Socializing the Impact: An Analysis of the Theory of Planned Behavior's Influence on Increasing University Students' Cybersecurity Awareness



Varsha Parikh(1*), Mansi Nimbekar(2),


(1) Dept of Extension and Communication- Academic Institute
(2) University of Baroda, Vadodara 390002 Gujarat
(*) Corresponding Author

DOI:

https://doi.org/10.47134/comdev.v4i2.162

Keywords:

Cybersecurity, University students, Theory of planned behaviour, Digital competency, knowledge, self-perception, actual skills and behaviour, attitude

Abstract

The study aimed to assess cybersecurity awareness among university students in Vadodara, India, using the Theory of Planned Behavior (TPB) framework. The study involved 242 students from selected universities, selected using a snowball sampling method. Data was collected through Google Forms and email, and the Statistical Package for the Social Sciences (SPSS) programme was used for statistical analysis. The majority of students were young (18-23 years old), with moderate internet usage and primary digital competency skills. Only 17% reported experiencing issues during cyber surfing. The study found that most students had low awareness, lower knowledge, and negative perceptions about cybersecurity. Most students followed unsafe cybersecurity practices and had a negative attitude towards cybersecurity. The study also examined the correlation between TPB constructs.

Downloads

Download data is not yet available.

References

Adamu, A. G., Siraj, M. M., and Othman, S. H. (2022) 'Cybersecurity Awareness Evaluation Among Students at Northeastern University in Nigeria', International Journal of Electrical and Computer Engineering, 12(1), pp. 572.

Ahaskar, A. (2021, February 8) '60% Surge in Cyber Threats Masquerading as Online Learning Platforms in H2 2020', Mint. [Online] Available at: https://www.livemint.com/technology/tech-news/cyber-threats-disguised-as-online-learning-platforms-grew-by-60-in-h2-2020-11612784120540.html

Alanazi, M., Freeman, M., and Tootell, H. (2022) 'Factors Influencing the Cybersecurity Behaviours of Young Adults', Computers in Human Behavior, 136, p. 107376.

Alharbi, T., and Tassaddiq, A. (2021) 'Assessment of Cybersecurity Awareness Among Majmaah University Students', Big Data and Cognitive Computing, 5(2), pp. 23.

Almarabeh, T., Majdalawi, Y. K., and Mohammad, H. (2016) 'Internet Usage, Challenges, and Attitudes Among University Students: Case Study of the University of Jordan', Journal of Software Engineering and Applications, 9(12), pp. 577-587.

Alqahtani, M. A. (2022) 'Cybersecurity Awareness Based on Software and Email Security with Statistical Analysis', Computational Intelligence and Neuroscience, 2022.

Alzubaidi, A. (2021) 'Measuring the Level of Cybersecurity Awareness for Cybercrime in Saudi Arabia', Heliyon, 7(1), e06016. [Online] Available at: https://doi.org/10.1016/j.heliyon.2021.e06016

Anand, N., Jain, P., Prabhu, S., Thomas, C., Bhat, A., Prathyusha, P. V., Bhat, S., Young, K. S., and Cherian, A. V. (2018) 'Internet Use Patterns, Internet Addiction, and Psychological Distress Among Engineering University Students: A Study from India', Indian Journal of Psychological Medicine, 40(5), pp. 458–467. [Online] Available at: https://doi.org/10.4103/ijpsym.ijpsym_135_18

Anwar, M., He, W., Ash, I. K., Yuan, X., Li, L., and Xu, L. (2017) 'Gender Difference and Employees’ Cybersecurity Behaviours', Computers in Human Behavior, 69, pp. 437–443. [Online] Available at: https://doi.org/10.1016/j.chb.2016.12.040

Aswathi, P., and Mohamed Haneefa, K. (2019) 'Attitude towards Information Technology and Digital Divide: A Study Among Students in Universities in Kerala, India'.

Bada, M., and Nurse, J. R. (2020) 'The Social and Psychological Impact of Cyberattacks', in Emerging Cyber Threats and Cognitive Vulnerabilities, Academic Press, pp. 73-92.

Barnicoat, C. A. (2014) 'Perceptions of Cyberbully Victimization Among College Students: An Examination Using Routine Activities Theory', Doctoral Dissertation, Middle Tennessee State University.

Benson, V., and McAlaney, J. (Eds.). (2019) Emerging Cyber Threats and Cognitive Vulnerabilities, Academic Press.

