A CROSS-CULTURAL AND GENDER-BASED PERSPECTIVE FOR ONLINE SECURITY : EXPLORING KNOWLEDGE , SKILLS AND ATTITUDES OF HIGHER EDUCATION STUDENTS

Preparing students adequately against online-attacks is a constant teaching and learning challenge, no matter how many advanced security-related courses have been developed for higher education curricula worldwide. Recently emphasis has also been put on online identity theft and social awareness in general. The authors research the knowledge, skills and attitudes of future IT professionals, from a cross-cultural and gender perspective. The available data were collected from international students in Software Engineering and other IT related disciplines via a questionnaire. The processed data revealed that (i) students are not free of security misconceptions, which security education is called upon to address and (ii) courses about online security can be part of a strategy for increasing social awareness on privacy protection. This pilot survey also revealed that the following issues are crucial: (a) the cultural and gender dimensions, (b) personality traits and (c) teaching methodology and learning environment used for security education. The researchers specify strategic guidelines in higher education for timely privacy protection and citizens’ security. The information provided in this study will be practical and useful for curricula design and formal/informal learning practices. Hence, courses on security can be thought-provoking, interesting throughout the learning process and effective regarding the learning outcomes. IADIS International Journal on WWW/Internet

[1]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[2]  Ralph W. Tyler,et al.  Basic Principles of Curriculum and Instruction , 1969 .

[3]  Sydney Gregory,et al.  Culture's consequences: international differences in work-related values , 1982 .

[4]  E. Keller Reflections on Gender and Science , 1985 .

[5]  R. Harries Security and society: reflections on law, order and politics , 1988 .

[6]  J. Biggs Enhancing teaching through constructive alignment , 1996 .

[7]  C. V. Ford Lies! Lies!! Lies!!!: The Psychology of Deceit , 1996 .

[8]  Detmar W. Straub,et al.  Gender Differences in the Perception and Use of E-Mail: An Extension to the Technology Acceptance Model , 1997, MIS Q..

[9]  E. Karvonen Informational societies : understanding the third Industrial Revolution , 2001 .

[10]  Marko Helenius,et al.  A System to Support the Analysis of Antivirus Products' Virus Detection Capabilities , 2002 .

[11]  Helen Nissenbaum,et al.  Users' conceptions of web security: a comparative study , 2002, CHI Extended Abstracts.

[12]  R. Nisbett The geography of thought : how Asians and Westerners think differently--and why , 2003 .

[13]  Alison Adam,et al.  A Decade of Neglect: Reflecting on Gender and IS , 2004 .

[14]  Cher Ping,et al.  Motivating students to learn , 2005, Br. J. Educ. Technol..

[15]  M Kalantzis,et al.  The conditions of learning , 2005 .

[16]  Eleni Berki,et al.  GLOBAL SOFTWARE DEVELOPMENT: THE DIMENSION OF CULTURE , 2005 .

[17]  Marti A. Hearst,et al.  Why phishing works , 2006, CHI.

[18]  Eleni Berki,et al.  Critical and Creative Mathematical Thinking with Practical Problem Solving Skills-A New Old Challenge , 2007 .

[19]  Lorrie Faith Cranor,et al.  School of phish: a real-world evaluation of anti-phishing training , 2009, SOUPS.

[20]  Ponnurangam Kumaraguru,et al.  Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions , 2010, CHI.

[21]  Lorrie Faith Cranor,et al.  Teaching Johnny not to fall for phish , 2010, TOIT.

[22]  Ugiomo S. Odaro,et al.  Social Engineering : Phishing for a Solution , 2011 .

[23]  Sunil Chaudhary,et al.  Recognition of phishing attacks utilizing anomalies in phishing websites , 2012 .

[24]  A. Economides,et al.  ADAPTIVE LEARNING : MAPPING PERSONALITY TYPES TO LEARNING STYLES , 2012 .

[25]  M. Angela Sasse,et al.  Security Education against Phishing: A Modest Proposal for a Major Rethink , 2012, IEEE Security & Privacy.

[26]  Nasir Memon,et al.  A pilot study of cyber security and privacy related behavior and personality traits , 2013, WWW.

[27]  Linfeng Li A Contingency Framework to Assure the User-Centered Quality and to Support the Design of Anti-Phishing Software , 2013 .

[28]  P. W. Singer,et al.  Cybersecurity and Cyberwar: What Everyone Needs to Know® , 2013 .

[29]  Eleni Berki,et al.  Communities, Communication, and Online Identities , 2014 .

[30]  Eleni Berki,et al.  Towards a contingency approach with whitelist- and blacklist-based anti-phishing applications: what do usability tests indicate? , 2014, Behav. Inf. Technol..

[31]  Howard A. Schmidt,et al.  Privacy in the Age of Big Data: Recognizing Threats, Defending Your Rights, and Protecting Your Family , 2014 .

[32]  Eleni Berki,et al.  Time Up for Phishing with Effective Anti-Phishing Research Strategies , 2015, Int. J. Hum. Cap. Inf. Technol. Prof..

[33]  Michelle Cheatham,et al.  Privacy in the age of big data , 2015, 2015 International Conference on Collaboration Technologies and Systems (CTS).