Skip to main content
Top

2022 | OriginalPaper | Chapter

Investigating Cyber Security Awareness Among Preservice Teachers During the COVID-19 Pandemic

Authors : Moses Moyo, Osman Sadeck, Nyarai Tunjera, Agnes Chigona

Published in: Information Systems

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

South African institutions of higher education suffered serious disruptions during the COVID-19 pandemic which, resulted in migrating most teaching and learning activities to various online platforms, of which many depended on the open web. This has the potential to expose lecturers and students to cyber security threats and risks. As such cyber security awareness (CSA) becomes important. This study investigated the CSA among preservice teachers pursuing a Bachelor of Education studies in Further Education and Training (FET) at a university in Cape Town, South Africa. The purpose of the study was to gain an insight into CSA among preservice teachers who had been using digital technologies to support learning during the COVID-19 pandemic. An electronic questionnaire was administered to a random sample of 300 preservice teachers. The findings show that preservice teachers were limited in their awareness of cyber security threats and risks likely to affect their use of various digital technologies for remote learning. Furthermore, preservice teachers implemented basic strategies to mitigate basic cyber security threats and attacks. These basic strategies were found not to be sufficient for advanced attacks. The study concluded that lack of proper CSA and knowledge among preservice teachers presented them with challenges in solving threat attacks associated with denial-of-service (DoS), data theft and phishing when using personal digital devices.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Lorente, L.M.L., Arrabal, A.A., Pulido-Montes, C.: The right to education and ICT during COVID-19: an international perspective. Sustain. 12(21), 1–17 (2020) Lorente, L.M.L., Arrabal, A.A., Pulido-Montes, C.: The right to education and ICT during COVID-19: an international perspective. Sustain. 12(21), 1–17 (2020)
3.
go back to reference Potgieter, P.: The Awareness behaviour of students on cyber security awareness by using social media platforms: a case study at the central University of Technology. In: Proceedings of 4th International Conference on the Internet, Cyber Security and Information Systems 2019, vol. 12, K. Njenga, Ed. Kalpa Publications in Computing, pp. 272–262 (2019) Potgieter, P.: The Awareness behaviour of students on cyber security awareness by using social media platforms: a case study at the central University of Technology. In: Proceedings of 4th International Conference on the Internet, Cyber Security and Information Systems 2019, vol. 12, K. Njenga, Ed. Kalpa Publications in Computing, pp. 272–262 (2019)
4.
go back to reference Aloul, F.: The need for effective information security awareness. J. Adv. Inf. Technol. 3(3), 176–183 (2012) Aloul, F.: The need for effective information security awareness. J. Adv. Inf. Technol. 3(3), 176–183 (2012)
5.
go back to reference Aldawood, H., Skinner, G.: Educating and raising awareness on cyber security social engineering: a literature review. In: 2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE), pp. 62–68 (2018) Aldawood, H., Skinner, G.: Educating and raising awareness on cyber security social engineering: a literature review. In: 2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE), pp. 62–68 (2018)
6.
go back to reference Sridevi, K.V.: Cyber security awareness among in-service secondary school teachers of Karnataka. Indian J. Educ. Technol. 2(2), 82–94 (2020)MathSciNet Sridevi, K.V.: Cyber security awareness among in-service secondary school teachers of Karnataka. Indian J. Educ. Technol. 2(2), 82–94 (2020)MathSciNet
7.
go back to reference Muniandy, L., Muniandy, B., Samsudin, Z.: Cyber security behaviour among higher education students in Malaysia. J. Inf. Assur. Cyber Secur. 2017(3), 1–13 (2017) Muniandy, L., Muniandy, B., Samsudin, Z.: Cyber security behaviour among higher education students in Malaysia. J. Inf. Assur. Cyber Secur. 2017(3), 1–13 (2017)
8.
go back to reference Sawahel, W.: COVID-19 Brings New Cyber-Security Threats to Universities. University World News Africa Edition, Durban, 08 Jun 2020 Sawahel, W.: COVID-19 Brings New Cyber-Security Threats to Universities. University World News Africa Edition, Durban, 08 Jun 2020
9.
