Skip to main content
Log in

College students information security awareness: a comparison between smartphones and computers

  • Published:
Education and Information Technologies Aims and scope Submit manuscript

Abstract

The rapid technological developments associated with the decrease in the cost of smartphones made the latter more accessible and convenient to be used. In an educational setting, students are increasingly bringing their smartphones to classrooms, this could have serious security implications, particularly when students are less aware of smartphone information security threats. This paper is set out to provide an empirical comparison in the level of information security awareness among college students in terms of knowledge and behavior. The main aim is to find the difference between students’ awareness level of information security using smartphones vs. computers. A descriptive research design was adopted and an online survey method was employed. Research findings showed that students were highly aware of some information security concepts, however, they behaved differently in protecting their smartphones compared to computers. Training campaigns are suggested to be conducted aiming to educate students with possible information security risks related to smartphone usage in educational settings.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  • Abawajy, J. (2014). User preference of cyber security awareness delivery methods. Behaviour & Information Technology, 33(3), 237–248.

    Article  MathSciNet  Google Scholar 

  • Ahlan, A. R., Lubis, M., & Lubis, A. R. (2015). Information security awareness at the knowledge-based institution: Its antecedents and measures. Procedia Computer Science, 72, 361–373.

    Article  Google Scholar 

  • Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179–211.

    Article  Google Scholar 

  • Al-Alawi, A. I., Al-Kandari, S. M., & Abdel-Razek, R. H. (2016). Evaluation of information systems security awareness in higher education: An empirical study of Kuwait University. Journal of Innovation and Business Best Practice, 2016(2016).

  • Al-Janabi, S., & Al-Shourbaji, I. (2016). A study of cyber security awareness in educational environment in the middle east. Journal of Information & Knowledge Management, 15(01), 1650007-1–1650007-30.

    Article  Google Scholar 

  • Allam, S., Flowerday, S. V., & Flowerday, E. (2014). Smartphone information security awareness: A victim of operational pressures. Computers & Security, 42, 56–65.

    Article  Google Scholar 

  • Alothman, M., Robertson, J., & Michaelson, G. (2017). Computer usage and attitudes among Saudi Arabian undergraduate students. Computers & Education, 110, 127–142.

    Article  Google Scholar 

  • Aloul, F. A. (2012). The need for effective information security awareness. Journal of Advances in Information Technology, 3(3), 176–183.

    Article  Google Scholar 

  • Androulidakis, I., & Kandus, G. (2011, April). Mobile phone security awareness and practices of students in Budapest. In Proceedings of the 6th International Conference on Digital Telecommunications (pp. 17-22).

  • Bada, M., Sasse, A. M. and Nurse, J. R. (2015) 'Cyber security awareness campaigns: Why do they fail to change behaviour?', in Proceedings of the International Conference on Cyber Security for Sustainable Society, 181-131.

  • Becker, S. A., Brown, M., Dahlstrom, E., Davis, A., DePaul, K., Diaz, V., & Pomerantz, J. (2018). Horizon Report 2018 Higher Education Edition Brought to you by EDUCAUSE (pp. 1-54). EDU18.

  • Breitinger, F., Tully-Doyle, R., & Hassenfeldt, C. (2019). A survey on smartphone user’s security choices, awareness and education. Computers & Security, 101647.

  • Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness. MIS Quarterly, 34(3), 523–548.

    Article  Google Scholar 

  • Chandarman, R., & Van Niekerk, B. (2017). Students' cybersecurity awareness at a private tertiary educational institution. African Journal of Information and Communication, 20, 133–155.

    Article  Google Scholar 

  • Crompton, H., & Burke, D. (2018). The use of mobile learning in higher education: A systematic review. Computers & Education, 123, 53–64.

    Article  Google Scholar 

  • Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M., & Baskerville, R. (2013). Future directions for behavioral information security research. Computers & Security, 32, 90–101.

    Article  Google Scholar 

  • D'Arcy, J., Hovav, A., & Galletta, D. (2009). User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Information Systems Research, 20(1), 79–98.

    Article  Google Scholar 

  • Farooq, A., Isoaho, J., Virtanen, S. and Isoaho, J. (2015) Information security awareness in educational institution: An analysis of students' individual factors, translated by IEEE, 352-359.

  • Filippidis, A. P., Hilas, C. S., Filippidis, G. and Politis, A. (2018) 'Information security awareness of greek higher education students—Preliminary findings', in 2018 7th International Conference on Modern Circuits and Systems Technologies (MOCAST), IEEE, 1-4.

  • Hanus, B., & Wu, Y. A. (2016). Impact of users’ security awareness on desktop security behavior: A protection motivation theory perspective. Information Systems Management, 33(1), 2–16.

    Article  Google Scholar 

  • Ifinedo, P. (2012). Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers & Security, 31(1), 83–95.

    Article  Google Scholar 

  • Jin, G., Tu, M., Kim, T. H., Heffron, J., & White, J. (2018, February). Game based cybersecurity training for high school students. In Proceedings of the 49th ACM Technical Symposium on Computer Science Education (pp. 68–73).

  • Johnston, A. C., Warkentin, M., & Siponen, M. (2015). An enhanced fear appeal rhetorical framework: Leveraging threats to the human asset through sanctioning rhetoric. MIS Quarterly, 39(1), 549–566.

    Article  Google Scholar 

  • Kambourakis, G. (2013). Security and privacy in m-learning and beyond: Challenges and state of the art. International Journal of u-and e-Service, Science and Technology, 6(3), 67–84.

    Google Scholar 

  • Kaspersky, 2019. The number of mobile malware attacks doubles in 2018. Available from https://www.kaspersky.com/about/press-releases/2019_the-number-of-mobile-malware-attacks-doubles-in-2018-as-cybercriminals-sharpen-their-distribution-strategies. Accessed 15/10/2019.

