ArticlePDF AvailableLiterature Review

The Influence of Cybercrime and Legal Awareness on the Behavior of University of Jordan Students

Authors:

Abstract and Figures

In contemporary times, there has been a rapid increase in the utilization of the Internet and information technology by students. As a result, educational instructors worldwide have encountered a significant issue due to an unprecedented level of reliance and, to a large extent, dependency on such technology. Furthermore, akin to any analogous emerging social phenomenon, this dependency on technology has engendered novel spectrums of unlawful and illicit conduct. This paper presents a comprehensive analysis of the impact of Cybercrime and Legal Awareness on the behavior of young individuals in society, incorporating both theoretical and empirical perspectives. To address the matter under consideration, a quantitative investigation was undertaken utilizing a questionnaire administered to a population comprising a random sample of 2000 students enrolled at the University of Jordan as the subject of our case study. The findings of our study demonstrate a robust and incontrovertible association between the degree of legal awareness of cybercrime among students and their engagement in illicit cyber-acts. Additionally, the findings indicate that gender and various other factors exert influence in dissuading students from engaging in such criminal behaviors. Consequently, this underscores the significance of implementing effective strategies to enhance students' legal awareness regarding cybercrime, to mitigate their involvement.
Content may be subject to copyright.
Heliyon 10 (2024) e32371
Available online 6 June 2024
2405-8440/© 2024 The Authors. Published by Elsevier Ltd. This is an open access article under the CC BY-NC-ND license
(http://creativecommons.org/licenses/by-nc-nd/4.0/).
Review article
The inuence of Cybercrime and legal awareness on the behavior
of university of Jordan students
Ismaeel Alhadidi
a
, Aman Nweiran
b
,
*
, Ghofran Hilal
a
a
School of Law, University of Jordan, Amman, Jordan
b
Centre for Excellence in Learning and Teaching, University of Jordan, Amman, Jordan
ARTICLE INFO
Keywords:
Cybercrimes
Cybercrime law
Legal awareness
Learning
Behavior
Education
ABSTRACT
In contemporary times, there has been a rapid increase in the utilization of the Internet and in-
formation technology by students. As a result, educational instructors worldwide have encoun-
tered a signicant issue due to an unprecedented level of reliance and, to a large extent,
dependency on such technology. Furthermore, akin to any analogous emerging social phenom-
enon, this dependency on technology has engendered novel spectrums of unlawful and illicit
conduct. This paper presents a comprehensive analysis of the impact of Cybercrime and Legal
Awareness on the behavior of young individuals in society, incorporating both theoretical and
empirical perspectives. To address the matter under consideration, a quantitative investigation
was undertaken utilizing a questionnaire administered to a population comprising a random
sample of 2000 students enrolled at the University of Jordan as the subject of our case study. The
ndings of our study demonstrate a robust and incontrovertible association between the degree of
legal awareness of cybercrime among students and their engagement in illicit cyber-acts. Addi-
tionally, the ndings indicate that gender and various other factors exert inuence in dissuading
students from engaging in such criminal behaviors. Consequently, this underscores the signi-
cance of implementing effective strategies to enhance students legal awareness regarding
cybercrime, to mitigate their involvement.
1. Introduction
The Internet can be considered the most comprehensive medium for the acquisition, dissemination, and transmission of infor-
mation in the history of human civilization [1]. According to Dogruer, Eyyam, and Menevis [2], the utilization of this medium is
crucial for facilitating communication, serving as a repository for scholarly investigation, and providing a means of entertainment.
Choudhary [3] estimates that in the present era, roughly one-third of the global population possesses Internet connectivity. According
to Shuqair [4], individuals in Jordan have been accessing and utilizing the World Wide Web since 1996. According to the data provided
by the Internet World Stats website as of March 31, 2021, the total number of Internet users in Jordan stands at 8,700,000 individuals,
accounting for approximately 85 % of the countrys overall population [5]. The substantial proportion of users in Jordan can be
attributed to the persistent endeavors towards modernization and automation across various domains, including education and the
public and private labor sectors. Moreover, this phenomenon can also be ascribed to the proliferation of smart devices, as evidenced by
the fact that over 90 % of individuals possess diverse types of smartphones, thereby availing themselves of a wide array of applications
* Corresponding author.
E-mail addresses: i.alhadidi@ju.edu.jo (I. Alhadidi), a_rahahleh@ju.edu.jo (A. Nweiran), g.hilal@ju.edu.jo (G. Hilal).
Contents lists available at ScienceDirect
Heliyon
journal homepage: www.cell.com/heliyon
https://doi.org/10.1016/j.heliyon.2024.e32371
Received 18 July 2022; Received in revised form 29 May 2024; Accepted 3 June 2024
Heliyon 10 (2024) e32371
2
that streamline their daily activities, particularly those pertaining to social networking and messaging [6]
In recent years, education has experienced signicant transformations due to the emergence of Information and Communications
Technology (ICT), which has had a profound impact on the overall way of life for humanity [7]. The utilization of diverse contem-
porary educational methodologies, such as online, ipped, hybrid, or blended learning modalities, has experienced an upward trend in
recent times [8]. Signicantly, amidst the COVID-19 pandemic, the exclusive viable alternative for education emerged as online
teaching, since educational institutions such as schools, colleges, and universities were compelled to cease in-person operations for an
extended duration [9]. The COVID-19 pandemic has resulted in an unprecedented disruption of global education systems, as stated by
the United Nations [10]. This disruption has impacted a substantial number of learners, estimated to be around 1.6 billion, across more
than 190 countries. The global student population has been impacted by this phenomenon, affecting approximately 94 % of students
worldwide. According to The United Nations Educational, Scientic and Cultural Organization [11], a signicant number of 220
million students in higher education were affected by the closure of universities during the peak of the crisis. Therefore, there has been
a transition in the eld of education from conventional pedagogy to a contemporary method of instruction, specically from in-person
classroom learning to online learning. Historically, e-learning and distance learning were regarded as supplementary modalities of
education. Nevertheless, with the ability to demonstrate its viability and effectiveness, E-learning is increasingly gaining traction in
integrating into the conventional education system and serving as a partial substitute [12].
Despite the myriad of positive implications associated with the advancement of Information and Communication Technology (ICT)
in enhancing the human condition, it has concurrently opened up a novel pathway for illicit activities, thereby engendering a source of
distress and malevolence. The criminal activities perpetrated within a digital environment are commonly referred to as cybercrimes.
For the purpose of this study, cybercrimes are dened as criminal activities that are perpetrated through electronic means, specically
targeting programs, information, or data that are accessible on electronic devices or networks. Accordingly, our research objectives are
divided mainly into four categories.
1. Measuring the relationship between the University of Jordan students awareness of cybercrimes on the one hand and penalties
enforced by the Cybercrime Law on the other,
2. Determining if studentsawareness of cybercrime and related laws inuences their behavior when committing or being exposed to
such crimes,
3. Determining if the demographical variables (gender, academic level, school, and academic achievement (GPA)) affect students
awareness of cybercrime and related laws,
4. Recommending appropriate measures that could help manage the studentslegal awareness of cybercrime.
Therefore, these objectives are evaluated according to the following research questions.
1. What is the overall relationship between awareness of cybercrime concepts, awareness of legal procedures, and students
engagement in unlawful acts?
2. What are the statistically signicant differences at the level of signicance (
α
=0.05) regarding (Awareness of cybercrime concepts,
Awareness of legal procedures, Unlawful acts done by students, Unlawful acts to which students are exposed), among the University
of Jordans students according to gender variable?
3. What are the statistically signicant differences at the level of signicance (
α
=0.05) regarding (Awareness of cybercrime concepts,
Awareness of legal procedures, Unlawful acts done by students, Unlawful acts to which students are exposed), among the University
of Jordans students according to school variable?
4. What are the statistically signicant differences at the level of signicance (
α
=0.05) regarding (Awareness of cybercrime concepts,
Awareness of legal procedures, Unlawful acts done by students, Unlawful acts to which students are exposed), among the University
of Jordans students according to academic level variable?
5. What are the statistically signicant differences at the level of signicance (
α
=0.05) regarding (Awareness of cybercrime concepts,
Awareness of legal procedures, Unlawful acts done by students, Unlawful acts to which students are exposed), among the University
of Jordans students according to academic achievement (GPA) variable?
To the best of our current knowledge, our research represents the inaugural investigation into the correlation between cybercrime
legal awareness and the conduct of students in Jordanian universities, both in terms of exposure to cybercrimes and potential
engagement in such activities. Our aim is to make a scholarly contribution to the existing body of knowledge in the eld of juvenile
behavioral patterns related to cybercrimes, with a specic focus on the legal aspects. Section 2 of the paper presents an overview of the
current state of cybercrimes in Jordan, drawing upon the most recent ofcial statistics. Additionally, it offers an analysis of the leg-
islative measures implemented in Jordan to combat cybercrimes. In addition, we conducted a comprehensive examination of the
pertinent literature concerning the assessment of legal awareness on cybercrimes in Jordan, while also referencing prominent inter-
national studies on the subject matter. The methodology employed in this study is expounded upon in Section 3. Section 4 of this paper
presents a comprehensive analysis of the ndings obtained from our study. Subsequently, section 5 and Section 6 provides study
limitations and a synthesis of the conclusions drawn from research results, along with recommendations for future research.
2. Background and literature review
The legal awareness of cybercrimes, including the identication of actions that qualify as cybercrimes and the corresponding
I. Alhadidi et al.
Heliyon 10 (2024) e32371
3
penalties, is a crucial element in safeguarding the condentiality of information in the digital realm. This preservation of privacy rights
is a fundamental principle upheld by numerous legislations across the globe. The enactment of cybercrime laws serves as a crucial
approach to addressing cybercrimes, as they are designed to facilitate the investigation, prosecution, and imposition of penalties on
individuals who engage in illegal activities on the Internet [13]. Hence, we shall initiate our scholarly discourse by elucidating the
legislative framework governing cyber infringements in Jordan, followed by an examination of the prevailing academic literature on
this subject.
2.1. Cybercrimes and Cybercrime law in Jordan
The implementation of proactive cybersecurity measures is imperative, particularly in developing countries like Jordan, where the
incidence of cybercrimes is rapidly increasing. Approximately one million cybercrimes are perpetrated annually in Jordan, yet only a
mere 5 % of these offenses are ofcially reported to the relevant authorities. Figure (1) depicts a comprehensive overview of various
categories of cybercrimes reported in Jordan during the period spanning from 2013 to 2022. Based on a cursory examination, it can be
asserted that the incidence of cybercrimes has been steadily increasing. According to ofcial records, the number of reported
cybercrimes in 2013 amounted to 1320 cases. Over the course of a decade, this gure has experienced a signicant increase, reaching
approximately 16027 incidents in 2022, representing a multiplication factor of approximately 12.
