 Jan 9 [accessed 2023 Jan 2]. https://www.youtube.com/watch?v=Kz2es3-XJvw.
  • WCF. Email Security Awareness Video. 2017 Aug 1 [accessed 24 Dec 2021]. https://www.youtube.com/watch?v=Og9lf0StwVA.
  • Cohen J. Statistical power analysis for the behavioral sciences. Cambridge (MA): Academic Press; 2013.
  • Sullivan GM, Feinn R. Using effect size—or why the P value is not enough. J Grad Med Educ. 2012;4(3):279–82. doi:10.4300/JGME-D-12-00156.1.
  • AlSobeh AMR, AlAzzam I, Shatnawi AMJ, Khasawneh I. Cybersecurity awareness factors among adolescents in Jordan: mediation effect of cyber scale and personal factors. Online J Commun Media Technol. 2023;13(2):e202312. doi:10.30935/ojcmt/12942.
  • Rudd EM, Harang R, Saxe J. Meade: towards a malicious email attachment detection engine. In 2018 IEEE International Symposium on Technologies for Homeland Security (HST); 2018 Oct; Woburn (MA): IEEE. p. 1–7.
  • Nicholson J, Javed Y, Dixon M, Coventry L, Ajayi OD, Anderson P. Investigating teenagers’ ability to detect phishing messages. In 2020 IEEE European Symposium on Security and Privacy Workshops; (EuroS&PW); 2020 Sept; Genoa (Italy): IEEE. p. 140–49.
  • Van Ouytsel J. The prevalence and motivations for password sharing practices and intrusive behaviors among early adolescents’ best friendships–a mixed-methods study. Telemat Inf. 2021;63:101668. doi:10.1016/j.tele.2021.101668.
  • Mwagwabi F, Jiow JH. Compliance with security guidelines in teenagers. Australas J Inf Syst. 2021;25. doi:10.3127/ajis.v25i0.2953.
  • Vogels EA, Gelles-Watnick R, Massarat N. Teens, social media and technology 2022. 2022.
  • Abolfathi M, Dehdari T, Zamani-Alavijeh F, Taghdisi MH, Ashtarian H, Rezaei M, Irandoost SF. Identification of the opportunities and threats of using social media among Iranian adolescent girls. Heliyon. 2022;8(4):e09224. doi:10.1016/j.heliyon.2022.e09224.
  • Eelmaa S. Sexualization of children in Deepfakes and hentai. Trames. 2022;26(2):229–48. doi:10.3176/tr.2022.2.07.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.