  • Kaye, L. K. (2018). Online research methods. In Psychological and Behavioral Examinations in Cyber Security (pp. 253-265). IGI global.

  • Kelly, R. (2017) 'Survey: 94% of Students Want to Use Their Cell Phones in Class', [online], available: https://campustechnology.com/articles/2017/12/12/students-want-to-use-their-cell-phones-in-class.aspx [Accessed 25/03/2019].

  • Kim, E. B. (2014). Recommendations for information security awareness training for college students. Information Management & Computer Security, 22, 115–126.

    Article  Google Scholar 

  • Koyuncu, M., & Pusatli, T. (2019). Security Awareness Level of Smartphone Users: An Exploratory Case Study. Mobile Information Systems, 2019.

  • Lau, K. P., Chiu, D. K., Ho, K. K., Lo, P., & See-To, E. W. (2017). Educational usage of mobile devices: Differences between postgraduate and undergraduate students. The Journal of Academic Librarianship, 43(3), 201–208.

    Article  Google Scholar 

  • Lebek, L., Uffen, J., Breitner, M., Neumann M, and Hohler,B. (2013). "Employees' information security awareness and behavior: A literature review," in system sciences (HICSS), 2013 46th Hawaii international conference on, 2013, pp. 2978-2987.

  • Monrad, J. (2019). Universities fall into the cross hairs of cyber attacks. Available from https://www.infosecurity-magazine.com/opinions/universities-attackers/ accessed 31/12/2019.

  • Mi, T., Gou, M., Zhou, G., Gan, Y., & Schwarzer, R. (2020). Effects of planning and action control on smartphone security behavior. Computers & Security, 101954.

  • Moletsane, T., & Tsibolane, P. (2020, March). Mobile information security awareness among students in higher education: An exploratory study. In 2020 conference on information communications technology and society (ICTAS) (pp. 1-6). IEEE.

  • Mylonas, A., Kastania, A., & Gritzalis, D. (2013). Delegate the smartphone user? Security awareness in smartphone platforms. Computers & Security, 34, 47–66.

    Article  Google Scholar 

  • Norton, 2019. Why hackers love public Wi-Fi. Available from https://us.norton.com/internetsecurity-wifi-why-hackers-love-public-wifi.html Accessed 13/10/2019.

  • Öğütçü, G., Testik, Ö. M., & Chouseinoglou, O. (2016). Analysis of personal information security behavior and awareness. Computers & Security, 56, 83–93.

    Article  Google Scholar 

  • Ophoff, J. and Robinson, M., 2014. Exploring end-user smartphone security awareness within a south African context. In 2014 information security for South Africa (pp. 1-7). IEEE.

  • Peker, Y. K., Ray, L., Da Silva, S., Gibson, N., & Lamberson, C. (2016, October). Raising Cybersecurity awareness among college students. In Journal of The Colloquium for Information System Security Education (Vol. 4, no. 1, pp. 17-17).

  • Parker, F., Ophoff, J., Van Belle, J.P. and Karia, R., 2015. Security awareness and adoption of security controls by smartphone users. In 2015 second international conference on information security and cyber forensics (InfoSec) (pp. 99-104). IEEE.

  • Sarathchandra, D., Haltinner, K. and Lichtenberg, N. (2016) 'College Students' Cybersecurity risk perceptions, awareness, and Practices', in 2016 Cybersecurity Symposium (CYBERSEC), IEEE, 68-73.

  • Sari, P. K. (2014). Measuring information security awareness of Indonesian smartphone users. Telkomnika, 12(2), 493.

    Article  Google Scholar 

  • Shin, D.-H., Shin, Y.-J., Choo, H., & Beom, K. (2011). Smartphones as smart pedagogical tools: Implications for smartphones as u-learning devices. Computers in Human Behavior, 27(6), 2207–2214.

    Article  Google Scholar 

  • Shonola, S.A. and Joy, M.S., 2014, July. Mobile learning security issues from lecturers’ perspectives (Nigerian universities case study)’. In 6th International Conference on Education and New Learning Technologies (pp. 7-9).

  • Statista. (2019). Public Wi-Fi activities of online adults worldwide 2017. Available from: https://www.statista.com/statistics/731525/unsecured-wifi-risky-behavior-of-adults-global/ accessed 13/10/2019.

  • Straub, D. W. (1990). Effective IS security: An empirical study. Information Systems Research, 1(3), 255–276.

    Article  Google Scholar 

  • Zhang, P. and Li, X. (2015) 'Determinants of information security awareness: An empirical investigation in higher Education', in Thirty Sixth International Conference on Information Systems, Fort Worth.

Download references

Acknowledgments

We would like to thank all the research participants for taking part in this study. We also thank the four professors who evaluated our questionnaire.

Availability of data and materials

The data used in this article will not be shared because we still have to do more analysis and get new findings from our data sets.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nashrawan Taha.

Ethics declarations

Ethical approval and consent to participate

Participants were asked to fill an online questionnaire through the University Learning Management System, and this was completely optional. We considered filling in the questionnaire as an indication of participants’ consent to take part in the study.

Consent for publication

Participants have filled an online survey, and the participation was anonymous.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendix

Appendix

Table 6 Information Security Awareness Questions
Table 7 Information Security Awareness Survey (Computer vs Smartphone)

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Taha, N., Dahabiyeh, L. College students information security awareness: a comparison between smartphones and computers. Educ Inf Technol 26, 1721–1736 (2021). https://doi.org/10.1007/s10639-020-10330-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10639-020-10330-0

Keywords

Navigation