PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Factors influencing the effectiveness of educational activities on personal data security – research results

Autorzy
Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
This article presents the results of a quasi-experimental study aimed at demonstrating the relationship between a unit educational activity in the form of a lecture on personal data risks and the level of commitment to ensuring the security of one’s own personal data. A proprietary tool with a high reliability index was used to measure the level of commitment – the dependent variable in this research. In the process of operationalizing the variable, use was made of the theory of attitude components. The studies, which were carried out according to the research plan involving a control group and only the final measurement, did not confirm the hypothesis that people subjected to educational activities would declare greater concern for their own data, and the connection was found to be small yet statistically significant.
Rocznik
Strony
7--16
Opis fizyczny
Bibliogr. 24 poz., rys.
Twórcy
  • Faculty of Security and Legal Sciences, Police Academy in Szczytno
Bibliografia
  • 1. Aronson, E., Wilson, T.D., & Akert, R.M., (1997). Psychlogia społeczna. Serce i umysł (1st edition). Poznań: Zysk i S-ka.
  • 2. Babbie, E.R., (2008). Podstawy badań społecznych. Warsaw: Wydawnictwo Naukowe PWN.
  • 3. Bramley, P., (2007). Ocena efektywności szkoleń (I. Sochacka, transl.; 2nd edition). Warsaw: Wolters Kluwer Polska.
  • 4. Caldwell, T., (2016). Making security awareness training work. Computer Fraud & Security, 2016(6), 8–14. https://doi.org/10.1016/S1361-3723(15)30046-4
  • 5. Davinson, N., & Sillence, E., (2010). It won’t happen to me: Promoting secure behaviour among internet users. Computers in Human Behavior, 26(6), 1739–1747. https://doi.org/10.1016/j.chb.2010.06.023
  • 6. Frankfort-Nachmias, C., & Nachmias, D., (2001). Metody badawcze w naukach społecznych. Poznań: Zysk i S-ka.
  • 7. Frauenstein, E.D., & Flowerday, S., (2020). Susceptibility to phishing on social network sites: A personality information processing model. Computers & Security, 94, 101862. https://doi.org/10.1016/j.cose.2020.101862
  • 8. Gerber, N., Gerber, P., & Volkamer, M., (2018). Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior. Computers & Security, 77, 226–261. https://doi.org/10.1016/j.cose.2018.04.002
  • 9. Happ, C., Melzer, A., & Steffgen, G., (2016). Trick with treat – Reciprocity increases the willingness to communicate personal data. Computers in Human Behavior, 61, 372–377. https://doi.org/10.1016/j.chb.2016.03.026
  • 10. Huang, D.-L., Rau, P.-L. P., & Salvendy, G., (2010). Perception of information security. Behaviour & Information Technology, 29(3), 221–232. https://doi.org/10.1080/01449290701679361
  • 11. Innab, N., Al-Rashoud, H., Al-Mahawes, R., & Al-Shehri, W., (2018). Evaluation of the Effective Anti-Phishing Awareness and Training in Governmental and Private Organizations in Riyadh. 2018 21st Saudi Computer Society National Computer Conference (NCC), 1–5. https://doi.org/10.1109/NCG.2018.8593144
  • 12. Jansson, K., & von Solms, R., (2013). Phishing for phishing awareness. Behaviour & Information Technology, 32(6), 584–593. https://doi.org/10.1080/0144929X.2011.632650
  • 13. Kokolakis, S., (2017). Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon. Computers & Security, 64, 122–134. https://doi.org/10.1016/j.cose.2015.07.002
  • 14. Kumaraguru, P., Cranshaw, J., Acquisti, A., Cranor, L., Hong, J., Blair, M. A., & Pham, T., (2009). School of phish: A real-world evaluation of anti-phishing training. Proceedings of the 5th Symposium on Usable Privacy and Security, 1–12. https://doi.org/10.1145/1572532.1572536
  • 15. Kumaraguru, P., Sheng, S., Acquisti, A., Cranor, L. F., & Hong, J., (2008). Lessons from a real world evaluation of anti-phishing training. 2008 eCrime Researchers Summit, 1–12. https://doi.org/10.1109/ECRIME.2008.4696970
  • 16. Lastdrager, E., Gallardo, I. C., Hartel, P., & Junger, M., (2017). How Effective is Anti- Phishing Training for Children? Thirteenth Symposium on Usable Privacy and Security, 229–239.
  • 17. Norberg, P.A., Horne, D.R., & Horne, D.A., (2007). The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors. Journal of Consumer Affairs, 41(1), 100–126. https://doi.org/10.1111/j.1745-6606.2006.00070.x
  • 18. Prince, C., (2018). Do consumers want to control their personal data? Empirical evidence. International Journal of Human-Computer Studies, 110, 21–32. https://doi.org/10.1016/j.ijhcs.2017.10.003
  • 19. Purkait, S., (2012). Phishing counter measures and their effectiveness – literature review. Information Management & Computer Security, 20(5), 382–420. https://doi.org/10.1108/09685221211286548
  • 20. Rae, L., (2001). Planowanie i projektowanie szkoleń (ed. 2). Cracow: Oficyna Ekonomiczna. Oddział Polskich Wydawnictw Profesjonalnych “ABC”.
  • 21. Shin-Yuan, H., Annie Pei-I, Y., Yu-Li, H., Kuanchin, C., & Hui-Ting, H., (2019). Factors Influencing Attitudes Towards Patients’ Personal Information Protection. Pacific Asia Conference on Information Systems (PACIS). Pacific Asia Conference on Information Systems (PACIS), Xi’an China.
  • 22. Sumner, A., Yuan, X., Anwar, M., & McBride, M., (2022). Examining Factors Impacting the Effectiveness of Anti-Phishing Trainings. Journal of Computer Information Systems, 62(5), 975–997. https://doi.org/10.1080/08874417.2021.1955638
  • 23. Wen, Z. A., Lin, Z., Chen, R., & Andersen, E., (2019). What.Hack: Engaging Anti- Phishing Training Through a Role-playing Phishing Simulation Game. Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 1–12. https://doi.org/10.1145/3290605.3300338
  • 24. Zhang, J., Reithel, B.J., & Li, H., (2009). Impact of perceived technical protection on security behaviors. Information Management & Computer Security, 17(4), 330–340. https://doi.org/10.1108/09685220910993980
Uwagi
Opracowanie rekordu ze środków MNiSW, umowa nr POPUL/SP/0154/2024/02 w ramach programu "Społeczna odpowiedzialność nauki II" - moduł: Popularyzacja nauki (2025).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-380b2069-f8ff-4e3e-a8a2-0193e7befc1e
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.