Turkish Journal
Turkish Journal
net/publication/353660156
Article in Turkish Journal of Computer and Mathematics Education (TURCOMAT) · January 2021
CITATIONS READS
3 772
3 authors, including:
All content following this page was uploaded by Adamu Abdullahi Garba on 03 August 2021.
Article History: Received: 11 January 2021; Revised: 12 February 2021; Accepted: 27 March 2021; Published
online: 23 May 2021
Abstract: Today, the internet has become the backbone to empower and facilitate our daily activities, including
educational, financial, and social activities. Nigeria is among the top list of countries that suffered economically
from cybercriminals. Many researchers have turned their attention to identifying the cybersecurity awareness of
students but limited to the North-eastern universities in Nigeria. University students are prime targets of
cyberattacks as research shows frequent access to the internet compared to normal users. The main aim of this
paper is to identify the current cybersecurity awareness on the following items (Cyberbully, Personal Information,
Internet Banking, Internet Addiction, and Self-protection) of students at the North-eastern universities. The
quantitative method was adopted for data collection through a questionnaire that was administered to randomly
selected students. The designed questionnaire covers the above items, ), based on the holistic result analysis using
OrignPro Software the majority of result shows the students have some basic knowledge of cybersecurity in an
item like personal information, internet banking, while other items like cyberbully, self-protection and, internet
addiction result show moderate awareness. Subsequently, based on the in-depth analysis performed with a control
variable “Major Discipline” as specialization, surprisingly, it indicates that engineering, humanity, and law
faculties tend to have more awareness of cybersecurity. This survey provides a roadmap toward the design of
effective cybersecurity awareness programs and implementation guidelines.
1. Introduction
The advancement of technology has brought opportunities for businesses to perform transactions online via the
internet, which is constantly increasing worldwide. The internet has become a prime medium for cybercriminals to
perform a variety of cybercrime-related activities. Studies show that a lack of awareness of the threat of cybersecurity
attacks is one of the driving factors that contribute to the increasing number of Internet-related attacks (McCrohan et
al., 2010; Troia, 2018) (Siddiqui et al., 2020)(Mohammad Ubaidullah Bokhari et al., 2014). Researchers described
cybercrime as any criminal activity in which computers or other network devices are used as a tool or a target to
commit illegal activities (Finnie, T., Petee, T., & Jarvis, 2010; Gercke, 2012; Malby, S., Mace, R., Holterhof, A.,
Brown, C., Kascherus, S., & Ignatuschtschenko, 2013; Monsurat, 2020; Siegel, 2010). Today, online chat forums,
web-sniffing and emails are common ways by which attackers target their victims to launch cyber-attacks, including
phishing, IP spoofing, social engineering, denial of service attack, child pornography. According to (Clement, 2020),
Africa is becoming more internet-connected than ever before; for example, in Nigeria, alone internet users have
reached 99.5 million in 2020. The figure is projected to grow to 131.7 million by 2023. Therefore, it is expected that
cybercrime rates will increase simultaneously.
In the past decade, cybersecurity attacks have become daily occurrences in Nigeria, which presents a more
significant challenge to the economy, national security and damage to the reputation of the county (F. A. Reegu et al.,
2021). To minimize the cybersecurity attacks, security countermeasures and strategies were developed by the Globe
Cyber Security Agenda(Gercke, 2012; Malby, S., Mace, R., Holterhof, A., Brown, C., Kascherus, S., &
Ignatuschtschenko, 2013). These strategies are expected to be implemented globally in the campaign to fight
cybercrime activities (Mohammad Ubaidullah Bokhari et al., 2012)(M U Bokhari & Alam, 2013). However,
cybersecurity awareness campaigns have not received much attention from both the government and private
organizations as a means of fighting against cybersecurity attacks. A few studies have proposed an overview of
cybersecurity awareness targeting a small number of participants (Al-Janabi & Al-Shourbaji, 2016; Malby, S., Mace,
R., Holterhof, A., Brown, C., Kascherus, S., & Ignatuschtschenko, 2013; White, 2011).
Nigeria has a popular crime syndicate known as yahoo-boys. These yahoo boys involve using the internet to
conduct illegal activities, including account hacking, identity theft, fake relationship, and spreading
malware(Ibrahim, 2016). Many individuals, both locally and internationally (foreigners), have been victims of
these activities. These activities have led many researchers to analyze the impact of cybercrime and cybersecurity
awareness levels on individuals or as a group of a target audience; however, most conducted research has focused
on the particular state in which the participants shared the same social, economic, and cultural values (Akanle &
Shadare, 2020; Monsurat, 2020; Nzeakor et al., 2020). Moreover, the government has also given much research
grants and funding to conduct such studies as many victims of cybercrimes were reported from the southern part
of the country.
