An Investigation of Information Security Awareness of Tertiary Educators


Abstract views: 278 / PDF downloads: 140

Authors

DOI:

https://doi.org/10.5281/zenodo.8148647

Keywords:

Information Security, Awareness, Tertiary Educators

Abstract

Currently, providing and maintaining of information security has become more difficult and complex.  The awareness can be expressed as the most important factor in this process. In this study, it is aimed to examine the awareness of tertiary educators, who are thought to have a critical role in raising awareness to individuals. In the study, the scale developed by Parsons et al. (2017) was adapted and applied online to tertiary educators in Turkey with a 5-point Likert scale. Data collected from 1548 people were analyzed with IBM SPSS package program. As a result of the analysis, it was seen that the the awareness level of the tertiary educators was at moderate level. In addition, as a result of the Chi-Square tests carried out, significant findings were obtained between the relationships gender and age, gender and university type, gender and academic field, gender and hours of computer use at work, age and hours of computer use at work, the total working time in the profession and the hours of computer use at work.

References

Ahlan, A. R., Lubis, M., & Lubis, A. R. (2015). Information security awareness at the knowledge-based institution: its antecedents and measures. Procedia Computer Science, 72(2015), 361-373. https://doi.org/10.1016/j.procs.2015.12.151

Arisya, K. F., Ruldeviyani, Y., Prakoso, R., & Fadhilah, A. L. (2020, November 3-4). Measurement of information security awareness level: A case study of mobile banking (m-banking) users. [Conference presentation]. In 2020 Fifth International Conference On Informatics And Computing (Icic), Gorontalo, Indonesia.

Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS quarterly, 34(3), 523-548. https://doi.org/10.2307/25750690

Chase, J. L. (2021). Examining the effect of erganizational Culture on End-User Attitude Towards Information Security Awareness [Doctoral dissertation]. Colorado Technical University.

Cohen, J. (1988). Statistical power analysis fort he behavioral sciences (2nd ed.). Hillsdale, NJ: Erlbaum

Çelik Çöp, Ç. (2017). Kalite Yönetim Direktörlerinin Bilgi Güvenliği Farkındalığı: İstanbul İli Örneği. [Doktora Tezi]. Okan Üniversitesi Sağlık Bilimleri Fakültesi.

Çifci, H. (2013). Her Yönüyle Siber Savaş. TÜBİTAK Popüler Bilim Kitapları.

Dharmawansa, A. D., & Madhuwanthi, R. A. M. (2020, October 15-16). Evaluating the Information Security Awareness (ISA) of employees in the banking sector: A case study [Conference presentation]. General Sir John Kotelawala Defence University Ratmalana, Sri Lanka.

Ecek, N., & Çakmak, A. F. (2022). Çalışanların Bilgi Güvenliği Önlemlerine Dair Tutumları: Ampirik Bir Değerlendirme. International Journal of Applied Economic and Finance Studies, 7 (2), 26-44.

Eminağaoğlu, M., & Gökşen, Y. (2009). Bilgi Güvenliği Nedir, Ne Değildir, Türkiye'de Bilgi Güvenliği Sorunları ve Çözüm Önerileri. Dokuz Eylül Üniversitesi Sosyal Bilimler Enstitüsü Dergisi, 11(4), 1-15.

Fianty, M. I. (2023). The impact of employees’ information security awareness on information security behaviour. International Journal of Information System and Technology, 6(5), 629-636.

Fisher, M. J. & Marshall, A. P. (2009). Understanding descriptive statistics. Australian critical care, 22(2), 93-97.

George D, & Mallery P. (2003). SPSS for Windows step by step: A simple guide and reference. 11.0 update (4th ed.). Allyn & Bacon.

Grassegger, T., & Nedbal, D. (2021). The Role of Employees' Information Security Awareness on the Intention to Resist Social Engineering. Procedia Computer Science, 181(2021), 59-66. DOI:10.1016/j.procs.2021.01.103

Fujs, D., Vrhovec, S., & Vavpotič, D. (2021, November). Know Your Enemy: User Segmentation Based on Human Aspects of Information Security [Conference presentation]. Access, 9(2021), 157306-157315. https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=9623526

Hadlington, L., & Parsons, K. (2017). Can cyberloafing and Internet addiction affect organizational information security?. Cyberpsychology, Behavior, and Social Networking, 20(9), 567-571. DOI: 10.1089/cyber.2017.0239