Based on the most recent data provided by the Anti-Cyber Crimes Unit (Fig. 2), certain crimes exhibit a higher level of concern
compared to others, primarily due to their frequency of occurrence. In 2022, there was a notable surge in reported incidents of
cybercrimes involving threats, extortion, defamation, slander, and contempt. The total number of such crimes reached 8529, repre-
senting a signicant increase compared to previous years.
Upon closer examination of the chart presented in Figure (3), it becomes evident that cybercrimes such as threats, extortion, insult,
defamation, and mail theft continue to prevail as the most prevalent occurrences. The incidence of these criminal activities experi-
enced an increase from 474 cases in 20133284 cases in 2020. Additionally, it is observed that crimes associated with communication
applications exhibit a subsequent trend, displaying a consistent rise from 401 incidents in 20132687 incidents in 2020.
One noteworthy observation is that the Unit has recorded the fewest instances of cybercrimes targeting families and children. For
example, the act of spoiling a conjugal bond is a relatively infrequent offense in comparison to other specied criminal activities. In
2013, the total number of cases amounted to a mere 101, while in 2020, this gure experienced a modest increase to 156. In contrast to
previous years, where a convergence in the occurrence of crimes was observed, there was a notable increase in 2017, with the number
of reported crimes reaching 1011. This represents a signicant rise compared to the gures of 187 in 2016 and 210 in 2018. Another
illustrative instance pertains to the offense of online child abuse, which culminated in a recent apprehension. There were specic years,
namely 2017 and 2018, during which instances of this crime were documented, and the occurrence rate was observed to be nonex-
istent. The occurrence of this criminal activity reached its peak in the year 2016, with a total of 51 reported instances. It is noteworthy
to observe that, despite the severity of cybercrimes targeting families and children, the statistical data for the year 2022 indicates a
relatively low incidence of such offenses. Consequently, the Unit has categorized these crimes under the miscellaneous category. It can
be argued that crimes of this nature, whether they are cyber-related or not, tend to be frequently underreported rather than infre-
quently committed due to their discreet nature, as they occur within the connes of familial relationships.
Many countries across the globe have dedicated signicant resources towards combating cybercrimes due to their substantial
detrimental effects on the economy. According to Morgan [14], it was projected that global cybercrime expenses would reach $6
trillion by the conclusion of 2021, with an anticipated increase to $10.5 trillion by 2025. Consequently, legislators, who are unable to
remain passive, are compelled to take measures to address these criminal activities. The legislative authority in Jordan has only
recently demonstrated a heightened focus on addressing concerns related to cyberspace by enacting legislation aimed at regulating
cybercrimes. The Electronic Transactions Law No. 85 of 2001 in Jordan is the initial legislation aimed at regulating cyber and
computer-related crimes, albeit indirectly. According to Faqir [15], the legislation primarily emphasized electronic transactions in the
domain of commerce and civil matters, rather than criminal aspects. This law was repealed by the Law No. 15 of 2015 concerning
Fig. 1. Number of handled by the cyber crime unit in Jordan.
I. Alhadidi et al.
Heliyon 10 (2024) e32371
4
Electronic Transactions. In the year 2010, the country of Jordan implemented a temporary legislation called Information Systems
Crimes Law No. 30. This law was then converted into a permanent legislation known as Cybercrime Law No. 27 of 2015, which served
as the framework for our study. Nevertheless, the aforementioned legislation was revoked pursuant to the enactment of the Cybercrime
Law No. 17 of 2023. The recently enacted legislation on Cybercrime has resulted in heightened prescribed sanctions and the incor-
poration of novel manifestations of Cybercrimes. Given that our questionnaire was designed with reference to the law prior to
alteration, we will maintain our reference to it.
Prior to this modication, the circumstances were less transparent compared to the current state. More specically, the Jordanian
legislators permit the presence of skepticism when it comes to the criminalization of certain activities occurring in the eld of cy-
berspace. The adoption of a position by legislators has resulted in an increased perception of stability in the legal standing of in-
dividuals within the society. The acts that are deemed reprehensible are explicitly dened through unambiguous Articles that do not
necessitate any further interpretation. According to Article 15 of Cybercrime Law No. 27 of 2015, individuals who engage in the
violation of any enforced law through online or electronic means will be subject to punishment as provided by law. The Cybercrime
Law is a response to the need for regulation in light of the widespread technological advancements that have impacted global society.
The rapid and ongoing transformation of virtual cyberspace has necessitated the establishment of a delicate equilibrium between
conventional legislative frameworks that address criminal offenses and the emergence of novel forms of criminal conduct facilitated by
computers and smart devices.
Revisiting the previous denition of cybercrimes, it is evident that these crimes are perpetrated through electronic methods and
involve the exploitation of vulnerabilities in information systems or networks. This may include targeting programs, data, or infor-
mation stored on electronic devices or within digital networks [16]. On the one hand, certain cybercriminal activities can be readily
subject to prosecution due to the inherent adaptability of existing conventional laws, which allows for prosecution regardless of the
specic context in which the crime occurs. On the other hand, there exist certain actions that necessitate legislative intervention to
enable their investigation within the purview of the respective legal framework. For instance, the transmission of explicit visual
materials to individuals below the legal age, minors, will not incur legal consequences unless the perpetrator violates provisions
outlined in the Cybercrime Law. The absence of legal provisions in the conventional Penal Code to criminalize this conduct
necessitated the creation of the Cybercrime Law, specically Article 15, to address this gap. Conversely, certain criminal offenses
continue to be subject to legal sanctions irrespective of the methods employed in their commission. For instance, when dealing with
certain criminal activities that pose a threat to the security of the State, which were perpetrated through electronic channels,
particularly via social media platforms such as Facebook, the Court did not refrain from imposing penalties for these condemnable acts,
Fig. 2. Types of handled by the cyber crime unit in 2022.
Fig. 3. Types of cybercrimes handled by the cyber crime unit in Jordan.
I. Alhadidi et al.
Heliyon 10 (2024) e32371
5
as the legal provisions governing such matters exhibit a degree of exibility.
Furthermore, certain actions are deemed impermissible when enacted in a real-world setting, yet they are not subject to the same
restrictions when executed in a virtual environment. The most evident illustration pertains to the act of theft. As per the provisions of
the Jordanian Penal Code, it is stipulated that the object subject to theft must possess a tangible and physical nature. Therefore, acts of
theft targeting electronic currency, data, or information are not subject to the conventional provisions governing theft-related offenses.
Consequently, the implementation of legislative measures to penalize such actions is highly desirable. By implementing this measure,
we effectively mitigate the occurrence of specic actions that were previously permitteddue to the lack of adequate legal regulations
prohibiting them. This line of reasoning adheres to the principle of "Nullum crimen and nulla poena sine lege" [17] in its logical legal
progression. Electronic fraud is governed by the same principles as crimes involving physical or intangible evidence. The aforemen-
tioned rationale holds true within the sphere of acts of vandalism. The interpretation of Article 445 of the Penal Code does not
currently encompass the destruction of immaterial information and programs. However, it is possible to modify the wording of the
Article to accommodate such an interpretation. The texts historical context restricts the possibility of a comprehensive and
all-encompassing interpretation [18]. Hence, the occurrence of a distinctive incriminating text is unavoidable. Thus, instances of such
texts can be observed in Articles 3 and 4 of the Cybercrime Law.
Moreover, upon initial examination, it can be argued that the criminal offense of document falsication, as stipulated in Articles
262265 of the Penal Code, does not encompass instances of falsication pertaining to electronic documents. Indeed, upon further
examination, it becomes evident that these articles pertain to tangible records and tools. Undoubtedly, the discernment of the legislator
becomes apparent as they deliberate on the placement of this offense within the second chapter of the fth part of the Penal Code,
specically categorized under "the Breach of Public Trust Offenses." The primary objective of the legislator, during the drafting process,
was to criminalize any deception occurring in any document based on material support [19]. In the majority of cases and in practical
terms, public trust is given to material documents. However, it is important to highlight that in the present era, it is conceivable to
envision a scenario where falsication could impact intangible documents and the relevant Articles could be applied to such cases
under specic circumstances which was stipulated by the provisions of the Electronic Transactions Law no. 15 of 2015. However, it
would be impractical to employ these articles in the context of drawing denitive conclusions through examination or replication of
these intangible documents. Cases of this nature require the presence of designated texts to ensure the enforcement of appropriate
measures and penalties for such actions.
The Cybercrime Law does not mandate the implementation of technical protection measures on information systems or websites as
a prerequisite for granting them legal protection. Despite the absence of information security systems, they are protected by the law
[20]. Unauthorized access to an information system or website is subject to legal consequences as stipulated by the Cybercrime Law in
accordance with Article 3. Hence, for the purpose of elucidating the cybercrimes delineated in the Cybercrime Law, it is instructive to
refer to the following table which presents diverse categories of cybercrimes along with their corresponding penalties.
2.2. Review of related literature
Lately, the study of cybercrimes has garnered signicant attention on an international and national scale, owing to the escalating
prevalence of such offenses. This section aims to present and analyze the latest research ndings pertaining to the awareness of
cybercrime in Jordan and abroad. On an international level, a study conducted by Moallem [21] examined the level of student
awareness and attitudes towards cyber security and the associated risks in Silicon Valley, California, which is renowned for its
technological advancements. Despite the awareness among college students regarding the potential surveillance of their online ac-
tivities and the vulnerability of their data, empirical analysis indicates a lack of knowledge regarding effective data security measures.
Furthermore, it is evident that educational institutions lack a proactive approach to enhancing awareness among college students,
thereby limiting their understanding of these matters and their ability to safeguard themselves against potential cybercrimes. A
noteworthy study conducted at Nigerian universities by Garba, Siraj, Othman, and Musa [22] revealed that the students of the
aforementioned study possessed a rudimentary understanding of cybersecurity, yet lacked awareness regarding data protection
measures. Furthermore, it was evident that the majority of colleges lack a comprehensive cybersecurity awareness program aimed at
augmenting studentsunderstanding of self-protection against potential threats.