go back to reference Chandarman, R., Van Niekerk, B.: Students’ cybersecurity awareness at a private tertiary educational institution. African J. Inf. Commun. (AJIC) 2017(20), 133–155 (2017) Chandarman, R., Van Niekerk, B.: Students’ cybersecurity awareness at a private tertiary educational institution. African J. Inf. Commun. (AJIC) 2017(20), 133–155 (2017)
10.
go back to reference Al-Janabi, S., Al-Shourbaji, I.: A study of cyber security awareness in educational environment in the Middle East. J. Inf. Knowl. Manag. 15(1), 1–30 (2016) Al-Janabi, S., Al-Shourbaji, I.: A study of cyber security awareness in educational environment in the Middle East. J. Inf. Knowl. Manag. 15(1), 1–30 (2016)
12.
go back to reference ISO: ISO/IEC 27032:2012 Information technology - Security techniques - Guidelines for cybersecurity (2012) ISO: ISO/IEC 27032:2012 Information technology - Security techniques - Guidelines for cybersecurity (2012)
13.
go back to reference Von Solms, R., Van Niekerk, J.: From information security to cyber security. Comput. Secur. 2013(33), 97–102 (2013) Von Solms, R., Van Niekerk, J.: From information security to cyber security. Comput. Secur. 2013(33), 97–102 (2013)
15.
go back to reference Arpaci, I., Kilicer, K., Bardakci, S.: Effects of security and privacy concerns on educational use of cloud services. Comput. Hum. Behav. 45(2015), 93–98 (2015) Arpaci, I., Kilicer, K., Bardakci, S.: Effects of security and privacy concerns on educational use of cloud services. Comput. Hum. Behav. 45(2015), 93–98 (2015)
16.
go back to reference Dawson, M., Bacius, R., Gouveia, L.B., Vassilakos, A.: Understanding the challenge of cybersecurity in critical infrastructure sectors. L. Forces Acad. Rev. 26(1), 69–75 (2021) Dawson, M., Bacius, R., Gouveia, L.B., Vassilakos, A.: Understanding the challenge of cybersecurity in critical infrastructure sectors. L. Forces Acad. Rev. 26(1), 69–75 (2021)
17.
go back to reference Kim, L.: Cybersecurity awareness: protecting data and patients. Nurs. Inf. 47(6), 65–67 (2017) Kim, L.: Cybersecurity awareness: protecting data and patients. Nurs. Inf. 47(6), 65–67 (2017)
18.
go back to reference Shaw, R., Chen, C., Harris, A., Huang, H.: The impact of information richness on information security awareness training effectiveness. Comput. Educ. 52(2), 92–100 (2009) Shaw, R., Chen, C., Harris, A., Huang, H.: The impact of information richness on information security awareness training effectiveness. Comput. Educ. 52(2), 92–100 (2009)
19.
go back to reference Zwilling, M., Klien, G., Lesjak, D., Wiechetek, Ł, Cetin, F., Basim, H.: Cyber security awareness, knowledge and behavior: a comparative study. J. Comput. Inf. Syst. 00(00), 1–16 (2020) Zwilling, M., Klien, G., Lesjak, D., Wiechetek, Ł, Cetin, F., Basim, H.: Cyber security awareness, knowledge and behavior: a comparative study. J. Comput. Inf. Syst. 00(00), 1–16 (2020)
20.
go back to reference Abawajy, J.: User preference of cyber security awareness delivery methods. Behav. Inf. Technol. 33(3), 237–248 (2014)MathSciNet Abawajy, J.: User preference of cyber security awareness delivery methods. Behav. Inf. Technol. 33(3), 237–248 (2014)MathSciNet
22.
go back to reference Furnell, S., Bryant, P., Phippen, A.: Assessing the security perceptions of personal Internet users. Comput. Secur. 26(5), 410–417 (2007) Furnell, S., Bryant, P., Phippen, A.: Assessing the security perceptions of personal Internet users. Comput. Secur. 26(5), 410–417 (2007)
23.
