Perceptive Profiles of Students Computer Security & Safety Competencies: Implication for Business Curriculum

نویسنده

  • Ewuuk Lomo-David
چکیده

The frequency with which intruders successfully breach and create havoc on computer systems and networks seems to indicate that information technology (IT) personnel and other employees whose duties are to protect these systems are either ill-prepared for their jobs, unfamiliar with information technology security measures (ITSM) or just not savvy enough for the industry. This issue seems to suggest that employers should seek to recruit student applicants (prospective employees) whose profiles relate to familiarity with ITSM. The profiles (gender, academic classification, academic majors, and experience with computers) have significant relationships with familiarity with ITSM (passwords, scan of computer systems and email attachments, functions of anti-virus software, placements of passwords on email attachments, functions of biometric authentication, firewalls, intrusion detection systems, and multifaceted authentication systems). Multiple regression analysis of data from a survey of 867 Nigerian university students revealed that engineering and business majors; and students with very good computer experience tend to be familiar with all ITSM except sophisticated passwords and functions of multifaceted authentication systems. Students who possess documentable familiarity with ITSM may make better information security-savvy employees that can engender much needed trust in the IT industry and profession.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Applications and Benefits of Curriculum Mapping: a Systematic Review of International Documents

Introduction: Maps can create a deeper insight of our surrounding environment. The map can also be used in curriculum for its reforming, and developing and ultimately improving teaching-learning process. This systematic review aimed to identify applications and benefits of curriculum mapping. Methods: Seven search engine and websites were searched using the keywords including curriculum mappin...

متن کامل

Collaborative competencies in professional social networking: Are students short changed by curriculum in business education?

Social networks have earned their indisputable place as a collaborative learning tool in education. In this paper, we address the gap in literature on developing a set of competencies to allow graduates to make the most of collaborative technologies for business and professional activity as well as career management. Based on a survey of over 600 business school graduates from AMBA accredited U...

متن کامل

Teaching Authentication in High Schools: Challenges and Lessons Learned

As more of the activities of daily living take place online, computer security education for high school students is of increasing importance. To address this need, we designed, developed, and tested prototype curriculum materials to teach secondary school students about user authentication. We identify challenges encountered in this process, and contend that these challenges stem from the natu...

متن کامل

Hands-On Approach to Teach Security Courses at undergraduate Level Lessons Learnt

It has become imperative for companies, governments, and organizations to understand how to guard against hackers, outsiders, and even disgruntled employees who threaten their information security, integrity and daily business operations. To address national needs for computer security education, many universities have incorporated computer and security courses into their undergraduate and grad...

متن کامل

Development and validation of an assessment tool for a national young worker curriculum.

BACKGROUND An online, multiple-choice assessment was developed and validated for Youth@Work-Talking Safety, a NIOSH curriculum that equips middle and high school students with foundational workplace safety and health knowledge and skills. METHODS Classical Test Theory was used for the test development and validation; the Jaeger method was used for cut score determination. A total of 118 multi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009