Factorial Structure of Knowledge and Risky Behavior of Information System Users Among Adolescents

10th International Scientific Conference Technics, Informatics and Education – TIE 2024, str. 530-538

АУТОР(И) / AUTHOR(S): Milivoje Ćosić , Miroljub Ivanović

Download Full Pdf  

DOI: 10.46793/TIE24.530C

САЖЕТАК /ABSTRACT:

The aim of this research was to examine the latent structure of knowledge and risky behavior of the information system users and self-reports of risky and delinquent behavior. Empirical research was conducted on a pertinent sample of adolescent students (N = 120; M age = 88.34, SD = 0.52). Two measuring instruments were applied: Users’ Information Security Awareness Questionnaire and Self-reported delinquency and risky behaviors questionnaire. The calculated alpha coefficients of internal consistency are satisfactory, which indicates satisfactory psychometric characteristics – the validity and reliability of the used measuring instruments and their optimal application to the Serbian adolescent population. Correlation analysis revealed statistically significant low interactions between manifest variables risky and delinquent behavior and risky behavior of computer users (p ≤  0.01). Exploratory factor analysis using the method of principal components, oblique rotation according to the Guttman-Kaiser criterion in the UZPK questionnaire, with 65.16% of the variance, identified three factors interpreted as: (1) habitual risky behaviors of computer users, (2) maintaining personal computer systems, and (3) receiving access data. Also, on the SRDP scale, with 62.10% variability, a three-dimensional structure was defined: (1) degree of computer communication security, (2) beliefs about security of computer data and (3) importance of properly storing computer data. The results of the isolated latent dimensions on knowledge and risk exposure of IT system users and knowledge on IT security of adolescents are discussed from a theoretical aspect and implications for research practice.

КЉУЧНЕ РЕЧИ / KEYWORDS: 

high school seniors, factors, information system, information security, communication technology

ЛИТЕРАТУРА / REFERENCES

  1. Velki, T., Šolić, K. i Očević, H. Development of Users’ information security awareness questionnaire (UISAQ) – Ongoing work. Institute of Electrical and Electronics Engineers Proceedings 37th MIPRO Information System Security, 1564‒1568, 2014 https://doi.org/
    10.1109/MIPRO.2014.6859789
  2. Mujiono, M. (2024). Digital Literacy: Fundamental Competence for Modern Society. Jurnal Pemikiran Pendidikan, 30(1), 15‒27, <https://journal.umg.ac.id/index.php/didaktika/article/view/6906.
  3. Suvija, V., & Rama, R. (2024). The relationship between internet usage prevalence, family dynamics and adolescent resilience-a comprehensive review. EPRA International Journal of Multidisciplinary Research (IJMR)10(1), 243–248. Retrieved from https://org/ eprajournals.net/index.php/
    IJMR/article/view/3601
  4. Jimeno, V., Ricarte, J.  J.,  Toledano,  A.,  Mangialavori,  S., Cacioppo, M., & Ros, L. (2022). Role of attachment and family functioning in problematic smartphone use in young adults. Journal of Family Issues, 43(2), 375‒391.
  5. Yas, N., Ibrahim, M. N., Shwedeh, F., & Lootah, S. (2024). The Impact of Intellectual Property Rights and the Work Environment on Information Security in the United Arab Emirates. Kurdish Studies12(1), 3931–3948. Retrieved from https://kurdishstudies.net/menu-script/index.php/KS/article/view/1681
  6. Thapa, C., Camtepe, S., (2021). Precision health data: Requirements, challenges and existing techniques for data security and privacy. Computers in biology and medicine, 129 (25): 104‒ https://doi.org/10.1016/j.compbiomed.2020.104130
  7. Armakolas, S., Lora, C., & Waligóra, A. (2024). Increased mobile phone use in high school students as a social problem under the dimension of addiction. Advances in Mobile Learning Educational Research4(1), 911‒ https://doi.org/10.25082/AMLER.2024.01.002
  8. Tabachnick, B. G., Fidell, L. S., & Ullman, J. B. (2019). Using multivariate statistics (Seventh edition). Pearson.
  9. Velki, T., Šolić, K. & Očević, H. (2014). Development of Users’ information security awareness questionnaire (UISAQ) – Ongoing work. Institute of Electrical and Electronics Engineers Proceedings 37th MIPRO Information System Security, 1564‒
  10. Ručević, S., Ajduković, M. i Šincek, D. (2009). Upitnik samoiskaza rizičnog i delinkventnog ponašanja. Kriminologija i socijalna integracija,17(1), 1‒11.
  11. Sharipova, M. (2024). Asymmetry and kurtosis coefficients. Theoretical Aspects in the Formation of Pedagogical Sciences3(1), 216–225. http:// org/econferences.ru/index.php/tafps/article/view/11739
  12. Sadiq, M. (2024). Modeling survival response using a parametric approach in the presence of multicollinearity. Communications in Statistics – Simulation and Computation, 53(4), 1889-1898.  https://doi.org/10.1080/03610918.2022.2060509
  13. Pituch, K. A., & Stevens, J. P. (2016). Chapter 9 Exploratory Factor Analysis. Applied multivariate statistics for the social sciences: Analyses with SAS and IBM’s SPSS. New York: Routledge
  14. Goretzko, D., Pham, T. T. H. & Bühner, M. (2021). Exploratory factor analysis: Current use, methodological developments and recommendations for good practice. Current Psychology 40, 3510–352. https://doi.org/10.1007/s12144-019-00300-2
  15. Li, Z., Wang, D. (2024). Database access information security management simulation under big data platform. Scalable Computing: Practice and Experience, 25(3),1841–1851. https://doi.org/10.12694/scpe.v25i3.2762
  16. Jiang, Q., , H., & Tao. R. (2018). Examining Factors Influencing Internet Addiction and Adolescent Risk Behaviors Among Excessive Internet Users. Health Communication, 33(12),1434‒1444. https://doi.org/10.1080/10410236.2017.1358241
  17. Jiang, Q., & Leung, L. (2015). Internet addiction. In A. Esarey & R. Kluver (Eds.), The Internet in China: Cultural, political, and social dimensions (1980s-2000s)(pp. 230–237). Great Barrington, MA: Berkshire Publishing Group
  18. Jiang, Q., & Leung, L. (2012). Effects of individual differences, awareness-knowledge, and acceptance of Internet addiction as a health risk on willingness to change Internet habits. Social Science Computer Review, 30, 170–183. doi:10.1177/089443931139844
  19. Zahra, A., & Chino, R. (2022). A Replication Study of the Impact of Impulsivity on Risky Cybersecurity Behaviors,“ AIS Transactions on Replication Research: Vol. 8, Article 3. https://doi.org/10.17705/1atrr.00074
  20. Paul Best, Roger Manktelow, and Brian Taylor. 2014. Online communication, social media and adolescent wellbeing: A systematic narrative review. Children and Youth Services Review 41 (2014), 27—36.
  21. Vazire, S., Carlson, E.N. (2011). Others sometimes know us better than we know ourselves. Current Directions in Psychological Science, 20, 104-108.