A study conducted by Alghareeb and Alameer [23] investigated the extent of youths awareness regarding the concept of infor-
mation crimes and their knowledge of the corresponding penal system in different regions of the Kingdom of Saudi Arabia. The study
demonstrated a clear correlation between individuals knowledge of the penal system and their engagement in illicit activities
facilitated by contemporary technologies. Fifty percent of the participants in the study indicated that they possess knowledge
regarding the utilization of electronic devices. The study further demonstrated that possessing knowledge regarding regulations and
penalties pertaining to the prevention of information crimes played a signicant role in mitigating detrimental behaviors within the
realm of information technology. In a recent investigation conducted by Alzubaidi [24], a scholarly examination was undertaken to
evaluate the existing level of cyber-security awareness within the Kingdom of Saudi Arabia. The research focused on the investigation
of cyber-security practices, the level of consciousness regarding this matter, and the act of reporting incidents. The results suggest that
the degree of awareness among participants from Saudi Arabia concerning cybercrimes is of a moderate nature. Furthermore, it was
noted that a substantial percentage (70.8 %) of the participants did not disclose any instances of being subjected to cybercrimes. The
present discovery indicates that individuals may demonstrate a deciency in trust towards diverse entities, including the eGovernment
portal, police, and Saudi CERT. Moreover, individuals might exhibit a limited comprehension of the functions fullled by these or-
ganizations, or experience reluctance in reporting occurrences of cybercriminal activities. The ndings of a study conducted by Alharbi
and Tassaddiq [25] on the assessment of Cybersecurity awareness among the undergraduate students of Majmaah University in the
I. Alhadidi et al.
Heliyon 10 (2024) e32371
6
Kingdom of Saudi Arabia, demonstrated that cybersecurity awareness and training program for students should be included in the
security management plan to ensure that all users know how to recognize the most common cybersecurity threats and vulnerabilities.
On a national level, in a study conducted by Manasrah, Akour, and Alsukhni [26], a survey was administered to college students
enrolled in three public universities in Jordan. The objective of the study was to assess the level of awareness and attitudes among these
students regarding spam emails as a form of cyberattack. The ndings of the study indicate that despite the awareness among Jor-
danian students regarding the issues and detrimental effects of spam emails, these unsolicited messages are still able to inltrate their
inboxes. A more recent study conducted by AlZeben and AlKharabsheh [27] aimed to assess the extent of students awareness at
Al-Balqa Applied University in Jordan regarding the adverse consequences of cybercrimes. The ndings of the investigation indicated a
minimal incidence of studentsexposure to cybercrime, juxtaposed with a notable degree of cybercrime awareness. Another recent
study conducted by Alsawalqa [28] examined the phenomenon of cyberbullying as a form of cybercrime specically among students at
Table 1
Cybercrimes and their Punishments according to the Jordanian Cybercrime Law.
Crime Article Description Punishment
Unauthorized Access Article 3/A/
Cybercrime Law
Access that is taking place without having the
permission of the person in charge or gained by an
unauthorized person, but it does not matter if the
perpetrator has complete control over the system or not.
What matters is that the perpetrator manages to enter
into the web or information system without having
permission to do so.
A prison sentence (one week- 3
months) or a ne (100200 JD) or
both
Article 3/B, C/
Cybercrime Law
The purpose of the access provided in Article 3/A is to
delete, remove, add, destroy, leak out, damage, block,
edit, change, transfer, copy data, stop or disable the
functioning of an information network or system or an
electronic website, or pretend to be its owner.
A prison sentence (3 months1 year)
or a ne (2001000 JD) or both
Intercepting and Tapping
Electronic Messages
Article 5/
Cybercrime Law
Being able to read, hear, acquire, or hinder the delivery
of an electronic message, modify its contents partially or
completely, or delete it during its transmission via the
web or any information system.
A prison sentence (3 months - one
year) or a ne (2001000 JD) or both
Financial Transactions, Credit
Card Transactions, and
Banking Transactions Crimes
Article 6/
Cybercrime Law
Unauthorized access via a computer network or
computer system to data or information related to credit
cards or data pertaining to nancial or banking
transactions.
A prison sentence (1 year - 3 years)
combined with a ne (5002000 JD)
Aggravating circumstances in
crimes involving nancial
aspects
Article 7/
Cybercrime Law
Committing one of the acts provided in Articles 3, 5, and
6 on websites or computer systems that are related to the
transfer of funds; the provision of payment services,
clearing, and settlements; or any service provided by
banks or nancial institutions.
A prison sentence with hard labor for
no less than 5 years combined with a
ne (500015000 JD)
Sexual Abuse of Children and
vulnerable people
Article 9/A
Cybercrime Law
Intentionally sending or publishing any pornographic
materials to a child in visual, oral, or written forms.
A prison sentence (3 months - 1 year)
combined with a ne (3005000 JD)
Article 9/B
Cybercrime Law
Developing, preparing, saving, processing, showing,
printing, and promoting sexual acts to children or
persons suffering from mental or psychological
disabilities, or inciting them to commit crimes.
A prison of no less than 2 years
combined with a ne (10005000 JD)
Article 9/C
Cybercrime Law
Using an information system or the web to exploit a
person under 18 years of age or a person suffering from
mental or psychological disabilities for prostitution and
pornography.
A prison sentence with temporary
hard labor combined with a ne
(500015000 JD)
Prostitution Contents Article 10/
Cybercrime Law
Using an information system or the web or establishing a
website that facilitates prostitution (like displaying
electronic photos and videos containing pornography,
publishing, distributing, producing, providing,
purchasing, selling, importing related objects).
A prison sentence of no less than 6
months combined with a ne
(3005000 JD)
Defamation, Slander, and
Denigration of People
Article 11/
Cybercrime Law
Sending, resending, or publishing data through the web
or websites embodying the defamation, slander, and
denigration of any person.
A prison sentence of no less than 3
months combined with a ne)
1002000 JD)
National Security and National
Economy Crimes
Article 12/A
Cybercrime Law
Unauthorized access to data or information unavailable
to the public concerning national security, international
affairs, public security, or the national economy.
A prison sentence of no less than 4
months combined with a ne
(5005000 JD)
Article 12/B
Cybercrime Law
Unauthorized access provided by Article 12/A to cancel,
delete, destroy, modify, change, transfer, copy, or
release content.
A prison sentence with temporary
hard labor combined with a ne of no
less than 500 JD
Article 12/C
Cybercrime Law
Unauthorized access to websites unavailable to the
public concerning national security, international
affairs, public security, or national economy.
A prison sentence of no less than 4
months combined with a ne
(5005000 JD)
Article 12/D
Cybercrime Law
Unauthorized access of the type described in Article 12/
C to cancel, delete, destroy, modify, change, transfer,
copy, or release content.
A prison sentence with temporary
hard labor combined with a ne
(10005000 JD)
I. Alhadidi et al.
Heliyon 10 (2024) e32371
7
the University of Jordan amidst the COVID-19 pandemic. The ndings obtained from the questionnaire indicate that cyberbullying has
a signicant impact on the self-esteem of students with East and Southeast Asian backgrounds who have experienced victimization
through bullying. The prevalence of bullying and cyberbullying was found to be higher among males compared to females. The in-
dividuals engaging in cyberbullying acknowledged that their primary motivation was amusement, and they expressed a lack of
awareness regarding the classication of their harsh or aggressive actions as instances of bullying.
Based on the above review of the existing literature, it is observed that the majority of these studies primarily concentrate on the
analysis of students level of awareness regarding cybercrimes. Nevertheless, our study not only focuses on the examination of the legal
dimensions of cybercrime awareness but also provides a seamless connection between this legal awareness and the subsequent impact
on studentsbehaviors related to such crimes.
3. Methodology
The study utilized a descriptive survey methodology as the most suitable approach to achieve the studys objectives, which is to
analyze the level of studentsawareness of cybercrimes and their penalties stated by the Jordanian cybercrime law (see Table 1).
3.1. Participants
The population of the study comprised 2000 students, encompassing individuals of both genders, attending various schools,
representing different academic levels (year of study), and exhibiting diverse levels of academic achievement (GPAs). Enrollment in
this study was entirely voluntary. Table 2 presents the demographic characteristics of the study population. The proportion of female
participants in this study is approximately 66.6 %, while males constitute 33.4 % of the total respondents. The higher representation of
female participants can be attributed to their higher performance in the General Secondary Certicate Examination (Tawjihi). A
national report indicates that 59.5 % of individuals who completed the Tawjihi requirements were female students [29].
According to Table 2, the largest proportion of participants enrolled in medical schools was 42.2 %, while humanities and scientic
schools accounted for 32.5 % and 25.4 % respectively. In relation to the variable of academic level, it was observed that 31.2 % of the
participants were freshmen, while sophomores, juniors, and seniors accounted for 28.3 %, 25.9 %, and 14.6 % of the sample,
respectively. Table 2 also shows a signicant proportion of the participants, specically 38 %, possessed a Grade Point Average (GPA)
of 3.50 or higher. Conversely, students with a GPA falling within the range of 11.49 constituted the smallest percentage of the overall
population, amounting to merely 1.2 %.
3.2. Research tools
The research utilized a questionnaire to collect data on the extent of University of Jordan students awareness regarding cyber-
crimes and the associated legal framework. The study was granted ethical approval by the University of Jordan, allowing the re-
searchers to proceed with the study. Subsequently, the distribution of the questionnaire to students was facilitated through the
implementation of a feedback activity on the Moodle platform, thereby ensuring the acquisition of a substantial and diverse sample of
students in a manner that adhered to ethical principles and maximized efciency. Therefore, the questionnaire was administered to
students enrolled in multiple mandatory courses during the First Semester of the 2021/2022 academic year. The selection of these
courses was based on the inclusion of students from various specializations, ensuring a diverse participant pool.
The study implemented measures to guarantee anonymous participation, thereby enabling each student to complete the ques-
tionnaire only once. Before commencing the data collection procedure, written consent was obtained from all students who agreed to
Table (2)
The Population of the Study.
Variables
Levels Frequency Percentage
Gender Male 669 33.4
Female 1331 66.6
School Medical 843 42.2
Scientic 508 25.4
Humanities 649 32.5
Academic Level (Year) Freshman 623 31.2
Sophomore 566 28.3
Junior 518 25.9
Senior 293 14.6
Academic achievement (GPA) 11,49 23 1.2
1,5 -1,99 28 1.4
22,49 132 6.6
2,52,99 338 16.9
33,49 720 36.0
3,5 and more 759 38.0
Total 2000
I. Alhadidi et al.
Heliyon 10 (2024) e32371
8
participate. This research does not make any reference to the research participants, as the identities of all participating students have
been safeguarded. The studys objective was explicitly articulated in the introductory section of the questionnaire. The questionnaire
comprised a total of 37 questions covering various aspects of cybersecurity. These aspects encompassed demographic information,
with 4 questions dedicated to this aspect. Additionally, the questionnaire explored participantsawareness of the concept of cyber-
crime, with 13 questions dedicated to this area. Furthermore, participantsfamiliarity with legal procedures related to cybersecurity
was assessed through 11 questions. The questionnaire also inquired about unlawful acts committed by students, with 4 questions
dedicated to this topic. Lastly, participants were asked about their exposure to unlawful acts, with 5 questions dedicated to this aspect.