However, this study aims to identify the current cybersecurity awareness on the following items (Cyberbully,
Personal Information, Internet Banking, Internet Addiction, and Self-protection) of students at the North-eastern
universities on a large number of participants of different cultural background, religion, exposure to the internet
3739
Turkish Journal of Computer and Mathematics Education Vol.12 No.12 (2021), 3739-3752
Research Article
and lifestyle environment, i.e. Universities students from the North-eastern part of Nigeria as many reports have
shown cybercrime is increasing exponentially in the region(Sesan Gbenga, B. Soremi, 2015). Therefore, there is
an urgent need to conduct this research to assess the level of cybersecurity awareness of people (students) living
in those areas. A few studies have been published but have focused on selected state in Nigeria(Adamu A Garba,
Siraj, et al., 2020).
Research in the cybersecurity domain is gaining momentum, focusing on designing and implementing
end-to-end security mechanisms to ensure the integrity and confidentiality of data and information (Masoodi et
al., 2011). However, cybersecurity awareness programs are considered the first security defence line to avoid
security attacks and threat confrontation (Malby, S., Mace, R., Holterhof, A., Brown, C., Kascherus, S., &
Ignatuschtschenko, 2013). The motivation behind this research includes limited research aiming to identify
cybersecurity awareness of university students located in the northeast part of Nigerian and also the continues
cyberattacks reports. Another motivation of this study is the provision of grants via the tertiary education trust
fund (Tetfund) to conduct such research to provide a solution to minimize and increase cybersecurity awareness
knowledge in the North-eastern part of the country (Nigeria). Hence, the importance of this study is targeting a
larger number of participants with different cultural background and religious exposure. This method would give
a clear picture of how cybersecurity knowledge is known to the student, and also, a recommendation on
cybersecurity awareness can be proposed.
The remainder of the paper consists of 7 sections. Section 2 discussed the existing literature, Section 3 presents
the research methodology, Section 4 explains the results and discussion, Section 5 concludes the findings, and
lastly, Section 6 presents the future research direction, section 7 Compliance with Ethical Standards.
2. Literature review
Cybersecurity awareness programs and training are regarded as one of the first defence lines and the most
effective means of improving cybersecurity practices. Most cybersecurity awareness programs aim to change the
security of individuals. Many theories have been adopted from human psychology that discusses understanding
human behaviour. Such theories include General Deterrence Theory (GDT)(D’Arcy et al., 2009; Straub, 1990),
Protection Motivation Theory (PMT), and Theory of Planned Behavior (TBP)(Taha & Dahabiyeh, 2020). All
these theories are designed to understand human behaviour. For example, GDT focuses on threat severity and
susceptibility to threat to predict behavioural intention while PMT emphasizes rational choices and that
individuals take calculated action to protect their interest(Bada et al., 2014). These theories have been used mostly
in the information system domain and cybersecurity awareness, since the aim is to change an individual’s
behaviour to instil security consciousness.
A study conducted by Serianu Agency’s Nigeria Cyber Security Study (2016)pointed out that the increase
in cyber threats and attacks had cost the Nigerian government $550 million. This indicated that most users are
not aware of the danger posed by cybercrime and its implications to the economy of a country. However, the
studyAwareness and Training, Continuous Monitoring and Log Analysis, Vulnerability and Patch Management,
Continuous Risk Assessment and Treatment, and Managed Services and Independent Reviewsidentified the top
five 2017 cybersecurity challenges (Serianu, 2017).
From the African point of view and in the Nigerian context, the best approach in addressing or mitigating
cybersecurity issues from the survey was that almost 95 percent of respondents agree that: Awareness training is
the primary driving force that will make everyone aware of the problems and danger of cyber-attacks on their
businesses. Some respondents also have the view that the IT budget will increase so that technical measures will
also be included.
Respondents also agree that “Education and knowledge is the best way, once a common man is aware of this,
he will be vigilant”. The best approach in dealing with cybersecurity in Nigeria is educating both public and
private individuals about the possibility of cyber-attacks before it happens. Therefore, according to Ben Robbert,
Liquid Telecom Group Chief Technical Officer, Kenya, “My top 3 priorities are education, education, and
education”. All companies need to make sure that all staff are aware of the danger of cybersecurity and should
have a basic knowledge of cybersecurity irrespective of their department.
2.1. Cybersecurity Awareness Program in Education Domain
The university system is becoming increasingly digitized day by day. One reason is the current COVID-19
epidemic, as online courses and degrees are much more prevalent, and new learning methods that fully depend
on technology have been adopted (Alam et al., 2021). Existing research on the security of the online learning
system has illuminated some of the challenges in using online platforms for educational purposes; such are attacks
on protecting students’ examination and processes, content filtration, and virus and malware attacks. There are
many motives toward targeting educational institutions as large databases contain valuable information about
students (Shuaib et al., 2021)(M U Bokhari et al., 2011). There is also a lack of security controls in university on
what devices students can bring and use in their learning process environment (Monrad, 2019). This issue makes
3740
Turkish Journal of Computer and Mathematics Education Vol.12 No.12 (2021), 3739-3752
Research Article
it important to create a secure learning environment. Many researchers have focused on identifying the antecedent
of cybersecurity awareness. Some authors have adopted the theories explained above to assess the impact of
individual factors, such as age and gender, on cybersecurity knowledge and behaviour (Ahlan et al., 2015; Al-
Alawi et al., 2016).
