Một Phương Pháp Cấu Trúc Phương Trình và Mô Hình Quan Điểm Của Giáo Viên Dự Bị Về Giáo Dục An Ninh Mạng
Tóm tắt
Sự phụ thuộc ngày càng tăng vào công nghệ trong thế giới hiện nay đã làm gia tăng nhu cầu về giáo dục an ninh mạng cho tất cả mọi người. Do đó, các sáng kiến liên quan đến việc tích hợp giáo dục an ninh mạng vào cấp học trước đại học đã bắt đầu xuất hiện trong thời gian gần đây. Tuy nhiên, nghiên cứu về quan điểm của giáo viên đang giảng dạy hoặc giáo viên dự bị về hiện tượng này vẫn còn hạn chế. Quan trọng hơn, cần phải hiểu những nhận thức của giáo viên dự bị; vì những nhận thức của họ có thể ảnh hưởng đáng kể đến cách thức mà các giáo viên tương lai phản ứng với các vấn đề an ninh mạng và cũng ảnh hưởng đến hành vi của họ đối với việc học tập và thúc đẩy giáo dục an ninh mạng trong tương lai. Do đó, để có cái nhìn sâu sắc về cách mà các ứng viên gia nhập ngành giáo dục đánh giá an ninh mạng, 451 giáo viên dự bị đã được lấy mẫu tại một trường đại học công lập lớn ở Lesotho. Các giáo viên tiềm năng được tuyển chọn từ nhiều khoa khác nhau trong trường sư phạm đã tham gia một cuộc khảo sát trực tuyến gồm 33 mục, được đo lường từ năm cấu trúc bao gồm nhận thức cá nhân về an ninh mạng, khả năng tự đánh giá trong việc học an ninh mạng, sự liên quan cá nhân của kiến thức an ninh mạng, ý định hành vi đối với việc học an ninh mạng và việc học thực tế về an ninh mạng. Chúng tôi đã phân tích các phản hồi từ cuộc khảo sát bằng cách sử dụng phương pháp mô hình phương trình cấu trúc. Những phát hiện của chúng tôi cho thấy mô hình giả thuyết của chúng tôi chủ yếu được chấp nhận. Kết quả cho thấy rằng các nhà thực hành và nghiên cứu trong lĩnh vực liên quan cần nâng cao ý định hành vi của giáo viên dự bị trong việc học an ninh mạng bằng cách giúp họ nhận ra tầm quan trọng đối với cuộc sống cá nhân và xã hội của họ. Chúng tôi đã thảo luận về các phát hiện của mình liên quan đến mô hình nghiên cứu đã đề xuất và nhấn mạnh ý nghĩa đối với các chương trình đào tạo giáo viên. Cuối cùng, bài báo kết thúc với những hạn chế và xác định chương trình nghiên cứu trong tương lai.
Từ khóa
Tài liệu tham khảo
Abawajy, J. (2014). User preference of cyber security awareness delivery methods. Behaviour & Information Technology, 33(3), 237–248. https://doi.org/10.1080/0144929X.2012.708787
Adıyaman, M., & Sert, H. (2018). An investigation on teacher candidates’ self-efficacy perceptions and attitudes towards computer aided education. Akdeniz Journal of Education, 1(2), 189–216. https://doi.org/10.20448/journal.522.2019.54.531.537
Agamba, J., & Keengwe, J. (2012). Pre-service teachers’ perceptions of information assurance and cyber security. International Journal of Information and Communication Technology Education, 8(2), 94–101. https://doi.org/10.4018/jicte.2012040108
Agudo-Peregrina, Á. F., Hernández-García, Á., & Pascual-Miguel, F. J. (2014). Behavioral intention, use behavior and the acceptance of electronic learning systems: Differences between higher education and lifelong learning. Computers in Human Behavior, 34, 301–314. https://doi.org/10.1016/j.chb.2013.10.035
Ahmad, N., Mokhtar, U. A., Fariza Paizi Fauzi, W., Othman, Z. A., Hakim Yeop, Y., & Huda Sheikh Abdullah, S. N. (2019). Cyber Security Situational Awareness among Parents. Proceedings of the 2018 Cyber Resilience Conference, CRC 2018 7–8. https://doi.org/10.1109/CR.2018.8626830
Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50, 179–211.
