The Level of Computer Teachers’ Awareness of Cybersecurity in Secondary Schools in Jeddah

Document Type : Original Article

Authors

Abstract

Abstract:
The problem of the study: The problem of the study is determined by the following main question: - The level of awareness of cyber security at computer teachers of the secondary stage in Jeddah city
The study population consists of all the computer parameters of the secondary stage in Jeddah for the academic year 1440 H-2019. The number of them (352) is according to the information received from the Jeddah Education Department.
The sample was used to calculate the appropriate sample size for the research. The questionnaire was distributed to the whole community in order to obtain the largest number of responses. 106 were retrieved and two questionnaires were excluded.
Methodology and tools: The researcher used the quantitative approach for the study
Main results:
• The study confirmed the weakness and lack of weakness and weakness of individuals - including computer teachers - in awareness of the concepts of security Sirany.
• The study confirmed the weakness and lack of weakness and weakness of individuals - including computer teachers - in awareness of the level of cybersecurity.
• There were no statistically significant differences between the average responses of the study sample members at the level of significance (00,05) in the degree of awareness of computer teachers in cybersecurity due to the current study variables (years of experience, qualification, training courses).

Keywords


Bulach,T; Osborn, R., & Samara, M., (2012) Bullying in Secondary Schools: What it looks like aiitl How to Manage it?. New York: Sage Publishing.
Connell, N., Schell-Busey, N., Pearce, A., & Negro, P. (2013). Badgrlz? Exploring sex differences in cyberbullying behaviors. Youth Violence and Juvenile Justice, 12 (3), 209.
Debray Stéphane (2013) Internet face aux substances illicite complice de la cybercriminalité ou outil de prevention – DESS media électronique et internet – uinversité de Paris.
Jaana, J; Cornell, D; Sheras, G. (2011). Identification of School Bullies by Survery Methods. Professional School Counseling, 9 ,(4), 305 - 313.
Kotler, James. “A Survey of Sanctions Awarded for E-Discovery Violations.” Proof, Vol. 17, No. (2), American Bar Association, (Winter 2009(.
Kraut, R., Patterson, M., lundmark, V., kiesler, S., Mukophadhyay, T. & scherlis, W. (1998). Internet paradox: A social technology that reduces social involvement and psychological well-being? American Psychologist, 53(9), 1017- 1031.
Lapidot-Lefler, N., & Dolev-Cohen, M. (2015). Comparing cyberbullying and school bullying among school students: prevalence, gender, and grade level differences. Social psychology of education, 18(1), 1-16.‏
Lim, Cher Ping, Yan, Hanbing & Xiong, Xibei. (2015). Development of pre-service teachers’ information and communication technology (ICT) in education competencies in a mainland Chinese university. Educational Media International, 52(1), 15-32.
Lipson, G. (2001). Bullying in schools fighting the bully Battle. Eribaum: National School Safety Center, NJ.
Rossein, Merrick T. Nuts and Bolts of Electronic Evidence. Employment Discrimination Law and Litigation, (November 2010).
Sheikli, Mazen Haitham Razouki. "Firewall Using Genetic Algorithm as Computational Tools." Al - Ma'amoun College Journal: Al - Ma'moun College, University, p. 24 (2014): 217 - 228.
Shepherd, K. & Edelmann, M. (2005) Reasons for internet use and anxiety, Journal of Personality and Individual Differences, 39(5), 949-958.