Bhatnagar, N., and Pry, M. (2020) 'Student Attitudes, Awareness, and Perceptions of Personal Privacy and Cybersecurity in the Use of Social Media: An Initial Study', Information Systems Education Journal, 18(1), pp. 48-58.

Bogdanovskaya, I., Koroleva, N., and Uglova, A. (2020) 'Digital Competence and Information Security in Adolescents', in Ceur Workshop Proceedings, pp. 63-72.

Chandarman, R., and Van Niekerk, B. (2017) 'Students' Cybersecurity Awareness at a Private Tertiary Educational Institution', The African Journal of Information and Communication, 20, pp. 133-155.

Chasanah, B. R., and Candiwan, C. (2020) 'Analysis of College Students’ Cybersecurity Awareness in Indonesia', SISFORMA, 7(2), pp. 49-57.

Daengsi, T., Pornpongtechavanich, P., and Wuttidittachotti, P. (2022) 'Cybersecurity Awareness Enhancement: A Study of the Effects of Age and Gender of Thai Employees Associated with Phishing Attacks', Education and Information Technologies, 27(4), pp. 4729–4752. [Online] Available at: https://doi.org/10.1007/s10639-021-10806-7

Debb, S. M., Schaffer, D. R., and Colson, D. G. (2020) 'A Reverse Digital Divide: Comparing Information Security Behaviors of Generation Y and Generation Z Adults', International Journal of Cybersecurity Intelligence & Cybercrime, 3(1), pp. 42-55.

Dwarakanath, S., Ravi, K., and Vijayakumar, R. (2022) 'A Study on the Emotions of an Employee After a Cyber Security Attack in Their Organization'.

Eduljee, N. B., and Kumar, S. S. (2015) 'Patterns of Internet Use with Indian Students from Aided and Unaided Colleges', Asian Journal of Multidisciplinary Studies, 3(7), pp. 32-43.

Evangelinos, G., and Holley, D. (2015) 'A Qualitative Exploration of the DIGCOMP Digital Competence Framework: Attitudes of Students, Academics, and Administrative Staff in the Health Faculty of a UK HEI', EAI Endorsed Transactions on e-Learning, 2(6).

Fatokun, F. B., Hamid, S., Norman, A., and Fatokun, J. O. (2019) 'Impact of Age, Gender, and Educational Level on the Cybersecurity Behaviors of Tertiary Institution Students: An Empirical Investigation on Malaysian Universities', Journal of Physics: Conference Series, 1339(1), 012098. [Online] Available at: https://doi.org/10.1088/1742-6596/1339/1/012098

Funke, J. (2017) 'How Much Knowledge Is Necessary for Action?' in P. Meusburger, B. Werlen, & L. Suarsana (Eds.), Knowledge and Action, Springer International Publishing, pp. 99–111. [Online] Available at: https://doi.org/10.1007/978-3-319-44588-5

Ghosh, S., and Tripathy, B. K. (2022) 'Cybersecurity Awareness and Practices Among Postgraduate Students of Management Institutes: An Empirical Study', Journal of Critical Reviews, 9(4), pp. 425–433.

Goncalves, R., Silva, R., Fonseca, B., and Cunha, M. A. (2021) 'Cybersecurity Knowledge and Practices: A Study on Portuguese University Students', International Journal of Cybersecurity Intelligence & Cybercrime, 4(2), pp. 29–49.

Gupta, N., Kapoor, N., and Swami, S. (2018) 'Security Awareness in Social Media and Smartphone Applications Among College Students in India', Computers in Human Behavior, 87, pp. 19–27.

Haghighi, P. D., and Hyun, S. S. (2016) 'The Impact of Internet on the Academic Performance of Iranian College Students', Proceedings of the European Conference on E-Learning, pp. 300-308.

Hassan, Z., Hashem, I. A. T., and Tahir, A. B. (2016) 'Students’ Attitudes and Acceptance of Mobile Learning in Higher Education Institutions', The Electronic Library, 34(2), pp. 302-318.

Jawahar, K., and Devi, S. N. (2022) 'Cybersecurity Practices and Awareness Among Engineering College Students in Tamil Nadu', Materials Today: Proceedings, 58, pp. 1087–1090.

Kang, M. (2019) 'Global Perspectives on Cybersecurity Education', in Handbook of Research on Curriculum Development and Experiential Learning in Modern Business, IGI Global, pp. 1-25.

