EN PL
Security of Personal Data in Cyberspace in the Opinion of Students of the University of Udine
 
More details
Hide details
1
Dipartimento di Lingue e Letterature, Comunicazione, Formazione e Società
 
2
The John Paul II Catholic University of Lublin
 
These authors had equal contribution to this work
 
 
Publication date: 2024-05-09
 
 
Cybersecurity and Law 2024;11(1):227-247
 
KEYWORDS
ABSTRACT
The escalating concerns surrounding personal data security in cyberspace necessitate a comprehensive examination of user awareness, attitudes, and behaviours. This study, conducted among University of Udine students, delves into the multifaceted dimensions of personal data security, exploring aspects such as perceptions and behaviours related to privacy, network security, and legal compliance. The research objectives involve assessing respondents’ awareness of data transfer on the network, their general concerns about cyber risks, and the coherence between awareness, concern, and actual online behaviour. A convenience sample of 518 predominantly young respondents was gathered through an online questionnaire. Results reveal a noteworthy disparity between declared awareness and actual concern, leading to a „privacy paradox”. While respondents express awareness of data transfer, their specific concern is limited, predominantly focusing on commercial aspects rather than acknowledging broader cybersecurity threats. This discordance extends to online behaviour and the predominant use of devices such as smartphones, which are simultaneously the most used by respondents but also perceived to have the greatest data loss and the least possibility of implementing data protection actions. The findings underscore the critical need for ongoing cybersecurity education, particularly targeting younger populations, to bridge the gap between theoretical awareness and practical implementation of secure online practices. This study prompts further investigation into diverse cultural contexts, proposing a shared model for technological education across European societies to foster secure behaviours in the digital landscape
 
REFERENCES (48)
1.
Adamczyk M., Karpiuk M., Soler U., The use of new technologies in education – opportunities, risks and challenges in the times of intensive intercultural change, „Edukacja Międzykulturowa” 2023, no. 4.
 
2.
Angwin J., Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance, New York 2014.
 
3.
Bencsik A., Karpiuk M., Cybersecurity in Hungary and Poland. Military aspects, „Cybersecurity and Law” 2023, no. 1.
 
4.
Bencsik A., Karpiuk M., The legal status of the cyberarmy in Hungary and Poland. An overview, „Cybersecurity and Law” 2023, no. 2.
 
5.
Boyd D., It’s Complicated: The Social Lives of Networked Teens, Yale 2014.
 
6.
Chałubińska-Jentkiewicz K., Cyberodpowiedzialność. Wstęp do prawa cyberbezpieczeństwa, Toruń 2023.
 
7.
Czuryk M., Cybersecurity as a premise to introduce a state of exception, „Cybersecurity and Law” 2021, no. 2.
 
8.
Czuryk M., Restrictions on the Exercising of Human and Civil Rights and Freedoms Due to Cybersecurity Issues, „Studia Iuridica Lublinensia” 2022, no. 3.
 
9.
Czuryk M., Supporting the development of telecommunications services and networks through local and regional government bodies, and cybersecurity, „Cybersecurity and Law” 2019, no. 2.
 
10.
Ejdys J., Soler U., The society’s attitude toward 5G technologies – a case study of Poland, „Technological and Economic Development of Economy” 2023, vol. 29, no. 5.
 
11.
Ferguson N., Schneier B., Kohno T., Cryptography Engineering, 2010.
 
12.
General Data Protection Regulation, https://uodo.gov.pl/404 [access: 28.12.2023].
 
13.
Hoffman I., Karpiuk M., The local self-government’s place in the cybersecurity domain. Examples of Poland and Hungary, „Cybersecurity and Law” 2021, no. 1.
 
14.
Karpiuk M., Crisis management vs cyber threats, „Sicurezza, Terrorismo e Societa” 2022, no. 2.
 
15.
Karpiuk M., Cybersecurity as an element in the planning activities of public administration, „Cybersecurity and Law” 2021, no. 1.
 
16.
Karpiuk M., Tasks of the Minister of National Defence in the area of cybersecurity, „Cybersecurity and Law” 2022, no. 1.
 
17.
Karpiuk M., The Local Government’s Position in the Polish Cybersecurity System, „Lex Localis – Journal of Local Self-Government” 2021, no. 3.
 
