Criminology Project Topics

A Research Proposal on Susceptibility of Nigerian Undergraduate Students to Social Engineering and Phishing Attacks

A Research Proposal on Susceptibility of Nigerian Undergraduate Students to Social Engineering and Phishing Attacks

A Research Proposal on Susceptibility of Nigerian Undergraduate Students to Social Engineering and Phishing Attacks

Chapter One

Objective of the Study

The main objective of this study is to assess the susceptibility of Nigerian undergraduate students to social engineering and phishing attacks. Specific objectives include:

  1. To evaluate the level of awareness and understanding of social engineering and phishing attacks among Nigerian undergraduate students.
  2. To identify the primary factors that contribute to the susceptibility of Nigerian undergraduate students to social engineering and phishing attacks.
  3. To analyze the impact of susceptibility to social engineering and phishing attacks on the academic performance of Nigerian undergraduate students.
  4. To determine the effectiveness of current educational and preventive measures in reducing susceptibility to social engineering and phishing attacks among Nigerian undergraduate students.

CHAPTER TWO

Literature Review

Digital Age and Cybersecurity

The term “digital age,” also known as the information age, refers to the era characterized by the rapid advancement and widespread adoption of digital technologies. This period began in the late 20th century and continues to evolve with the proliferation of computers, the internet, and digital communication tools (Al-Mutairi, Alhajri, & Alsabaan, 2020). The digital age has transformed traditional methods of information processing and dissemination, leading to a fundamental shift in how people access, share, and interact with data. It encompasses a broad range of technologies, including personal computers, smartphones, social media platforms, and cloud computing, all of which have become integral to everyday life (Bernard, 2022).

The scope of the digital age extends beyond mere technological advancements; it also includes changes in societal behaviours and business practices. For instance, digital technologies have revolutionized communication, enabling instant connectivity across the globe. This has facilitated new forms of interaction, such as social networking and online collaboration, which were previously unimaginable (Bertot, Jaeger, & Grimes, 2020). Additionally, the digital age has significantly impacted commerce, with e-commerce platforms and digital payment systems becoming dominant modes of transaction. As digital technologies continue to evolve, they further integrate into various aspects of personal and professional life, shaping the way individuals and organizations operate (Fink, 2021).

The rapid advancement of digital technologies, while offering numerous benefits, has also introduced significant risks, making cybersecurity a critical concern in the modern era. Cybersecurity encompasses the practices, technologies, and processes designed to protect digital information and systems from unauthorized access, attacks, and damage (Shahbaznezhad, Kolini, & Rashidirad, 2021). As digital platforms and technologies become increasingly central to personal and organizational activities, the potential for cyber threats grows correspondingly. Cybersecurity is thus essential for safeguarding sensitive data, maintaining the integrity of digital systems, and ensuring the privacy of users (Eftimie, Moinescu, & Răcuciu, 2022).

The importance of cybersecurity is underscored by the increasing frequency and sophistication of cyber-attacks. Cybercriminals employ various tactics, such as malware, ransomware, and phishing, to exploit vulnerabilities and gain unauthorized access to data (Choi & Kim, 2022). For example, social engineering attacks, which manipulate individuals into divulging confidential information, have become more prevalent, targeting unsuspecting users who may not have robust security practices in place (Ghosh, 2023). These attacks not only threaten personal privacy but also pose risks to organizational security and national infrastructure.

Moreover, the impact of cyber-attacks can be severe, resulting in financial losses, reputational damage, and legal consequences for affected individuals and entities (Khan & Shaikh, 2021). As digital systems are increasingly integrated into critical sectors, such as finance, healthcare, and education, the need for effective cybersecurity measures becomes even more pressing. Ensuring robust cybersecurity practices helps mitigate these risks, protecting both individual and institutional interests from potential harm (Liu, Zheng, & Wu, 2022).

In conclusion, the digital age has brought about transformative changes in how information is accessed and shared, leading to significant advancements and opportunities. However, this evolution has also introduced new challenges, particularly concerning cybersecurity. As digital technologies continue to advance and integrate further into various aspects of life, the importance of robust cybersecurity measures becomes increasingly evident. Protecting digital information and systems is crucial for ensuring the safety, privacy, and integrity of data in the modern era (Yang & Zhang, 2023).

