Warning: Declaration of Jetpack_IXR_Client::query() should be compatible with IXR_Client::query(...$args) in /hermes/bosnacweb06/bosnacweb06ar/b2421/ipg.danielboniface201579429/cedtechjournals/wp-content/plugins/jetpack/vendor/automattic/jetpack-connection/legacy/class-jetpack-ixr-client.php on line 54

Warning: Cannot modify header information - headers already sent by (output started at /hermes/bosnacweb06/bosnacweb06ar/b2421/ipg.danielboniface201579429/cedtechjournals/wp-content/plugins/jetpack/vendor/automattic/jetpack-connection/legacy/class-jetpack-ixr-client.php:122) in /hermes/bosnacweb06/bosnacweb06ar/b2421/ipg.danielboniface201579429/cedtechjournals/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /hermes/bosnacweb06/bosnacweb06ar/b2421/ipg.danielboniface201579429/cedtechjournals/wp-content/plugins/jetpack/vendor/automattic/jetpack-connection/legacy/class-jetpack-ixr-client.php:122) in /hermes/bosnacweb06/bosnacweb06ar/b2421/ipg.danielboniface201579429/cedtechjournals/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /hermes/bosnacweb06/bosnacweb06ar/b2421/ipg.danielboniface201579429/cedtechjournals/wp-content/plugins/jetpack/vendor/automattic/jetpack-connection/legacy/class-jetpack-ixr-client.php:122) in /hermes/bosnacweb06/bosnacweb06ar/b2421/ipg.danielboniface201579429/cedtechjournals/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /hermes/bosnacweb06/bosnacweb06ar/b2421/ipg.danielboniface201579429/cedtechjournals/wp-content/plugins/jetpack/vendor/automattic/jetpack-connection/legacy/class-jetpack-ixr-client.php:122) in /hermes/bosnacweb06/bosnacweb06ar/b2421/ipg.danielboniface201579429/cedtechjournals/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /hermes/bosnacweb06/bosnacweb06ar/b2421/ipg.danielboniface201579429/cedtechjournals/wp-content/plugins/jetpack/vendor/automattic/jetpack-connection/legacy/class-jetpack-ixr-client.php:122) in /hermes/bosnacweb06/bosnacweb06ar/b2421/ipg.danielboniface201579429/cedtechjournals/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /hermes/bosnacweb06/bosnacweb06ar/b2421/ipg.danielboniface201579429/cedtechjournals/wp-content/plugins/jetpack/vendor/automattic/jetpack-connection/legacy/class-jetpack-ixr-client.php:122) in /hermes/bosnacweb06/bosnacweb06ar/b2421/ipg.danielboniface201579429/cedtechjournals/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /hermes/bosnacweb06/bosnacweb06ar/b2421/ipg.danielboniface201579429/cedtechjournals/wp-content/plugins/jetpack/vendor/automattic/jetpack-connection/legacy/class-jetpack-ixr-client.php:122) in /hermes/bosnacweb06/bosnacweb06ar/b2421/ipg.danielboniface201579429/cedtechjournals/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /hermes/bosnacweb06/bosnacweb06ar/b2421/ipg.danielboniface201579429/cedtechjournals/wp-content/plugins/jetpack/vendor/automattic/jetpack-connection/legacy/class-jetpack-ixr-client.php:122) in /hermes/bosnacweb06/bosnacweb06ar/b2421/ipg.danielboniface201579429/cedtechjournals/wp-includes/rest-api/class-wp-rest-server.php on line 1893
{"id":2301,"date":"2024-11-18T12:55:35","date_gmt":"2024-11-18T12:55:35","guid":{"rendered":"https:\/\/cedtechjournals.org\/?p=2301"},"modified":"2024-11-18T12:55:38","modified_gmt":"2024-11-18T12:55:38","slug":"he-role-of-cyber-security-policies-in-promoting-safe-online-behaviour-among-students-of-nigerian-tertiary-institutions-a-north-eastern-states-perspective","status":"publish","type":"post","link":"https:\/\/cedtechjournals.org\/2024\/11\/18\/he-role-of-cyber-security-policies-in-promoting-safe-online-behaviour-among-students-of-nigerian-tertiary-institutions-a-north-eastern-states-perspective\/","title":{"rendered":"HE ROLE OF CYBER SECURITY POLICIES IN PROMOTING SAFE ONLINE BEHAVIOUR AMONG STUDENTS OF NIGERIAN TERTIARY INSTITUTIONS: A NORTH-EASTERN STATES PERSPECTIVE."},"content":{"rendered":"\n

