Article Processing Charges (APC)
Cyber Security Awareness among Students and Faculty Members in a Sudanese College
In the last few years, cyber security has been an essential prerequisite for almost every organization to handle the massive number of emerging cyber attacks worldwide. A critical factor in reducing the possibility of being exploited is cyber security awareness. Not only having the adequate knowledge but how to utilize this knowledge to prevent cyber attacks. In this paper we conducted a survey that focuses on three vital security parameters, which are trust, passwords and defensive attitude respectively. The survey mainly aimed at assessing cyber security knowledge of 200 students and 100 faculty members in a Sudanese college and how secure these participants think they are according to their current cyber behaviour. 56% of the participants are males and 44% are females. The results revealed that all participants were having fairly-low level of security awareness and their defensive attitude is considerably weak and doesn’t protect them either individually or at institutional-level. Nevertheless, faculty member showed better cyber security knowledge and skills by 8% higher than students. This study can be used to develop training approaches that bridge the security gaps depicted by the respondents of the survey questions manipulated in this study.
Keywords:Cyber security, Awareness, Passwords, Students, Faculty members
 Moallem, A. Cybersecurity Awareness Among Students and Faculty. Boca Raton, FL: CRC Press, 2019.
 Tareq Ahram, Waldemar Karwowski. Advances in Human Factors in Cybersecurity. Proceedings of the AHFE 2019 International Conference on Human Factors in Cybersecurity
 Aboul Ella Hassanien, Mohamed Elhoseny. Cybersecurity and Secure Information Systems_Challenges and Solutions in Smart Environments, 2019.
 Cuthbertson A. Ransomware attacks rise 250 percent in 2017, Hitting U.S. Hardest. Newsweek,September28, 2017.www.newsweek.com/ransomware-attacks-rise-250-2017-us-wannacry-614034
 Yuri Diogenes, Erdal Ozkaya, Cybersecurity. Attack and Defense Strategies_ Infrastructure security with Red Team and Blue Team tactics, Packt Publishing,2018.
 National Institute of Justice. 2018. The Fingerprint Sourcebook. NIJ.https://www.ncjrs.gov/pdffiles1/nij/225320.pdf
 Adhikari, D. Exploring the differences between social and behavioral science. Behavioral Development Bulletin, 2016, 21(2): 128-135.
 Crossler, R.E., Bélanger, F., Ormond, D. The quest for complete security: an empirical analysis of users’multi-layered protection from security threats. Inf.Syst. Front. 2017, 1-15.
 Cuthbertson A. Ransomware attacks rise 250 percent in 2017, Hitting U.S. Hardest. Newsweek,September 28, 2017.www.newsweek.com/ransomware-attacks-rise-250-2017-us-wannacry-614034
 Young, H., van Vliet, T., van de Ven, J., Jol, S.,Broekman, C.: Understanding human factors in cyber security as a dynamic system. In: International Conference on Applied Human Factors and Ergonomics.Springer, Cham, 2018: 244-254.
 Farzan A. College students are not as worried as they should be about the threat of identity theft.Business Insider, 2015.www.businessinsider.com/students-identity-theft-2015-6
 Grainne H. et al. Factors for social networking site scam victimization among Malaysian students. Cyberpsychology, Behavior, and Social Networking,2017.DOI: https://doi.org/10.1089/cyber.2016.0714
 Hossain A., Zhang W. Privacy and security concern of online social networks from user perspective. International Conference on Information Systems Security and Privacy (ICISSP), Angers,2015: 246-253
 Senthilkumar K., Easwaramoorthy S. A survey on cyber security awareness among college students in Tamil Nadu. IOP Conference Series: Materials Science and Engineering, Volume 263,Computation and Information Technology, Tamil Nadu, 2017: 1-10.
 Wisniewska, M., Wisniewski, Z. The relationship between knowledge security and the propagation of innovation. Adv. Intell. Syst. Comput. 2019, 783: 176-184.
 Winston-Proctor, C. E. Toward a model for teaching and learning qualitative inquiry within a core content undergraduate psychology course: Personality psychology as a natural opportunity. Qualitative Psychology, 2018, 5(2): 243-262.
 Brumen, B., Taneski, V. Moore’s curse on textual passwords. In: 2015 28th International Convention on Information and Communication Technology,Electronics and Microelectronics (MIPRO), 2015.DOI:https://doi.org/10.1109/MIPRO.2015.7160486
 Stainbrook, M., Caporusso, N.: Convenience or strength? Aiding optimal strategies in password generation. In: International Conference on Applied Human Factors and Ergonomics. Springer, Cham, 2018:23-32.DOI:https://doi.org/10.1007/978-3-319-94782-2_3
 Kruger H., Kearney W. A prototype for assessing information security awareness. Computers &Security,2006, 25(4): 289-296
 Wayne Patterson, Cynthia E. Winston - Proctor - Behavioral Cybersecurity. Applications of Personality Psychology and Computer Science. Taylor & Francis. CRC, 2019.
How to Cite
Copyright © 2020 Mohammed Daffalla Elradi, Altigani Abd alraheem Altigani, Osman Idriss Abaker
This is an open access article under the Creative Commons Attribution-NonCommercial 4.0 International (CC BY-NC 4.0) License.