Title: VIEWS ON CYBERSECURITY PRINCIPLES AND PRACTICES: THE
CASE OF BS INFORMATION TECHNOLOGY STUDENTS OF LNU,
TACLOBAN CITY, PHILIPPINES
Authors: Las Johansen B. Caluza, Lowell A. Quisumbing, Rommel L. Verecio, Dennis S. Tibe
|| ||
Las Johansen B. Caluza, Lowell A. Quisumbing, Rommel L. Verecio, Dennis S. Tibe
Leyte Normal University,Tacloban City, Philippines
MLA 8 Caluza, Las Johansen B., et al. "VIEWS ON CYBERSECURITY PRINCIPLES AND PRACTICES: THE CASE OF BS INFORMATION TECHNOLOGY STUDENTS OF LNU, TACLOBAN CITY, PHILIPPINES." Int. j. of Social Science and Economic Research, vol. 3, no. 1, Jan. 2018, pp. 289-296, ijsser.org/more2018.php?id=18. Accessed 2018.
APA Caluza, L. B., Quisumbing, L. A., Verecio, R. L., & Tibe, D. S. (2018, January). VIEWS ON CYBERSECURITY PRINCIPLES AND PRACTICES: THE CASE OF BS INFORMATION TECHNOLOGY STUDENTS OF LNU, TACLOBAN CITY, PHILIPPINES. Int. j. of Social Science and Economic Research, 3(1), 289-296. Retrieved from ijsser.org/more2018.php?id=18
Chicago Caluza, Las Johansen B., Lowell A. Quisumbing, Rommel L. Verecio, and Dennis S. Tibe. "VIEWS ON CYBERSECURITY PRINCIPLES AND PRACTICES: THE CASE OF BS INFORMATION TECHNOLOGY STUDENTS OF LNU, TACLOBAN CITY, PHILIPPINES." Int. j. of Social Science and Economic Research 3, no. 1 (January 2018), 289-296. Accessed , 2018. ijsser.org/more2018.php?id=18.
References [1]. Arachchilage, N.A.G., & Love, S. (2014). Security awareness of computer users: A phishing
threat avoidance perspective. Computers in Human Behavior, 38, 304-312.
[2]. Aytes, K., & Connolly, T. (2004). Computer security and risky computing practices: A rational
choice perspective. Journal of Organizational and End User Computing (JOEUC), 16(3), 22-40.
[3]. Ng, B. Y., Kankanhalli, A., & Xu, Y. C. (2009). Studying users' computer security behavior: A
health belief perspective. Decision Support Systems, 46(4), 815-825.
[4]. Skinner, W. F., & Fream, A. M. (1997). A social learning theory analysis of computer crime
among college students. Journal of research in crime and delinquency, 34(4), 495-518.
[5]. Cornish, D. B., & Clarke, R. V. (1987). Understanding crime displacement: An application of
rational choice theory. Criminology, 25(4), 933-948.
[6]. Bandura, A. (1962). Social learning through imitation.
[7]. De Leon, J. A. V., & Tarrayo, V. N. (2014). Cyber Reading in L2: Online Reading Strategies of
Students in a Philippine Public High School. i-Manager's Journal on English Language
Teaching, 4(2), 8.
[8]. Chou, C., & Peng, H. (2011). Promoting awareness of Internet safety in Taiwan in-service
teacher education: A ten-year experience. The Internet and Higher Education, 14(1), 44-53.
[9]. Aftab, P. (2000). The parent's guide to protecting your children in cyberspace. New
York:McGraw-Hill.
[10]. Poftak, A. (2002). Net-wise teens: Safety, ethics, and innovations. Technology & Learning,
22(1), 36-45.
[11]. Shillair, R., Cotten, S. R., Tsai, H. Y. S., Alhabash, S., LaRose, R., & Rifon, N. J. (2015). Online
safety begins with you and me: Convincing Internet users to protect themselves. Computers in
Human Behavior, 48, 199-207.
[12]. Van Bruggen, D.C. (2014). Studying the impact of security awareness efforts on user behavior.
Unpublished doctorate dissertation, University of Notre Dame.
[13]. Eriksson, J., & Giacomello, G. (2004, March). International Relations Theory and Security in the
Digital Age. In Montreal: International Studies Association Convention, Panel: Theorizing
Information Age Security (also available at: http://www. threat-politics. net/docs/eriksson_isa.
pdf, 24. 6. 2005).
[14]. Ciolan, I. M. (2014). Defining Cybersecurity As The Security Issue of The Twenty First
Century. A Constructivist Approach. Revista de Administratie Publica si Politici Sociale, 12(1),
40.
[15]. Baylis, J., Owens, P., & Smith, S. (Eds.). (2017). The globalization of world politics: An
introduction to international relations. Oxford University Press.
Abstract: The use of the Internet and other computing technologies in the Philippine Universities has
significantly increased in the last decade. While its purpose and aim is to promote
communications and research in the academic field, it has become an integral part of a College
student's life. Students use the Internet for locating information, and acquiring general
knowledge (De Leon, J. A. V., & Tarrayo, V. N., 2014). The Internet today is not only an
information superhighway serving teachers and students, but also a new interpersonal arena in
which young people can enhance their opportunities and social experiences (Chou, C., & Peng,
H., 2011). In many ways, the Internet can be used to access email, complete coursework,
purchase books and negotiate online transactions that require the need for personal information.
However, this kind of dependency on the Internet has its pitfalls and drawbacks. Using the
Internet habitually, exposes students to different risks such as exposure to inappropriate or
potentially dangerous information, disclosure of important and private information, onlinepurchase
scams, and enticement by cyber-predators who want to meet them in person for
detrimental purposes (Aftab, 2000). Hence, students who use the Internet are more vulnerable to
different types of computer security threats such as pornography, hacking, copyright
infringement, piracy, and abuse (Poftak, A., 2002).
The International Journal of Social Science and Economic Research Inviting Papers/Articles for Upcoming Issue Volume 9 No. 11 November 2024.
Submit your Paper through Online Submission System. Authors also can Send Paper to
submit@ijsser.org If you need any help contact us +91-9753980183