skip to main content
10.1145/3585059.3611410acmconferencesArticle/Chapter ViewAbstractPublication PagesiteConference Proceedingsconference-collections
research-article

Comparison of Password Hygiene for Computer Science and Non-Computer Science Undergraduates

Published:11 October 2023Publication History

ABSTRACT

In today’s digital world, it is imperative that the next generation of workers is prepared to be successful working online. Students graduating from a technology curriculum may be prepared for secure digital work due to the nature of their coursework, but students in non-technical fields will also require strong cybersecurity awareness as all professions continue to move more online. Adding cybersecurity education to non-technical fields may assist in this endeavor, but it is unclear the degree to which cybersecurity knowledge correlates with realized cybersecurity behavior. This paper describes an analysis of the results of a survey of 119 students in various fields of study at a large public university. Students’ cybersecurity knowledge and password hygiene were assessed, with password hygiene serving as an example of cybersecurity behavior. It was found that Computer Science (CS) students performed only marginally better than their non-CS counterparts on a general cybersecurity knowledge survey. However, the CS students’ password hygiene was significantly better. This suggests that some element other than just knowledge of cybersecurity topics is important in encouraging actual strong cybersecurity behavior among students.

References

  1. [n. d.]. Cyber security threat trends: phishing, crypto top the list. https://umbrella.cisco.com/info/2021-cyber-security-threat-trends-phishing-crypto-top-the-list. Accessed: 2023-5-14.Google ScholarGoogle Scholar
  2. [n. d.]. PwC Pulse Survey: Managing business risks. https://www.pwc.com/us/en/library/pulse-survey/managing-business-risks.html. Accessed: 2023-5-14.Google ScholarGoogle Scholar
  3. [n. d.]. S-RM Cybersecurity Insights Report 2022. https://www.s-rminform.com/cyber-security-insights-report/. Accessed: 2023-5-14.Google ScholarGoogle Scholar
  4. N. Bhatnagar and M Pry. 2020. Student Attitudes, Awareness, and Perceptions of Personal Privacy and Cybersecurity in the Use of Social Media: An Initial Study. Information Systems Education Journal 18, 1 (2020).Google ScholarGoogle Scholar
  5. Ali Farooq, Johanna Isoaho, Seppo Virtanen, and Jouni Isoaho. 2015. Information security awareness in educational institution: An analysis of students’ individual factors. Proceedings - 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015 1 (2015), 352–359. https://doi.org/10.1109/Trustcom.2015.394 Publisher: IEEE ISBN: 9781467379519.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Adamu Abdullahi Gabra, Maheyzah Binti Sirat, Siti Hajar, and Ibrahim Bukar Dauda. 2020. Cyber security awareness among university students: A case study. Journal of Critical Reviews 7, 16 (2020), 825–833. https://doi.org/10.31838/jcr.07.16.108Google ScholarGoogle ScholarCross RefCross Ref
  7. Y. Li and Q. Liu. [n. d.]. A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments. Energy Reports 7 ([n. d.]). https://doi.org/10.1016/j.egyr.2021.08.126Google ScholarGoogle ScholarCross RefCross Ref
  8. Richard G Lomax and Debbie L Hahs-Vaughn. 2013. An introduction to statistical concepts. Routledge.Google ScholarGoogle Scholar
  9. J. Muhirwe and N. White. 2016. Cybersecurity Awareness and Practice of Next Generation Corporate Technology Users. Issues in Information Systems 17 (2016).Google ScholarGoogle Scholar
  10. Olmstead, K. and Smith, A.2017. "What the public knows about cybersecurity". (2017).Google ScholarGoogle Scholar
  11. C. Resch, C. Gardner-Mccune, and K. Wintjen. 2022. Cross-Sectional Survey of CS Students’ Knowledge of and Attitudes Toward Cybersecurity. In 2022 ASEE Annual Conference.Google ScholarGoogle Scholar
  12. William; Stallings and Lawrie Brown. 2019. Computer Security: Principles and Practice. Publication Title: Stallings, William; Brown, Lawrie.Google ScholarGoogle Scholar

Index Terms

  1. Comparison of Password Hygiene for Computer Science and Non-Computer Science Undergraduates

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SIGITE '23: Proceedings of the 24th Annual Conference on Information Technology Education
        October 2023
        230 pages
        ISBN:9798400701306
        DOI:10.1145/3585059

        Copyright © 2023 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 11 October 2023

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited

        Acceptance Rates

        Overall Acceptance Rate176of429submissions,41%
      • Article Metrics

        • Downloads (Last 12 months)57
        • Downloads (Last 6 weeks)12

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format