18.
Karpiuk M., The obligations of public entities within the national cybersecurity system, „Cybersecurity and Law” 2020, no. 2.
 
19.
Karpiuk M., A. Makuch, Soler U., The role of the Cybersecurity Strategy of the Republic of Poland in ensuring cybersecurity, „Polish Political Science Yearbook” 2023, vol. 52, no. 3.
 
20.
Melchior C., Gli anziani e lo scarso utilizzo (e desiderio) di tecnologia digitale, „Salute e Società” 2023, vol. 1, no. 3.
 
21.
Melchior C. Elderly People and the Barriers to Digital Education, „Italian Journal of Sociology of Education” 2023, vol. 15, no. 2.
 
22.
Melchior C., News and climate change: Opinions, degree of information and awareness of Italian university students [in:] Communities, technology and this moment, eds. L. Stillman, M. Anwar, C. Rhinesmith, Melbourn 2021.
 
23.
Mitnick K., The Art of Deception: Controlling the Human Element of Security, New Yersey 2002.
 
24.
Mitnick K., Simon W. L., Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker, Boston 2011.
 
25.
Mitnick K., Simon W. L., The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders, and Deceivers, New Jersey 2005.
 
26.
Mitnick K., Vamosi R., The Art of Invisibility, Boston 2017.
 
27.
Network and Information Security Directive, https://www.enisa.europa.eu/to... [access: 28.12.2023].
 
28.
Network and Information Security Directive 2, https://eur-lex.europa.eu/eli/... [access: 28.12.2023].
 
29.
Noble S., Algorithms of oppression: how search engines reinforce racism, New York 2018.
 
30.
Snowden E., Permanent Record, Macmillan, New York 2019.
 
31.
Schneier B., Applied Cryptography, New Jersey 1996.
 
32.
Schneier B., Beyond Fear: Thinking Sensibly about Security in an Uncertain World, New York 2003.
 
33.
Schneier B., E-Mail Security, New Jersey 1995.
 
34.
Schneier B., Liars and Outliers: Enabling the Trust that Society Needs to Thrive, New Jersey 2012.
 
35.
Schneier B., Protect Your Macintosh, Berkley 1994.
 
36.
Schneier B., Secrets and Lies, New Jersey 2000.
 
37.
Schneier B., Schneier on Security, New Jersey 2008.
 
38.
Schneier B., Banisar D., The Electronic Privacy Papers, New Jersey 1997.
 
39.
Schneier B., Kelsey J., Whiting D., Wagner D., Hall C., Ferguson N., The Twofish Encryption Algorithm, New Jersey 1996.
 
40.
Soler U., Social perception of 5G technology, „Rocznik Instytutu Europy Środkowej” 2022, R. 20, z. 1.
 
41.
Soler U., Technologia jako narzędzie wzmacniania więzi społecznych, „Zeszyty Naukowe Politechniki Śląskiej”. Ser. „Organizacja i Zarządzanie” 2028, t. 113.
 
42.
Soler U., The Role of Network Technologies in European Cybersecurity [in:] The Role of Cybersecurity in the Public Sphere – The European Dimension, eds. K. Chałubińska-Jentkiewicz, I. Hoffman, Maribor 2022.
 
43.
Soler U., Busiło M., Oswajanie z technologią. Na przykładzie elektryfikacji Wielkiej Brytanii i technologii 5G, „Przegląd Elektrotechniczny” 2019, R. 95, nr 12.
 
44.
Soler U., Busiło M., Education of society as a tool to counteract disinformation in implementing new technologies. On the example of 5G mobile telecommunications network and Warsaw sewage system [in:] Proceedings of the International Conference „Applications of Electromagnetics in Modern Engineering and Medicine” June 9–12, 2019, Janów Podlaski, Poland, New York 2019.
 
45.
Solve D., Nothing to Hide: The False Tradeoff Between Privacy and Security, Yale 2011.
 
46.
The Privacy Issue. Decoding the Privacy Paradox, 2021, https://theprivacyissue.com/pr... [access: 28.12.2023].
 
47.
Tufekci Z., Twitter and tear gas: the power and fragility of networked protest, New Haven 2017.
 
48.
Zuboff S., The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power, New York 2019.
 
ISSN:2658-1493
Journals System - logo
Scroll to top