Cybersecurity awareness has been implemented in the educational domain to either identify the level of
awareness or implement a program to increase the level of awareness among students and academics (Al-Janabi
& Al-Shourbaji, 2016; Adamu A Garba, Othman, et al., 2020). Educational establishments offer to use the internet
in research; therefore, they can be victims of cyber-attack, especially the students whose knowledge of
cybersecurity is limited, as some previous research has indicated. Students mostly engage in social networking
using the university internet. Their personal information can be compromised or made vulnerable to cyberbullying
as there is much available information about hacking skills that can equip potential offenders with knowledge and
tools to hack (Van Nguyen, 2020) (Abdus et al., 2018)(Alam et al., 2019). Therefore, universities must provide
preventive measures to counter any attack as there is a relationship between preventive measures and information
security awareness (Knapp et al., 2006). Cyber-attacks can only be minimized if people (students) have adequate
knowledge and practise good behaviour when using the internet as a relationship exists between the two(Kruger
et al., 2010).
3. Methodology
This section explains the methodology adopted for this research and how it was conducted; the section includes:
data collection, Measures and data analysis.
3741
Turkish Journal of Computer and Mathematics Education Vol.12 No.12 (2021), 3739-3752
Research Article
Figure 1. Research Survey Design Model
250
214
200
Number of Responders
150 147
100
80
50
0
Private Federal State
University type
Responders
120
110
100
88
80 76
68
Responders
60 57
42
3742
40
20
Turkish Journal of Computer and Mathematics Education Vol.12 No.12 (2021), 3739-3752
Research Article
250 246
236
227
200
No of Responders
150
133
113
108
100
88
84 83
65
59
55
50 46
40 40
35
27 28 26 25
0
Q1 Q2 Q3 Q4
Question
Q1: I am worried that my personal information might be misused. From the figure, it can be seen that
around 30% of the respondents strongly agree to the question “I am worried that my personal information
might be misused”, accounting for number(N) =133, while only (N=65, 14%) admitted to not being worried if
their information might be misused. However, a significant proportion of respondents (N= 113, 25.6%)
admitted to being “neutral” to the question asked.
This results analysis reveals that 30% of the students have some basic knowledge on how to protect their
personal information when using the internet; however, because 23% of respondents selected “neutral”, there
is a need for a cybersecurity awareness program that will discuss how to protect personal information and the
dangers of revealing it.
Q2: I am not comfortable when my personal information was shared without my permission . Figure 6
shows how the respondents express their thoughts regarding whether they feel comfortable when their
information is shared without their permission. The results show that the majority of the respondents strongly
agree (N=246, 55.8%) to not feeling comfortable when their personal information was shared without their
permission, while (N=40, 9.1%) feel it is ok if their information is shared without their consent.
3743
Turkish Journal of Computer and Mathematics Education Vol.12 No.12 (2021), 3739-3752
Research Article
The outcome of the result has indicated approximately 55.8% have an idea of the concept of identity theft.
However, the students also expressed concern about the issue of not being comfortable when their information
is shared without their consent.
Q3, I am worried if my personal information was not securely kept online. The result vividly indicates
the majority of the students are worried about the security of their personal information online. (N=236, 53.5%)
strongly agree, while a small proportion (N=35, 7.9%) disagree with the question. The analysis of the result
has indicated many students are engaged with online activities and are worried their information might be
stolen. This analysis displays that students are being careful of what information they save and send via social
medium.
Q4, I will only provide my personal information when I was asked by an organization that I know well.
When asked what information students will provide, (N=227, 51%) admitted to only reveal the information
when asked, and only (N=26, 5.9%) disagree with the question.
Basic cybersecurity knowledge is essential to all individuals. However, this result has indicated that the surveyed
students have some basic idea of protecting their personal information as 51% said that they would only reply
to a legitimate organization that they know and trust.
250
219
212
200
180
No of Responders
150
104 107
100
84
77
64 68
53 56 52
50 45
34 36
31 28
23 21
0
Q1 Q2 Q3 Q4
Question
3744
Turkish Journal of Computer and Mathematics Education Vol.12 No.12 (2021), 3739-3752
Research Article
This result proves that students are careful about what they see and receive from an unwanted source as
phishing emails have become the simplest way criminals use to get information from their target. Thus, it is
shown that a large percentage of the respondents are aware of such attack.
Q4, I will provide my personal information whenever I received calls from banking organizations,
describes how the students feel or act when they received a call from banks asking for personal information.
(N=212, 48.1%) disagree with the questions while only (N=68, 15%) agree to the questions.
The analysis confirms that most students are very aware and familiar with yahoo- boys’ methods of
scamming victims, as 68% attested to that; however, more cybersecurity awareness programs are needed to
educate the remaining students.