3.3. Data analysis and interpretation
After the data were obtained, they were analyzed using SPSS (version 25). The use of such software was intended to nd certain
statistical observations based on the variables of the study, observations which might in turn help better describe, summarize, and
analyze the data.
3.3.1. Validity and reliability
3.3.1.1. Validity. The face validity of the study was tested by having the questionnaire reviewed by eight competent specialist re-
viewers. Per their observations and remarks, adjustments were made. The nal version of the questionnaire was later distributed to the
population.
3.3.1.2. Reliability. The Cronbachs alpha coefcient was used to test the reliability of the instrument of this study. According to the
test, reliability is considered poor when the value of the coefcient is less than 0.60. Sekaran & Bougie [30] assumed that the lowest
acceptable value of Cronbachs alpha coefcient is 0.70. Reliability is thought of as good if it is 0.80 or more. Listed in Table 3 are the
Cronbachs alpha test results for each subscale in the study (see Table 4).
According to the Cronbachs alpha test results, the coefcients of the subscales included in the questionnaire are between 0.749 and
0.859, which is above 0.7 and means that they are acceptable. As for the research instrument, the Cronbachs alpha coefcient
amounted to 0.789. This acceptable value indicates the internal consistency and reliability among the items and accordingly provides a
suitable basis for statistical analysis. It also warrants the validity of the instrument for analyzing the results and answering the
questions of the study.
3.3.2. The goodness-of-t of the study data
In order to test the goodness-of-t of the study data for statistical analysis, a normality test was conducted to check whether the data
follow a normal distribution by using the One-Sample Kolmogorov-Smirnov text. The results are presented in Table (4).
Table (4) shows that the One-Sample Kolmogorov-Smirnov test value of statistical signicance for all subscales was higher than the
tabulated level of signicance
α
0.05, which indicates that all the subscales follow a normal distribution. Based on the Central Limit
Theorem (which states that for any sample size that is greater than 30, has a population mean
μ
, and has variance
σ
2
; the distribution of
sample means approximates normal distribution).
4. Results and discussion
This section answers the results of the research questions, and its related hypotheses, as follows.
4.1. First: results related to the rst research question
What is the overall relationship between awareness of cybercrime concepts, awareness of legal procedures, and students
engagement in unlawful acts?
In response to this question, the following hypothesises has been suggested:
The rst main hypothesis (H
01
): There is no correlation between awareness of cybercrime concepts and awareness of legal
procedures.
Table (3)
The Cronbachs alpha coefcient values for the subscales and the instrument.
Subscales
# Questions Cronbachs Alpha
Awareness of cybercrime concepts 13 0.749
Awareness of legal procedures 11 0.813
Unlawful acts done by students 4 0.859
Unlawful acts to which students are exposed 5 0.753
Cronbachs Alpha 0.789
Source: The data were extracted using the SPSS statistical software platform.
I. Alhadidi et al.
Heliyon 10 (2024) e32371
9
The second main hypothesis (H
02
): There is no correlation between awareness of legal procedures and students unlawful acts.
The third main hypothesis (H
03
): There is no correlation between awareness of cybercrime concepts and the unlawful acts to which
students are exposed.
In order to test the rst, second, and third hypotheses, a correlation matrix for the study subscales was extracted, and the results are
presented in Table (5) as follows.
A signicant correlation of 0.380 at the level of
α
0.01 is seen in Table (5) between awareness of cybercrime concepts and
awareness of legal procedures. This means that we must reject the rst main hypothesis and support the alternative hypothesis, which
states that there is a correlation between awareness of cybercrime concepts and awareness of legal procedures.
That is because individuals who are aware of the notion of cybercrimes, their elements, and their attendant penalties feel compelled
to look for practical information; that is, procedures. It is inevitable that individuals who familiarize themselves with cybercrimes and
the punishment that is meted out to cybercriminals become curious about the legal procedures that make such acts more concrete. The
way they do this is through doing their own research about the legal procedures that one should follow in the event of committing a
cybercrime. But curiosity is not the only factor that leads to awareness of the legal procedures in this context, as personal experiences
can also lead to more awareness. This experience is not only conned to the victim who is looking for the legal procedures that put into
effect the pertinent laws against the criminal, but it can also apply to the offender. The latter is directly apprised of the legal pro-
ceedings put into practice by law enforcement ofcials.
On the one hand, the second main hypothesis that states that there is no correlation between awareness of legal procedures and
studentsunlawful acts is accepted, as shown in Table 5. The result of this hypothesis reveals that students might commit cybercrimes
regardless of their being aware of the legal measures taken against such offenses. That is caused by the idea that students who commit
such crimes are not necessarily conscious enough of the illegality of what they do and of the consequences of their acts. If students were
aware of the legal procedures that are put into effect as a result of their unlawful acts, there would be a correlation between unlawful
acts and the legal procedures that ensue. On the other hand, it also seems that sufcient awareness does not necessarily deter offenders
from committing cybercrimes, as some students already know about the consequences of such unlawful acts but continue to do them.
The nature of the crime committed online differs from real-world crime. When committing a crime online, for example, not seeing
the victim, how the victim reacts, and how much the crime affects him or her gives offenders the feeling that they are anonymous and
will not be punished for whatever they do. The chances of being caught committing a crime online are signicantly lower than in real
life. As a result, offenders are more likely to break the law and engage in cybercrime [31]. It is explained according to the theory of
differential association that criminal behavior is a non-inherited behavior that a person acquires by learning [32]. This indicates that a
person does not become a criminal without previous criminal experience, such as the one who does not become a mechanic without
prior knowledge and sufcient training in mechanics. This explains the commission of the crime despite awareness of it and its
consequences.
A phenomenon worthy of attention is the recurrence of crime, as the person who commits a crime is judged, and after the sentence
period has expired, we nd that the criminal returns to the criminal act again (NIJ). Hamdan [33] claried in her study that recidivism
is concentrated among young people less than 2534 years old, and this is consistent with the study of Saleh [34] and Al-Majdoub [35],
whose study indicated that recidivism is concentrated among young people.
Table (5) also shows a statistically signicant correlation of 0.047 at
α
0.05 level of signicance between awareness of cybercrime
concepts and unlawful acts to which students are exposed. The third main hypothesis is therefore rejected and replaced with the
alternative hypothesis which states that there is a correlation between awareness of cybercrime concepts and unlawful acts to which
Table (4)
Test one sample Kolmogorov-Smirnov.
Subscales One Sample Kolmogorov-Smirnov test Statistical signicance
Awareness of cybercrime concepts 1.179 0.124
Awareness of legal procedures 1.220 0.102
Unlawful acts done by students 1.179 0.124
Unlawful acts to which students were exposed 1.274 0.078
Source: The data were extracted using the SPSS statistical software platform.
Table (5)
Pearson correlation matrix concerning the study.
Subscales Awareness of cybercrime
concepts
Awareness of legal
procedures
Unlawful acts done by
students
Unlawful acts to which students
are exposed
Awareness of cybercrime concepts 1
Awareness of legal procedures 0.380
b
1
Unlawful acts done by students 0.0470
a
0.009 1
Unlawful acts to which students
are exposed
0.0470
a
0.001 0.536
b
1
a
Correlation is signicant at (0.05).
b
Correlation is signicant at (0.01).
Source: The data were extracted using the SPSS statistical software platform.
I. Alhadidi et al.
Heliyon 10 (2024) e32371
10
students are exposed. This means that students do not care about following the right path even when they are aware that path leads to
ensuring their own safety. Indeed, people, in general, do aim at protecting themselves, their lovely ones, their property, and their
interests in the broadest sense of the word. Despite that, students fall into the trap and suffer from the harm they cause to themselves
and others by cybercrimes. This could be explained by the fact that the harm that they cause is immaterial, and students therefore are
more vulnerable to these crimes. In addition, the extent of the prejudice generated by these crimes is in most cases insignicant, which
makes students more tempted to take risks such as following the instructions included in an e-mail of a suspicious origin. Moreover,
playing on the emotional chord of students may be one of the reasons they fall into the trap of cybercrimes. In fact, it is easy to
manipulate the feelings of young students and make them disempowered puppets in the hands of perpetrators. Finally, another
explanation for this phenomenon could be that young students are curious to discover the unknown.
4.2. Second: results related to the second research question
What are the statistically signicant differences at the level of signicance (
α
=0.05) regarding (Awareness of cybercrime concepts,
Awareness of legal procedures, Unlawful acts done by students, Unlawful acts to which students are exposed), among the University of
Jordans students according to gender variable?
In response to this question, the fourth hypothesis has been suggested, which states that there are no statistically signicant dif-
ferences at the 0.05 level of signicance concerning the four subscales of the study that can be attributed to gender. In order to test the
fourth hypothesis, the Independent Samples Test was used, and the results are listed in Table 6 as follows.
Table (6) indicates that the t-test value for the subscale of awareness of cybercrime concepts amounted to 2.806, with a 0.005
statistical signicance less than the tabulated signicance level of 0.05. This indicates statistically signicant differences for the
subscale of awareness of cybercrime concepts that can be attributed to gender. By taking the means into consideration, we notice that
the differences were in favor of males with a means of 3.617. On the other hand, the t-test value of the subscale of awareness of legal
procedures was 5.088, with a 0.000 statistical signicance less than 0.05. This indicates statistically signicant differences for the
subscale of awareness of legal procedures that can be attributed to gender. When we factor in the means, we notice that the differences
were in favor of females with a mean value of 3.733.
We can also notice that the t-test value for the subscale of unlawful acts done by students is 7.748 with a statistical signicance of
0.000. This means that there are statistically signicant differences between the subscale of unlawful acts done by students that can be
attributed to gender. We also nd that the means differences were in favor of males with a mean value of 2.060. The table also shows
the t-test value of 3.566 for the subscale of unlawful acts to which students are exposed, with a statistical signicance of 0.000, less than
the agreed-upon signicance 0.05. This refers to statistically signicant differences for the subscale of unlawful acts to which students
are exposed that can be attributed to gender. By further examining the means, we nd that the differences were in favor of males with a
mean value of 2.300.
It is possible that the higher rate of awareness of cyber threats among male students can be attributed to personal experiences. That
does not necessarily mean that a male student may have committed or has been a victim of such crimes. Their personal experiences
might also be the result of obtaining this kind of knowledge from a family member or a close acquaintance who has committed a
cybercrime, especially because most of the offenders of those crimes are males. This unquestionably tips the scales in favor of males
when comparing the number of male and female offenders.
