CYBER VULNERABILITY IN LIGHT OF ONLINE LEARNING REALITY
DOI:
https://doi.org/10.17770/sie2021vol5.6367Keywords:
Cyber threats, Privacy, Security, Social engineering, Social Networking WebsitesAbstract
Presently, as Covid 19 has caused most of educational processes to move online, cybersecurity and data protection is rapidly gaining importance in all educational institutions, and most of the academia became more vulnerable to cyberattacks. This article sheds some light on how communities of higher education institutions perceive increased online threats, what measures they take to protect themselves against cybercrime, whether they practice good security hygiene. This paper presents and analyses results of a survey conducted at higher education institutions (universities, colleges) into perception of cybersecurity, online culture and hygiene during the present times of remote education.
Downloads
References
Bellovin, S.M., Landau, S, &Lin, H.S. (2017). Limiting the undesired impact of cyber weapons: technical requirements and policy implications, Journal of Cybersecurity, 3(1), 59–68.
Bialaszewski, D. (2015). Information security in education: Are we continually improving? Issues in Informing Science and Information Technology, 12, 45-54. Retrieved from http://iisit.org/Vol12/IISITv12p045-054Bialaszewski1770.pdf
Clough, J. (2011). Cybercrime. Commonwealth law bulletin, 37(4), 671–680.
Cullen, A., & Armitage, L. (2016). The social engineering attack spiral. In Proceedings of the IEEE International Conference on Cybersecurity and Protection of Digital Services, 1–6. Retrieved from https://ieeexplore.ieee.org/document/7502347
Heitzenrater, C.D., & Simpson, A.C. (2016). Policy statistics and questions: reflections on UK cyber security disclosures. Cybersecur. 2(1), 43.
Kapsevičius, G. (2019). Verslui vis labiau skaitmenizuojantis, kibernetinių įsilaužimų nuostoliai auga. Retrieved from https://www.alfa.lt/straipsnis/50407155/verslui-vis-labiau-skaitmenizuojantis-kibernetiniu-isilauzimu-nuostoliai-auga
National Cybersecurity Strategy. (2017). January 28. Nr. XIII-202. Retrieved from https://e-seimas.lrs.lt/portal/legalAct/lt/TAD/TAIS.167925/asr
The Law on Cybersecurity of the Republic of Lithuania. (2018). June 27. Nr. XIII-1299. Retrieved from https://e-seimas.lrs.lt/portal/legalAct/lt/TAD/15e540727ac211e89188e16a6495e98c
Manske, K. (2000). An introduction to social engineering, Security Management Practices, 6, 53-59.
Peltsverger, S., & Zheng, G. (2016). Enhancing Privacy Education with a Technical Emphasis in IT Curriculum, Journal of Information Technology Education: Innovations in Practice, (15). Retrieved from http://www.jite.org/documents/Vol15/JITEv15IIPp001-017Peltsverger1873.pdf
Renaud, K., & Zimmermann, V. (2020). How to Nudge in Cybersecurity, Network Security, 2020(11).
Statistics Lithuania. (2020). Informacinių technologijų naudojimas namų ūkiuose. Retrieved from https://osp.stat.gov.lt/informaciniai-pranesimai?articleId=8028975