4.3 Student Awareness on Self Protection
Awareness of self-protection is significant, as many attacks can be successful if individuals have fallen to
protect their data. Therefore, this section evaluates the respondents’ responses on how well they are aware of
self-protection when it comes to cybersecurity. Figure 6 shows all four questions with their analyzed results.
160 155
140
122
No of Responders
120
103
100 99 98
96 94 92
81
80 78 78
66
60
54 52
44
40 37
30 32
20
0
Q1 Q2 Q3 Q4
Question
3745
Turkish Journal of Computer and Mathematics Education Vol.12 No.12 (2021), 3739-3752
Research Article
4.4 Students Awareness of Cyberbully
Cyberbully is among the top cybercrime that affects the young generation, i.e. students, due to their excessive
usage of social media platforms, may become victims, who are usually threatened to do or give something in
exchange for their stolen information; therefore, there is an urgent need to know the impact of this attack on the
students as there are few programs that tackle cyber harassment awareness courses that focus the perpetrators of
these crimes (Conradie et al., 2020). Figure 7 shows the analysis of all the questions’ feedback.
200
180
No. Responders
176
166
150
106 104
97 97 101
100 91 91
50 42 46
38 42
25 28 30
20 18
Figure 7. RespondQuestion
to Cyber Bully Q1 Q2 Q3 Q4
Q1, although I felt unsatisfied with someone, I will never express it through social media. The result shows that
(N=180, 40%), (N=97, 22%) have agreed not to express their hatred to some online, while the same proportion
(N= 97, 22%) are neutral to the expression. (N=42, 9.5%) and (N=25, 5.7%) disagree with the question.
This shows that students don’t mind expressing their feelings to a person through social media. Overall indication
concludes that the majority of the respondents agreed not to express dissatisfaction with someone via social media.
This analysis also proves that students are not likely to be involved in that act of cyberbully.
Q2 I think giving harsh comments to my friends on social media is not a good thing to do. The analysis indicated
(N=266, 60.3%) and (N=91, 20.6%) have agreed that it is not a good idea to write a harsh comment to a friend
when replying to his/her post or message. However, a small percentage have disagreed with the question (N= 20,
4.5%) and (N18, 4.1%).
The outcome shows that 80% of the respondents have agreed not to use harsh wording when replying to a post.
This question also indicated the surveyed students are not likely to be involved in a cyberbully act.
Q3 I think it is not acceptable to criticize someone when they uploaded their controversial photos. The analysis
shows (N= 176, 39.9%) and (N=106, 24%), which accounts for 63% of the respondents, have agreed it is not good
to criticize someone for uploading a provocative photo on social media, while only a few have disagreed with the
question and those account for 8.6% of the total respondents. Similarly, 22.9% are neutral, which implies they can
either agree or disagree.
The overall analysis displays majority would not be involved in criticizing someone simply because they uploaded
a provocative photo or statement, which means the surveyed respondents are well-mannered individuals.
Q4 I will never express my anger to someone through social media. This question was asked to know if the
students would ever express their anger in social media and the results indicated (N=166, 37.65) and (N=91, 20.6%)
have agreed to that, while (N= 104, 23.6%) are neutral to the question. However, 17% of the respondents have
disagreed with the question.
This outcome shows respondents would not express their anger to anyone through social media as 57% have agreed
to that, which implies that the respondents can control their anger via social media.
4.5 Students Awareness of Internet Addiction
The internet has become part of almost everyone’s lives, as many businesses, works, interactions are now
performed through the internet. In this context, and the internet is a vital medium of research by educational
initiations. To identify the impact of internet addiction, students were asked questions concerning their use of the
internet. Figure 8 shows an analysis of the surveyed feedback collected from the participants.
Strongly disagree
Disagree
160 Neutral
148 Agree
Strongly agree
140
123 123
120
120
111
103 103
100 98 97
No. Responders
93 93
80 79
76
70 68 69
64
60 59
49
40
20 18
0
Q1 Q2 Q3 Q4
Question
3746
Turkish Journal of Computer and Mathematics Education Vol.12 No.12 (2021), 3739-3752
Research Article
This section explains more on the feedback analysis based on a control variable “Major Discipline”. This
analysis will give more in-depth knowledge on the cybersecurity awareness level among the students and also
would identify the students that have more knowledge on cybersecurity, with this analysis proper cybersecurity
will be design for the appropriate audience. Table 1 displays the results of the analysis.