Hadlington, L., Popovac, M., Janicke, H., Yevseyeva, I., & Jones, K. (2019). Exploring the role of work identity and work locus of control in information security awareness. Computers & Security, 81, 41-48. https://doi.org/10.1016/j.cose.2018.10.006

Hadlington, L., & Chivers, S. (2020). Segmentation analysis of susceptibility to cybercrime: Exploring individual differences in information security awareness and personality factors. Policing: A Journal of Policy and Practice, 14(2), 479-492. https://doi.org/10.1093/police/pay027

Hadlington, L., Binder, J., & Stanulewicz, N. (2020). Fear of missing out predicts employee information security awareness above personality traits, age, and gender. Cyberpsychology, Behavior, and Social Networking, 23(7), 459-464. DOI: 10.1089/cyber.2019.0703

Hart, S., Margheri, A., Paci, F., & Sassone, V. (2020). Riskio: A serious game for cyber security awareness and education. Computers & Security, 95, 101827. DOI:10.1016/j.cose.2020.101827

Herbert, F., Farke, F. M., Kowalewski, M., & Dürmuth, M. (2021, October 11-12). Vision: Developing a Broad Usable Security & Privacy Questionnaire [Conference presentation]. In Proceedings of the 2021 European Symposium on Usable Security. Karlsruhe, Germany.

Kapanoğlu, G. (2016). Öğretmenlerin Bilgi Güvenliği Farkındalığının İncelenmesi. [Yüksek lisans tezi]. Gazi Üniversitesi Eğitim Bilimleri Enstitüsü.

Karagöz, Y. (2019). SPSS AMOS META Uygulamalı Nitel-Nicel-Karma Bilimsel Araştırma Yöntemleri ve Yayın Etiği. Nobel Yayıncılık.

Kritzinger, E., Da Veiga, A., & van Staden, W. (2022). Measuring organizational information security awareness in South Africa. Information Security Journal: A Global Perspective, 32(2), 120-133. https://doi.org/10.1080/19393555.2022.2077265

Krutz, R. L., Vines, R. D., & Stroz, E. M. (2001). The CISSP Prep Guide: Mastering the ten domains of computer security. John Wiley & Sons, Inc.

Lionel, B. (2020). Examining the Relationship between Cybersecurity-Employee Vulnerabilities and Reduction of Security Breaches in Information Technology Organization [Doctoral dissertation]. Colorado Technical University.

Mahardika, M. S., Hidayanto, A. N., Paramartha, P. A., Ompusunggu, L. D., Mahdalina, R., & Affan, F. (2020). Measurement of employee awareness levels for information security at the center of analysis and information services judicial commission Republic of Indonesia. Adv. Sci. Technol. Eng. Syst, 5(3), 501-509. DOI:10.25046/aj050362

McCormac, A., Calic, D., Parsons, K., Zwaans, T., Butavicius, M., & Pattinson, M. (2016). Test-retest reliability and internal consistency of the Human Aspects of Information Security Questionnaire (HAIS-Q) [Conference Presentation]. Australasian Conference on Information Systems, Wollogngong.

McCormac, A., Zwaans, T., Parsons, K., Calic, D., Butavicius, M., & Pattinson, M. (2017). Individual differences and information security awareness. Computers in Human Behavior, 69, 151-156. https://doi.org/10.1016/j.chb.2016.11.065

Murphy, S. (2022). A Quantitative Study Using the Protection Motivation Theory to Examine Information Protection Awareness in a Healthcare Organization [Doctoral dissertation] Northcentral University.

Okenyi, P. O., & Owens, T. J. (2007). On the anatomy of human hacking. Information Systems Security, 16(6), 302-314. https://doi.org/10.1080/10658980701747237

Öğütçü, G., Testik, Ö. M., & Chouseinoglou, O. (2016). Analysis of personal information security behavior and awareness. Computers & Security, 56, 83-93. https://doi.org/10.1016/j.cose.2015.10.002

Pallant, J. (2020). Survival Manual A Step by Step Guide to Data Analysis Using IBM SPSS (7th Edition). Routledge Taylor&Francis Group.