Abubakar Salisu1<\/sup>; Anas Yunusa Adamu 2<\/sup> \u00a0and Bashir Tirmizi Yusuf 3<\/sup><\/strong><\/p>\n\n\n\n

ABSTRACT<\/strong><\/p>\n\n\n\n

This study assessed the impact of cybersecurity policies on students’ online behavior in tertiary institutions in northeastern Nigeria. Descriptive and Inferential statistics approach was employed, utilizing both surveys and interviews with a sample of 400 students. The research aimed to investigate the relationship between policy implementation and safe online practices among these students. The results indicated a statistically significant positive influence of cybersecurity policies on students’ online activities, with key performance indicators showing improved online safety behavior. However, the study also identified several challenges that hinder full compliance with these policies. It is recommended that policies be enhanced, and targeted training programs introduced, to increase overall adherence and foster greater cybersecurity awareness and safety.<\/p>\n\n\n\n

Keywords<\/strong>: Cybersecurity Policies, Online Behavior, Tertiary Institutions, Online Safety, Compliance.<\/em><\/p>\n\n\n\n

Full Article pdf<\/a>Download<\/a><\/div>\n\n\n\n

<\/p>\n","protected":false},"excerpt":{"rendered":"

Abubakar Salisu1; Anas Yunusa Adamu 2 \u00a0and Bashir Tirmizi Yusuf 3 ABSTRACT This study assessed the impact of cybersecurity policies on students’ online behavior in tertiary institutions in northeastern Nigeria. Descriptive and Inferential statistics approach was employed, utilizing both surveys and interviews with a sample of 400 students. The researchRead More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[225],"tags":[],"class_list":["post-2301","post","type-post","status-publish","format-standard","hentry","category-international-journal-of-natural-applied-science-vol-5-no-3-2024"],"jetpack_featured_media_url":"","yoast_head":"\nHE ROLE OF CYBER SECURITY POLICIES IN PROMOTING SAFE ONLINE BEHAVIOUR AMONG STUDENTS OF NIGERIAN TERTIARY INSTITUTIONS: A NORTH-EASTERN STATES PERSPECTIVE. - Centre for Educational Development and Technology<\/title>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"HE ROLE OF CYBER SECURITY POLICIES IN PROMOTING SAFE ONLINE BEHAVIOUR AMONG STUDENTS OF NIGERIAN TERTIARY INSTITUTIONS: A NORTH-EASTERN STATES PERSPECTIVE. - Centre for Educational Development and Technology\" \/>\n<meta property=\"og:description\" content=\"Abubakar Salisu1; Anas Yunusa Adamu 2 \u00a0and Bashir Tirmizi Yusuf 3 ABSTRACT This study assessed the impact of cybersecurity policies on students’ online behavior in tertiary institutions in northeastern Nigeria. Descriptive and Inferential statistics approach was employed, utilizing both surveys and interviews with a sample of 400 students. The researchRead More\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cedtechjournals.org\/2024\/11\/18\/he-role-of-cyber-security-policies-in-promoting-safe-online-behaviour-among-students-of-nigerian-tertiary-institutions-a-north-eastern-states-perspective\/\" \/>\n<meta property=\"og:site_name\" content=\"Centre for Educational Development and Technology\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-18T12:55:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-18T12:55:38+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cedtechjournals.org\/#website\",\"url\":\"https:\/\/cedtechjournals.org\/\",\"name\":\"Centre for Educational Development and Technology\",\"description\":\"Centre for Educational Development and