go back to reference von Solms, B., von Solms, R.: Cybersecurity and information security – what goes where? Inf. Comput. Secur. 26(1), 2–9 (2018) von Solms, B., von Solms, R.: Cybersecurity and information security – what goes where? Inf. Comput. Secur. 26(1), 2–9 (2018)
24.
go back to reference Ulven, B., Wangen, G.: A systematic review of cybersecurity risks in higher education. Futur. Internet 13(2), 39–51 (2021) Ulven, B., Wangen, G.: A systematic review of cybersecurity risks in higher education. Futur. Internet 13(2), 39–51 (2021)
25.
go back to reference Bada, M., Nurse, J.: Developing cybersecurity education and awareness programmes for small and medium-sized enterprises (SMEs). Inf. Comput. Secur. 27(3), 393–410 (2019) Bada, M., Nurse, J.: Developing cybersecurity education and awareness programmes for small and medium-sized enterprises (SMEs). Inf. Comput. Secur. 27(3), 393–410 (2019)
26.
go back to reference Aliyu, M., Abdallah, N., Lasisi, N., Diyar, D., Zeki, A.: Computer security and ethics awareness among IIUM students: an empirical study. In: The Information and Communication Technology for the Muslim World (ICT4M) 2010 International Conference (2010) Aliyu, M., Abdallah, N., Lasisi, N., Diyar, D., Zeki, A.: Computer security and ethics awareness among IIUM students: an empirical study. In: The Information and Communication Technology for the Muslim World (ICT4M) 2010 International Conference (2010)
33.
go back to reference Shahabuddin, A., et al.: Exploring maternal health care-seeking behavior of married adolescent girls in Bangladesh: a social-ecological approach. PLoS ONE 12(1), e0169109 (2017)MathSciNet Shahabuddin, A., et al.: Exploring maternal health care-seeking behavior of married adolescent girls in Bangladesh: a social-ecological approach. PLoS ONE 12(1), e0169109 (2017)MathSciNet
34.
go back to reference He, W., Zhang, Z.: Enterprise cybersecurity training and awareness programs: recommendations for success. J. Organ. Comput. Electron. Commer. 29(4), 249–257 (2019)MathSciNet He, W., Zhang, Z.: Enterprise cybersecurity training and awareness programs: recommendations for success. J. Organ. Comput. Electron. Commer. 29(4), 249–257 (2019)MathSciNet
36.
go back to reference Koyuncu, M., Pusatli, T.: Security awareness level of smartphone users: an exploratory case study. Mob. Inf. Syst. 2019, 16–28 (2019) Koyuncu, M., Pusatli, T.: Security awareness level of smartphone users: an exploratory case study. Mob. Inf. Syst. 2019, 16–28 (2019)
37.
go back to reference Breitinger, F., Tully-Doyle, R., Hassenfeldt, C.: A survey on smartphone user’s security choices, awareness and education. Comput. Secur. 101647, 88 (2019) Breitinger, F., Tully-Doyle, R., Hassenfeldt, C.: A survey on smartphone user’s security choices, awareness and education. Comput. Secur. 101647, 88 (2019)
38.
go back to reference Mi, T., Gou, M., Zhou, G., Gan, Y., Schwarzer, R.: Effects of planning and action control on smartphone security behaviour. Comput. Secur. 97, 101954 (2020) Mi, T., Gou, M., Zhou, G., Gan, Y., Schwarzer, R.: Effects of planning and action control on smartphone security behaviour. Comput. Secur. 97, 101954 (2020)
39.
go back to reference Moletsane, T., Tsibolane, P.: Mobile information security awareness among students in higher education: an exploratory study. In: 2020 conference on information communications technology and society (ICTAS), pp. 1–6 (2020) Moletsane, T., Tsibolane, P.: Mobile information security awareness among students in higher education: an exploratory study. In: 2020 conference on information communications technology and society (ICTAS), pp. 1–6 (2020)
40.
go back to reference Crompton, H., Burke, D.: The use of mobile learning in higher education: a systematic review. Comput. Educ. 123(2018), 53–64 (2018) Crompton, H., Burke, D.: The use of mobile learning in higher education: a systematic review. Comput. Educ. 123(2018), 53–64 (2018)
41.
