{"title":"青少年资讯安全实践及干预","authors":"Satish Radhakrishnan, Lavanya Rajendran","doi":"10.1080/08874417.2023.2270453","DOIUrl":null,"url":null,"abstract":"ABSTRACTIn the digital age, information is drastically exchanged among users. This data exchange paved the way for unsolicited access by cybercriminals, which could lead to psychological and financial loss. In this study, through a pre- and posttest experimental design, 668 Indian teenagers aged between fifteen and nineteen were evaluated last year. The preliminary study revealed low performance by teenagers in e-mail practices, password management, software practices, social media usage, and privacy settings. Through a novel intervention, 36 teenagers were observed through a curated information security module. The pretest and posttest analyses significantly supported the effects of security training, and Cohen’s d effect size reiterated the importance of progressive outcomes in their security literacy and practices. The intervention focused on the importance of threat perception and coping appraisal for inculcating security parameters and behavioral change among the teenagers.KEYWORDS: Information security awarenesssecurity practicesemail securitypassword securitysecurity training AcknowledgmentsWe would like to thank all the candidates who have participated in this research and spent time with us in spite of their busy commitments.Disclosure statementNo potential conflict of interest was reported by the author(s).","PeriodicalId":54855,"journal":{"name":"Journal of Computer Information Systems","volume":"493 1","pages":"0"},"PeriodicalIF":2.5000,"publicationDate":"2023-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Information Security Practices and Intervention Among Teenagers\",\"authors\":\"Satish Radhakrishnan, Lavanya Rajendran\",\"doi\":\"10.1080/08874417.2023.2270453\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"ABSTRACTIn the digital age, information is drastically exchanged among users. This data exchange paved the way for unsolicited access by cybercriminals, which could lead to psychological and financial loss. In this study, through a pre- and posttest experimental design, 668 Indian teenagers aged between fifteen and nineteen were evaluated last year. The preliminary study revealed low performance by teenagers in e-mail practices, password management, software practices, social media usage, and privacy settings. Through a novel intervention, 36 teenagers were observed through a curated information security module. The pretest and posttest analyses significantly supported the effects of security training, and Cohen’s d effect size reiterated the importance of progressive outcomes in their security literacy and practices. The intervention focused on the importance of threat perception and coping appraisal for inculcating security parameters and behavioral change among the teenagers.KEYWORDS: Information security awarenesssecurity practicesemail securitypassword securitysecurity training AcknowledgmentsWe would like to thank all the candidates who have participated in this research and spent time with us in spite of their busy commitments.Disclosure statementNo potential conflict of interest was reported by the author(s).\",\"PeriodicalId\":54855,\"journal\":{\"name\":\"Journal of Computer Information Systems\",\"volume\":\"493 1\",\"pages\":\"0\"},\"PeriodicalIF\":2.5000,\"publicationDate\":\"2023-10-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Computer Information Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1080/08874417.2023.2270453\",\"RegionNum\":4,\"RegionCategory\":\"管理学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Computer Information Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/08874417.2023.2270453","RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Information Security Practices and Intervention Among Teenagers
ABSTRACTIn the digital age, information is drastically exchanged among users. This data exchange paved the way for unsolicited access by cybercriminals, which could lead to psychological and financial loss. In this study, through a pre- and posttest experimental design, 668 Indian teenagers aged between fifteen and nineteen were evaluated last year. The preliminary study revealed low performance by teenagers in e-mail practices, password management, software practices, social media usage, and privacy settings. Through a novel intervention, 36 teenagers were observed through a curated information security module. The pretest and posttest analyses significantly supported the effects of security training, and Cohen’s d effect size reiterated the importance of progressive outcomes in their security literacy and practices. The intervention focused on the importance of threat perception and coping appraisal for inculcating security parameters and behavioral change among the teenagers.KEYWORDS: Information security awarenesssecurity practicesemail securitypassword securitysecurity training AcknowledgmentsWe would like to thank all the candidates who have participated in this research and spent time with us in spite of their busy commitments.Disclosure statementNo potential conflict of interest was reported by the author(s).
期刊介绍:
The Journal of Computer Information Systems (JCIS) aims to publish manuscripts that explore information systems and technology research and thus develop computer information systems globally.
We encourage manuscripts that cover the following topic areas:
-Analytics, Business Intelligence, Decision Support Systems in Computer Information Systems
- Mobile Technology, Mobile Applications
- Human-Computer Interaction
- Information and/or Technology Management, Organizational Behavior & Culture
- Data Management, Data Mining, Database Design and Development
- E-Commerce Technology and Issues in computer information systems
- Computer systems enterprise architecture, enterprise resource planning
- Ethical and Legal Issues of IT
- Health Informatics
- Information Assurance and Security--Cyber Security, Cyber Forensics
- IT Project Management
- Knowledge Management in computer information systems
- Networks and/or Telecommunications
- Systems Analysis, Design, and/or Implementation
- Web Programming and Development
- Curriculum Issues, Instructional Issues, Capstone Courses, Specialized Curriculum Accreditation
- E-Learning Technologies, Analytics, Future