According to the CEP confederation, there is a group of offenders that do not see their behavior as harmful at all. These are mainly
young men who are very good at computers. In their online community, they can convince each other that hacking a bank, for example,
is just a bit of fun [36].
Table (6)
Fourth hypothesis test results - independent samples test.
Awareness of cybercrime concepts
Gender Mean t- value test Statistical signicance (.Sig)
Male 3.617 2.806 0.005
Female 3.539
Awareness of legal procedures
Gender Mean t- value test Statistical signicance (.Sig)
Male 3.565 5.088- 0.000
Female 3.733
Unlawful acts done by students
Gender Mean t- value test Statistical signicance (.Sig)
Male 2.060 7.748 0.000
Female 1.755
Unlawful acts to which students are exposed
Gender Mean t- value test Statistical signicance (.Sig)
Male 2.300 3.566 0.000
Female 2.170
Source: The data were extracted using the SPSS statistical software platform.
I. Alhadidi et al.
Heliyon 10 (2024) e32371
11
These ndings are consistent with Fatokun, Hamid, Norman, & Fatokun [37], who showed that male students are more condent in
their cybercrime skills than their female counterparts. The researchers attributed this to the fact that male students have more
computer skills than female students.
It is possible to explain the unlawful acts that males do or to which they are exposed can be attributed to the low self-control in
young males, as studies by Smith [38] and Nakhaie, Silverman, & LaGrange [39] conrmed that males tend to have less self-control
compared to females.
According to the self-control theory (SCT) in "A General Theory of Crime" [40], which is considered one of the most dominant
theories and has signicantly contributed to the advancement of criminological knowledge, low self-control is a major cause of crime.
This nding was conrmed by empirical studies that test the link between low self-control and measures of crime [41] [42] [43] [44].
According to SCT, those with low self-control are characterized by impulsiveness; a high risk-seeking potential; self-centeredness and
insensitivity to others; and physicality where their behavior can be described as unrelated to caution and predictive of consequences
and far from rationality [45]. Also, socialization has an important role in committing reckless behavior, as Jordanian society is a
patriarchal society in which males are allowed to engage in reckless acts, which are forbidden for females, as this provides a suitable
environment for males to commit reckless behavior, and this is what was emphasized in Tawaiha study [46]. In addition, Titis [47]
study conrms the result that men are more likely to be victims compared to women.
As for femalesawareness of the legal procedures that result from perpetrating cybercrime, this may be attributed to the fact that
females are generally more afraid than males and therefore more careful as well, as was found by Fatokun, Hamid, Norman, & Fatokun
[48] that male students are more negligent about the consequences of violating cybersecurity laws and rules. This conclusion supports
Titis [49] ndings that women are more aware of cyber regulations than men.
4.3. Third: results related to the third research question
What are the statistically signicant differences at the level of signicance (
α
=0.05) regarding (Awareness of cybercrime concepts,
Awareness of legal procedures, Unlawful acts done by students, Unlawful acts to which students are exposed), among the University of
Jordans students according to school variable?
In response to this question, the fth hypothesis has been suggested, which states that There are no statistically signicant dif-
ferences at the 0.05 level of signicance concerning the four subscales of the study that can be attributed to the school in which the
student is enrolled. In order to test the fth hypothesis, the One Way ANOVA (analysis of variance) was conducted, and the results are
listed in Table (7) as follows.
Table (7) indicates that the F-values for the subscales awareness of cybercrime concepts and unlawful acts to which students are
exposed are F8.233, and F6.552, respectively, with a value of statistical signicance of 0.00 <0.05. This indicates that there are
statistically signicant differences between the two subscales. In order to detect the differences, the Scheff´
e Test was used. The results
can be seen in Table (8) below.
Results in Table (8) indicate differences in the subscale of awareness of cybercrime concepts between the humanities and medical
schools. These differences are in favor of the humanities schools with the mean value of 3.630, whereas the mean for medical schools is
3.507. The results also indicate differences in the subscale of unlawful acts to which students were exposed between students of the
humanities and medical schools. By observing the means, we nd that the differences are in favor of the humanities with a mean value
of 2.293, whereas the means for medical schools amounted to 2.147.
These results can be attributed to the long duration of time spent on social media by students of the humanities, as they need fewer
study hours and have more free time available in comparison with students in scientic schools. This means that they are more likely to
be exposed to unlawful acts than other students. Moreover, the nature of the topics taught in the schools of the humanities focus on
social issues, which in turn increases the possibility of tackling the issue of cybercrimes in classrooms. Finally, more students from the
humanities schools participate in extracurricular activities than their counterparts in scientic schools. This fact makes it more possible
to raise studentsawareness of cybercrimes through such extracurricular activities.
4.4. Fourth: results related to the fourth research question
What are the statistically signicant differences at the level of signicance (
α
=0.05) regarding (Awareness of cybercrime concepts,
Awareness of legal procedures, Unlawful acts done by students, and Unlawful acts to which students are exposed), among the Uni-
versity of Jordans students according to academic level variable?
In response to this question, the sixth hypothesis has been suggested, which states that there are no statistically signicant
Table (7)
Fifth hypothesis test results.
Subscales F- value test Statistical signicance (.Sig)
Awareness of cybercrime concepts 8.233 0.000
Awareness of legal procedures 1.969 0.140
Unlawful acts done by students 2.907 0.055
Unlawful acts to which students are exposed 6.552 0.001
Source: The data were extracted using the SPSS statistical software platform.
I. Alhadidi et al.
Heliyon 10 (2024) e32371
12
differences at the 0.05 level of signicance concerning the four subscales of the study that can be attributed to their academic level
(year of study). In order to test the sixth hypothesis, the One Way ANOVA (analysis of variance) was conducted, and the results are
listed in Table (9) as follows.
Table (9) indicates that the F-value for the subscale awareness of cybercrime concepts is 2.885, with a value of statistical signif-
icance of 0.035 <0.05. This indicates that there are statistically signicant differences for this subscale that can be attributed to
studentsacademic level. In order to detect the differences, the Scheff´
e Test was used. The results are seen in Table (10).
Results in Table (10) show a statistically signicant difference in the subscale of awareness of cybercrime concepts between
sophomores and juniors on the one hand, and seniors and sophomores on the other. By observing the means, we nd that the dif-
ferences are in favor of seniors with a means value of 3.764, whereas the means values for sophomores and juniors were 3.638 and
3.709, respectively.
The increased level of awareness of cybercrime concepts is the outcome of experience that accumulates over time in general and
during school years in particular. As students grow older, they become more conscious of issues they barely knew of. It is not surprising
that seniors are more aware of the legal consequences of committing cybercrimes than younger students, as seniors may have had
personal experiences in this context or may have heard about illegal cyber incidents. It is worth mentioning that seniors have the
ability to deal with as many of their fellow students as they can, which in turn contributes to the accumulation of knowledge and
experience.
4.5. Fifth: results related to the fth research question
What are the statistically signicant differences at the level of signicance (
α
=0.05) regarding (Awareness of cybercrime concepts,
Awareness of legal procedures, Unlawful acts done by students, Unlawful acts to which students are exposed), among the University of
Jordans students according to academic achievement (GPA) variable?
In response to this question the seventh hypothesis has been suggested, which states that there are no statistically signicant
differences at the 0.05 level of signicance concerning the four subscales of the study that can be attributed to the students GPA. In
order to test the seventh hypothesis, the One Way ANOVA (analysis of variance) was conducted, and the results are listed in Table (11)
as follows.
Table (11) shows that the F-values regarding the subscales of awareness of cybercrime concepts, awareness of legal procedures, and
unlawful acts done by students amounted to 5.843, 6.345,4.440, respectively. A statistically signicant difference is determined at
0.000, which is less than the tabulated level of signicance 0.05 for these subscales that can be attributed to studentsGPAs. In order to
detect the differences, the Scheff´
e Test was used. The results can be seen in Table (12).
The results in Table (12) indicate that there are differences in the subscale of awareness of cybercrime concepts between students
with GPAs 11.49 and 2.002.49; 1-1.49-2.50-2.99; 11.49, 3.003.49; and 11.49, 3.50 or more. By taking the means into consid-
eration, we nd that the differences are in favor of the GPA category 3.003.49, with a mean value of 3.569. On the other hand, the
Table (8)
Results of the Meta-Analysis to Detect Differences between the Subscales Awareness of Cybercrime Concepts and Unlawful Acts to which the students
are Exposed that Can be Attributed to Field of School in which Students are Enrolled.
Awareness of cybercrime concepts
Mean Medical Scientic Humanities
Medical 3.507 1
Scientic 3.579 0720. (0.094) 1
Humanistic 3.630 0.124
a
(0.000) 0.051 (0.339) 1
Unlawful Acts to Which Students Are Exposed
Mean Medical Scientic Humanities
Medical 2.147 1
Scientic 2.222 0.075 (0.222) 1
Humanistic 2.293
a
(0.145)
(0.002)
0.070 (0.308) 1
( ) Statistical signicance(Sig).
a
The mean is signicant at (0.05) level of signicance.
Source: The data were extracted using the SPSS statistical software platform.
Table (9)
Sixth hypothesis test results.
Scales F- value test Statistical signicance (.Sig)
Awareness of cybercrime concepts 2.048 0.105
Awareness of legal procedures 2.885 0.035
Unlawful acts done by students 1.288 0.277
Unlawful acts to which students were exposed 1.550 0.200
Source: The data were extracted using the SPSS statistical software platform.
I. Alhadidi et al.
Heliyon 10 (2024) e32371
13
means for the GPA categories 2.002.49, 2.502.99, 3.50 or more amounted to 3.530, 3.558, and 3.540, respectively.
The results also indicate differences in the subscale of awareness of legal procedures between the GPA categories of 1.501.99,
2.502.99; 1.501.99, 3.003.49; 1.501.99, 3.50 and above; 2.002.49, 2.502.99; and 2.002.49, 3.003.49. By observing the
means, we nd that the differences are in favor of the GPA category 3.003.49, with a mean value of 3.732. On the other hand, the
means for the GPA categories 2.002.50, 3.50, and above amounted to 3.728, and 3.660, respectively.
Moreover, the results indicate differences in the subscale of unlawful acts done by students between GPA categories 2.002.49,
3.003.49, and categories 2.002.49, 3.50 or more. The difference in the mean value is in favor of the GPA category 3.003.49, which
was 1.842, whereas the mean for GPA categories 2.002.49, 3.50 or more amounted to 1.793.
Table (10)
Results of the Meta-Analysis to detect differences in the elements of the study, according to the academic level variable.
Awareness of legal procedures
Mean Freshman Sophomore Junior Senior
Freshman 3.645 1
Sophomore 3.638 0.007 (0.998) 1
Junior 3.709 070690.
