• Aucun résultat trouvé

Usage of Computer and Internet among Undergraduates: Knowledge, Awareness, and Concentration on Privacy and Security Management

N/A
N/A
Protected

Academic year: 2022

Partager "Usage of Computer and Internet among Undergraduates: Knowledge, Awareness, and Concentration on Privacy and Security Management"

Copied!
2
0
0

Texte intégral

(1)

HAL Id: edutice-01737894

https://edutice.archives-ouvertes.fr/edutice-01737894

Submitted on 20 Mar 2018

HAL is a multi-disciplinary open access archive for the deposit and dissemination of sci- entific research documents, whether they are pub- lished or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers.

L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d’enseignement et de recherche français ou étrangers, des laboratoires publics ou privés.

Usage of Computer and Internet among Undergraduates: Knowledge, Awareness, and Concentration on Privacy and Security Management

G P S Nalaka, H P Diunugala

To cite this version:

G P S Nalaka, H P Diunugala. Usage of Computer and Internet among Undergraduates: Knowledge, Awareness, and Concentration on Privacy and Security Management. International Postgraduate Research Conference 2017 (IPRC2017), Dec 2017, Kelaniya, Sri Lanka. �edutice-01737894�

(2)

Usage of Computer and Internet among Undergraduates: Knowledge, Awareness, and Concentration on Privacy and Security Management

G.P.S. Nalaka1*, H.P. Diunugala2

Today, in twenty first century information technology plays a vital role of every aspect of human life, especially in process of education. Significantly, the usage of computer and Internet is expanding among undergraduates. The aim of the present study was to assess the knowledge, awareness and concentration on privacy and security management of computer and Internet usage among undergraduates. 420 undergraduates from the University of Sri Jayewardenepura were selected randomly for the survey. A web and paper based questionnaire was used to collect data. Summary measures and data presenting tools were used under descriptive analysis.

Usage knowledge of computer and Internet is consisted two components as the computer literacy and the digital literacy. Composite indices were constructed to measure the computer literacy, digital literacy, awareness, and concentration on privacy and security management which were monitored through Likert scale statements. Cronbach’s alpha, the Kaiser-Meyer- Olkin measure of sampling adequacy tests and the Bartlett's test of sphericity were used to diagnose the feasibility of the data reduction. With respect to the composite indices, the level of computer literacy among undergraduates is 83.83% and it is a good sign. The level of digital literacy among undergraduates is 61.23% but is not much higher as computer literacy. There is lack of security awareness among undergraduates since the average level is 51.23%. The level of security management among undergraduates is 68.81% while the level of privacy concentration among undergraduates is 69.62%. As the results of one sample t-tests, except security awareness, other indices are over the level of 60% significantly. Therefore, the levels of computer literacy, digital literacy, security management and privacy concentration are in higher level among the undergraduates. However, the awareness about security should be empowered among undergraduates. Also, it is important to improve the digital literacy among undergraduates. Therefore, seminars and workshops should be organized to emphasis knowledge so that the individuals will learn to use computer and Internet properly.

1 Department of Social Statistics, University of Sri Jayewardenepura * hellonalaka@gmail.com

2 Department of Social Statistics, University of Sri Jayewardenepura

Références

Documents relatifs

The main task of a security monitor reasoning about a situation given a privacy policy is to check compliance – regardless of whether these policies are expressed in terms of

Alexander Pretschner Technical University of Munich, Germany Rami Puzis Ben Gurion University of the Negev, Israel Rui Qiao Virginia Polytechnic Institute and State

Consider the case of a group of two or more users that want to make some kind of computation based on common data, but without revealing to the oth- ers their own information..

I’ll talk about opportunities for AI/HLT-based automation to im- prove the incident management process for practitioners and how AI/HLT can drive a better understanding of

First, and obviously, to create a socio-technical approach to cyber security risk analysis and management, based on security culture assessment, which can identify

Wen was a senior data scientist at Google working in social analytics; and a Research Staff Member at IBM Research after receiving PhD from University of

It is therefore important, when thinking about security, to consider the differences between our privacy interests in public – our interests in anonymity, seclusion,

Another generalization of above mentioned concepts is overall security of processes with respect to -differential privacy which requires that processes are secure with respect to