{"id":3671,"date":"2024-02-28T11:29:27","date_gmt":"2024-02-28T05:59:27","guid":{"rendered":"https:\/\/journal.ipem.edu.in\/computer_applications\/?page_id=3671"},"modified":"2024-03-30T14:11:03","modified_gmt":"2024-03-30T08:41:03","slug":"assessing-cyber-security-awareness-and-preparedness-a-survey-study","status":"publish","type":"page","link":"https:\/\/journal.ipem.edu.in\/computer_applications\/assessing-cyber-security-awareness-and-preparedness-a-survey-study\/","title":{"rendered":"Assessing Cyber Security Awareness And Preparedness: A Survey Study"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"3671\" class=\"elementor elementor-3671\">\n\t\t\t\t\t\t<div class=\"elementor-inner\">\n\t\t\t\t<div class=\"elementor-section-wrap\">\n\t\t\t\t\t\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-3b3d6bf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3b3d6bf\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d724340\" data-id=\"d724340\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c722ad7 elementor-widget elementor-widget-heading\" data-id=\"c722ad7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Assessing Cyber Security Awareness And Preparedness: A Survey Study<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-12c9a41 elementor-widget elementor-widget-html\" data-id=\"12c9a41\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<a class=\"author\" href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/assessing-cyber-security-awareness-and-preparedness-a-survey-study\/#author\"> <em> Sivaguru R<\/em><\/a>,\r\n   <a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/assessing-cyber-security-awareness-and-preparedness-a-survey-study\/#author\"> <em> Malarvizhi P<\/em><\/a>,\r\n    <a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/assessing-cyber-security-awareness-and-preparedness-a-survey-study\/#author\"> <em> Saranya R<\/em><\/a>,\r\n<a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/assessing-cyber-security-awareness-and-preparedness-a-survey-study\/#author\"> <em> Babu G<\/em><\/a>,\r\n<a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/assessing-cyber-security-awareness-and-preparedness-a-survey-study\/#author\"> <em> Saranya K <\/em><\/a>\t\r\n\r\n\r\n\r\n\r\n\r\n                                        <p class=\"Issue\"><a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/assessing-cyber-security-awareness-and-preparedness-a-survey-study\/\">Vol 8 ,  Issue 1 , December 2023<\/a><span class=\"pipe\"> | <\/span>Pages: 20-26\r\n                                        <\/p>\r\n                                        \r\n            <p class=\"doi\">DOI: <a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/assessing-cyber-security-awareness-and-preparedness-a-survey-study\/\">10.61691\/IPEM_CA.8.2023.20-26<\/a><\/p>\r\n\r\n                                        <p class=\"Published\"><span class=\"articledate\">Published Online: December, 2023<\/span><\/p>\r\n                                <p class=\"Download\">        <a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/wp-content\/uploads\/2024\/03\/P_4.pdf\" target=\"_blank\">Download Article<\/a><\/p>\r\n                    \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1eb397b elementor-widget elementor-widget-eael-adv-tabs\" data-id=\"1eb397b\" data-element_type=\"widget\" data-widget_type=\"eael-adv-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t        <div data-scroll-on-click=\"no\" data-scroll-speed=\"300\" id=\"eael-advance-tabs-1eb397b\" class=\"eael-advance-tabs eael-tabs-horizontal eael-tab-auto-active  active-caret-on\" data-tabid=\"1eb397b\">\n            <div class=\"eael-tabs-nav\">\n                <ul class=\"\" role=\"tablist\">\n                                            <li id=\"author\" class=\"inactive eael-tab-item-trigger eael-tab-nav-item\" aria-selected=\"true\" data-tab=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"author-tab\" aria-expanded=\"false\">\n                            \n                            \n                            \n                                                            <span class=\"eael-tab-title title-after-icon\" >Author Affiliations<\/span>                                                    <\/li>\n                                            <li id=\"abstract\" class=\"inactive eael-tab-item-trigger eael-tab-nav-item\" aria-selected=\"false\" data-tab=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"abstract-tab\" aria-expanded=\"false\">\n                            \n                            \n                            \n                                                            <span class=\"eael-tab-title title-after-icon\" >Abstract<\/span>                                                    <\/li>\n                                            <li id=\"references\" class=\"inactive eael-tab-item-trigger eael-tab-nav-item\" aria-selected=\"false\" data-tab=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"references-tab\" aria-expanded=\"false\">\n                            \n                            \n                            \n                                                            <span class=\"eael-tab-title title-after-icon\" >References<\/span>                                                    <\/li>\n                                            <li id=\"citation\" class=\"inactive eael-tab-item-trigger eael-tab-nav-item\" aria-selected=\"false\" data-tab=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"citation-tab\" aria-expanded=\"false\">\n                            \n                            \n                            \n                                                            <span class=\"eael-tab-title title-after-icon\" >Citation<\/span>                                                    <\/li>\n                                    <\/ul>\n            <\/div>\n            \n            <div class=\"eael-tabs-content\">\n\t\t        \n                    <div id=\"author-tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"author-tab\">\n\t\t\t\t        <p class=\"Author-bg\"><b>Author Details<\/b><\/p>\n\n<div class=\"card-body table-responsive\">\n<div class=\"autinfo\"><b class=\"sn\">\n1. <\/b>Sivaguru R, <em>Assistant Professor, Department of Computer Science and Engineering, Knowledge Institute of Technology, Salem<\/em><\/div>\n<div class=\"autinfo\"><b class=\"sn\">\n2. <\/b>Malarvizhi P, <em>Assistant Professor, Department of Computer Science and Engineering, Knowledge Institute of Technology, Salem<\/em><\/div>\n<div class=\"autinfo\"><b class=\"sn\">\n3. <\/b>Saranya R, <em>Assistant Professor, Department of Computer Science and Engineering, Knowledge Institute of Technology, Salem<\/em><\/div>\n<div class=\"autinfo\"><b class=\"sn\">\n4. <\/b>Babu G, <em>Assistant Professor, Department of Computer Science and Engineering, Knowledge Institute of Technology, Salem<\/em><\/div>\n<div class=\"autinfo\"><b class=\"sn\">\n5. <\/b>Saranya K, <em>Assistant Professor, Department of Computer Science and Engineering, Knowledge Institute of Technology, Salem<\/em><\/div>\n<\/div>                    <\/div>\n\t\t        \n                    <div id=\"abstract-tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"abstract-tab\">\n\t\t\t\t        <p style=\"text-align: justify;\">The rapid growth of technology and the increasing reliance on digital systems have highlighted the need for effective cyber security measures. This survey study aims to assess the level of cyber security awareness and preparedness among individuals and organizations. By collecting data through a survey questionnaire, this study seeks to identify gaps in knowledge, identify common vulnerabilities, and understand the current practices in place to mitigate cyber threats. The findings of this study will provide insights into the effectiveness of existing cyber security awareness programs and inform strategies for enhancing cyber security education and preparedness. <\/p>\n<p class=\"keywords\">Keywords<\/p>\ncyber security awareness, cyber security preparedness, survey study, gaps in knowledge, common vulnerabilities, current practices, cyber threats                    <\/div>\n\t\t        \n                    <div id=\"references-tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"references-tab\">\n\t\t\t\t        <ol><li><em>Jitendra Jain et al, International Journal of Advanced Research in Computer Science, 8 (3), March-April 2017, 791-793 <\/em><\/li><li><em>International Journal of Computer Applications (0975 \u2013 8887) Volume 111 \u2013 No 7, February 2015 <\/em><\/li><li><em>Recent Trends in Programming Languages ISSN: 2455-1821 (Online) Volume 4, Issue 2 www.stmjournals.com <\/em><\/li><li><em>\u00a9 The Author(s). 2018 Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License <\/em><\/li><li><em>Cabaj et al. EURASIP Journal on Information Security (2018) 2018:10 <\/em><\/li><li><em>https:\/\/doi.org\/10.1186\/s13635-018-0080 <\/em><\/li><li><em> Bhutada and P. Bhutada, Application of Artificial <\/em><\/li><li><em>Intelligence in Cyber Security: in IJERCSE, 2018, 5(4): 214-219 <\/em><\/li><li><em>V. Alberto, lecture, Topic: Application of Artificial Intelligence (AI) to Network Security\u2016, ITEC 625, University of Maryland, University College, Maryland, Mar. 2018. <\/em><\/li><li><em>Avira, The Application of AI to Cybersecurity \u2013 An Avira White Paper, Germany, Avira Operation, 2017. <\/em><\/li><li><em> A Panimalar, U.G. Pai and K.S. Khan, \u2015AI Techniques for Cyber Security\u2016, International Research Journal of Engineering and Technology, vol. 5, 3, pp. 122-124, Mar. 2018. Available: https:\/\/www.irjet.net [assessed May. 29, 2020] <\/em><\/li><li><em>S. Tuang. Diep.Q. B, and Zelinka. I, Artificial Intelligence in the Cyber Domain: Offense and Defense: Symmetry, 2020, 12,410 available: www.mdp.com\/journal\/symmetry on [assessed Apr. 20, 2020] <\/em><\/li><li><em> Kanal, Machine Learning in Cybersecurity: Carnegie Mellon University Software Engineering Institute, available <\/em><\/li><li><em>onhttp:\/\/insights.sei.cnu.edu.