Person Q1 441 3.95 1.394 4.12 1.194 4.0 1.19 4.0 1.27 3.9 1.24 4.1 1.3
al 7 4 8 1 5 0 1 32
Infor Q2 441 3.86 1.563 4.07 1.197 3.9 1.40 4.2 1.16 4.0 1.25 4.0 1.3
9 9 4 5 9 3 9 08
3747
Turkish Journal of Computer and Mathematics Education Vol.12 No.12 (2021), 3739-3752
Research Article
matio Q3 441 3.23 1.536 3.50 1.330 3.2 1.40 3.4 1.30 3.4 1.40 3.4 1.4
n 9 4 3 2 4 5 5 18
Q4 441 4.26 1.078 4.05 1.168 4.0 1.16 4.0 1.19 3.9 1.16 4.1 1.1
5 8 9 0 7 1 1 84
Cumul 3.82 1.39 3.93 1.222 3.85 1.2937 3.9 1.23 3.8 1.26 3.9 1.31
ative 5 275 5 25 5 6 2 625 475 4 05
Mean/
SD
Intern Q1 441 3.98 1.295 4.02 1.199 4.2 1.08 3.9 1.29 4.1 0.96 3.8 1.2
et 1 7 8 5 8 9 9 17
Banki Q2 441 4.05 1.481 4.10 1.265 4.2 1.21 4.2 1.24 4.4 0.93 4.1 1.1
ng 4 1 0 3 2 2 6 89
Q3 441 3.86 1.315 3.52 1.366 3.9 1.24 3.9 1.18 3.7 1.28 3.8 1.2
7 6 3 2 0 9 8 22
Q4 441 2.42 1.647 2.45 1.485 2.2 1.60 2.2 1.53 2.4 1.51 2.2 1.4
9 3 8 1 1 6 5 80
Cumul 3.57 1.43 3.52 1.328 3.677 1.2867 3.5 1.31 3.6 1.17 3.5 1.27
ative 75 45 25 75 5 5 975 275 775 65 45 7
Mean/
SD
Self- Q1 441 4.02 1.217 3.74 1.211 3.7 1.34 4.0 1.19 3.8 1.22 3.7 1.1
Protec 4 5 6 7 2 8 2 96
tion Q2 441 2.96 1.388 2.93 1.314 3.0 1.48 2.9 1.39 3.0 1.39 2.7 1.2
9 4 3 6 5 4 6 74
Q3 441 3.81 1.315 3.26 1.380 3.5 1.41 3.8 1.19 3.5 1.3. 3.5 1.2
0 9 8 2 6 3 8 14
Q4 441 3.58 1.362 3.67 1.319 3.5 1.45 3.7 1.32 3.4 1.43 3.7 1.3
0 1 8 6 3 6 5 67
Cumul 3.59 1.32 3.4 1.306 3.457 1.4247 3.6 1.27 3.4 1.01 3.4 1.26
ative 25 05 5 5 625 775 65 45 525 275
M/SD
Cyber Q1 441 3.70 1.253 3.95 1.188 3.8 1.30 4.0 1.16 3.6 1.19 3.8 1.2
bully 7 3 1 9 9 4 0 44
Q2 441 4.14 1.187 4.21 1.180 4.3 1.11 4.2 1.17 4.2 1.03 4.4 0.9
7 8 4 4 7 1 1 69
Q3 441 3.63 1.422 3.98 1.259 3.8 1.22 3.9 1.19 3.7 1.08 3.9 1.1
1 5 3 2 7 1 6 71
Q4 441 3.79 1.306 3.81 1.292 3.7 1.29 3.7 1.41 3.6 1.17 3.4 1.3
2 1 3 2 9 1 9 42
Cumul 3.81 1.29 3.98 1.229 3.942 1.2342 3.9 1.23 3.8 1.11 3.9 1.18
ative 5 2 75 75 5 5 775 675 55 925 15 15
Mean/
SD
Intern Q1 441 3.74 1.142 3.83 1.208 3.7 1.28 3.8 1.17 3.7 1.07 3.6 1.1
et 8 0 4 3 1 0 8 22
Addict Q2 441 3.14 1.369 3.43 1.364 3.1 1.50 3.3 1.33 3.4 1.30 3.1 1.3
ion 9 9 9 4 2 2 7 10
Q3 441 2.26 1.330 2.60 1.380 2.8 1.50 2.6 1.44 2.9 1.32 2.5 1.3
7 5 6 5 0 7 5 70
Q4 441 2.89 1.410 3.00 1.414 3.1 1.44 3.1 1.40 3.1 1.30 2.8 1.4
5 8 9 5 5 8 8 04
Cumul 3.00 1.31 3.21 1.341 3.247 1.4355 3.2 1.33 3.2 1.25 3.0 1.30
ative 75 275 5 5 5 7 925 95 175 7 15
Mean/
SD
Table 1. Result analysis of based on major discipline
Key
From 3.6 -5.0 High From 3.0 – 3.5 moderate 2.0- 3.0 Low
3748
Turkish Journal of Computer and Mathematics Education Vol.12 No.12 (2021), 3739-3752
Research Article
3749
Turkish Journal of Computer and Mathematics Education Vol.12 No.12 (2021), 3739-3752
Research Article
Table 2 indicated that none of the faculties requires cybersecurity awareness in personal information and
cyberbully as the results obtained show high awareness, and subsequently, all the faculties require awareness in
internet addiction. However, Science, Art and education, and medical sciences require awareness of internet
banking and self-protection. Meanwhile, humanity and law require awareness of self-protection. Similarly,
engineering requires awareness of internet banking. Surprisingly, the comparison results indicate engineering,
humanity, and law faculties tend to have more awareness based on the surveyed items as students show moderate
awareness of only two items, unlike the other faculties that require three programs.