Ajzen, I. (2012). The Theory of planned behavior. In Van P. A. M. Lange, A. W. Kruglanski, & E. T. Higgins (Eds.), Handbook of Theories of Social Psychology (438–459)
Akgün, Ö. E., & Topal, M. (2015). Information security awareness of the senior teacher students: Sakarya University sample. Sakarya University Journal of Education, 2(5), 98–121. https://doi.org/10.1016/SUJE.2021.12.040
Amankwa, E. (2021). Relevance of Cybersecurity Education at Pedagogy Levels in Schools. Journal of Information Security, 12(04), 233–249. https://doi.org/10.4236/jis.2021.124013
Amusa, J. O., & Ayanwale, M. A. (2021). Partial Least Square Modeling of Personality Traits and Academic Achievement in Physics. Asian Journal of Assessment in Teaching and Learning, 11(2), 77–92. https://doi.org/10.37134/ajatel.vol11.2.8.2021
Angela, M, Borgert Nele,Friedauer Jennifer,Böse, Imke and Elson, M. (2021). The Study of Cybersecurity Self-Efficacy : A Systematic Literature Review of Methodology. Symposium on Usable Privacy and Security, 1–4. https://www.usenix.org/system/files/soups21-abstract-poster56-borgert.pdf
Ayanwale, M. A., Sanusi, I. T., Adelana, O. P., Aruleba, K. D., & Oyelere, S. S. (2022). Teachers’ readiness and intention to teach artificial intelligence in schools. Computers and Education: Artificial Intelligence, 3, 100099.
Ayanwale, M. A., Mosia, P. A., Molefi, R. R., & Shata, L. (2023). Reliability Components of Online Teaching and Learning Tools in Lesotho Higher Education Institutions : A Systematic Review. Pertanika Journal of Science and Technology, 31(1), 595–614. https://doi.org/10.47836/pjst.31.1.34
Ayanwale, M. A. & Sanusi, I. T. (2023). Perceptions of STEM vs. Non-STEM Teachers toward Teaching Artificial Intelligence. In 2023 IEEE AFRICON Conference. (Accepted). IEEE
Bagozzi, R. P. (1981). Attitudes, intentions, and behavior: A test of some key hypotheses. Journal of Personality and Social Psychology, 41(4), 607. https://doi.org/10.1037/0022-3514.41.4.607
Bodea, C. N., Dascalu, M. I., & Cazacu, M. (2019). Increasing the Effectiveness of the Cybersecurity Teaching and Learning By Applying Activity Theory and Narrative Research. Issues In Information Systems, 20(3), 186–193. https://doi.org/10.48009/3_iis_2019_186-193
Celik, V., & Yesilyurt, E. (2013). Attitudes to technology, perceived computer self-efficacy and computer anxiety as predictors of computer supported education. Computers & Education, 60(1), 148–158. https://doi.org/10.1016/J.COMPEDU.2012.06.008
Chakraborty, S. (2019). Malware attack and Malware Analysis : A Research. International Journal of Scientific Research in Computer Science, 5(3), 268–272. https://doi.org/10.32628/CSEIT195379
Childers, G., Linsky, C. L., Payne, B., Byers, J., & Baker, D. (2022). K-12 Educators’ Self-Confidence in Designing and Implementing Cybersecurity Lessons. Computers and Education Open, 100119.
Chiua, W. Y., & Hob, H. F. (2019). Time to Educate the Educators: An Evaluation of Cyber Security Knowledge Awareness and Implementation for School Teachers in Taiwan. Paper Presented at the International Conference on Technology and Social Science 2019, Kiryu, Japan.
