Reference Hub3
Computer Security Practices and Perceptions of the Next Generation of Corporate Computer Use

Computer Security Practices and Perceptions of the Next Generation of Corporate Computer Use

S.E. Kruck, Faye P. Teer
Copyright: © 2008 |Volume: 2 |Issue: 1 |Pages: 11
ISSN: 1930-1650|EISSN: 1930-1669|ISSN: 1930-1650|EISBN13: 9781615203277|EISSN: 1930-1669|DOI: 10.4018/jisp.2008010105
Cite Article Cite Article

MLA

Kruck, S.E., and Faye P. Teer. "Computer Security Practices and Perceptions of the Next Generation of Corporate Computer Use." IJISP vol.2, no.1 2008: pp.80-90. http://doi.org/10.4018/jisp.2008010105

APA

Kruck, S. & Teer, F. P. (2008). Computer Security Practices and Perceptions of the Next Generation of Corporate Computer Use. International Journal of Information Security and Privacy (IJISP), 2(1), 80-90. http://doi.org/10.4018/jisp.2008010105

Chicago

Kruck, S.E., and Faye P. Teer. "Computer Security Practices and Perceptions of the Next Generation of Corporate Computer Use," International Journal of Information Security and Privacy (IJISP) 2, no.1: 80-90. http://doi.org/10.4018/jisp.2008010105

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The purpose of this article is to present the results of an empirical study of the computer security practices and perceptions of the next generation of corporate computer users, undergraduate university students. The authors surveyed undergraduate university students who represented 42 different majors. The findings relate to the students’ usage of antivirus programs, firewalls, password security, and security patches. Student perceptions of computer security and its importance are also reported. Research in this area is important for two reasons. First, potential employers may find the results useful in assessing their vulnerability to unsafe practices from entry level employees. Secondly, research in this area can give those responsible for providing computer security education a better understanding of students’ computer security training needs.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.