Kavitha, S., and Uma, G. (2020) 'Security Awareness Among College Students in Tamilnadu: An Empirical Study', Materials Today: Proceedings, 26(4), pp. 3484–3487.

Kavitha, S., and Uma, G. (2020) 'Security Awareness Among College Students in Tamilnadu: An Empirical Study', Materials Today: Proceedings, 26(4), pp. 3484–3487.

Kim, B., and An, J. (2019) 'Cybersecurity Awareness and Training for Employees: A Research Note', International Journal of Information Management, 44, pp. 141–147.

Kolahi, J., Khazaei, S., Salahi-Moghaddam, A., Soori, H., and Molaeipoor, L. (2014) 'Factors Influencing the Use of Information Technology in Nursing Education: A Study in Iran', Journal of Advances in Medical Education & Professionalism, 2(4), pp. 169–174.

Kumar, N., and Joseph, J. (2017) 'A Study on the Security Awareness of E-Banking Users in Selected Areas of Kerala', Journal of Emerging Technologies and Innovative Research, 4(2), pp. 33-39.

Kurubacak, G., Erdur-Baker, O., and Sunar, D. (2009) 'Cyberbullying: A New Face of Peer Bullying', The Eurasia Proceedings of Educational & Social Sciences, 1(1), pp. 96-100.

López, R., Zhang, H., Saldaña, M., Zhou, J., Aung, Z., Zhang, J., and Chen, X. (2019) 'Understanding Students' Cybersecurity Behaviors: A Case Study', in Proceedings of the 13th International Conference on Ubiquitous Information Management and Communication, ACM, pp. 1-8.

Lu, H. H., Lu, L. Y., and Yu, C. S. (2013) 'Factors Affecting Cybersecurity Knowledge Sharing Intention among Employees', Management Decision, 51(10), pp. 2029–2045.

Lublóy, Á., and Kaczmarek, M. (2021) 'Perceived Cybersecurity Risks and Individual Cybersecurity Behaviors: Empirical Evidence from Europe', Journal of Organizational and End User Computing (JOEUC), 33(1), pp. 16-38.

Madakam, S., Ramaswamy, R., and Tripathi, S. (2015) 'Internet of Things (IoT): A Literature Review', Journal of Computer and Communications, 3(2), pp. 164-173.

Manogaran, G., Lopez, D., and Thota, C. (2017) 'A Survey of Big Data Architectures and Machine Learning Algorithms in Healthcare', Journal of King Saud University - Computer and Information Sciences. [Online] Available at: https://doi.org/10.1016/j.jksuci.2017.01.015

Marchiori, E., Moustakas, E., Katos, V., and Arief, B. (2013) 'Digital Forensic Process Ontology', Journal of Digital Forensics, Security and Law, 8(2), pp. 25-40.

Mehmood, A., and Pearson, S. (2014) 'Fog Computing: Focusing on Mobile Users at the Edge', ACM SIGCOMM Computer Communication Review, 44(5), pp. 1-2.

Mentz, J., and Cilliers, L. (2021) 'Digital Forensics Education for Employability', Future Generation Computer Systems, 115, pp. 198-207.

Mitnick, K. D., and Simon, W. L. (2002) The Art of Deception: Controlling the Human Element of Security, John Wiley & Sons.

Mokhtarian, P. L., Salomon, I., and Singer, M. E. (2015) 'What Moves Us? An Interdisciplinary Exploration of Reasons for Travel Behavior', Transportation Research Part A: Policy and Practice, 77, pp. 96-112.

Moallem, A. (2019). Cybersecurity awareness among college students. In Advances in Human Factors in Cybersecurity: Proceedings of the AHFE 2018 International Conference on Human Factors in Cybersecurity, July 21–25, 2018, Loews Sapphire Falls Resort at Universal Studios, Orlando, Florida, USA 9 (pp. 79–87). Springer International Publishing.

Moletsane, T., and Tibolane, P. (2020, March). Mobile information security awareness among students in higher education: An exploratory study. 2020 conference on information, communications, technology, and society (ICTAS) (pp. 1–6). IEEE.

Moshirpour, M., and Dargahi, T. (2021) 'A Comprehensive Survey on Fog Computing: State-of-the-Art and Research Directions', Journal of Network and Computer Applications, 178, p. 102987.

Mylrea, M. F., Gupta, L., and Yuan, Y. (2014) 'New Market Opportunities for Digital Forensics in the Cloud', Digital Investigation, 11(3), pp. 215-224.