Dawson, K., Antonenko, P., Xu, Z., & Wusylko, C. (2022). Promoting Interdisciplinary Integration of Cybersecurity Knowledge, Skills and Career Awareness in Preservice Teacher Education. Journal of Technology and Teacher Education, 30(2), 275–287. https://www.learntechlib.org/primary/p/221089/.
Erbschloe, M. (2019). Social Engineering : Hacking Systems, Nations, and Societies. CRC Press. CRC Press. https://doi.org/10.1201/9780429322143
Erol, O., Şahin, Y. L., Yılmaz, E., & Haseski, H. İ. (2015). Personal Cyber Security Provision Scale development study Kişisel Siber Güvenliği Sağlama Ölçeği geliştirme çalışması. Journal of Human Sciences, 12(2), 75–91. https://doi.org/10.14687/ijhs.v12i2.3185
Feng, W. C., Liebman, R., Delcambre, L., Lupro, M., Sheard, T., Britell, S., & Recktenwald, G. (2017). {CyberPDX}: A Camp for Broadening Participation in Cybersecurity. In 2017 USENIX Workshop on Advances in Security Education (ASE 17).
Frymier, A. B., & Shulman, G. M. (1995). “What’s in it for me?”: Increasing content relevance to enhance students’ motivation. Communication Education, 44(1), 40–50.
Furnell, S., & Vasileiou, I. (2017). Security education and awareness: Just let them burn? Network Security, 12, 5–9. https://doi.org/10.1016/S1353-4858(17)30122-8
Furnell, S., Bryant, P., & Phippen, A. (2007). Assessing the security perceptions of personal Internet users. Computers & Security, 26(5), 410–417. https://doi.org/10.1016/j.cose.2007.03.001
Group World Bank. (2020). Lesotho Digital Economy Diagnostic (Issue February). www.worldbankgroup.org
Günbatar, M. S., & Bakırcı, H. (2019). STEM teaching intention and computational thinking skills of pre-service teachers. Education and Information Technologies, 24, 1615–1629.
Hair, J. F., Black, W. C., Babin, B. J., & Anderson, R. E. (2010). Multivariate Data Analysis (7th ed.). Pearson.
Hair, J. F., Hult, G. T. M., Ringle, C. M., & Sarstedt, M. (2014). A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM). Sage.
Hair, J. F., Hult, G. T. M., Ringle, C. M., & Sarstedt, M. (2017). A Primer on Partial Least Squares Structural Equation Modeling (PLS‐SEM) (2nd ed.). Sage.
Hair, J. F., Hult, G. T. M., Ringle, C. M., & Sarstedt, M. (2022). A Primer on Partial Least Squares Structural Equation Modeling (PLS‐SEM) (3rd ed.). Sage.
Handeli, K., & Robila, S. (2018). A Cybersecurity High School Curriculum Course. In Society for Information Technology & Teacher Education International Conference (864–869). Association for the Advancement of Computing in Education (AACE).
Haseski, H. İ. (2020). Cyber security skills of pre-service teachers as a factor in computer-assisted education. International Journal of Research in Education and Science, 6(3), 484–500. https://doi.org/10.46328/ijres.v1i1.1006
Henseler, J., Ringle, C. M., & Sarstedt, M. (2015). A new criterion for assessing discriminant validity in variance-based structural equation modeling. J. of the Acad. Mark. Sci., 43, 115–135. https://doi.org/10.1007/s11747-014-0403-8
Jin, G., Tu, M., Kim, T. H., Heffron, J., & White, J. (2018). Game based cybersecurity training for high school students. In Proceedings of the 49th ACM Technical Symposium on Computer Science Education (68–73).
Kabanda, S., Tanner, M., & Kent, C. (2018). Exploring SME cybersecurity practices in developing countries. Journal of Organizational Computing and Electronic Commerce, 28(3), 269–282. https://doi.org/10.1080/10919392.2018.1484598
Kara, İ, & Aydos, M. (2019). The ghost in the system: Technical analysis of remote access trojan. International Journal on Information Technologies & Security, 11(1), 73–84.