)0.432)
a
1270. (0.098) 1
Senior 3.764 11924 (0.124)
a
12670 (0.098) 05601 (0.754) 1
( ) Statistical signicance(Sig).
a
The mean is signicant at (0.05) level of signicance.
Source: The data were extracted using the SPSS statistical software platform.
Table (11)
Seventh hypothesis test results.
Scales F- value test Statistical signicance (.Sig)
Awareness of cybercrime concepts 5.843 0.000
Awareness of legal procedures 6.345 0.000
Unlawful acts done by students 4.440 0.001
Unlawful acts to which students were exposed 1.489 0.190
Source: The data were extracted using the SPSS statistical software platform.
Table (12)
Results of the Meta-Analysis to detect differences in the elements of (awareness of cybercrime concepts, awareness of legal procedures, and unlawful
acts done by students), according to GPA variable.
Awareness of cybercrime concepts
Mean 11.49 1.501.99 22.49 2.502.99 33.49 3.50 and more
1.001.49 4.174 1
1.501.99 3.750 0.424 (0.257) 1
2.002.49 3.530
a
0.644 (0.000) 0.220 (0.667) 1
2.502.99 3.558
a
0.606 (0.000) 0.181 (0.781) 0.038 (0.996) 1
3.003.49 3.569
a
0.604 (0.000) 0.181 (0.771) 0.039 (0.992) 0.011 (0.998) 1
3.5 and more 3.540
a
0.634 (0.000) 0.220 (0.634) 0.010 (0.998) 0.027 (0.991) 0.039 (0.969) 1
Awareness of legal procedures
Mean 11.49 1.501.99 22.49 2.502.99 33.49 3.50 and more
1.001.49 3.478 1
1.501.99 3.214 0.264 (0.875) 1
2.002.49 3.477 0.009 (0.998) 0.263 (0.656) 1
2.502.99 3.728 0.250 (0.737)
a
0.516 (0.016)
a
0.251 (0.032) 1
3.003.49 3.732 0.254 (0.708)
a
0.518 (0.011)
a
0.256 (0.011) 0.008 (0.998) 1
3.5 and more 3.660 0.182 (0.911)
a
0.446 (0.050) 0.183 (0.173) 0.068 (0.820) 0.072 (0.561) 1
Unlawful acts to which students were exposed
Mean 11.49 1.501.99 22.49 2.502.99 33.49 3.50 and more
1.001.49 1.957 1
1.501.99 2.143 0.186 (0.987) 1
2.002.49 2.121 0.165 (0.980) 0.517 (0.998) 1
2.502.99 1.899 0.057 (0.998) 0.243 (0.824) 0.022 (0.249) 1
3.003.49 1.842 0.115 (0.995) 0.301 (0.627)
a
0.280 (0.030) 0.058 (0.995) 1
3.5 and more 1.793 0.163 (0.974) 0.350 (0.454)
a
0.328 (0.004) 0.106 (0.585) 0.048 (0.941) 1
a
The mean is signicant at (0.05) level of signicance.
Source: The data were extracted using the SPSS statistical software platform.
I. Alhadidi et al.
Heliyon 10 (2024) e32371
14
This result shows that students with sufcient awareness mainly possess intellectual abilities and persevere to achieve the best
results. These students with high GPAs appear to be the most knowledgeable of the concept of cybercrime and any relevant legal
procedures. In addition, they admitted to having done unlawful acts. This shows that the better academically students are, the more
conscious they are. Students whose academic records are excellent are best equipped to understand the electronic and legal contexts
that they inhabit. Since those students admitted to having committed unlawful acts means that committing cybercrimes is not
necessarily connected with ignorance of such topics. Indeed, students may be aware of the penalties of cybercrimes, yet this does not
deter them from committing those crimes.
The majority of previous research has primarily investigated the extent to which students are aware of cybercrimes, or the potential
correlation between their awareness and the level of deterrence. Thus, our study aims to examine the connection between awareness
and student behavior from a legal perspective, specically within the context of Jordan. This analysis contributes to the empirical
understanding of the factors that inuence a students likelihood to engage in cybercriminal activities, as well as the role of legal
awareness in this scenario.
5. Limitations and future scope
The present study is subject to certain limitations with respect to the sample size, as it solely comprised 2000 students from the
University of Jordan. Consequently, the generalizability of the ndings may be compromised. Furthermore, a thorough investigation
of external factors that could potentially impact studentsawareness and behavior to cybercrimes was lacking. The studys exclusive
concentration on a solitary university restricts the inclusion of a wider contextual understanding of cybercrime awareness. The
questionnaire employed in the study may have failed to encompass all pertinent dimensions, and employing a combination of diverse
methodologies and measures would yield a more exhaustive evaluation. It is of utmost importance to acknowledge these constraints in
order to ensure precise analysis and to provide guidance for future investigations aimed at addressing these deciencies, thereby
enhancing comprehension of the topic. Acknowledging these constraints is crucial for precise analysis and guiding future research to
address these deciencies, thereby enhancing comprehension of the topic. Despite focusing on University of Jordan students, future
work aims to overcome this limitation by replicating the study across various universities in Jordan for improved result generaliz-
ability. The study emphasizes the need for tailored educational programs at the University of Jordan to enhance students legal
awareness of cybercrimes, underlining the importance of evaluating the short and long-term effectiveness of these programs in
inuencing student behavior.
6. Conclusion and recommendations
In this paper, results show the signicance of enhancing studentsunderstanding of cybercrime and related legislation as a means to
prevent their engagement in unlawful cyber activities and minimize their vulnerability to such offenses. This study additionally offers a
comprehensive examination of the concept of cybercrime and the corresponding legislation, as perceived by students at the University
of Jordan. It explores the inuence of this legal awareness on their behavior. It also reveals that there exists variation in the level of
awareness among students, which can be attributed to factors such as gender, academic level, academic achievement (as measured by
GPA), and the type of school attended (scientic, medical, or humanities). It is worth mentioning that students deliberately engage in
illicit behaviors despite possessing knowledge of the legal ramications. The unexpected outcome can be attributed to the limited
number of cyber criminals who face prosecution, as well as the lack of awareness among cybercrime victims regarding their legal rights
or their reluctance to engage in legal proceedings. The aforementioned circumstances contribute to a lack of societal adherence to
cybercrime legislation, particularly among younger individuals who tend to exhibit impulsive behavior and rarely consider the
ramications of their actions.
These ndings should raise concerns, as the lack of efcient punitive measures does not result in a reduction in criminal activity.
The potential risk arises from the implementation of legal prosecutions following the adoption of amendments to cybercrime legis-
lation. Legislators may subsequently opt to enhance the facilitation of prosecution by increasing victimscomprehension regarding the
implementation of penal provisions. Furthermore, legislators have the authority to allocate specialized units of the judicial police with
the purpose of deterring such offenses and subsequently referring them to the appropriate judicial authorities. Insufcient awareness of
the concept of cybercrime among university students hinders their ability to effectively prevent engagement in unlawful activities.
Hence, the integration of the cybercrime concept into the curriculum of select academic disciplines that focus on practical compe-
tencies may warrant the inclusion of dedicated instructional sessions. Furthermore, the inclusion of these concepts in university re-
quirements is warranted given their signicance. In light of this matter, it is imperative to deliberate upon alternative strategies that
can bolster the deterrence of cybercrime. One possible approach to achieve this objective is to educate students about concrete in-
stances that highlight the legal repercussions faced by individuals involved in cybercrime. The utilization of real-life scenarios in
storytelling has a greater impact on individuals compared to abstract concepts. Additionally, the incorporation of gamication
learning techniques serves to enhance studentsengagement levels and foster the development of desired behaviors.
The study has additionally revealed that students enrolled in humanities schools exhibit a comparatively more relaxed attitude
towards engaging in cybercrimes, in contrast to their peers attending other academic institutions. This phenomenon may be ascribed to
the greater availability of leisure time among the former group, which increases the likelihood of engaging in unlawful activities driven
by curiosity or the pursuit of novelty. Consequently, it is crucial to allocate greater emphasis towards these students by incorporating
cybercrime-related topics into their academic syllabus, thereby augmenting their level of awareness. Furthermore, the utilization of
extracurricular activities can serve as a means to enhance students understanding of cybercrimes and the severity associated with
I. Alhadidi et al.
Heliyon 10 (2024) e32371
15
them. The university has the potential to address the issue by implementing a regulatory board or entity responsible for monitoring
cybercrimes committed by students on social media platforms. Subsequently, the institution has the capacity to disseminate or publish
cases of said transgressions and their corresponding sanctions in the guise of cautionary advisories, with the aim of dissuading students
from engaging in such illicit activities.
The research ndings indicate that there is a higher prevalence of male involvement in cybercriminal activities compared to fe-
males. This necessitates prioritizing the reformation of male students conduct over that of female students, as the latter exhibit a
greater inclination to adhere to legal norms and the penal code. This can be achieved through various forms of media across both
physical and digital platforms that individuals regularly engage with.
Funding statement
This research did not receive any specic grant from funding agencies in the public, commercial, or not-for-prot sectors.
Ethics declarations
This study was reviewed and approved by the Institutional Review Board at the University of Jordan, with the approval number:
179/2024.
All participants provided informed consent to participate in the study.
All participants provided informed consent for the publication of their anonymised case details and images.
Data availability
The data that support the ndings of this study are available from the corresponding author, upon request.
CRediT authorship contribution statement
Ismaeel Alhadidi: Writing original draft, Methodology, Formal analysis, Conceptualization. Aman Nweiran: Writing original
draft, Validation, Supervision, Resources, Methodology, Formal analysis, Data curation, Conceptualization. Ghofran Hilal: Writing
review & editing.
Declaration of competing interest
The authors declare that they have no known competing nancial interests or personal relationships that could have appeared to
inuence the work reported in the paper which titled The Inuence of Cybercrime and Legal Awareness on the Behavior of University
of Jordan Students
Appendix A. Supplementary data
Supplementary data to this article can be found online at https://doi.org/10.1016/j.heliyon.2024.e32371.
References
[1] A. Reno, Reno v. ACLU, 521 U.S. 844, Retrieved from, https://supreme.justia.com/cases/federal/us/521/844/case.pdf, 1997.
[2] N. Dogruer, R. Eyyam, I. Menevis, The use of the Internet for educational purposes, Procedia-Social Behavioral Sciences 28 (2011) 606611.
[3] M. Choudhary, Cybercrime awareness among higher education students from Haryana with respect to various demographical variables, alArchs Journal of
Archaeology of Egypt/Egyptology 17 (7) (2020) 1445414461.