Parsons, K., McCormac, A., Butavicius, M., Pattinson, M., & Jerram, C. (2014). Determining employee awareness using the human aspects of information security questionnaire (HAIS-Q). Computers & security, 42, 165-176. DOI:10.1016/j.cose.2013.12.003

Pattinson, M., Butavicius, M., Parsons, K., McCormac, A., & Calic, D. (2017). Managing information security awareness at an Australian bank: A comparative study. Information & Computer Security, 25(2), 181-189. DOI: 10.1108/ICS-03-2017-0017

Pattinson, M., Butavicius, M., Lillie, M., Ciccarello, B., Parsons, K., Calic, D., & McCormac, A. (2019). Matching training to individual learning styles improves information security awareness. Information & Computer Security, 28(1), 1-14. DOI:10.1108/ICS-01-2019-0022

Rao, U. H., & Nayak, U. (2014). The Infosec Handbook: An Introduction to Information Security. Friendsoft Apress. Nisan 20, 2022 tarihinde https://library.oapen.org/bitstream/handle/20.500.12657/28165/1001829.pdf?sequence=1 adresinden alındı.

Reeves, A., Parsons, K., & Calic, D. (2017, November). Securing mobile devices: evaluating the relationship between risk perception, organisational commitment and information security awareness [Conference presentation]. Proceedings of the Eleventh International Symposium on Human Aspects of Information Security & Assurance (HAISA 2017), Adelaide, South Australia.

Romansky, R. P., & Noninska, I. S. (2020). Challenges of the Digital Age for Privacy and Personal Data Protection. Mathematical Biosciences and Engineering, 17(5), 5288-5303. doi: 10.3934/mbe.2020286

Safa, N. S., Sookhak, M., Von Solms, R., Furnell, S., Ghani, N. A., & Herawan, T. (2015). Information security conscious care behaviour formation in organizations. Computers & Security, 53(2015), 65-78. http://dx.doi.org/10.1016/j.cose.2015.05.012

Safa, N. S., Von Solms, R., & Futcher, L. (2016). Human aspects of information security in organisations. Computer Fraud & Security, 2016(2), 15-18. DOI:10.1016/S1361-3723(16)30017-3

Salem, Y., Moreb, M., & Rabayah, K. S. (2021, July 14-15). Evaluation of Information Security Awareness among Palestinian Learners [Conference presentation]. In 2021 International Conference on Information Technology (ICIT), Amman, Jordan.

Sekaran. U. (2003). Research methods for business: A skill building approach (Fourth Edition). John Wiley & Sons Inc.

Sturman, D., Valenzuela, C., Plate, O., Tanvir, T., Auton, J. C., Bayl-Smith, P., & Wiggins, M. W. (2023). The role of cue utilization in the detection of phishing emails. Applied Ergonomics, 106(2023), 1-13. https://doi.org/10.1016/j.apergo.2022.103887

Teker, E. (2019). Öğretmenlerin ve Lise Öğrencilerinin Bilgi Güvenliği Farkındalık Düzeylerinin Değerlendirilmesi [Yüksek lisans tezi]. Ankara Üniversitesi Eğitim Bilimleri Enstitüsü.

Veseli, I. (2011). Measuring the effectiveness of information security awareness program [Master's dissertation]. Gjøvik University College.

Vroom, C., & Von Solms, R. (2004). Towards information security behavioural compliance. Computers & security, 23(3), 191-198. https://doi.org/10.1016/j.cose.2004.01.012

Wiley, A., McCormac, A., & Calic, D. (2020). More than the individual: Examining the relationship between culture and Information Security Awareness. Computers & Security, 88(2020), 1-8. https://doi.org/10.1016/j.cose.2019.101640

Witsenboer, J. W. A., Sijtsma, K., & Scheele, F. (2022). Measuring cyber secure behavior of elementary and high school students in the Netherlands. Computers & Education, 186(2022), 1-11. https://doi.org/10.1016/j.compedu.2022.104536

Zulfia, A., Adawiyah, R., Hidayanto, A. N., & Budi, N. F. A. (2019, April 11-13). Measurement of employee information security awareness using the human aspects of information security questionnaire (HAIS-Q): Case study at PT. PQS [Conference presentation]. In 2019 5th International Conference on Computing Engineering and Design (ICCED), Singapore.

Published

2023-08-06

How to Cite

Ecek, N., & Yılmaz, S. (2023). An Investigation of Information Security Awareness of Tertiary Educators. Turkish Management Review, 2(1), 18–39. https://doi.org/10.5281/zenodo.8148647

Issue

Section

Reseach Articles