 

Chapter Three

Methodology

 Research Design

The research design for this study will adopt a quantitative survey research design, chosen for its capacity to systematically collect, measure, and analyze data in a structured manner. This design will provide a comprehensive framework for investigating the prevalence of cybersecurity vulnerabilities among Nigerian undergraduate students and assessing their impact on academic performance. The quantitative approach is particularly suited for this study because it facilitates the collection of numerical data that can be subjected to statistical analysis, allowing for precise measurement of relationships and outcomes (Saunders, Lewis, & Thornhill, 2019).

By employing a quantitative survey research design, the study aims to quantify various aspects of cybersecurity awareness and vulnerability among students. This design will allow for the collection of data from a large sample, which enhances the generalizability of the findings across the population of Nigerian undergraduates. The structured questionnaire, a key component of this design, will be utilized to gather data systematically. This approach will ensure that all participants respond to the same set of questions, thereby providing standardized information that can be directly compared and analyzed (Bell, Bryman, & Harley, 2019).

The use of a structured questionnaire will facilitate the gathering of consistent and comparable data. The questionnaire will be meticulously developed to include a range of questions that address various dimensions of cybersecurity, including awareness levels, perceived vulnerabilities, and engagement with protective practices. The structured nature of the questionnaire will allow for the collection of quantitative data, which can be analyzed to identify patterns, correlations, and trends. This method of data collection is advantageous because it enables researchers to handle large volumes of data efficiently and apply statistical techniques to derive meaningful insights.

Furthermore, the quantitative survey research design will support the identification of relationships between cybersecurity awareness and academic performance among Nigerian students. By analyzing the data collected through the structured questionnaire, the study will be able to examine how different levels of cybersecurity awareness correlate with students’ experiences and challenges related to cybersecurity threats. This approach will provide valuable insights into how vulnerabilities impact academic performance and help in understanding the broader implications of cybersecurity issues in the educational context.

Population of the Study

The target population for this study will consist of 1,200 Nigerian undergraduate students from various universities. This population will be chosen due to their high engagement with digital platforms and their potential vulnerability to cyber threats. Frankfort-Nachmias, Nachmias, and DeWaard (2021) highlight the increasing reliance on digital tools among students, making them a critical demographic for studying cybersecurity awareness and practices. Nigerian universities will be selected for their progressive integration of digital resources into curricula, reflecting the relevance of this population for capturing insights into cybersecurity vulnerabilities and awareness.

References

  • Yasin, A., & Abuhasan, A. (2022). An intelligent classification model for phishing email detection. arXiv preprint arXiv:1608.02196. https://doi.org/10.48550/arXiv.1608.02196
  • Jain, A. K., & Gupta, B. B. (2017). Phishing detection: Analysis of visual similarity-based approaches. Security and Communication Networks, 2017, 5421046. https://doi.org/10.1155/2017/5421046
  • Eftimie, S., Moinescu, R., & Răcuciu, C. (2022). Spearphishing susceptibility stems from personality traits. IEEE Access, 10, 73548–73561. https://doi.org/10.1109/ACCESS.2022.3190009.
  • Das, S., Nippert-Eng, C., & Camp, L. J. (2022). Evaluating user susceptibility to phishing attacks. Information and Computer Security, 30(1), 1–18. https://doi.org/10.1108/ICS-12-2020-0204
  • Jain, A. K., & Gupta, B. B. (2022). A survey of phishing attack techniques, defence mechanisms and open research challenges. Enterprise Information Systems, 16(4), 527–565. https://doi.org/10.1080/17517575.2021.1896786.
  • Daengsi, T., Pornpongtechavanich, P., & Wuttidittachotti, P. (2022). Cybersecurity awareness enhancement: A study of the effects of age and gender of Thai employees associated with phishing attacks. Education and Information Technologies, 27(4), 4729–4752. https://doi.org/10.1007/s10639-021-10806-7.
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!