Karacı, A., Akyüz, H. İ, & Bilgici, G. (2017). Investigation of cyber security behaviors of university students. Kastamonu Education Journal, 25(6), 2079–2094.
Karagozlu, D. (2020). Determination of cyber security ensuring behaviours of pre-service teachers. Cypriot Journal of Educational Sciences, 15(6), 1698–1706. https://doi.org/10.18844/cjes.v15i6.5327
Kemper, G. (2019). Improving employees’ cyber security awareness. Computer Fraud and Security, 2019(8), 11–14. https://doi.org/10.1016/S1361-3723(19)30085-5
Konak, A. (2018). Experiential learning builds cybersecurity self-efficacy in K-12 students. Journal of Cybersecurity Education, Research and Practice, 1, 6.
Kritzinger, E. (2016). Short-term initiatives for enhancing cyber-safety within South African schools. South African Computer Journal, 28(1), 1–17.
Kritzinger, E., Bada, M., & Nurse, J. R. (2017). A study into the cybersecurity awareness initiatives for school learners in South Africa and the UK. In IFIP World Conference on Information Security Education (pp. 110–120). Springer, Cham.
Lesotho News Agency. (2020). Cyber Crime A Risk To Lesotho. http://www.gov.ls/cyber-crime-a-risk-to-lesotho/
Li, K., Li, Y., & Franklin, T. (2016). Preservice teachers’ intention to adopt technology in their future classrooms. Journal of Educational Computing Research, 54(7), 946–966.
Li, X., Jiang, M. Y. C., Jong, M. S. Y., Zhang, X., & Chai, C. S. (2022). Understanding Medical Students’ Perceptions of and Behavioral Intentions toward Learning Artificial Intelligence: A Survey Study. International Journal of Environmental Research and Public Health, 19(14), 8733. https://doi.org/10.3390/ijerph19148733
London, UK, SageWeerathunga, P. R., Samarathunga, W. H. M. S., Rathnayake, H. N., Agampodi, S. B., Nurunnabi, M., & Madhunimasha, M. M. S. C. (2021). The COVID-19 pandemic and the acceptance of E-learning among university Students: The Role of Precipitating Events. Education Sciences, 11(8), 436. https://doi.org/10.3390/educsci11080436
Loukomies, A., Pnevmatikos, D., Lavonen, J., Spyrtou, A., Byman, R., Kariotoglou, P., & Juuti, K. (2013). Promoting students’ interest and motivation towards science learning: The role of personal needs and motivation orientations. Research in Science Education, 43(6), 2517–2539.
Mack, M. (2018). Cyber security. In UK: ED-Tech Press. https://www.google.com/search?q=Mack%2C+M.+%282018%29.+Cyber+security.+UK%3A+ED-Tech+Press.&sxsrf=ALiCzsa1HaQ0FV62NOyHoN5B9ikEJxN2pw%3A1670511700821&ei=VPyRY9HmMYnLgAbO7YWYBA&ved=0ahUKEwjR4JSEper7AhWJJcAKHc52AUMQ4dUDCA8&uact=5&oq=Mack%2C+M.+%282018%29.+Cy
Ministry of Education and Training. (2009). Curriculum and assessment policy framework: Education for individual and social development. June, 1–34.
Mosola, N. N., Moeketsi, K. F., Sehobai, R., & Pule, N. (2019). Cybersecurity Protection Structures: The Case of Lesotho. International Journal of Computer and Information Engineering, 13(3), 158–163.
Mourning, C., Juedes, D., Hallman-Thrasher, A., Chenji, H., Kaya, S., & Karanth, A. (2022). Reflections of Cybersecurity Workshop for K-12 Teachers and High School Students. In Proceedings of the 53rd ACM Technical Symposium on Computer Science Education 2 1127–1127).
Mourning, C. Chenji, H., Hallman-Thrasher, A., Kaya, S., Abukamail, N., Juedes, D. and Karanth, A. (2023). Reflections of Cybersecurity Workshop for K-12 Teachers. In Proceedings of the 54th ACM Technical Symposium on Computer Science Education V. 1 (Accepted).
