CFP last date
20 February 2025
Reseach Article

The Impact of Age on the User Habit and Awareness of Personal Information Protection

by Salma Elhag
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 186 - Number 56
Year of Publication: 2024
Authors: Salma Elhag
10.5120/ijca2024924281

Salma Elhag . The Impact of Age on the User Habit and Awareness of Personal Information Protection. International Journal of Computer Applications. 186, 56 ( Dec 2024), 16-22. DOI=10.5120/ijca2024924281

@article{ 10.5120/ijca2024924281,
author = { Salma Elhag },
title = { The Impact of Age on the User Habit and Awareness of Personal Information Protection },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2024 },
volume = { 186 },
number = { 56 },
month = { Dec },
year = { 2024 },
issn = { 0975-8887 },
pages = { 16-22 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume186/number56/the-impact-of-age-on-the-user-habit-and-awareness-of-personal-information-protection/ },
doi = { 10.5120/ijca2024924281 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-12-27T02:46:01.237114+05:30
%A Salma Elhag
%T The Impact of Age on the User Habit and Awareness of Personal Information Protection
%J International Journal of Computer Applications
%@ 0975-8887
%V 186
%N 56
%P 16-22
%D 2024
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the rapid development and data circulating on the Internet, some information crimes have emerged. User awareness and behavior play a major role to ensure information security and provide maximum security. In addition, although the literature provides studies on information security teaching curricula, there is a few evidence of the effect of age on information security in Saudi Arabia. Therefore, this study investigates the effect of age and its relationship to the user's security awareness. A survey of 106 participants from educational departments was done for this reason. It's interesting to note that the findings showed that age has a partial influence on computer, web, and email security crimes.

References
  1. M. M. Alhassan, A. Adjei-Quaye, and M. Mahfouz Alhassan, “Information Security in an Organization The future of E-democracy in the developing world View project An Open Forum for Expert Opinions and Discussion View project Information Security in an Organization,” International Journal of Computer, 2017, [Online]. Available: https://www.researchgate.net/publication/314086143
  2. M. Gratian, S. Bandi, M. Cukier, J. Dykstra, and A. Ginther, “Correlating human traits and cyber security behavior intentions,” Comput Secur, vol. 73, pp. 345–358, Mar. 2018, doi: 10.1016/j.cose.2017.11.015.
  3. F. B. Fatokun, S. Hamid, A. Norman, and J. O. Fatokun, “The Impact of Age, Gender, and Educational level on the Cybersecurity Behaviors of Tertiary Institution Students: An Empirical investigation on Malaysian Universities,” in Journal of Physics: Conference Series, Dec. 2019, vol. 1339, no. 1. doi: 10.1088/1742-6596/1339/1/012098.
  4. Jamshaid G. MohebzadaAhmed El ZarkaArsalan H. BhojaniAli Darwish, “Phishing in a university community: Two large scale phishing experiments ,” Innovations in Information Technology (IIT), 2012 International Conference, 2012.
  5. B. Morrison, L. Coventry, and P. Briggs, “How do Older Adults feel about engaging with Cyber-Security?,” Hum Behav Emerg Technol, vol. 3, no. 5, pp. 1033–1049, Dec. 2021, doi: 10.1002/hbe2.291.
  6. A. Bostan and İ. Akman, “Utjecaj obrazovanja na sigurnosne mjere u ICT,” Tehnicki Vjesnik, vol. 22, no. 1, pp. 161–168, 2015, doi: 10.17559/TV-20140403122930.
  7. Singhal, R., & Rana, R. (2015). Chi-square test and its application in hypothesis testing. Journal of the Practice of Cardiovascular Sciences, 1(1), 69. https://doi.org/10.4103/2395-5414.157577
  8. Alothman B, Alibrahim O, Alenezi N, Alhashemi A, Alhashemi M, Almardasi D, Khattab O, Joumaa C, Khan M. The Development of a Secure Online System to Protect Social Networking Platforms from Security Attacks. Applied Sciences. 2023 Oct 26;13(21):11731.
  9. Khan NF, Ikram N, Murtaza H, Asadi MA. Social media users and cybersecurity awareness: predicting self-disclosure using a hybrid artificial intelligence approach. Kybernetes. 2023 Jan 17;52(1):401-21.
  10. Palau-Saumell, Ramon., Forgas-Coll, Santiago., Sánchez-García, Javier., & Robres, Emilio. (2019). User Acceptance of Mobile Apps for Restaurants: An Expanded and Extended UTAUT-2. Sustainability . http://doi.org/10.3390/SU11041210
  11. Brudy, Frederik., Ledo, David., Greenberg, S.., & Butz, A.. (2014). Is Anyone Looking? Mitigating Shoulder Surfing on Public Displays through Awareness and Protection. Proceedings of The International Symposium on Pervasive Displays . http://doi.org/10.1145/2611009.2611028
  12. Hossain, M. A.., Rashid, Md. Utba., Khan, M. A. S.., Sayeed, Sabrina., Kader, Md Abdul., & Hawlader, M. D.. (2021). Healthcare Workers' Knowledge, Attitude, and Practice Regarding Personal Protective Equipment for the Prevention of COVID-19. Journal of Multidisciplinary Healthcare , 14 , 229 - 238 . http://doi.org/10.2147/JMDH.S293717
  13. Hanus, Bartlomiej., & Wu, Y.. (2016). Impact of Users’ Security Awareness on Desktop Security Behavior: A Protection Motivation Theory Perspective. Information Systems Management , 33 , 16 - 2 . http://doi.org/10.1080/10580530.2015.1117842
Index Terms

Computer Science
Information Sciences
K knowledge of Cybercrimes

Keywords

Information Security Security awareness Age password security email security