2023
DOI: 10.3390/su15129426
|View full text |Cite
|
Sign up to set email alerts
|

Education, Online Presence and Cybersecurity Implications: A Study of Information Security Practices of Computing Students in Saudi Arabia

Abstract: Information technology is considered as a key enabler to achieve “education for all” as a sustainable development goal; however, involvement in the education sector has introduced security risks along with benefits. Students’ exposure to the internet has increased the probability of cybersecurity attacks. To foster a more sustainable use of technology, it is crucial that students are made aware of information security risks and can keep themselves protected in the online sphere. In this paper, we present the r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
15
1

Year Published

2023
2023
2025
2025

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(18 citation statements)
references
References 61 publications
2
15
1
Order By: Relevance
“…Given the increasing frequency and sophistication of cyber-attacks today, developing a robust cybersecurity threat intelligence framework should be considered one of the top priorities of any organization looking to protect its critical assets. Since humans are a weak link in cybersecurity [ 68 , 69 , 70 ], a robust CTI framework will also facilitate overcoming human security lapses. As proposed in our model, leveraging multiple layers such as a knowledge base, detection models, and visualization tools along with human expertise would enable effective management and mitigation of these evolving challenges.…”
Section: Discussionmentioning
confidence: 99%
“…Given the increasing frequency and sophistication of cyber-attacks today, developing a robust cybersecurity threat intelligence framework should be considered one of the top priorities of any organization looking to protect its critical assets. Since humans are a weak link in cybersecurity [ 68 , 69 , 70 ], a robust CTI framework will also facilitate overcoming human security lapses. As proposed in our model, leveraging multiple layers such as a knowledge base, detection models, and visualization tools along with human expertise would enable effective management and mitigation of these evolving challenges.…”
Section: Discussionmentioning
confidence: 99%
“…With the increase in online learning, there are also increased risks related to cybersecurity (Saeed, 2023). These include risks of data breaches, privacy concerns, and issues related to digital citizenship.…”
Section: Disadvantages Of Blended Learningmentioning
confidence: 99%
“…The Action Plan for Vocational Skills Improvement (2019-2021) proposes to strengthen the basic capacity building of vocational skills training, support the construction of industryeducation integration training bases and public training bases [2], strengthen the construction of vocational training institutes, and actively promote the co-construction and sharing of vocational skills training resources. The training base is an important platform for talent training, scientific research development, social service, technological innovation and cultural inheritance in vocational colleges [3][4]. The construction of training base is related to the development of vocational education.…”
Section: Introductionmentioning
confidence: 99%