go back to reference Kamarulzaman, M.H.: Cyber security awareness among Malaysian pre-university students. In: E-Proceeding of the 6Th Global Summit on Education, p. 199, September 2017 Kamarulzaman, M.H.: Cyber security awareness among Malaysian pre-university students. In: E-Proceeding of the 6Th Global Summit on Education, p. 199, September 2017
42.
go back to reference Da Veiga, A.: Comparing the information security culture of employees who had read the information security policy and those who had not: Illustrated through an empirical study. Inf. Comput. Secur. 24(2), 139–151 (2016) Da Veiga, A.: Comparing the information security culture of employees who had read the information security policy and those who had not: Illustrated through an empirical study. Inf. Comput. Secur. 24(2), 139–151 (2016)
43.
go back to reference Dlamini, Z., Modise, M.: Cyber security awareness initiatives in South Africa: A synergy approach. In: Case Studies in Information Ware fare and Security: For researchers, teachers and students, M. Warren, Ed. Reading UK: Academic Conferences and Publishing International Limited (2013) Dlamini, Z., Modise, M.: Cyber security awareness initiatives in South Africa: A synergy approach. In: Case Studies in Information Ware fare and Security: For researchers, teachers and students, M. Warren, Ed. Reading UK: Academic Conferences and Publishing International Limited (2013)
44.
go back to reference Talib, A.M., Atan, R., Abdullah, R., Murad, M.A.A.: Towards a comprehensive security framework of cloud data storage based on multi-agent system architecture. J. Inf. Secur. 3(4), 295–306 (2012) Talib, A.M., Atan, R., Abdullah, R., Murad, M.A.A.: Towards a comprehensive security framework of cloud data storage based on multi-agent system architecture. J. Inf. Secur. 3(4), 295–306 (2012)
46.
go back to reference Redmond, P., Lock, J., Smart, V.: Pre-service teachers’ perspectives of cyberbullying. Comput. Educ. 119, 1–13 (2018) Redmond, P., Lock, J., Smart, V.: Pre-service teachers’ perspectives of cyberbullying. Comput. Educ. 119, 1–13 (2018)
47.
go back to reference Deschamps, Y., McNutt, K.: Cyberbullying: what’s the problem? Can. Public Adm. 59(1), 45–71 (2016) Deschamps, Y., McNutt, K.: Cyberbullying: what’s the problem? Can. Public Adm. 59(1), 45–71 (2016)
48.
go back to reference Bele, J., Dimc, M., Rozman, D., Jemec, A.: Raising awareness of cybercrime - the use of education as a means of prevention and protection. In: Proceedings of the 10th International Conference on Mobile Learning 2014, ML 2014, pp. 281–284 (2014) Bele, J., Dimc, M., Rozman, D., Jemec, A.: Raising awareness of cybercrime - the use of education as a means of prevention and protection. In: Proceedings of the 10th International Conference on Mobile Learning 2014, ML 2014, pp. 281–284 (2014)
49.
go back to reference Crossler, R., Johnston, A., Lowry, P., Hu, Q., Warkentin, M., Baskerville, R.: Future directions for behavioral information security research. Comput. Secur. 32(2013), 90–101 (2013) Crossler, R., Johnston, A., Lowry, P., Hu, Q., Warkentin, M., Baskerville, R.: Future directions for behavioral information security research. Comput. Secur. 32(2013), 90–101 (2013)
50.
go back to reference Öğütçü, G., Testik, Ö., Chouseinoglou, O.: Analysis of personal information security behavior and awareness. Comput. Secur. 56(2016), 83–93 (2016) Öğütçü, G., Testik, Ö., Chouseinoglou, O.: Analysis of personal information security behavior and awareness. Comput. Secur. 56(2016), 83–93 (2016)
51.
go back to reference Hanus, B., Wu, Y.: Impact of users’ security awareness on desktop security behavior: a protection motivation theory perspective. Inf. Syst. Manag. 33(1), 2–16 (2016) Hanus, B., Wu, Y.: Impact of users’ security awareness on desktop security behavior: a protection motivation theory perspective. Inf. Syst. Manag. 33(1), 2–16 (2016)
52.
