Cybersecurity Awareness Based on Software and E-mail Security with Statistical Analysis.

Comput Intell Neurosci

Department of Computer Information Systems, College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, P.O. Box 1982, Dammam 31441, Saudi Arabia.

Published: March 2022

The aim of this study is to discover the impact of software security and e-mail security on overall cybersecurity among the students of Imam Abdulrahman Bin Faisal University in Dammam. Another main purpose to conduct this study is to know the level of knowledge students have in the developing countries about the cybersecurity and how much are they mindful of cyber-attacks and the level of awareness among the university students. Two important hypotheses were studied to discover their importance in awareness of cybersecurity. One is software security, and the other is e-mail security. A total of 11 relevant questions were drafted, and then these questions were distributed among the university students, and around 390 responded to the questionnaires. Statistical analysis was performed on the responses using tools. Initial tests such as validity and reliability test, feasibility test of a variable, correlation test, multicollinearity test, multiple regression, and Heteroskedasticity test were conducted using SPSS. And furthermore, multiple linear regression model and coefficient of determination, hypothesis test, ANOVA test, and partial test were conducted using ANOVA. The outcome of the analysis is software security variable (X1) that has a significant and positive effect on cybersecurity awareness ( value ≤0.001,  = 0.192). This shows that having a thorough understanding of software security can raise cybersecurity awareness up to 19.2%. E-mail security variable (X2) has a significant and positive effect on cybersecurityawareness (-value ≤0.000). This shows that having a thorough understanding of email security can raise cybersecurity awareness up to 31.3%. Software security (1) and e-mail security (2) variables simultaneously have a significant effect on cybersecurity awareness (-value ≤0.000) with a correlation coefficient of 12.1% (2 = 0.121). This shows that the independent variable used can explain the level of cybersecurity awareness up to 12.1%. Research results show that students are aware of software or application updates. Furthermore, students' awareness of email security is also good.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC8956416PMC
http://dx.doi.org/10.1155/2022/6775980DOI Listing

Publication Analysis

Top Keywords

cybersecurity awareness
24
e-mail security
20
software security
20
security
12
security e-mail
12
cybersecurity
9
statistical analysis
8
awareness
8
university students
8
test
8

Similar Publications

This paper introduces a novel energy-efficient lightweight, void hole avoidance, localization, and trust-based scheme, termed as Energy-Efficient and Trust-based Autonomous Underwater Vehicle (EETAUV) protocol designed for 6G-enabled underwater acoustic sensor networks (UASNs). The proposed scheme addresses key challenges in UASNs, such as energy consumption, network stability, and data security. It integrates a trust management framework that enhances communication security through node identification and verification mechanisms utilizing normal and phantom nodes.

View Article and Find Full Text PDF

Analysis of Autonomous Penetration Testing Through Reinforcement Learning and Recommender Systems.

Sensors (Basel)

January 2025

Group of Analysis, Security and Systems (GASS), Department of Software Engineering and Artificial Intelligence (DISIA), Faculty of Computer Science and Engineering, Office 431, Universidad Complutense de Madrid (UCM), Calle Profesor José García Santesmases, 9, Ciudad Universitaria, 28040 Madrid, Spain.

Conducting penetration testing (pentesting) in cybersecurity is a crucial turning point for identifying vulnerabilities within the framework of Information Technology (IT), where real malicious offensive behavior is simulated to identify potential weaknesses and strengthen preventive controls. Given the complexity of the tests, time constraints, and the specialized level of expertise required for pentesting, analysis and exploitation tools are commonly used. Although useful, these tools often introduce uncertainty in findings, resulting in high rates of false positives.

View Article and Find Full Text PDF

Unlabelled: Collecting data and logging behaviors of clients who have autism spectrum disorder (ASD) during applied behavior analysis (ABA) therapy sessions can be challenging in real time, especially when the behaviors require a rapid response, like self-injury or aggression. Little information is available about the automation of data collection in ABA therapy, such as through machine learning (ML). Our survey of ABA therapists nationally revealed mixed levels of familiarity with ML and generally neutral responses to statements endorsing the benefits of ML.

View Article and Find Full Text PDF

Malware is a common word in modern era. Everyone using computer is aware of it. Some users have to face the problem known as Cyber crimes.

View Article and Find Full Text PDF

Background: Nowadays, optimal patient care should be based on data-driven decisions. In the course of digitization, hospitals, in particular, are becoming complex organizations with an enormously high density of digital information. Ensuring information security is, therefore, essential and has become a major challenge.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!