\/sei_blog\/2017\/06\/mac hine _learning_in_cybersecurity.html <\/em><\/li><li><em> Selma, C. Huseyin and A. Mustafa, Application of Artificial Intelligence Techniques to Combating Cyber Crimes: A Review, International Journal of Artificial Intelligence &amp;Applications, vol. 6, issue 1, pp. 21-39, January 2015. <\/em><\/li><li><em> Enn, \u2015Artificial Intelligence in Cyber Defense\u2016, in Proceedings of 3rd International Conference on Cyber Conflicts [ICCC], 7-10 June, 2011 Tallin Estonia. <\/em><\/li><li><em> Dennis, A. Stuart, \u2015Global Challenges: Twelve risks that threaten human civilization, Global Challenges Foundation\u2016: 2015,Available: http:\/\/globalchallenges.org \/wp-content\/ uploads\/12-Risks-with-infinite-impact.pdf [accessed Jun. 3, 2020] <\/em><\/li><li><em> Stuart, D. Daniel, T. Max, \u2017\u2017Research Priorities for Robust and Beneficial Artificial Intelligence\u2018\u2018, AI Magazine, vol. 36, issue 4, pp. 105-114, Winter 2015 <\/em><\/li><li><em>National Science &amp; Technology Council, <\/em><\/li><li><em>Artificial Intelligence and Cybersecurity: Opportunities and Challenges\u2016 Net. &amp; Info.Tech R&amp;D Sub-comtt and the ML &amp; AI Sub-comtt, 2020.<\/em><\/li><li><em>M. Shamiulla, Role of Artificial Intelligence in Cyber Security, International Journal of Innovative Technology and Exploring Engineering, vol. 9 issue 1 pp. 4628-4630, November 2019<\/em><\/li><li><em> Pranav, \u2015Artificial Intelligence in cyber security\u2016, International Journal of Research in Computer Applications &amp; Robotics, vol 4, 1, pp.1- 5, May 2016 <\/em><\/li><li><em> Kivimaa, A. Ojamaa, E. Tyugu. Graded Security Expert System. Lecture Notes in Computer Science, v. 5508. Springer, 2009, 279-286. <\/em><\/li><li><em> Christain, D.A. Elizondo and T. Watson, <\/em><\/li><li><em>Application of artificial neural networks and related techniques to intrusion detection\u2016, World Congress on Computation Intelligence, pp 949- 954, 2010 <\/em><\/li><li><em> Tyugu, \u2015Artificial Intelligence in Cyber Defense\u2016, International conference on Cyber Conflict, vol. 3, pp. 95-105, Tallinn, Estonia, Jan. 2011 <\/em><\/li><li><em> Nadine and K. Hadas, \u2015Artificial Intelligence in Cybersecurity\u2016, Cyber, Intelligence, and Security, vol. 1, 1, pp. 103-119, Jan. 2017 <\/em><\/li><li><em> Dima, M. Robert, B. Zvi, S. Shahar and E. Yuval, \u2015Using Artificial Neural Network to Detect Unknown Computer Worms\u2016, Neural Computing and Applications, vol.18, 7, pp. 663- 674, Oct. 2009 <\/em><\/li><li><em> H. Geoffrey, O. Simon and T. Yee-Whye, \u2015A Fast Learning Algorithm for Deep Belief Nets\u2016, Neural Computation, vol. 18, no. 7, pp. 1527-1554, 2006 <\/em><\/li><li><em> Thomson, \u2015Cyber Attacks Could be Predicted with Artificial Intelligence\u2016, iTechPost, www.itechpost.com\/articles\/1734 7\/cyberattacks- predicted-artificial-intelligence-help.htm, Apr. 21, 2016 [Jun. 2, 2020] <\/em><\/li><li><em> Franklin and A. Graesser, \u2015Is It an Agent, or Just a Program? A Taxonomy for Autonomous Agents\u2016, Third International Workshop on Agent Theories, Architectures, and Languages, no. 3, pp. 21-35, 1997 <\/em><\/li><li><em> Xia and L. Junshan, \u2015A Security Architecture Based on Immune Agents for MANET\u2016, International Conference on Wireless Communication and Sensor Computing, no. , pp. 1- 5, 2010 <\/em><\/li><\/ol>                    <\/div>\n\t\t        \n                    <div id=\"citation-tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"citation-tab\">\n\t\t\t\t        <p><strong>Sivaguru R , et.al (2003); Assessing cyber security awareness and preparedness: a survey study,\u00a0 IPEM JOURNAL OF COMPUTER APPLICATION &amp; RESEARCH, 8(1) , 20-26<\/strong><\/p>                    <\/div>\n\t\t                    <\/div>\n        <\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Assessing Cyber Security Awareness And Preparedness: A Survey Study Sivaguru R, Malarvizhi P, Saranya R, Babu G, Saranya K Vol [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-3671","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/journal.ipem.edu.in\/computer_applications\/wp-json\/wp\/v2\/pages\/3671","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/journal.ipem.edu.in\/computer_applications\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/journal.ipem.edu.in\/computer_applications\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/journal.ipem.edu.in\/computer_applications\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/journal.ipem.edu.in\/computer_applications\/wp-json\/wp\/v2\/comments?post=3671"}],"version-history":[{"count":13,"href":"https:\/\/journal.ipem.edu.in\/computer_applications\/wp-json\/wp\/v2\/pages\/3671\/revisions"}],"predecessor-version":[{"id":3918,"href":"https:\/\/journal.ipem.edu.in\/computer_applications\/wp-json\/wp\/v2\/pages\/3671\/revisions\/3918"}],"wp:attachment":[{"href":"https:\/\/journal.ipem.edu.in\/computer_applications\/wp-json\/wp\/v2\/media?parent=3671"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}