0% found this document useful (0 votes)
31 views

The Design and Development of Student Information and Violation Management System (SIVMS) For A Higher Educational Institution

This study examined how age, gender, and educational level impact cybersecurity behaviors among students at tertiary institutions in Malaysia. A survey was conducted with 340 students, and structural equation modeling was used to analyze the data. The results showed that students' cybersecurity behaviors varied based on their age for factors like perceived severity, peer behavior, familiarity with cyber threats, response efficacy, and perceived vulnerability. Gender differences existed for security self-efficacy, computer skills, cybersecurity behaviors, perceived severity, and prior experiences with computer security practices. Educational level played a role in cues to action and familiarity with cyber threats. The findings can help tertiary institutions tailor cybersecurity training and interventions based on these demographic factors to improve students'

Uploaded by

denieldacillo12
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views

The Design and Development of Student Information and Violation Management System (SIVMS) For A Higher Educational Institution

This study examined how age, gender, and educational level impact cybersecurity behaviors among students at tertiary institutions in Malaysia. A survey was conducted with 340 students, and structural equation modeling was used to analyze the data. The results showed that students' cybersecurity behaviors varied based on their age for factors like perceived severity, peer behavior, familiarity with cyber threats, response efficacy, and perceived vulnerability. Gender differences existed for security self-efficacy, computer skills, cybersecurity behaviors, perceived severity, and prior experiences with computer security practices. Educational level played a role in cues to action and familiarity with cyber threats. The findings can help tertiary institutions tailor cybersecurity training and interventions based on these demographic factors to improve students'

Uploaded by

denieldacillo12
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

https://eric.ed.gov/?

id=ED622596

The Design and Development of Student Information and Violation


Management System (SIVMS) for a Higher Educational Institution
Olipas, Cris Norman P.
Online Submission, International Journal of Innovative Research in Multidisciplinary Field v6 n8 p72-80 Aug 2020
This study aimed to design and develop a Student Information and Violation Management System (SIVMS) for a Higher
Educational Institution in Central Luzon, Philippines. It utilized the descriptive developmental design of research in which
the researcher described and explained the processes performed to design and develop the prototype system. The Incremental
Model of Software Development Life Cycle (SDLC) framework was employed to guide the researcher in designing and
developing the project. Specifically, the following stages were undertaken: Planning and Requirements Analysis, Design and
Development, and Testing Stage. The researcher was able to design and developed a prototype system of the Student
Information and Violation Management System (SIVMS) using the Incremental Model. Based on the design and
development of the prototype, the study provides essential recommendations for future projects related to the design and
development of a Student Information and Violation Management System (SIVMS).

https://www.theseus.fi/handle/10024/171460
Development of student data protection culture through
privacy policy update in Laurea University of Applied
Sciences
Marjotie, Marc (2019)
Julkaisun pysyvä osoite on
https://urn.fi/URN:NBN:fi:amk-2019052612010

This thesis stemmed from the project initiated by Laurea University of Applied Sciences data protection officer, with the goal of
developing Laurea’s student privacy policy statement. The project was focused on the English language version of the privacy
policy statement, with an emphasis on including necessary information for exchange and foreign students.

The research goal was to find out that how the Laurea student privacy policy statement could be made more reader-friendly. In
addition, it became evident during the project that there was a need to research the data processing practices that take place with
exchange and foreign students.

The research methods included content analysis and semi-structured interviews. Content analysis was used as a quantitative
research method to analyse other universities of applied sciences privacy policy statements. The findings of the content analysis
helped determine the content of the privacy policy statement. Semi-structured interview was used as a qualitative research method
to gain more knowledge about exchange and foreign student data processing at Laurea. Staff from Laurea’s international
department was interviewed in the research. The interview made it clear that the most relevant privacy policy for exchange and
foreign students is the SoleMOVE privacy policy. It was then determined that the privacy policy developed in this thesis did not
need as much exchange and foreign student specific information.

The literature chosen for the thesis consisted of: relevant legislation, information security related literature and research guides. The
legislation was necessary to assure that the privacy policy statement would cover all the necessary aspects. The European Union’s
General Data Protection Regulation requirements dictated heavily the content. Information security related literature provided
knowledge about personal data, privacy policies and information security in general. The research literature was used to support the
research conducted.

As a result of the research and the development process a new privacy policy statement was created, using the knowledge from the
literature and the research findings. The result was a summarized and simpler version, still containing all necessary elements. The
creation process was done in dialogue with the data protection officer.

https://iopscience.iop.org/article/10.1088/1742-6596/1339/1/012098/meta

Journal of Physics: Conference Series


PAPER • THE FOLLOWING ARTICLE ISOPEN ACCESS

The Impact of Age, Gender, and Educational level on the


Cybersecurity Behaviors of Tertiary Institution
Students: An Empirical investigation on Malaysian Universities
F B Fatokun1, S Hamid1, A Norman1 and J O Fatokun2
Published under licence by IOP Publishing Ltd
Journal of Physics: Conference Series, Volume 1339, International Conference Computer Science and Engineering (IC2SE) 26–27
April 2019, Padang, IndonesiaCitation F B Fatokun et al 2019 J. Phys.: Conf. Ser. 1339 012098DOI 10.1088/1742-
6596/1339/1/012098

Abstract
A lot of cybersecurity breaches occur due to human errors. Tertiary institutions need to enhance
students' cybersecurity awareness and capabilities, hence promoting safe cybersecurity behaviors. Socio-
psychological factors affects students' cybersecurity behaviors. We explore to what extent age, gender
and educational level, plays a role in mediating the factors affecting tertiary institution students'
cybersecurity behaviors. A cross-sectional survey was conducted among 340 students and Structural
Equation Modelling was employed for evaluating impacts. Data analysis was conducted via SPSS (V.25).
Results show that students cybersecurity behaviors varies based on Age for factors such as: Perceived
Severity, Peer Behavior, Familiarity with Cyber Threats, Response Efficacy and Perceived Vulnerability.
Gender effects existed in Security Self Efficacy, Computer Skills, Cybersecurity Behaviors, Perceived
Severity, and little effects in Prior Experiences with Computer Security Practices. Educational level
differences existed in Cues to Action and Familiarity with Cyber-Threats. Age, gender and educational
level are important factors in mediating students' cybersecurity behaviors. Practically, our findings can
instigate the need for specific/focused cybersecurity training and interventions for students in the
tertiary institutions. It can also help cybersecurity training units in the tertiary institutions to target very
vital components of cybersecurity behavior model, hence improving the cybersecurity behaviors of the
students.

You might also like