Technology\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/cedtechjournals.org\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cedtechjournals.org\/2024\/11\/18\/he-role-of-cyber-security-policies-in-promoting-safe-online-behaviour-among-students-of-nigerian-tertiary-institutions-a-north-eastern-states-perspective\/#webpage\",\"url\":\"https:\/\/cedtechjournals.org\/2024\/11\/18\/he-role-of-cyber-security-policies-in-promoting-safe-online-behaviour-among-students-of-nigerian-tertiary-institutions-a-north-eastern-states-perspective\/\",\"name\":\"HE ROLE OF CYBER SECURITY POLICIES IN PROMOTING SAFE ONLINE BEHAVIOUR AMONG STUDENTS OF NIGERIAN TERTIARY INSTITUTIONS: A NORTH-EASTERN STATES PERSPECTIVE. - Centre for Educational Development and Technology\",\"isPartOf\":{\"@id\":\"https:\/\/cedtechjournals.org\/#website\"},\"datePublished\":\"2024-11-18T12:55:35+00:00\",\"dateModified\":\"2024-11-18T12:55:38+00:00\",\"author\":{\"@id\":\"https:\/\/cedtechjournals.org\/#\/schema\/person\/14a196f1f24cf523a73ba19d04870082\"},\"breadcrumb\":{\"@id\":\"https:\/\/cedtechjournals.org\/2024\/11\/18\/he-role-of-cyber-security-policies-in-promoting-safe-online-behaviour-among-students-of-nigerian-tertiary-institutions-a-north-eastern-states-perspective\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cedtechjournals.org\/2024\/11\/18\/he-role-of-cyber-security-policies-in-promoting-safe-online-behaviour-among-students-of-nigerian-tertiary-institutions-a-north-eastern-states-perspective\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cedtechjournals.org\/2024\/11\/18\/he-role-of-cyber-security-policies-in-promoting-safe-online-behaviour-among-students-of-nigerian-tertiary-institutions-a-north-eastern-states-perspective\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cedtechjournals.org\/\",\"url\":\"https:\/\/cedtechjournals.org\/\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"position\":2,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cedtechjournals.org\/2024\/11\/18\/he-role-of-cyber-security-policies-in-promoting-safe-online-behaviour-among-students-of-nigerian-tertiary-institutions-a-north-eastern-states-perspective\/\",\"url\":\"https:\/\/cedtechjournals.org\/2024\/11\/18\/he-role-of-cyber-security-policies-in-promoting-safe-online-behaviour-among-students-of-nigerian-tertiary-institutions-a-north-eastern-states-perspective\/\",\"name\":\"HE ROLE OF CYBER SECURITY POLICIES IN PROMOTING SAFE ONLINE BEHAVIOUR AMONG STUDENTS OF NIGERIAN TERTIARY INSTITUTIONS: A NORTH-EASTERN STATES PERSPECTIVE.\"}}]},{\"@type\":[\"Person\"],\"@id\":\"https:\/\/cedtechjournals.org\/#\/schema\/person\/14a196f1f24cf523a73ba19d04870082\",\"name\":\"obed\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/cedtechjournals.org\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5c679829854544462513b9672ae6dd4a?s=96&d=mm&r=g\",\"caption\":\"obed\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/cedtechjournals.org\/wp-json\/wp\/v2\/posts\/2301","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cedtechjournals.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cedtechjournals.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cedtechjournals.org\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cedtechjournals.org\/wp-json\/wp\/v2\/comments?post=2301"}],"version-history":[{"count":1,"href":"https:\/\/cedtechjournals.org\/wp-json\/wp\/v2\/posts\/2301\/revisions"}],"predecessor-version":[{"id":2304,"href":"https:\/\/cedtechjournals.org\/wp-json\/wp\/v2\/posts\/2301\/revisions\/2304"}],"wp:attachment":[{"href":"https:\/\/cedtechjournals.org\/wp-json\/wp\/v2\/media?parent=2301"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cedtechjournals.org\/wp-json\/wp\/v2\/categories?post=2301"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cedtechjournals.org\/wp-json\/wp\/v2\/tags?post=2301"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}