Nagaur, A. (2020). Internet addiction and mental health among university students during the CVOID-19 lockdown. MuktShabd J, 9, 684-692.

Narahari, A. C., & Shah, V. (2016). Cyber Crime and Security: A Study on Awareness among Young Netizens of Anand, Gujarat State, India. IJARIIE, 6(2), 1164–1172.

Nasser, A., Minoli, D., and Jain, R. (2013) 'Cloud-Based Wireless Networks: Technologies, Risks, and Scenarios', IEEE Wireless Communications, 20(2), pp. 10-17.

Niemantsverdriet, K., and Russell, M. A. (2018) Investigating Cyber Law and Cyber Ethics: Issues, Impacts and Practices, IGI Global.

Nyikes, Z., &Baimakova, K. V. (2016). An Examination of the Relationship between Security Awareness and Digital Competence.

Ozdamli, F., and Zunboylu, H. (2015). M-learning adequacy and perceptions of students and teachers in secondary schools: M-learning adequacy and perceptions. British Journal of Educational Technology, 46(1), 159–172. https://doi.org/10.1111/bjet.12136

Pham, H., Brennan, L., & Richardson, J. (2017, June). Review of behavioural theories in security compliance and research challenges. Informing Science and Information Technology Education Conference, Vietnam (pp. 65–76). Santa Rosa, CA: Informing Science Institute

Reddy, G. N., & Reddy, G. J. U. (2014). A study of cyber security challenges and emerging trends in the latest technologies. arXiv. https://doi.org/10.48550/arXiv.1402.1842

Safarpour, F., Kurd, N., and Ghazanfari, Z. (2021). A Study on Internet Usage Patterns among Students at the Medical University of Ilam and Influential Factors. Biomedical Journal of Scientific and Technical Research, 33(2), 25761-25765.

Sanzgiri, V., &Sanzgiri, V. (2022). 12.67 lakh cyber-attacks were reported in India by November 2022, according to the IT Ministry in Parliament. MediaNama.https://www.medianama.com/2022/12/223-12-67-lakh-cyber-attacks-reported-november-2022-meity/

Second International Conference of the South Asian Society of Criminology and Victimology (SASCV), 11–13 January 2013, Kanyakumari, Tamil Nadu, India. (n.d.). Google Books. https://books.google.co.in/books?hl=en&lr=&id=Do1Kl2OyQdgC&oi=fnd&pg=PA378&dq=studies+on+cybercrime+victims+within+college+students+in+india&ots=S3lsbbieAj&sig=RuMykUvXLoDVGiE3nG90ik17iKM&redir_esc=y#v=twopage&q=studies%20on%20cybercrime%20victims%20within%20college%20students%20in%20india&f=true

Senthilkumar, K., and Eswaramoorthy, S. (2017, November). A survey on cyber security awareness among college students in Tamil Nadu. In IOP Conference Series: Materials Science and Engineering (Vol. 263, No. 4, p. 042043). IOP Publishing.

Skinner, W., & Foam, A. M. (1997). A Social Learning Theory Analysis of Computer Crime among College Students. Journal of Research in Crime and Delinquency, 34(4), 495–518. https://doi.org/10.1177/0022427897034004005

Slusky, L., &Partow-Navid, P. (2012). Students’ information security practices and awareness. Journal of Information Privacy and Security, 8(4), 3–26. https://doi.org/10.1080/15536548.2012.10845664

Sombatruang, N., Sasse, M. A., & Baddeley, M. (2016). Why do people use unsecure public wi-fi? An investigation of behaviour and factors driving decisions. Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and Trust, 61–72. https://doi.org/10.1145/3046055.3046058

Van Bavel, R., Rodríguez-Priego, N., Vila, J., & Briggs, P. (2019). Using protection motivation theory in the design of nudges to improve online security behavior. International Journal of Human-Computer Studies, 123, 29–39.

Wang, X., Zhang, R., Wang, Z., & Li, T. (2021). How does digital competence preserve university students’ psychological well-being during the pandemic? An investigation from self-determined theory. Frontiers in Psychology, 12. https://www.frontiersin.org/articles/10.3389/fpsyg.2021.652594

Yen, S. C., Lo, Y., Lee, A., & Enriquez, J. (2018). Learning online, offline, and in-between: comparing student academic outcomes and course satisfaction in face-to-face, online, and blended teaching modalities. Education and Information Technologies, 23, 2141-2153.

