Advertisement

Survey results on adults and cybersecurity education

Article
  • 9 Downloads

Abstract

Cyberattacks and identity theft are common problems nowadays where researchers often say that humans are the weakest link the security chain. Therefore, this survey focused on analyzing the interest for adults for ‘cyber threat eduction seminars’, e.g., how to project themselves and their loved ones. Specifically, we asked questions to understand a possible audience, willingness for paying / time commitment, or fields of interest as well as background and previous training experience. The survey was conducted in late 2016 and taken by 233 participants. The results show that many are worried about cyber threats and about their children exploring the online domain. However, seminars do not seem to be a priority as many individuals were only willing to spend 1-1.5h on seminars.

Keywords

Adult education Cybersecurity Survey Training Security awareness Children 

Notes

Acknowledgments

This work was funded by the University of New Haven’s Summer Research Grant.

References

  1. Air Force Association. (2009). Cyberpatriot national youth cyber education program. https://www.uscyberpatriot.org/home.
  2. American Association of Retired Persons. (2016). 2016 aarp cyber security survey of adults age 18 and older. https://www.aarp.org/content/dam/aarp/research/surveys_statistics/general/2016/2016-national-cyber-security-annot-res-gen.pdf.
  3. Bradford, L. (2017). How to start a lucrative career in cybersecurity. https://www.forbes.com/sites/laurencebradford/2017/02/27/how-to-start-a-lucrative-career-in-cybersecurity.
  4. Brooks, C. (2016). Career success depends on your willingness to learn. https://www.businessnewsdaily.com/9256-career-boost-learning.html.
  5. Charness, N., & Boot, W. R. (2009). Aging and information technology use: Potential and barriers. Current Directions in Psychological Science, 18, 253–258.CrossRefGoogle Scholar
  6. Concise, A C. (2017). Learn how to start a career in cybersecurity: Interviews, resources, tips. https://breakingintocybersecurity.com/.
  7. Enough is Enough. (2017). Internet safety 101. http://internetsafety101.org/.
  8. Fiegerman, S. (2017). The biggest data breaches ever. http://money.cnn.com/2017/09/07/technology/business/biggest-breaches-ever/index.html. Online; accessed 19 October 2017.
  9. Forbes Coaches Council. (2014). Changing careers? here’s whether you should return to school first. https://www.forbes.com/sites/forbescoachescouncil/2017/04/14/changing-careers-heres-whether-you-should-return-to-school-first/#32d7404d31fa.
  10. Franceschi-Bicchierai, L. (2016). The worst hacks of 2016. https://motherboard.vice.com/en_us/article/wnxkz9/the-worst-hacks-of-2016. Online; accessed 19 October 2017.
  11. Furman, S., Theofanos, M. F., Choong, Y. -Y., Stanton, B. (2012). Basing cybersecurity training on user perceptions. IEEE Security & Privacy, 10, 40–49.CrossRefGoogle Scholar
  12. Hill, M. (2016). Walmart confirms card data theft. https://www.infosecurity-magazine.com/news/walmart-confirms-card-data-theft/. Online; accessed 19 October 2017.
  13. Hinduja, S., & Patchin, J. W. (2011). Summary of our cyber bullying research from 2005–2010. Retrieved on January 29.Google Scholar
  14. Internet Safe Education. (2017). Courses for parents. https://www.internetsafeeducation.com/courses-for-parents/.
  15. Jeffers, T. M. (2016). Maximizing adult learning methodologies in corporate cyber security training programs. Ph.D. thesis Utica College.Google Scholar
  16. Kaspersky Lab. (2016). Elderly people online: habits and concerns. https://www.kaspersky.co.uk/blog/older-people-internet/7736/.
  17. Kidspot.com.au. (2016). Dad horrified to find vile messages in popular game on son’s ipad. http://www.kidspot.com.au/parenting/real-life/in-the-news/dad-horrified-to-find-vile-messages-in-popular-game-on-sons-ipad.
  18. Krebs, B. (2017). Source: Deloitte breach affected all company email, admin accounts. https://krebsonsecurity.com/2017/09/source-deloitte-breach-affected-all-company-email-admin-accounts/. Online; accessed 19 October 2017.
  19. Li, Y. B., & Perkins, A. (2007). The impact of technological developments on the daily life of the elderly. Technology in Society, 29, 361–368.CrossRefGoogle Scholar
  20. McCoy, K. (2017). Target to pay $18.5m for 2013 data breach that affected 41 million consumers. https://www.usatoday.com/story/money/2017/05/23/target-pay-185m-2013-data-breach-affected-consumers/102063932/. Online; accessed 19 October 2017.
  21. Murnane, K. (2017). If you don’t know much about cybersecurity, you’re not alone. https://www.forbes.com/sites/kevinmurnane/2017/03/29/if-you-dont-know-much-about-cybersecurity-youre-not-alone/.
  22. National Cyber Security Alliance. (2017). Keeping up with generation app: Ncsa parent/teen online safety survey. https://staysafeonline.org/wp-content/uploads/2017/10/Generation-App-Survey-Report-2017.pdf.
  23. National Institute of Standards and Technology. (2016). National initiative for cybersecurity education (nice). https://www.nist.gov/itl/applied-cybersecurity/nice.
  24. NSA / NSF. (2017). Gencyber summer camp. https://www.gen-cyber.com/about/.
  25. Olmstead, K., & Smith, A. (2017). What the public knows about cybersecurity. http://www.pewinternet.org/2017/03/22/what-the-public-knows-about-cybersecurity/.
  26. Phoenix, U. O. (2017). Why you should consider a career change to cybersecurity (paid content by university of phoenix). https://mashable.com/2017/05/24/career-change-cybersecurity/.
  27. Roberts, J. J. (2017). Home Depot data breach costs top $179 million after latest settlement. http://fortune.com/2017/03/09/home-depot-data-breach-banks/. Online; accessed 19 October 2017.
  28. Spafford, E. H. (2009). Cyber security: assessing our vulnerabilities and developing an effective defense, (pp. 20–33). Berlin: Springer.Google Scholar
  29. Symantec, N. (2015). Norton cybersecurity insights report. https://us.norton.com/norton-cybersecurity-insights-report-global.
  30. Xie, B., Watkins, I., Golbeck, J., Huang, M. (2012). Understanding and changing older adults’ perceptions and learning of social media. Educational Gerontology, 38, 282–296.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  • Joseph Ricci
    • 1
  • Frank Breitinger
    • 1
  • Ibrahim Baggili
    • 1
  1. 1.Cyber Forensics Research & Education Group, Tagliatela College of Engineering, ECECSUniversity of New HavenWest HavenUSA

Personalised recommendations