Strengthening cybersecurity education for university students: bridging vulnerabilities and promoting proactive digital safety practices

Authors

DOI:

https://doi.org/10.29352/mill0227.41111

Keywords:

cybersecurity; digital safety; threat perceptions; behavioral responses; cyberattacks

Abstract

Introduction: As university students in emerging regions like Albania increasingly engage with digital platforms, they face growing cybersecurity risks. While basic tools like antivirus software are common, critical gaps in password management and phishing detection persist, underscoring the urgent need for enhanced cybersecurity education.

Objective: To examine the gaps in cybersecurity practices among university students and identify critical areas that need more focus.

Methods: A quantitative survey was conducted with 242 students from IT-related disciplines. The survey assessed digital security practices, threat perceptions, and responses to cybersecurity incidents. Logistic regression analysis was applied to evaluate the link between proactive cybersecurity behaviors and the reduction of cyber incidents.

Results: The findings reveal a notable gap in students' awareness of cybersecurity risks. Students are more inclined to report cybersecurity incidents when anonymous reporting mechanisms are available, emphasizing the crucial role of privacy-respecting systems in promoting proactive incident reporting within universities. Additionally, logistic regression analysis shows that students who consistently engage in proactive cybersecurity behaviors are significantly less likely to encounter or report malware-related incidents, further highlighting the importance of cultivating these behaviors to reduce exposure to cyber risks.

Conclusion: This study underscores the need for educational programs that focus on advanced cybersecurity practices. It advocates for universities to implement tailored curricula that enhance students' digital security competencies, better preparing them for evolving cyber risks.

Downloads

Download data is not yet available.

References

Albanian Institute of Statistics (INSTAT). (2023). Use of Information and Communication Technology in the Household, 2023. https://www.instat.gov.al/media/11339/use-of-ict-in-households-2023.pdf

Chandarman, R., & Van Niekerk, B. (2017). Students’ cybersecurity awareness at a private tertiary educational institution. The African Journal of Information and Communication (AJIC), 20, 133–155. https://doi.org/10.23962/10539/23572

Chaudhary, S. (2024). Driving behaviour change with cybersecurity awareness. Computers & Security, 142, Article 103858. https://doi.org/10.1016/j.cose.2024.103858

European Commission. (2024, April 29). Policies: European Commission. Retrieved June 5, 2024. https://digital-strategy.ec.europa.eu/en/policies/cybersecurity

European Union Agency for Cybersecurity. (2024, June 29). Incident reporting: ENISA. https://ciras.enisa.europa.eu/

Eurostat. (2022, December). Statistical themes: Eurostat. https://ec.europa.eu/eurostat/statistics-explained/index.php?title=ICT_security_in_enterprises#ICT_security_in_EU_enterprises

Hong, W. C., Chi, C., Liu, J., Zhang, Y., Lei, V. N., & Xu, X. (2023). The influence of social education level on cybersecurity awareness and behaviour: A comparative study of university students and working graduates. Education and Information Technologies, 28(1), 439–470. https://doi.org/10.1007/s10639-022-11121-5

IBM. (2023). Cost of a data breach report 2023. https://www.ibm.com/reports/data-breach

Kuraku, S., Kalla, D., Samaah, F., & Smith, N. (2023). Cultivating proactive cybersecurity culture among IT professionals to combat evolving threats. International Journal of Electrical, Electronics and Computers (IJEEC), 8(6), 1–7.

Li, W., & Zeng, J. (2021). Leet usage and its effect on password security. IEEE Transactions on Information Forensics and Security, 16, 2130–2143. https://doi.org/10.1109/TIFS.2021.3050066

Li, Y., Wang, H., & Sun, K. (2016). A study of personal information in human-chosen passwords and its security implications. IEEE INFOCOM 2016 – The 35th Annual IEEE International Conference on Computer Communications (pp. 1–9). IEEE. https://doi.org/10.1109/INFOCOM.2016.7524341

Mashiane, T., & Kritzinger, E. (2019). Cybersecurity behaviour: A conceptual taxonomy. In O. Blazy & C. Yeun (Eds.), Information Security Theory and Practice (WISTP 2018) (Vol. 11469, pp. 147–156). Springer. https://doi.org/10.1007/978-3-030-20074-9_11

Mattioli, R., & Malatras, A. (2024). Incident reporting: ENISA. European Union Agency for Cybersecurity (ENISA). https://abrir.link/BPZwm

Moallem, A. (2019). Cybersecurity awareness among college students. In T. N. Ahram (Ed.), Advances in Human Factors in Cybersecurity. Advances in Intelligent Systems and Computing (Vol. 782, pp. 79–87). Springer. https://doi.org/10.1007/978-3-319-94709-9_8

Muniandy, L., Muniandy, B., & Samsudin, Z. (2017). Cyber security behaviour among higher education students in Malaysia. Journal of Information Assurance & Cybersecurity, 2017, Article 800299. https://doi.org/10.5171/2017.800299

National Authority for Electronic Certification and Cyber Security. (2023). Cyber governance 2023 report. Tirana, Albania: Author.

Raya, J. E., Yahya, A. S., & Ahmad, E. K. (2023). Protection from a quantum computer cyber-attack: Survey. Technium: Romanian Journal of Applied Sciences and Technology, 5, 1–12. http://dx.doi.org/10.47577/technium.v5i.8293

Shay, R., Komanduri, S., Durity, A. L., Huh, P., Mazurek, M. L., Segreti, S. M., Ur, B., Bauer, L., Christin, N., & Cranor, L. F. (2014). Can long passwords be secure and usable? CHI '14: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 2927–2936). Association for Computing Machinery. https://doi.org/10.1145/2556288.2557224

Temoshok, D., Fenton, J. L., Choong, Y.-Y., Lefkovitz, N., Regenscheid, A., Galluzzo, R., & Richer, J. P. (2024). NIST SP 800-63B-4.2pd: Digital identity guidelines: Authentication and authenticator management (Second Public Draft). National Institute of Standards and Technology. https://doi.org/10.6028/NIST.SP.800-63b-4.2pd

Wang, S., Salehi-Abari, A., & Thorpe, J. (2023). PiXi: Password inspiration by exploring information. Information and Communications Security: 25th International Conference, ICICS 2023 (pp. 249–266). Springer. https://doi.org/10.1007/978-3-031-44698-8_14

Zwilling, M., Klien, G., Lesjak, D., Wiechetek, Ł., Cetin, F., & Basim, H. N. (2022). Cyber security awareness, knowledge and behavior: A comparative study. Journal of Computer Information Systems, 62(1), 82–97. https://doi.org/10.1080/08874417.2020.1712269

Downloads

Published

2025-07-25

How to Cite

Ferhataj, A., Memaj, F., Sahatcija, R., & Ora, A. (2025). Strengthening cybersecurity education for university students: bridging vulnerabilities and promoting proactive digital safety practices. Millenium - Journal of Education, Technologies, and Health, 2(27), e41111. https://doi.org/10.29352/mill0227.41111

Issue

Section

Education and Social Development Sciences