[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1185448.1185544acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesacm-seConference Proceedingsconference-collections
Article

Computer security and ethics awareness in university environments: a challenge for management of information systems

Published: 10 March 2006 Publication History

Abstract

There are great challenges for the people involved in the management of information systems to take special measures to secure their information systems. This is more apparent in a university setting, specifically when providing computing resources to the diverse student population. The current paper reports on a study of computer security and ethics awareness among students taking an introductory computer technology course at Historically Black Colleges and Universities (HBCU). Four hundred sixty five (465) student volunteers attending introductory computer technology courses participated in the survey. A concise questionnaire consisting of 21 questions was used. The questionnaire had two major parts. The first part measured the participant's awareness of computer security. The second part measured their awareness of ethical computer use. In general, the majority of the participants had a satisfactory awareness of computer security and ethics. However, as the results of the survey reveal, a 20% to 52% lack of awareness of computer security is highly risky and a 14% to 24% violation of the code of ethics is not desirable. This suggests security and ethic awareness training is needed for university users. To help students at HBCUs increase their awareness of security and ethical issues, the authors provided several recommendations.

References

[1]
Foster, Andrea L, Insecure and Unaware, The Chronicle of Higher Education, May 7, 2004.
[2]
Caruso, Judith B., Information Technology Security: Governance, Strategy, and Practice in Higher Education Key Findings (ID: EKF0305), EDUCAUSE, 2003. http://www.educause.edu/ers0305/
[3]
Dozier, G., Brown, D., Hurley, J., and Cain, K. Vulnerability Analysis of AIS-Based Intrusion Detection Systems via Genetic and Particle Swarm Red Teams, The Proceedings of the 2004 Congress on Evolutionary Computation, pp. 111--116, 2004.
[4]
Dozier, G., Brown, D., Hurley, J., and Cain, K. Vulnerability Analysis of Immunity-Based Intrusion Detection Systems Using Evolutionary Hackers, The Proceedings of the 2004 Genetic and Evolutionary Computation Conference, pp. 60--63, 2004.
[5]
Kaplan, L. M., Molnar, P., Srour, N., and Filipov, A. Node Selection using Bearings-only Unattended Ground Sensors, ARL CTA Symposium, College Park, MD, April 29-May 1, 2003.
[6]
Pfleeger, C. P., Pfleeger, S. L. Security in Computing, Prentice Hall, Third Edition, 2003.
[7]
Salkever, Alex, The Virus of Youthful Irresponsibility; College kids just don't pay enough attention to computer security. Thank goodness adults on campus are prepared to force the issue. SECURITY NET- Business Week Online, September 9, 2003.
[8]
North. S. M., George, R., Shujaee, K., and Mumford, A. Collaborative Information Assurance Capacity Building at a Consortium of Colleges and Universities. Proceedings of the 43rd Annual Association for Computing Machinery Southeast Conference. March 2005, pp. 361--362.
[9]
Laudon, K. C., Laudon, J. P., Essential of Management Information Systems: Managing the Digital Firm. Prentice Hall, Sixth Edition, 2005.

Cited By

View all
  • (2023)Want to Raise Cybersecurity Awareness? Start with Future IT Professionals.Proceedings of the 2023 Conference on Innovation and Technology in Computer Science Education V. 110.1145/3587102.3588862(236-242)Online publication date: 29-Jun-2023
  • (2022)Exploring Chinese College Students' Awareness of Information Security in the COVID-19 EraEuropean Journal of Education10.2478/ejed-2022-00125:2(19-33)Online publication date: 14-Nov-2022
  • (2022)Exploring Chinese College Students' Awareness of Information Security in the COVID-19 EraEuropean Journal of Education10.2478/ejed-2022-00025:2(19-33)Online publication date: 14-Nov-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
ACMSE '06: Proceedings of the 44th annual ACM Southeast Conference
March 2006
823 pages
ISBN:1595933158
DOI:10.1145/1185448
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 10 March 2006

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. computer ethics awareness
  2. computer security awareness
  3. management information systems

Qualifiers

  • Article

Conference

ACM SE06
ACM SE06: ACM Southeast Regional Conference
March 10 - 12, 2006
Florida, Melbourne

Acceptance Rates

ACMSE '06 Paper Acceptance Rate 100 of 244 submissions, 41%;
Overall Acceptance Rate 502 of 1,023 submissions, 49%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)17
  • Downloads (Last 6 weeks)0
Reflects downloads up to 07 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Want to Raise Cybersecurity Awareness? Start with Future IT Professionals.Proceedings of the 2023 Conference on Innovation and Technology in Computer Science Education V. 110.1145/3587102.3588862(236-242)Online publication date: 29-Jun-2023
  • (2022)Exploring Chinese College Students' Awareness of Information Security in the COVID-19 EraEuropean Journal of Education10.2478/ejed-2022-00125:2(19-33)Online publication date: 14-Nov-2022
  • (2022)Exploring Chinese College Students' Awareness of Information Security in the COVID-19 EraEuropean Journal of Education10.2478/ejed-2022-00025:2(19-33)Online publication date: 14-Nov-2022
  • (2018)Information security awareness of greek higher education students — Preliminary findings2018 7th International Conference on Modern Circuits and Systems Technologies (MOCAST)10.1109/MOCAST.2018.8376578(1-4)Online publication date: May-2018
  • (2017)Quantitative Assessment of Information Security Awareness on Informatics Students in a UniversityProceedings of the 2017 International Conference on Information Technology10.1145/3176653.3176728(346-350)Online publication date: 27-Dec-2017
  • (2017)Awareness of information security and its implications to legal and ethical issues in our daily life2017 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM)10.1109/IEEM.2017.8290090(1236-1240)Online publication date: Dec-2017
  • (2014) The scale for the self‐efficacy and perceptions in the safe use of the I nternet for teachers: The validity and reliability studies British Journal of Educational Technology10.1111/bjet.1221747:1(76-90)Online publication date: 15-Oct-2014
  • (2012)Towards a conceptual model of software piracyInternational Journal of Business Information Systems10.1504/IJBIS.2012.05017611:4(442-460)Online publication date: 1-Nov-2012
  • (2010)A comparative study of information security and ethics awareness in diverse university environmentsJournal of Computing Sciences in Colleges10.5555/1747137.174717825:5(223-230)Online publication date: 1-May-2010
  • (2010)Computer security and ethics awareness among IIUM students: An empirical studyProceeding of the 3rd International Conference on Information and Communication Technology for the Moslem World (ICT4M) 201010.1109/ICT4M.2010.5971884(A52-A56)Online publication date: Dec-2010
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media