Search In this Thesis
   Search In this Thesis  
العنوان
مجتمع المخاطر وأثره على الأمن المعلوماتي للشباب الجامعى :
المؤلف
زيدان، شروق محمد صلاح حامد.
هيئة الاعداد
باحث / شروق محمد صلاح حامد زيدان
مشرف / دينا السعيد أبوالعلا
مناقش / نجلاء محمد عاطف
مناقش / سهير صفوت عبدالجيد
الموضوع
طلبة الجامعات - أحوال اجتماعية. الإنترنت والشباب - جوانب اجتماعية.
تاريخ النشر
2022.
عدد الصفحات
مصدر الكترونى (229 صفحة).
اللغة
العربية
الدرجة
الدكتوراه
التخصص
علم الاجتماع والعلوم السياسية
تاريخ الإجازة
1/1/2022
مكان الإجازة
جامعة المنصورة - كلية الآداب - قسم علم الاجتماع
الفهرس
يوجد فقط 14 صفحة متاحة للعرض العام

from 229

from 229

المستخلص

With the spread of digital systems and devices in our current era, When computers began to contain important information, Concern began to maintain the security and protection of this information. The ongoing conflict between protection systems, technologies and mechanisms on the one hand; hackers, attackers, threats and dangers on the other hand; Which makes information security an endless process and does not stop to a certain extent in light of the risk community, Recent risks have emerged, including risks of breach and equipment failure; Risks of unprotected system, data misuse, data loss, application software errors, And the risks of privacy and electronic attack, as there are many and varied risks and threats of information security to university youth, The problem of the study can be summarized in the lack of sufficient knowledge among university youth on the means and tools to prevent and discover the various methods of electronic fraud related to information security and the necessary procedures to correct security gaps.The study aims to:The study aims to try to answer the main question: What are the risks that threaten the information and data of university youth users of modern communication technology? A set of the following sub-questions emerge from it:1-What is the most hacked data among university youth?2-What are the types of information threats that university youth are exposed to?3-What are the most hacked web sites?4-What are the most important mechanisms that can be obtained to protect the information security of university youth from hacking?Methodological procedures for the study:-Method used:In her study, the researcher used the social survey method using a sample of university youth at the Faculty of Arts at Damietta University, and a sample of engineers specialized in information and communication security.-Fields of study:A- Geographical area:The study community, Damietta University, had theoretical and practical faculties (science - engineering - computers and information - literature - law – commerce).-Syndicate of Engineers in Damietta.b- The human domain -Students from Damietta University, theoretical and practical faculties, and a random sample was taken, and they are approximately (425 individuals).-A deliberate sample of experts, engineers specialized in information and communication security, and their number is (30) was chosen.4-Study tools:In her study, the researcher relied on a questionnaire applied to university youth; And an interview guide with expert engineers specializing in information and communications security. 5-The study resulted in several results, the most important of which are:-She indicated with the highest percentage that the vast majority of the study sample used a smart phone while browsing the Internet.-There are statistically significant differences in the opinions of university youth about their knowledge of the concept of information security. More than half of the sample size indicated that their knowledge of the concept of information security is intended to protect the programs that run or on which the information system itself is based.- The highest percentage of the study sample indicated that electronic harassment, defamation and defamation are among the most common information crimes they encounter while browsing the Internet.-The results of the field study of the opinions of the study sample showed that one of the most important threats to information security is the rapid development of electronic fraud methods.-It came in high rates that one of the most informational threats they face is a request for a fee in exchange for providing information (ransom program), and the opinions of more than half of the sample size of university youth indicated that mobile security threats and security holes in smartphones are among the strongest information security threats.-The study found that the university youth under study is not aware and sufficiently aware of ways to protect information security.-The study concluded that the study sample did not have sufficient knowledge of social engineering attacks as one of the threats to information security.-The study recommends the necessity of concerted efforts and cooperation with the University’s Youth Welfare Department in coordination with experts and specialists in information security and the establishment of awareness programs within the university about the importance and culture of information security.-The study revealed the need for integration between the university and experts specialized in information security to achieve information security for university youth by joining educational meetings and conducting open discussion sessions within the university between young people and specialized experts on methods of information protection and problems facing young people, from the views of university youth.-The study revealed the need for comprehensive educational content on information security to be taught in all college teams.-The study recommends the necessity of emphasizing the use of two-step verification to be more secure for university youth.-The study indicated the need to refer to specialists and experts in information security, when a problem with their information security occurs, not to succumb to the blackmailer, and to resort to Internet investigations to take the necessary measures towards the situation.