International Journal of Social Science & Economic Research
Submit Paper

Title:
VIEWS ON CYBERSECURITY PRINCIPLES AND PRACTICES: THE CASE OF BS INFORMATION TECHNOLOGY STUDENTS OF LNU, TACLOBAN CITY, PHILIPPINES

Authors:
Las Johansen B. Caluza, Lowell A. Quisumbing, Rommel L. Verecio, Dennis S. Tibe

|| ||

Las Johansen B. Caluza, Lowell A. Quisumbing, Rommel L. Verecio, Dennis S. Tibe
Leyte Normal University,Tacloban City, Philippines

MLA 8
Caluza, Las Johansen B., et al. "VIEWS ON CYBERSECURITY PRINCIPLES AND PRACTICES: THE CASE OF BS INFORMATION TECHNOLOGY STUDENTS OF LNU, TACLOBAN CITY, PHILIPPINES." Int. j. of Social Science and Economic Research, vol. 3, no. 1, Jan. 2018, pp. 289-296, ijsser.org/more2018.php?id=18. Accessed 2018.
APA
Caluza, L. B., Quisumbing, L. A., Verecio, R. L., & Tibe, D. S. (2018, January). VIEWS ON CYBERSECURITY PRINCIPLES AND PRACTICES: THE CASE OF BS INFORMATION TECHNOLOGY STUDENTS OF LNU, TACLOBAN CITY, PHILIPPINES. Int. j. of Social Science and Economic Research, 3(1), 289-296. Retrieved from ijsser.org/more2018.php?id=18
Chicago
Caluza, Las Johansen B., Lowell A. Quisumbing, Rommel L. Verecio, and Dennis S. Tibe. "VIEWS ON CYBERSECURITY PRINCIPLES AND PRACTICES: THE CASE OF BS INFORMATION TECHNOLOGY STUDENTS OF LNU, TACLOBAN CITY, PHILIPPINES." Int. j. of Social Science and Economic Research 3, no. 1 (January 2018), 289-296. Accessed , 2018. ijsser.org/more2018.php?id=18.

References
[1]. Arachchilage, N.A.G., & Love, S. (2014). Security awareness of computer users: A phishing threat avoidance perspective. Computers in Human Behavior, 38, 304-312.
[2]. Aytes, K., & Connolly, T. (2004). Computer security and risky computing practices: A rational choice perspective. Journal of Organizational and End User Computing (JOEUC), 16(3), 22-40.
[3]. Ng, B. Y., Kankanhalli, A., & Xu, Y. C. (2009). Studying users' computer security behavior: A health belief perspective. Decision Support Systems, 46(4), 815-825.
[4]. Skinner, W. F., & Fream, A. M. (1997). A social learning theory analysis of computer crime among college students. Journal of research in crime and delinquency, 34(4), 495-518.
[5]. Cornish, D. B., & Clarke, R. V. (1987). Understanding crime displacement: An application of rational choice theory. Criminology, 25(4), 933-948.
[6]. Bandura, A. (1962). Social learning through imitation.
[7]. De Leon, J. A. V., & Tarrayo, V. N. (2014). Cyber Reading in L2: Online Reading Strategies of Students in a Philippine Public High School. i-Manager's Journal on English Language Teaching, 4(2), 8.
[8]. Chou, C., & Peng, H. (2011). Promoting awareness of Internet safety in Taiwan in-service teacher education: A ten-year experience. The Internet and Higher Education, 14(1), 44-53.
[9]. Aftab, P. (2000). The parent's guide to protecting your children in cyberspace. New York:McGraw-Hill.
[10]. Poftak, A. (2002). Net-wise teens: Safety, ethics, and innovations. Technology & Learning, 22(1), 36-45.
[11]. Shillair, R., Cotten, S. R., Tsai, H. Y. S., Alhabash, S., LaRose, R., & Rifon, N. J. (2015). Online safety begins with you and me: Convincing Internet users to protect themselves. Computers in Human Behavior, 48, 199-207.
[12]. Van Bruggen, D.C. (2014). Studying the impact of security awareness efforts on user behavior. Unpublished doctorate dissertation, University of Notre Dame.
[13]. Eriksson, J., & Giacomello, G. (2004, March). International Relations Theory and Security in the Digital Age. In Montreal: International Studies Association Convention, Panel: Theorizing Information Age Security (also available at: http://www. threat-politics. net/docs/eriksson_isa. pdf, 24. 6. 2005).
[14]. Ciolan, I. M. (2014). Defining Cybersecurity As The Security Issue of The Twenty First Century. A Constructivist Approach. Revista de Administratie Publica si Politici Sociale, 12(1), 40.
[15]. Baylis, J., Owens, P., & Smith, S. (Eds.). (2017). The globalization of world politics: An introduction to international relations. Oxford University Press.

Abstract:
The use of the Internet and other computing technologies in the Philippine Universities has significantly increased in the last decade. While its purpose and aim is to promote communications and research in the academic field, it has become an integral part of a College student's life. Students use the Internet for locating information, and acquiring general knowledge (De Leon, J. A. V., & Tarrayo, V. N., 2014). The Internet today is not only an information superhighway serving teachers and students, but also a new interpersonal arena in which young people can enhance their opportunities and social experiences (Chou, C., & Peng, H., 2011). In many ways, the Internet can be used to access email, complete coursework, purchase books and negotiate online transactions that require the need for personal information. However, this kind of dependency on the Internet has its pitfalls and drawbacks. Using the Internet habitually, exposes students to different risks such as exposure to inappropriate or potentially dangerous information, disclosure of important and private information, onlinepurchase scams, and enticement by cyber-predators who want to meet them in person for detrimental purposes (Aftab, 2000). Hence, students who use the Internet are more vulnerable to different types of computer security threats such as pornography, hacking, copyright infringement, piracy, and abuse (Poftak, A., 2002).

IJSSER is Member of