[4] Y. Shuqair, Cybercrime Laws in the Arab World, 2019. Retrieved from, https://arij.net/wp-content/uploads/2019/12/Policy-005.pdf.
[5] E.d. Argaez, Internet Usage in the Middle East, 2021. Retrieved from, https://www.internetworldstats.com/.
[6] I. Al Mubaidin, 8.7 million internet users in Jordan, Alghad (2020). Retrieved from, https://bit.ly/3jLv8mS.
[7] A.Y. Ismanto, A.S. Lamonge, N. Langingi, J. Pizarro, Students Perspectives and Experiences Regarding Digital Technology for Educational Purposes, 2021,
p. 2516, 2314. Retrieved from, https://easychair.org/publications/preprint_open/vdBd.
[8] J. Singh, K. Steele, L. Singh, Combining the best of online and face-to-face learning: hybrid and blended learning approach for covid-19, post-vaccine, & post-
pandemic world, J. Educ. Technol. Syst. 50 (2) (2021) 140171.
[9] J. Martinez, Take this pandemic moment to improve education, EdSource 22 (2020). Retrieved from, https://edsource.org/2020/take-this-pandemic-moment-
to-improve-education/633500.
[10] United Nations, Policy brief: education during COVID-19 and beyond, Retrieved from, https://unsdg.un.org/sites/default/les/2020-08/sg_policy_brief_covid-
19_and_education_august_2020.pdf, 2020.
[11] UNESCO, COVID-19: reopening and reimagining universities, survey on higher education through the UNESCO National Commissions, Retrieved from, https://
unesdoc.unesco.org/ark:/48223/pf0000378174, 2021.
[12] L. Mishra, T. Gupta, A. Shree, Online teaching-learning in higher education during the lockdown period of COVID-19 pandemic, International Journal of
Educational Research Open 1 (2020) 100012.
[13] C. Mambile, P. Mbogoro, Cybercrimes awareness, cyber laws and its practice in public sector Tanzania, International Journal of Advanced Technology
Engineering Exploration 7 (68) (2020) 119.
I. Alhadidi et al.
Heliyon 10 (2024) e32371
16
[14] S. Morgan, Cybercrime to Cost the World $10.5 Trillion Annually by 2025, Cybercrime Magazine, Nov. 13, 2020.
[15] R.S. Faqir, Cyber crimes in Jordan: a legal assessment on the effectiveness of information system crimes law No (30) of 2010, International Journal of Cyber
Criminology 7 (1) (2013).
[16] M. Abubaker, Computer Related Crimes Encyclopedia: Computer and Internet Crimes: Alexandria: the New Arabic Bureau, 2007.
[17] The Principle that Only the Law Can Dene a Crime and Prescribe a Penalty.
[18] A. Alnawayseh, Information Technology Offences: Explanation of Substantive Provisions in Cybercrimes Law, Dar Wael for publishing, Amman, 2017.
[19] A. Alnawayseh, Information Technology Offences: Explanation of Substantive Provisions in Cybercrimes Law, Dar Wael for publishing, Amman, 2017.
[20] A. Alnawayseh, Information Technology Offences: Explanation of Substantive Provisions in Cybercrimes Law, Dar Wael for publishing, Amman, 2017.
[21] A. Moallem, Cyber Security Awareness Among College Students, on Applied Human Factors and Ergonomics, 2018. Paper presented at the International
Conference.
[22] A. Garba, M.M. Siraj, S.H. Othman, M. Musa, A study on cybersecurity awareness among students in Yobe State University, Nigeria: a quantitative approach, Int.
J. Emerg. Technol. 11 (5) (2020) 4149.
[23] M. Alghareeb, H. Alameer, The Extent of Awareness Among the Young Age Group of the Saudi Cybercrime Penal System, 2017.
[24] A. Alzubaidi, Measuring the level of cyber-security awareness for cybercrime in Saudi Arabia 7 (1) (2021).
[25] T. Alharbi, A. Tassaddiq, Assessment of cybersecurity awareness among students of Majmaah university, Big Data and Cognitive Computing 5 (2) (2021) 23,
https://doi.org/10.3390/bdcc5020023.
[26] A. Manasrah, M. Akour, E. Alsukhni, Toward improving university students awareness of spam email and cybercrime: case study of Jordan. Paper Presented at
the 2015 First International Conference on Anti-cybercrime (ICACC), 2015.
[27] G. AlZeben, A. AlKharabsheh, Cybercrimes and the awareness of its danger eld study on Jordanian university youth, Journal of the Islamic University of
Human Research 29 (2) (2021).
[28] R. Alsawalqa, Cyberbullying, social stigma, and self-esteem: the impact of COVID-19 on students from East and Southeast Asia at the University of Jordan,
Heliyon 7 (4) (2021) e06711.
[29] M. Edaibes, 59% of high school graduates in 2021 are female, Retrieved from, https://www.sigi-jordan.org/?p=11373, 2021.
[30] U. Sekaran, J.R.G. Bougie, Research Methods for Business: A Skill Building Approach, fth ed., Wiley, Chichester, 2009.
[31] J.v. Triest, A new target group in probation: cybercrime offenders, Retrieved from, https://www.cep-probation.org/a-new-target-group-in-probation-
cybercrime-offenders/, 2018.
[32] E. Sutherland, D. Cressey, Principles of Criminology, Altamira Press, 1960.
[33] W.M. Hamdan, The Recurrence of Crime in Jordanian Society: a Field Social Study, University of Jordan, 2001.
[34] H. Saleh, Factors of Return to Crime. (Master), University of, Baghdad, 1984.
[35] A. Al-Majdoub, Returning Criminals, a statistical analysis study, The National Criminal Journal (1972). XV (Three).
[36] J.v. Triest, A new target group in probation: cybercrime offenders, Retrieved from, https://www.cep-probation.org/a-new-target-group-in-probation-
cybercrime-offenders/, 2018.
[37] F. Fatokun, S. Hamid, A. Norman, J. Fatokun, The impact of age, gender, and educational level on the cybersecurity behaviors of tertiary institution students: an
empirical investigation on Malaysian universities. Paper Presented at the Journal of Physics: Conference Series, 2019.
[38] T.R. Smith, Low self-control, staged opportunity, and subsequent fraudulent behavior, Crim. Justice Behav. 31 (5) (2004) 542563.
[39] M.R. Nakhaie, R.A. Silverman, T.C. LaGrange, Self-control and resistance to school, Canadian Review of Sociology/Revue canadienne de sociologie 37 (4)
(2000) 443460.
[40] C.H. Burt, Self-control and crime: beyond Gottfredson and Hirschis theory, Annual Review of Criminology 3 (1) (2020) 43.
[41] T.R. Smith, Low self-control, staged opportunity, and subsequent fraudulent behavior, Crim. Justice Behav. 31 (5) (2004) 542563.
[42] C.H. Burt, Self-control and crime: a sociological perspective, in: The Nurture versus Biosocial Debate in Criminology: on the Origins of Criminal Behavior and
Criminality, SAGE Publications Inc, 2014, pp. 143171.
[43] G.E. Higgins, Can low self-control help with the understanding of the software piracy problem? Deviant Behav. 26 (1) (2004) 124.
[44] H. Hirtenlehner, Self-control and crime over the life course, Journal of Criminology a Penal Reform 99 (6) (2016) 490491.
[45] M.R. Gottfredson, T. Hirschi, A general theory of crime, in: A General Theory of Crime, Stanford University Press, 2022.
[46] M. Tawaiha, Level of self-control and its relationship with impudent behavior among high school students in al- Ruseifa education directorate, (Master), Mutah
University, Jordan (2008).
[47] M. Titi, Code of Ethics, Professionalism and Responsibilities, Al-Ahliyyah Amman University, Ardhah, Jordan, 2003.
[48] F. Fatokun, S. Hamid, A. Norman, J. Fatokun, The impact of age, gender, and educational level on the cybersecurity behaviors of tertiary institution students: an
empirical investigation on Malaysian universities. Paper Presented at the Journal of Physics: Conference Series, 2019.
[49] M. Titi, Code of Ethics, Professionalism and Responsibilities, Al-Ahliyyah Amman University, Ardhah, Jordan, 2003.
I. Alhadidi et al.
... Research also indicates a strong and undeniable relationship between the level of legal awareness regarding cybercrime and students' involvement in illegal cyber activities (Alhadidi et al., 2024). Unfortunately, most students surveyed exhibited low levels of cybersecurity awareness, particularly among younger age groups. ...
... The prime challenges include absence of a common set syllabus, little to no faculty awareness, and few practical exposures to cyber law students (Gulyamov et al., 2023). Besides, the rapid rise in Internet and information technology use by students created colossal issues because of an unprecedented dependency on those technologies, consequently giving birth to a new spectrum of unlawful and illegal behaviors (Alhadidi et al., 2024). Another challenge lies in low-level cybersecurity awareness of students, especially at younger age groups, as well as a lack of understanding of common terms used in reference to cybersecurity and typical threats (Tirumala et al., 2016). ...
... Some of the opportunities include incorporating collaborative learning, simulations, real-world case studies, and technology among students in learning their cyber laws to improve the quality of teaching and outcomes (Gulyamov et al., 2023). Other opportunities include devising proper strategies to enhance the cybercrime awareness of students and subsequently decreasing their involvement in such types of crimes (Alhadidi et al., 2024). Furthermore, tailored cyber security training and interventions for students from higher learning institutions will enhance the improvement of their cyber security behavior (Fatokun et al., 2019). ...
Article
Full-text available
This study analyzes current trends in the integration of digital technologies with legal education and their impact on cybersecurity awareness among students. Through a bibliometric approach, the research identifies challenges, opportunities, and future directions in digital legal education, emphasizing the importance of a holistic approach that encompasses technical, digital rights, and ethical dimensions. While technology is increasingly embedded in legal education, human-centeredness and ethical considerations remain underrepresented in cybersecurity curricula. The findings reveal that current cybersecurity education predominantly focuses on technical and legal aspects, thereby neglecting critical humanistic factors necessary for comprehensive training. This paper underscores the need for more interactive and innovative educational strategies, such as collaborative learning and virtual reality simulations, to bridge the skills gap and adequately prepare students for the digital challenges of the modern world. Future research should further explore these strategies to enhance the effectiveness of cybersecurity education within legal studies, equipping students to navigate the complexities of a digitally driven age.
... Experts project global cybercrime costs to reach $6 trillion by 2021, and they anticipate an increase to $10.5 trillion by 2025. (Alhadidi, Nweiran, & Hilal, 2024). ...
... Male students may have a higher rate of cyber threat awareness due to personal experiences or knowledge gained from family members or acquaintances who have committed cybercrimes. (Alhadidi, Nweiran, & Hilal, 2024). ...