Moyo, M., Sadeck, O., Tunjera, N., & Chigona, A. (2022). Investigating Cyber Security Awareness Among Preservice Teachers During the COVID-19 Pandemic. Lecture Notes in Business Information Processing, 437 LNBIP, 527–550. https://doi.org/10.1007/978-3-030-95947-0_38
Moyo, H. (2022). Lesotho’s cyber law not well thought-out, potentially violates human rights: Analysts. Lesotho Times. https://lestimes.com/lesothos-cyber-law-not-well-thought-out-potentially-violates-human-rights-analysts/.
Nelson B. (2022). Top Security Threats of Smartphones (2022). Retrieved on 03.01.2022 from https://www.rd.com/article/mobile-security-threats/
Neumann, L. (2017). Human factor in IT security. In F. Abolhassan (Ed.), Cyber security. Simply. Make it happen. Leveraging digitalization through IT security. Switzerland: Springer, 75–86.
Pencheva, D., Hallett, J., & Rashid, A. (2020). Bringing cyber to school: Integrating cybersecurity into secondary school education. IEEE Security & Privacy, 18(2), 68–74. https://doi.org/10.1109/MSEC.2020.2969409
Prasad, R., & Rohokale, V. (2020). Cyber Security: The Lifeline of Information and Communication Technology. In Switzerland: Springer. https://link.springer.com/content/pdf/10.1007/978-3-030-31703-4.pdf%0Ahttp://link.springer.com/10.1007/978-3-030-31703-4.
Prem, S. P., & Reddy, B. I. (2019). Phishing and anti-phishing techniques. International Research Journal of Engineering and Technology, 6(7), 1446–1452.
Pusey, P., & Sadera, W. A. (2011). Cyberethics, cybersafety, and cybersecurity: Preservice teacher knowledge, preparedness, and the need for teacher education to make a difference. Journal of Digital Learning in Teacher Education, 28(2), 82–85. https://doi.org/10.1080/21532974.2011.10784684
Pye, K. (2016). Teaching cybersecurity in K-12 schools. A Capstone Project Submitted to the Faculty of Utica College.
Rahman, N. A. A., Sairi, I. H., Zizi, N. A. M., & Khalid, F. (2020). The importance of cybersecurity education in school. International Journal of Information and Education Technology, 10(5), 378–382. https://doi.org/10.18178/ijiet.2020.10.5.1393
Sanusi, I. T., & Olaleye, S. A. (2022). An insight into cultural competence and ethics in K-12 artificial intelligence education. In 2022 IEEE global engineering education conference (EDUCON) (pp. 790–794). IEEE.
Sanusi, I. T., Olaleye, S. A., Agbo, F. J., & Jatileni, C. N. (2021). Global Readiness for Immersive Virtual Space Adoption: The Case of Ohyay. In 2021 XVI Latin American Conference on Learning Technologies (LACLO) (pp. 244–251). IEEE.
Schreiber, J. B., Nora, A., Stage, F. K., Barlow, E. A., & King, J. (2006). Reporting structural equation modeling and confirmatory factor analysis results: A review. The Journal of Educational Research, 99(6), 323–338. https://doi.org/10.3200/JOER.99.6.323-338
Schwarzer, R., Schmitz, G. S., & Daytner, G.T. (1999). The Teacher self-efficacy scale. Retrieved from http://userpage.fu-berlin.de/~health/teacher_se.htm
Serianu. (2018). Africa Cyber Security Report - Lesotho Cyber Security Skills Gap. https://www.serianu.com/downloads/LesothoCyberSecurityReport2018.pdf
Subramaniam, S. R. (2017). Cyber security awareness among Malaysian pre-university students. Proceeding of the 6th Global Summit on Education, 1–14.
