Computer Security Practices and Perceptions of the Next Generation of Corporate Computer Users

Author(s):  
S. E. Kruck ◽  
Faye P. Teer

The purpose of this chapter is to present the results of an empirical study of the computer security practices and perceptions of the next generation of corporate computer users, undergraduate university students. The authors surveyed undergraduate university students who represented 42 different majors. The findings relate to the students’ usage of antivirus programs, firewalls, password security, and security patches. Student perceptions of computer security and its importance are also reported. Research in this area is important for two reasons. First, potential employers may find the results useful in assessing their vulnerability to unsafe practices from entry level employees. Secondly, research in this area can give those responsible for providing computer security education a better understanding of students’ computer security training needs.

2015 ◽  
Vol 17 (1) ◽  
Author(s):  
Rika Butler ◽  
Martin Butler

Background: The ability to identify and authenticate users is regarded as the foundation of computer security. Although new authentication technologies are evolving, passwords are the most common method used to control access in most computer systems. Research suggests that a large portion of computer security password breaches are the result of poor user security behaviour. The password creation and management practices that online consumers apply have a direct effect on the level of computer security and are often targeted in attacks. Objectives: The objective of this study was to investigate South African online consumers’ computer password security practices and to determine whether consumers’ perceptions regarding their password security ability is reflected in the password creation and management practices that they apply. Method: A Web-based survey was designed to (1) determine online consumers’ perceptions of their skills and competence in respect of computer password security and (2) determine the practices that South African online consumers apply when creating and managing passwords. The measures applied were then compared to (1) the users’ perceptions about their computer password security abilities and (2) the results of international studies to determine agreement and inconsistencies. Results: South African online consumers regard themselves as proficient password users. However, various instances of unsafe passwords practices were identified. The results of this South African study correspond with the results of various international studies confirming that challenges to ensure safe online transacting are in line with international challenges. Conclusion: There is a disparity between South African online consumers’ perceived ability regarding computer password security and the password creation and management practices that they apply.


2019 ◽  
Vol 8 (1) ◽  
pp. 129-144
Author(s):  
Chinaza Uleanya ◽  
Bongani Thulani Gamede ◽  
Mofoluwake Oluwadamilola Uleanya

Sexual Health ◽  
2015 ◽  
Vol 12 (3) ◽  
pp. 269 ◽  
Author(s):  
Sharyn Burns

Background Young university students participate in hazardous drinking and risky sexual health behaviours, however there are few comprehensive interventions targeting this group. Methods: Undergraduate university students aged 18–24 years (n = 2466) were recruited to complete an online survey to investigate the association between levels of alcohol consumption, gender and experienced, second-hand and witnessed sexual health behaviours and situations. Results: Male students and hazardous drinkers were most likely to participate in unprotected sex and regretted sex. Female students and hazardous drinkers were most likely to experience an unwanted sexual advance. Conclusions: Integrated and comprehensive interventions targeting young people in the university setting are needed.


2017 ◽  
Vol 9 (2) ◽  
pp. 39-58 ◽  
Author(s):  
Valerie J.M. Watzlaf ◽  
Leming Zhou ◽  
Dilhari R. DeAlmeida ◽  
Linda M. Hartman

The objective of this systematic review was to systematically review papers in the United States that examine current practices in privacy and security when telehealth technologies are used by healthcare providers. A literature search was conducted using the Preferred Reporting Items for Systematic Reviews and Meta-Analyses Protocols (PRISMA-P). PubMed, CINAHL and INSPEC from 2003 – 2016 were searched and returned 25,404 papers (after duplications were removed). Inclusion and exclusion criteria were strictly followed to examine title, abstract, and full text for 21 published papers which reported on privacy and security practices used by healthcare providers using telehealth.  Data on confidentiality, integrity, privacy, informed consent, access control, availability, retention, encryption, and authentication were all searched and retrieved from the papers examined. Papers were selected by two independent reviewers, first per inclusion/exclusion criteria and, where there was disagreement, a third reviewer was consulted. The percentage of agreement and Cohen’s kappa was 99.04% and 0.7331 respectively. The papers reviewed ranged from 2004 to 2016 and included several types of telehealth specialties. Sixty-seven percent were policy type studies, and 14 percent were survey/interview studies. There were no randomized controlled trials. Based upon the results, we conclude that it is necessary to have more studies with specific information about the use of privacy and security practices when using telehealth technologies as well as studies that examine patient and provider preferences on how data is kept private and secure during and after telehealth sessions.Keywords: Computer security, Health personnel, Privacy, Systematic review, Telehealth 


Author(s):  
William Bart

The purpose of this study was to explore how undergraduate university students react to chess instruction. Certain patterns emerged from 10 offerings of a Freshman Seminar entitled “Beginners’ Chess and 21st Century Thinking Skills”. The course enrolled only first-year and second-year undergraduate students at a large public state university in the USA. The students tended to have little or no knowledge of chess prior to the course. The course made extensive use of chess-related websites available on the Internet such as chess.com, lichess.org, and chessgames.com. The instruction involved the projection of a chess-related website projected onto a large classroom screen with the use of an instructor’s computer connected to a projector that projected the computer-based image onto the screen. The course had 10-20 students in each annual offering of the course that lasted 15 weeks. The student evaluations of the course were very positive, indicating that the students enjoyed the course very much. The course involved instruction in chess on topics such as tactics and basic checkmates along with instruction on the cognitive psychological foundations of chess on topics such as problem solving and critical thinking. The primary task in the course was that each student had to prepare a critical evaluation of two of their own chess games that included correct usage of proper algebraic notation for the chess moves. The chess activity that the students enjoyed the most was group competition.


Sign in / Sign up

Export Citation Format

Share Document