Yu, S. (2014). Fear of cybercrime among college students in the United States: An exploratory study. International Journal of Cyber Criminology, 8(1), 36.

Zwilling, M., Klien, G., Lesjak, D., Wiechetek, Ł., Cetin, F., & Basim, H. N. (2022). Cybersecurity awareness, knowledge, and behavior: A comparative study. Journal of Computer Information Systems, 62(1), 82–97.

WEBILIOGRAPHY

BL New Delhi Bureau. (2022, March 15). Indian Gen Z spends average 8 hours a day online: report. [Online] Available at: https://www.thehindubusinessline.com/news/variety/indian-gen-z-spends-average-8-hours-a-day-online-report/article65227021.ece

Bournemouth University Research Online [BURO]. A Qualitative Exploration of the DIGCOMP Digital Competence Framework: Attitudes of students, academics, and administrative staff in the health faculty of a UK HEI. (n.d.). [Online] Available at: http://eprints.bournemouth.ac.uk/23477/

Bureau, B. N. D. (2022, March 15). Indian Gen Z spends average 8 hours a day online: Report. [Online] Available at: https://www.thehindubusinessline.com/news/variety/indian-gen-z-spends-average-8-hours-a-day-online-report/article65227021.ece

Campbell, S. (2017). Cybersecurity in Higher Education: Problems and Solutions. Toptal Insights Blog. [Online] Available at: https://www.toptal.com/insights/innovation/cybersecurity-in-higher-education

CIA Triad in Cyber Security: Definition, Examples, Importance. (n.d.). [Online] Available at: https://www.knowledgehut.com/blog/security/cia-in-cyber-security

Cybercrime in India: An overview. (n.d.). [Online] Available at: https://legalserviceindia.com/legal/article-4998-cyber-crime-in-india-an-overview.html

Cyber security awareness and why it is important | Australian Institute of ICT. (n.d.). [Online] Available at: https://aiict.edu.au/blog/what-is-cyber-security-awareness-and-why-is-it-important/

Cyber space and the various challenges attached to the regulation of information and communication technology. - Lawpanch. (2022, March 2). [Online] Available at: https://lawpanch.com/cyber-space-and-the-various-challenges-attached-to-the-regulation-of-information-and-communication-technology-%ef%bf%bc/

Cybersecurity awareness is about both “knowing” and “doing.” (2014, October 1). Security Intelligence. [Online] Available at: https://securityintelligence.com/cybersecurity-awareness-is-about-both-knowing-and-doing/

Cybersecurity in higher education: Problems and solutions | Toptal. (n.d.). Toptal Insights Blog. [Online] Available at: https://www.toptal.com/insights/innovation/cybersecurity-in-higher-education

Delhi University, AMU, IIT-BHU websites hacked; “Pakistan Zindabad”, pro-Kashmir messages seen. (n.d.). India Today. [Online] Available at: https://www.indiatoday.in/india/story/delhi-university-amu-website-pakistan-zindabad-kashmir-kashmiri-youths-indian-army-973492-2017-04-25

Desk, I. T. W. (2017, April 25). Delhi University, AMU, IIT-BHU websites hacked; 'Pakistan Zindabad', pro-Kashmir messages seen. India Today. [Online] Available at: https://www.indiatoday.in/india/story/delhi-university-amu-website-pakistan-zindabad-kashmir-kashmiri-youths-indian-army-973492-2017-04-25

Desk, T. (2022, June 13). 18 out of every 100 Indians victim of data breaches: SurfShark. The Indian Express. [Online] Available at: https://indianexpress.com/article/technology/tech-news-technology/18-out-of-every-100-indians-affected-by-data-breaches-surfshark-7967560/

Dunning-Kruger effect | Definition, examples, & facts | Britannica. (2023, March 27). [Online] Available at: https://www.britannica.com/science/Dunning-Kruger-effect

Economic Diplomacy Division. India to have nearly 1 billion internet users by 2025: Report. [Online] Available at: https://indbiz.gov.in/india-to-have-nearly-1-billion-internet-users-by-2025-report/

Education report cybersecurity. (n.d.). Security Scorecard. [Online] Available at: https://resources.securityscorecard.com/all/education-report-cybersecurity

Facts and figures 2021. (n.d.). [Online] Available at: https://www.itu.int/itu-d/reports/statistics/2021/11/15/youth-internet-use