5.Conclusion
Cybersecurity knowledge is a must for all individuals irrespective of gender, education, organization, and age
group, as now many activities are performed via the internet. Many developed countries have implemented
strategies on the cybersecurity awareness of their citizens. Also, much research was conducted to identify the
level of cybersecurity awareness of organizations’ staff of an educational institution. In general, factors such as
searching for knowledge, keeping in touch with family and friends, searching for a job, and students engaging
with the connected world make them the prime target of cybersecurity attacks and threats. Research shows the
current level of cybersecurity awareness among Nigerian students, particularly in the North-eastern part, required
urgent attention to reduce the risk of potential victims.
The study has adopted quantitative methods in data collection. SPSS software was used to analyze the data
and presented using OrignPro Software. A total of 600 questionnaires were sent out, and 500 were received;
however, after filtering the uncompleted questions, a total of 441 were used for data analysis. As discussed, the
analysis is based on cybersecurity items being investigated, which are Personal information, Internet banking,
Self-protection, cyberbully and Internet addiction. Each item consists of four questions to determine the
awareness level of the respondents. Based on the general analysis performed on the feedback, the overall results
have indicated the majority of the students who participated in the study have some basic knowledge of
cybersecurity in items like personal information, internet banking, while other items like cyberbully, self-
protection and, internet addiction result shows moderate awareness.
However, in the second section of the analysis, a control variable, “Faculty”, was used to analyze further the
results based on specialization. The analysis shows that students from all faculties have a higher knowledge of
personal information and cyberbully and moderately low knowledge of internet addiction. However, faculties
like Science, Art, education, medical sciences, humanity, and law require awareness in self-protection. Similarly,
engineering, Science, Art and education, and medical sciences all require awareness in internet banking. Those
having a higher chance of understanding cybersecurity are engineering, humanity, and law faculties.
This has given a hint to further the study in the North-eastern part of the country on designing and
implementing cybersecurity awareness programs as a proactive approach to increase cybersecurity awareness
among students and make students identify how to defend themselves from some basis cyberattacks and also as
a benchmark to internet users for identifying the current level of cybersecurity knowledge to help cyber experts
to decide what program is appropriate to the users.
6. Future direction
The case study results and discussion indicates the students have some basic knowledge of cybersecurity
terminologies. However, in other areas, their results indicated an urgent intervention to address those issues.
Therefore, the next paper will focus on planning, designing, and implementing an effective cybersecurity
awareness program that will address those issues, increase cybersecurity knowledge, and reduce network attacks
and threats to the students and internet users in the northeast using theories and hypotheses. In addition, other
analysis such as regression and Structural equation modelling (SEM) would be performed to identify the impact
of the programs. Other possible research directions include assessing the methods used to assess the effectiveness
of cybersecurity awareness programs, the best method to deliver the effectiveness of cybersecurity awareness
programs, and lastly, cybersecurity awareness maturity framework design and implementation.
7. Compliance with Ethical Standards
Ethical approval and consent to participate Participants were asked to fill an online questionnaire through
various platforms, which was completely optional. We considered filling in the questionnaire as an indication of
participants’ consent to take part in the study. Therefore, a section was created for the participant to tick for
consent before filling the questionnaire.
References
1. Abdus, S., Shadab, A., Mohammed, S., & Mohammad.Ubaidullah, B. (2018). Internet of Vehicles (IoV)
Requirements, Attacks and Countermeasures. 5 International Conference on “Co Mputing for Sustainable
Global Development, March, 4037–4040.
3750
Turkish Journal of Computer and Mathematics Education Vol.12 No.12 (2021), 3739-3752
Research Article
2. Ahlan, A. R., Lubis, M., & Lubis, A. R. (2015). Information Security Awareness at the Knowledge-Based
Institution: Its Antecedents and Measures. Procedia Computer Science, 72, 361–373.
https://doi.org/10.1016/j.procs.2015.12.151
3. Akanle, O., & Shadare, B. R. (2020). Why has it been so difficult to counteract cyber crime in Nigeria?
Evidence from an ethnographic Study. International Journal of Cyber Criminology, 14(1), 29–43.
https://doi.org/10.5281/zenodo.3738962
4. Al-Alawi, A. I., Al-Kandari, S. M. H., & Abdel-Razek, R. H. (2016). Evaluation of Information Systems
Security Awareness in Higher Education: An Empirical Study of Kuwait University. Journal of
Innovation and Business Best Practice, 2016, 1–24. https://doi.org/10.5171/2016.329374
5. Al-Janabi, S., & Al-Shourbaji, I. (2016). A Study of Cyber Security Awareness in Educational
Environment in the Middle East. Journal of Information and Knowledge Management, 15(1).
https://doi.org/10.1142/S0219649216500076
6. Alam, S., Abdullah, H., Ayoub, Y., Abdulhaq, R., Alshaikh, A., & Hayawi, A. (2021). A Blockchain-
based framework for secure Educational Credentials. Turkish Journal of Computer and Mathematics
Education (TURCOMAT), 12(10), 5157–5167.
