CYBER VULNERABILITY IN LIGHT OF ONLINE LEARNING REALITY

Authors

  • Inga Piscikiene Vilnius College of Technologies and Design (LT)
  • Jurate Romeikiene Vilnius College of Technologies and Design (LT)
  • Brigita Šustickienė Vilnius College of Technologies and Design (LT)

DOI:

https://doi.org/10.17770/sie2021vol5.6367

Keywords:

Cyber threats, Privacy, Security, Social engineering, Social Networking Websites

Abstract

Presently, as Covid 19 has caused most of educational processes to move online, cybersecurity and data protection is rapidly gaining importance in all educational institutions, and most of the academia became more vulnerable to cyberattacks. This article sheds some light on how communities of higher education institutions perceive increased online threats, what measures they take to protect themselves against cybercrime, whether they practice good security hygiene. This paper presents and analyses results of a survey conducted at higher education institutions (universities, colleges) into perception of cybersecurity, online culture and hygiene during the present times of remote education.

 

References

Bellovin, S.M., Landau, S, &Lin, H.S. (2017). Limiting the undesired impact of cyber weapons: technical requirements and policy implications, Journal of Cybersecurity, 3(1), 59–68.

Bialaszewski, D. (2015). Information security in education: Are we continually improving? Issues in Informing Science and Information Technology, 12, 45-54. Retrieved from http://iisit.org/Vol12/IISITv12p045-054Bialaszewski1770.pdf

Clough, J. (2011). Cybercrime. Commonwealth law bulletin, 37(4), 671–680.

Cullen, A., & Armitage, L. (2016). The social engineering attack spiral. In Proceedings of the IEEE International Conference on Cybersecurity and Protection of Digital Services, 1–6. Retrieved from https://ieeexplore.ieee.org/document/7502347

Heitzenrater, C.D., & Simpson, A.C. (2016). Policy statistics and questions: reflections on UK cyber security disclosures. Cybersecur. 2(1), 43.

Kapsevičius, G. (2019). Verslui vis labiau skaitmenizuojantis, kibernetinių įsilaužimų nuostoliai auga. Retrieved from https://www.alfa.lt/straipsnis/50407155/verslui-vis-labiau-skaitmenizuojantis-kibernetiniu-isilauzimu-nuostoliai-auga

National Cybersecurity Strategy. (2017). January 28. Nr. XIII-202. Retrieved from https://e-seimas.lrs.lt/portal/legalAct/lt/TAD/TAIS.167925/asr

The Law on Cybersecurity of the Republic of Lithuania. (2018). June 27. Nr. XIII-1299. Retrieved from https://e-seimas.lrs.lt/portal/legalAct/lt/TAD/15e540727ac211e89188e16a6495e98c

Manske, K. (2000). An introduction to social engineering, Security Management Practices, 6, 53-59.

Peltsverger, S., & Zheng, G. (2016). Enhancing Privacy Education with a Technical Emphasis in IT Curriculum, Journal of Information Technology Education: Innovations in Practice, (15). Retrieved from http://www.jite.org/documents/Vol15/JITEv15IIPp001-017Peltsverger1873.pdf

Renaud, K., & Zimmermann, V. (2020). How to Nudge in Cybersecurity, Network Security, 2020(11).

Statistics Lithuania. (2020). Informacinių technologijų naudojimas namų ūkiuose. Retrieved from https://osp.stat.gov.lt/informaciniai-pranesimai?articleId=8028975

Downloads

Published

2021-05-28

How to Cite

Piscikiene, I., Romeikiene, J., & Šustickienė, B. (2021). CYBER VULNERABILITY IN LIGHT OF ONLINE LEARNING REALITY. SOCIETY. INTEGRATION. EDUCATION. Proceedings of the International Scientific Conference, 5, 426-435. https://doi.org/10.17770/sie2021vol5.6367