Indian education sector biggest target of cyber threats, remote learning among key triggers: Report. (2022, May 1). The Times of India. [Online] Available at: https://timesofindia.indiatimes.com/india/indian-education-sector-biggest-target-of-cyber-threats-remote-learning-among-key-triggers-report/articleshow/91234420.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst

Lara. (2018, February 24). Answer to "What’s the difference between “knowledge of sth” and "perception of sth “?” English Language & Usage Stack Exchange. [Online] Available at: https://english.stackexchange.com/a/432673

Matters, S. M. (n.d.). Patterns of internet usage among youth in India. Social Media Matters. [Online] Available at: https://www.socialmediamatters.in/internet-usage-among-youth-in-india

Measuring digital development: Facts and Figures 2022. (n.d.). ITU Hub. [Online] Available at: https://www.itu.int/hub/publication/d-ind-ict_mdd-2022/

Murnane, K. (n.d.). How men and women differ in their approach to online privacy and security. Forbes. [Online] Available at: https://www.forbes.com/sites/kevinmurnane/2016/04/11/how-men-and-women-differ-in-their-approach-to-online-privacy-and-security/

Pramshu. (2022, May 17). India to have nearly 1 billion Internet users by 2025: Report - IndBiz | Economic Diplomacy Division. IndBiz | Economic Diplomacy Division. [Online] Available at: https://indbiz.gov.in/india-to-have-nearly-1-billion-internet-users-by-2025-report/

Pti. (2022, May 1). Indian education sector biggest target of cyber threats, remote learning among key triggers: Report. The Times of India. [Online] Available at: http://timesofindia.indiatimes.com/articleshow/91234420.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst

Redmonster.In. (2022). Cyber Space and the various Challenges attached to the regulation of Information and Communication Technology. - LawPanch. LawPanch - Let’s Spread Law. [Online] Available at: https://lawpanch.com/cyber-space-and-the-various-challenges-attached-to-the-regulation-of-information-and-communication-technology-%EF%BF%BC/

Sanzgiri, V. (2022, December 15). 12.67 lakh cyber-attacks reported in India by November 2022: IT Ministry in Parliament. MediaNama. [Online] Available at: https://www.medianama.com/2022/12/223-12-67-lakh-cyber-attacks-reported-november-2022-meity/

Security Culture Report. (n.d.). Knowbe4. [Online] Available at: https://www.knowbe4.com/hubfs/Security-Culture-Report.pdf

Statistics. (n.d.). ITU. [Online] Available at: https://www.itu.int:443/en/ITU-D/Statistics/Pages/stat/default.aspx

The benefits of cyber security awareness training within universities. (2022, July 19). Open Access Government. [Online] Available at: https://www.openaccessgovernment.org/the-benefits-of-cyber-security-awareness-training-within-universities/139452/

The State of Cybersecurity Education in K-12 Schools. (n.d.). cyber.org. [Online] Available at: https://cyber.org/sites/default/files/2020-06/The%20State%20of%20Cybersecurity%20Education%20in%20K-12%20Schools.pdf

Townsend, A. (2021, February 26). 3 reasons higher education is a cyberattack favorite. OneLogin Identity Management Blog. [Online] Available at: https://www.onelogin.com/blog/3-reasons-higher-ed-hacked

Utilizing the technology acceptance model to assess employee adoption of information systems security measures - ProQuest. (n.d.). [Online] Available at: https://www.proquest.com/openview/561019e2cb80f662d4308633147e172c/1?pqorigsite=gscholar&cbl=18750

Wallace, J. (2022, June 2). What is the CIA triad? Definition & examples in cybersecurity. Coretelligent. [Online] Available at: https://coretelligent.com/insights/what-is-the-cia-triad-and-why-does-your-cybersecurity-position-depend-on-it/

Wilde, N. (2022). The benefits of cyber security awareness training within universities. Open Access Government. [Online] Available at: https://www.openaccessgovernment.org/the-benefits-of-cyber-security-awareness-training-within-universities/139452

Yu, S. (2014). Fear of cybercrime among college students in the United States: An exploratory study. International Journal of Cyber Criminology, 8(1), 36.

Downloads

Published

2023-12-26

How to Cite

Parikh, V., & Nimbekar, M. (2023). Socializing the Impact: An Analysis of the Theory of Planned Behavior’s Influence on Increasing University Students’ Cybersecurity Awareness. Journal of Community Development, 4(2), 139–156. https://doi.org/10.47134/comdev.v4i2.162

Issue

Section

Articles