7. Alam, S., Shuaib, M., & Samad, A. (2019). A Collaborative Study of Intrusion Detection and Prevention
Techniques in Cloud Computing. In Lecture Notes in Networks and Systems (Vol. 55). Springer
Singapore. https://doi.org/10.1007/978-981-13-2324-9_23
8. Aloul, F. A. (2012). The Need for Effective Information Security Awareness. Journal of Advances in
Information Technology, 3(3). https://doi.org/10.4304/jait.3.3.176-183
9. Bada, M., Sasse, A., & Bada, M., Sasse, A., Nurse, J. (2014). Cyber Security Awareness Campaigns:
Why They Fail to Change Behavior. International Conference on Cyber Security for Sustainable Society,
11.
10. Bokhari, M U, Ahmad, S., Alam, S., Masoodi, F., & Science, C. (2011). Modern Tools and Technologies
for Interactive Learning. 5th National Conference; INDIACom-2011, 5–8.
11. Bokhari, M U, & Alam, S. (2013). BSF-128: a new synchronous stream cipher design. Proceeding of
International Conference on Emerging Trends in Engineering and Technology, 541–545.
12. Bokhari, Mohammad Ubaidullah, Alam, S., & Hasan, S. H. (2014). A Detailed Analysis of Grain family
of Stream Ciphers. International Journal of Computer Network & Information Security, 6(6).
13. Bokhari, Mohammad Ubaidullah, Alam, S., & Masoodi, F. S. (2012). Cryptanalysis techniques for stream
cipher: a survey. International Journal of Computer Applications, 60(9).
14. Clement, J. (2020). Nigeria: Number of internet users 2025.
15. Conradie, L., Pitchford, M., Myers, E., Barnes, T., & Short, E. (2020). Cyberharassment awareness course
(cybac): Influences from domestic abuse perpetrator programmes for its design and function. International
Journal of Cyber Criminology, 14(1), 220–235. https://doi.org/10.5281/zenodo.3750140
16. D’Arcy, J., Hovav, A., & Galletta, D. (2009). User awareness of security countermeasures and its impact
on information systems misuse: A deterrence approach. Information Systems Research, 20(1), 79–98.
https://doi.org/10.1287/isre.1070.0160
17. Finnie, T., Petee, T., & Jarvis, J. (2010). The Future Challenges of Cyber-crime. Proceedings of the
Futures Working Group. US, Virginia Quantico: Federal Bureau of Investigation.
18. Gabra, A. A., Sirat, M. B., Hajar, S., & Dauda, I. B. (2020). Cyber security awareness among university
students: A case study. Journal of Critical Reviews, 7(16). https://doi.org/10.31838/jcr.07.16.108
19. Garba, Adamu A, Othman, S. H., & Musa, M. A. (2020). A Study on Cybersecurity Awareness Among
Students in Yobe State University, Nigeria: A Quantitative Approach 1. 11(5), 41–49.
20. Garba, Adamu A, Siraj, M. M., Othman, S. H., & Musa, M. A. (2020). A Study on Cybersecurity
Awareness Among Students in Yobe State University, Nigeria: A Quantitative Approach. International
Journal on Emerging Technologies, 11(5), 41–49.
21. Garba, Adamu Abdullahi, Jeribi, F., Al-shourbaji, I., Alhameed, M., Reegu, F., & Alim, S. (2021). An
Approach To Weigh Cybersecurity Awareness Questions In Academic Institutions Based On Principle
Component Analysis : A Case Study Of Saudi Arabia. 04, 319–326.
22. Gercke, M. (2012). Understanding cybercrime: Phenomena, challenges and legal response purpose.
Geneva: International Communication Union.
23. Ibrahim, S. (2016). Causes of socioeconomic cybercrime in Nigeria. 2016 IEEE International Conference
on Cybercrime and Computer Forensic, ICCCF 2016. https://doi.org/10.1109/ICCCF.2016.7740439
24. Khalid, F., Daud, Y., Jasmy, M., Rahman, A., Khalid, M., & Nasir, M. (2018). An Investigation of
University Students’ Awareness on Cyber Security. International Journal of Engineering & Technology,
7, 11–14.
25. Kim, E. B. (2014). Recommendations for information security awareness training for college students.
Information Management and Computer Security, 22(1), 115–126. https://doi.org/10.1108/IMCS-01-
2013-0005
26. Knapp, K. J., Marshall, T. E., Rainer, R. K., & Ford, F. N. (2006). Information security: Management’s
effect on culture and policy. Information Management and Computer Security, 14(1), 24–36.
https://doi.org/10.1108/09685220610648355
3751
Turkish Journal of Computer and Mathematics Education Vol.12 No.12 (2021), 3739-3752
Research Article
27. Kruger, H., Drevin, L., & Steyn, T. (2010). A vocabulary test to assess information security awareness.
Information Management & Computer Security, 18(5), 316–327.
https://doi.org/10.1108/09685221011095236
28. Malby, S., Mace, R., Holterhof, A., Brown, C., Kascherus, S., & Ignatuschtschenko, E. (2013).
Comprehensive study on cybercrime. In United Nations Office on Drugs and Crime, Tech. Rep.