... Females' awareness of cybercrime legal procedures may be due to their fear and more cautious nature, supporting Titi's findings that women are more aware of cyber regulations than men. (Alhadidi, Nweiran, & Hilal, 2024). ...
Article
Full-text available
The study examines attributional differences in assessing the level of knowledge awareness about Jordanian Cybercrimes Law (JCL) among college students. The study sample comprised 500 Jordanian students representing four Jordanian universities (TTU, MU, JU, & BU). Of these, 43% were males, and 57% were females. Students (19%) reported being victims of cybercrimes, and 24% were perpetrators. Reliability as estimated by the scale’s Cronbach’s α was 0.66, and the validity (correlation between the scale and LSC scale) was 0.157 α = 0.00 (F = 187.161, α = 0.00). More than 25% of the sample read about the JCL and observed that the law has been politicized. Moreover, three-quarters of them heard about it. More than half of the sample witnessed illegal actions on the net that required punishment. Less than 10% of the sample dealt with the JCL or participated in an online action that required punishment. ANOVA analysis of the mean gender differences in cybercrime knowledge showed females were more knowledgeable about JCL than males (F = 4.402, α =.036). Furthermore, an ANOVA analysis of the mean external attribution differences (yes vs. no) in JCL knowledge (F = 4.402, α =.036) was performed. Finally, ANOVA analysis of the mean external attribution differences in the knowledge of JCL (F = 4.402, α =.036).
... Therefore policy awareness is essential for employees to ensure compliance [2]. A large volume of studies emphasised training and awareness; this establishes their important role in public service institutions [2,30,32,39,40,43,44,46,48,50,54]. ...
Article
Full-text available
This review addresses the fragmented literature on administrative interventions for cybercrime mitigation within e-government services, which often prioritise technological aspects over a unified theoretical framework. By analysing 32 peer-reviewed articles from the Web of Science (WoS) and Scopus databases, supplemented by additional sources located through Google Scholar, this study synthesises factors within the technical, managerial and behavioural domains using the Theory, Context and Method (TCM) framework. The findings reveal a predominant focus on managerial and technical factors, with behavioural aspects frequently overlooked. Cybercrime mitigation is often treated as a procedural step rather than a holistic process. This study advocates a well-established, context-specific mitigation plan, integrating regional factors through the Human–Organisation–Technology (HOT) framework to develop a comprehensive model for effective cybercrime mitigation in e-government services. This research has practical, theoretical and policy implications, offering actionable insights for improving operational practices, advancing theoretical frameworks and guiding policymakers in formulating effective cybercrime mitigation strategies.
Article
Full-text available
A lot of cybersecurity breaches occur due to human errors. Tertiary institutions need to enhance students’ cybersecurity awareness and capabilities, hence promoting safe cybersecurity behaviors. Socio-psychological factors affects students’ cybersecurity behaviors. We explore to what extent age, gender and educational level, plays a role in mediating the factors affecting tertiary institution students’ cybersecurity behaviors. A cross-sectional survey was conducted among 340 students and Structural Equation Modelling was employed for evaluating impacts. Data analysis was conducted via SPSS (V.25). Results show that students cybersecurity behaviors varies based on Age for factors such as: Perceived Severity, Peer Behavior, Familiarity with Cyber Threats, Response Efficacy and Perceived Vulnerability. Gender effects existed in Security Self Efficacy, Computer Skills, Cybersecurity Behaviors, Perceived Severity, and little effects in Prior Experiences with Computer Security Practices. Educational level differences existed in Cues to Action and Familiarity with Cyber-Threats. Age, gender and educational level are important factors in mediating students’ cybersecurity behaviors. Practically, our findings can instigate the need for specific/focused cybersecurity training and interventions for students in the tertiary institutions. It can also help cybersecurity training units in the tertiary institutions to target very vital components of cybersecurity behavior model, hence improving the cybersecurity behaviors of the students.
Article
Full-text available
The coronavirus disease 2019 (COVID-19) pandemic has changed the landscape of higher education. As academic institutions across the world continue to deal with the global health crisis, there is a need to examine different instructional approaches including online, hybrid, and blended learning methods. This descriptive study provide an in-depth review of the history of blended learning, evolution of hybrid model of instruction, preparedness of faculty with minimal or no experience in online teaching, and lessons learned as faculty worked on navigating COVID-19 situation since early 2020. A fish-bone analysis, a visual and structured approach to identify possible causes of problem, has been used to present the problems faced by faculty during the pandemic. A detailed Strength–Weakness–Opportunities–Threat analysis of blended/hybrid learning has been presented. An evidence-based approach on how instructors can combine the best of both traditional and online instruction to offer engaging learning experiences for students has been described. This research provides valuable insights to faculty and administrators who are preparing to teach during a pandemic and making efforts to academically survive it.
Article
Full-text available
Information exchange has become increasingly faster and efficient through the use of recent technological advances, such as instant messaging and social media platforms. Consequently, access to information has become easier. However, new types of cybersecurity threats that typically result in data loss and information misuse have emerged simultaneously. Therefore, maintaining data privacy in complex systems is important and necessary, particularly in organizations where the vast majority of individuals interacting with these systems is students. In most cases, students engage in data breaches and digital misconduct due to the lack of knowledge and awareness of cybersecurity and the consequences of cybercrime. The aim of this study was to investigate and evaluate the level of cybersecurity awareness and user compliance among undergraduate students at Majmaah University using a scientific questionnaire based on several safety factors for the use of the Internet. We quantitatively evaluated the knowledge of cybercrime and protection among students to show the need for user education, training, and awareness. In this study, we used a quantitative research methodology and conducted different statistical tests, such as ANOVA, Kaiser–Meyer–Olkin (KMO), and Bartlett’s tests, to evaluate and analyze the hypotheses. Safety concerns for electronic emails, computer viruses, phishing, forged ads, popup windows, and supplementary outbreaks on the Internet were well-examined in this study. Finally, we present recommendations based on the collected data to deal with this common problem.
Article
Full-text available
The spread of the COVID-19 pandemic has transformed the way people live, work, and socialize, and has perhaps even altered the reasons why they harass one another. To our knowledge, the present study is one of the first studies to address cyberbullying among university students during the COVID-19 pandemic. Additional objectives were to reveal the causes and types of cyberbullying that university students from East and Southeast Asia have experienced because of COVID-19, and to explore the relationship between cyberbullying and self-esteem. Of the 525 university students from different East and Southeast Asian countries and varied academic backgrounds who were invited to participate in the study, 310 students agreed and were included. Moreover, a sample of 400 Jordanian undergraduate students, who participated in cyberbullying against East and Southeast Asian students on social media, answered a questionnaire to reveal their reasons for engaging in bullying during the COVID-19 pandemic. This study also examined the relationship and differences between sex and nationality. The findings revealed that cyberbullying contributed to low self-esteem in students of East and Southeast Asian descent who were victims of bullying. Men were more likely to be bullies and cyberbullies than women. The bullies admitted that the main reason for cyberbullying was humor, and that they were unaware that their harsh or aggressive behaviors could be categorized as bullying. This study aimed to make a positive contribution to the scant literature on cyberbullying/cyber racism among university students in an Arab country. We believe our findings can help guide the formulation of policies and solutions that address cyberbullying, especially between resident and foreign students.
Article
Full-text available
Dr. Menka Choudhary, Cyber Crime Awareness among Higher Education Students from Haryana with respect to various demographical variables-Palarch's Journal Of Archaeology Of Egypt/Egyptology 17(7), ISSN 1567-214x Abstract: Now days, Internet is becoming an important part of our life. Everyone is very much depending on cyber world which also increase the space for cybercrime. Cybercrime is evolving as a very serious issue in today's scenario. The internet becomes integrated part of our lives because it brings joy or happinessbut sometime it becomes nightmare. There is a numerous trick used by cyber criminals to cheat people. Cyber world becomes forte of everyone, government sector to businessmen, school students to college students and teenagers to adults. In this study investigators want to investigate about the attitude towards cybercrime awareness among college students. For this purpose, investigator took 500 students from Haryana state belongs to professional as well as traditional courses. For data collection Cyber Crime Awareness Scale (CCAS-RS) by Dr. S. Rajasekar (2013) was used. In this result showed that professional students having more awareness to words cybercrime as compare traditional students but not any difference on the basis of gender. The study also showed Average Cyber Crime Awareness among the college students. As we know the cybercrimes are increasing day by day but we can reduce these crimes by using proper preventive measures. Everyone should always take some precautions while using the internet. Students can be aware by organizing workshops, seminars and conferences etc.
Article
Full-text available
The revolution in the Information Technology (IT) field has led to a significant increase in the number of people connected to and utilizing the Internet. However, it has also introduced severe security risks: valuable information such as passwords, financial accounts, and other confidential data are considered attractive targets for attackers. Cyber-attacks against this infrastructure can not only lead to data leakage but can also have significant financial implications and even lead to loss of life. Consequently, to defend against such attacks, and considering that humans have a key role in these technologies, it is important to increase cyber-security awareness. This paper focuses on measuring the current level of cyber-security awareness in Saudi Arabia, in terms of cyber-security practices, level of awareness, and incident reporting, by means of an online questionnaire with 1230 participants. The questionnaire results showed that 31.7% used public Wi-Fi to access the Internet, 51% used their personal information to create their passwords, 32.5% did not have any idea about phishing attacks, 21.7% had been victim of cybercrimes while only 29.2% of them reported the crime, which reflects their levels of awareness. The paper concludes by offering recommendations based on analysis of the results to promote the level of awareness.
Article
Full-text available
The whole educational system from elementary to tertiary level has been collapsed during the lockdown period of the novel coronavirus disease 2019 (COVID-19) not only in India but across the globe. This study is a portrayal of online teaching-learning modes adopted by the Mizoram University for the teaching-learning process and subsequent semester examinations. It looks forward to an intellectually enriched opportunity for further future academic decision-making during any adversity. The intended purpose of this paper seeks to address the required essentialities of online teaching-learning in education amid the COVID-19 pandemic and how can existing resources of educational institutions effectively transform formal education into online education with the help of virtual classes and other pivotal online tools in this continually shifting educational landscape. The paper employs both quantitative and qualitative approach to study the perceptions of teachers and students on online teaching-learning modes and also highlighted the implementation process of online teaching-learning modes. The value of this paper is to draw a holistic picture of ongoing online teaching-learning activities during the lockdown period including establishing the linkage between change management process and online teaching-learning process in education system amid the COVID-19 outbreak so as to overcome the persisting academic disturbance and consequently ensure the resumption of educational activities and discourses as a normal course of procedure in the education system.