Suwarna Rami Subramaniam. (2018). Cyber Security Awareness Among Malaysian Pre-University Students | Request PDF. Paper Presented at the 6th Global Summit on Education, Kuala Lumpur, Malaysia. https://www.researchgate.net/publication/323382802_cyber_security_awareness_among_malaysian_pre-university_students
The Economic Times (2022). 4 in 10 smartphones are vulnerable to cyber attacks. Here's how to protect your device. Retrieved on 03.01.2023 from https://economictimes.indiatimes.com/magazines/panache/can-your-mobile-phone-get-a-virus-yes-and-youll-have-to-look-carefully-to-see-the-signs/articleshow/91314693.cms?from=mdr
Tseng, S. S., Yang, T. Y., Shih, W. C., & Shan, B. Y. (2022). Building a self-evolving iMonsters board game for cyber-security education. Interactive Learning Environments, 1–19. https://doi.org/10.1080/10494820.2022.2120015
Ustundag, M. T., Guneş, E., & Bahcivan, E. (2017). Turkish adaptation of digital literacy scale and investigating pre-service science teachers’ digital literacy. Journal of Education and Future, 12, 19–29.
van Schaik, P., Jeske, D., Onibokun, J., Coventry, L., Jansen, J., & Kusev, P. (2017). Risk perceptions of cyber-security and precautionary behaviour. Computers in Human Behavior, 75, 547–559. https://doi.org/10.1016/j.chb.2017.05.038
Vennix, J., Den Brok, P., & Taconis, R. (2017). Perceptions of STEM-based outreach learning activities in secondary education. Learning Environments Research, 20(1), 21–46.
Vennix, J., den Brok, P., & Taconis, R. (2022). Motivation style of K–12 students attending outreach activities in the STEM field: a person-based approach. Learning Environments Research, 1–15.
Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. Computers & Security, 33, 97–102.
Walters, R., Trakman, L., & Zeller, B. (2019). Data Protection Law A Comparative Analysis of Asia Pacific and European Approaches. Springer. https://doi.org/10.2139/ssrn.3463731
Weerathunga, P. R., Samarathunga, W. H. M. S., Rathnayake, H. N., Agampodi, S. B., Nurunnabi, M., & Madhunimasha, M. M. S. C. (2021). The COVID-19 pandemic and the acceptance of e-learning among university students: The role of precipitating events. Education Sciences, 11(8), 436.
Wirtz, J. J. (2017). The Cyber Pearl Harbor. Intelligence and National Security, 32(6), 758–767. https://doi.org/10.1080/02684527.2017.1294379
World Economic Forum (2020). Unchecked cyberattacks ‘are growing threat to fragile global economy’. Retrieved from https://www.weforum.org/press/2023/01/unchecked-cyberattacks-are-growing-threat-to-fragile-global-economy/. Accessed 15 May 2023
Yan, Z., Xue, Y., & Lou, Y. (2021). Risk and protective factors for intuitive and rational judgment of cybersecurity risks in a large sample of K-12 students and teachers. Computers in Human Behavior, 121, 106791.
Yeşilyurt, E., Ulaş, A. H., & Akan, D. (2016). Teacher self-efficacy, academic self-efficacy, and computer self-efficacy as predictors of attitude toward applying computer-supported education. Computers in Human Behavior, 64, 591–601. https://doi.org/10.1016/j.chb.2016.07.038
Yett, B., Hutchins, N., Stein, G., Zare, H., Snyder, C., Biswas, G., ... & Lédeczi, Á. (2020). A hands-on cybersecurity curriculum using a robotics platform. In Proceedings of the 51st ACM Technical Symposium on Computer Science Education (1040–1046).
Yigilt, M. F., & Seferoğlu, S. S. (2019). Öğrencilerin Siber Güvenlik Davranışlarının Beş Faktör Kişilik Özellikleri ve Çeşitli Diger Değişkenlere Göre Investigating Students ’ Cyber Security Behaviors in Relation to Big Five Personality Traits and Other Various Variables. Mersin University Journal of the Faculty of Education, 15(1), 186–215.
Zucule de Barros, M. J., & Lazarek, H. (2018). A cyber safety model for schools in Mozambique. ICISSP 2018 - Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018-Janua, 251–258. https://doi.org/10.5220/0006573802510258