29. Masoodi, F., Alam, S., & U Bokhari, M. (2011). SOBER Family of Stream Ciphers: A Review.
International Journal of Computer Applications, 23(1), 1–5. https://doi.org/10.5120/2857-3672
30. McCrohan, K. F., Engel, K., & Harvey, J. W. (2010). Influence of awareness and training on cyber
security. Journal of Internet Commerce, 9(1), 23–41. https://doi.org/10.1080/15332861.2010.487415
31. Monrad, J. (2019). Universities fall into the cross hairs of cyber attacks.
32. Monsurat, I. (2020). African insurance (spiritualism) and the success rate of cybercriminals in Nigeria: A
study of the yahoo boys in Ilorin, Nigeria. International Journal of Cyber Criminology, 14(1), 300–315.
https://doi.org/10.5281/zenodo.3755848
33. Nzeakor, O. F., Nwokeoma, B. N., & Ezeh, P. J. (2020). Pattern of cybercrime awareness in Imo state,
Nigeria: An empirical assessment. International Journal of Cyber Criminology, 14(1), 283–299.
https://doi.org/10.5281/zenodo.3753223
34. Reegu, F. A., Mohd, S., Hakami, Z., Reegu, K. K., & Alam, S. (2021). Towards Trustworthiness of
Electronic Health Record system using Blockchain. Annals of the Romanian Society for Cell Biology,
25(6), 2425–2434.
35. Reegu, F., Khan, W. Z., Daud, S. M., Arshad, Q., & Armi, N. (2020). A Reliable Public Safety Framework
for Industrial Internet of Things (IIoT). 2020 International Conference on Radar, Antenna, Microwave,
Electronics, and Telecommunications (ICRAMET), 189–193.
https://doi.org/10.1109/ICRAMET51080.2020.9298690
36. Serianu. (2017). Demystifying Africa’s Cyber Security Poverty Line.
37. Sesan Gbenga, B. Soremi, B. O. (2015). Economic Cost of Cybercrime in Nigeria.
38. Shuaib, M., Alam, S., Daud, S., & Ahmad, S. (2021). Blockchain-Based Initiatives in Social Security
Sector. EAI 2nd International Conference on ICT for Digital, Smart, and Sustainable Development
(ICIDSSD), 8. https://doi.org/10.4108/eai.27-2-2020.2303256
39. Siddiqui, S. T., Alam, S., Ahmad, R., & Shuaib, M. (2020). Security threats, attacks, and possible
countermeasures in internet of things. In Lecture Notes in Networks and Systems (Vol. 94, pp. 35–46).
https://doi.org/10.1007/978-981-15-0694-9_5
40. Siegel, L. (2010). Criminology: Theories, patterns, and typologies (Nelson Education (ed.); 10th ed.).
Wadsworth Gengage learning.
41. Slusky, L., & Partow-Navid, P. (2012). Students Information Security Practices and Awareness. Journal
of Information Privacy and Security, 8(4), 3–26. https://doi.org/10.1080/15536548.2012.10845664
42. Son, J., Kim, D., Hussain, R., & Oh, H. (2014). Conditional proxy re-encryption for secure big data group
sharing in cloud environment. Proceedings - IEEE INFOCOM, 541–546.
https://doi.org/10.1109/INFCOMW.2014.6849289
43. Straub, D. W. (1990). Effective IS security: An empirical study. Information Systems Research, 1(3),
255–276. https://doi.org/10.1287/isre.1.3.255
44. Taha, N., & Dahabiyeh, L. (2020). College students information security awareness: a comparison
between smartphones and computers. Education and Information Technologies.
https://doi.org/10.1007/s10639-020-10330-0
45. Troia, V. (2018). The Cybersecurity Framework as an Effective Information Security Baseline: A
Qualitative Exploration. ProQuest Dissertations and Theses, D.I.T.(August).
46. Van Nguyen, T. (2020). Cybercrime in Vietnam: An analysis based on routine activity theory.
International Journal of Cyber Criminology, 14(1), 156–173. https://doi.org/10.5281/zenodo.3747516
47. White, G. B. (2011). The community cyber security maturity model. 2011 IEEE International Conference
on Technologies for Homeland Security, HST 2011, 173–178.
https://doi.org/10.1109/THS.2011.6107866
48. Yang, Y., Zhou, L., Peng, Z., Using, S., Spread, N., Deng, S., & Huang, H. (2017). A Survey on Cyber
Security awareness among college students in Tamil Nadu A Survey on Cyber Security awareness among
college students in Tamil Nadu. https://doi.org/10.1088/1757-899X/263/4/042043
3752