go back to reference Kim, E.: Recommendations for information security awareness training for college students. Inf. Manag. Comput. Secur. 22(2014), 115–126 (2014) Kim, E.: Recommendations for information security awareness training for college students. Inf. Manag. Comput. Secur. 22(2014), 115–126 (2014)
53.
go back to reference Dlamini, M.T., Venter, H.S., Eloff, J.H.P., Eloff, M.M.: Security of cloud computing: seeing through the fog (2011) Dlamini, M.T., Venter, H.S., Eloff, J.H.P., Eloff, M.M.: Security of cloud computing: seeing through the fog (2011)
54.
go back to reference Bada, M., Sasse, A., Nurse, J.: Cyber security awareness campaigns: why do they fail to change behaviour? Int. Conf. Cyber Secur. Sustain. Soc. (2019) Bada, M., Sasse, A., Nurse, J.: Cyber security awareness campaigns: why do they fail to change behaviour? Int. Conf. Cyber Secur. Sustain. Soc. (2019)
55.
go back to reference Piccoli, G., Pigni, F.: Information Systems for Managers. Prospect Press, Burlington (2019) Piccoli, G., Pigni, F.: Information Systems for Managers. Prospect Press, Burlington (2019)
57.
go back to reference Ismail, N.: The importance of cyber security culture (2017) Ismail, N.: The importance of cyber security culture (2017)
58.
go back to reference Zefeiti, A.M.B., Mohamad, N.A.: Methodological considerations in studying transformational leadership and its outcomes. Int. J. Eng. Bus. Manage. 7, 10 (2015) Zefeiti, A.M.B., Mohamad, N.A.: Methodological considerations in studying transformational leadership and its outcomes. Int. J. Eng. Bus. Manage. 7, 10 (2015)
59.
go back to reference Youssef, A., Alageel, M.: A framework for secure cloud computing. Int. J. Comput. Sci. 9(4), 487–500 (2012) Youssef, A., Alageel, M.: A framework for secure cloud computing. Int. J. Comput. Sci. 9(4), 487–500 (2012)
60.
go back to reference Podsakoff, P.M., MacKenzie, S.B., Lee, J.Y., Podsakoff, N.P.: Common method biases in behavioural research: a critical review of the literature and recommended remedies. J. Appl. Psychol. 88(5), 879–903 (2003) Podsakoff, P.M., MacKenzie, S.B., Lee, J.Y., Podsakoff, N.P.: Common method biases in behavioural research: a critical review of the literature and recommended remedies. J. Appl. Psychol. 88(5), 879–903 (2003)
61.
go back to reference Chang, S., Van Witteloostuijn, A., Eden, L.: From the editors: Common method variance in international business research. J. Int. Bus. Stud. 41(2), 178–184 (2010) Chang, S., Van Witteloostuijn, A., Eden, L.: From the editors: Common method variance in international business research. J. Int. Bus. Stud. 41(2), 178–184 (2010)
62.
go back to reference Peker, Y., Ray, L., Da Silva, S., Gibson, N., Lamberson, C.: Raising cybersecurity awareness among college students. J. Colloq. Inf. Syst. Secur. Educ. 4(1), 17 (2016) Peker, Y., Ray, L., Da Silva, S., Gibson, N., Lamberson, C.: Raising cybersecurity awareness among college students. J. Colloq. Inf. Syst. Secur. Educ. 4(1), 17 (2016)
64.
go back to reference Alexei, A., Alexei, A.: Cyber security threat analysis in higher education institutions as a result of distance learning. Int. J. Sci. Technol. Res. 10(3), 128–133 (2021) Alexei, A., Alexei, A.: Cyber security threat analysis in higher education institutions as a result of distance learning. Int. J. Sci. Technol. Res. 10(3), 128–133 (2021)
Metadata
Title
Investigating Cyber Security Awareness Among Preservice Teachers During the COVID-19 Pandemic
Authors
Moses Moyo
Osman Sadeck
Nyarai Tunjera
Agnes Chigona
Copyright Year
2022
DOI
https://doi.org/10.1007/978-3-030-95947-0_38

Premium Partner