Cybersecurity Literacy and Online Risk Management among First-Year IT Students

Authors

Eric B. Bulala

State University of Northern Negros, Sagay, Negros Occidental (Philippines)

Mark Angelou A. Balonga

State University of Northern Negros, Sagay, Negros Occidental (Philippines)

Alvin M. Boncales

State University of Northern Negros, Sagay, Negros Occidental (Philippines)

Kristine T. Soberano

State University of Northern Negros, Sagay, Negros Occidental (Philippines)

Article Information

DOI: 10.51244/IJRSI.2026.1304000071

Subject Category: Information Technology

Volume/Issue: 13/4 | Page No: 719-729

Publication Timeline

Submitted: 2026-04-04

Accepted: 2026-04-10

Published: 2026-04-30

Abstract

This research examined the cybersecurity literacy and online risk management behaviors of first-year Information Technology (IT) students at three colleges in the Philippines. The study's objectives were to evaluate students' understanding of cybersecurity threats, pinpoint prevalent risky online behaviors, and analyze the correlation between cybersecurity literacy and online risk management practices. A descriptive quantitative research design was utilized, and data were gathered from 250 first-year IT students through a structured questionnaire assessing cybersecurity knowledge and online risk management.
The results revealed that, despite students exhibiting a generally high degree of confidence in their ability to manage online risks, certain insecure practices persisted. Many respondents reported infrequent password updates (38% changing passwords only once a year and 29.6% rarely or never updating). The results also revealed that a large proportion of students entered the IT program with minimal formal cybersecurity training (32.4% had not taken any IT-related courses at all), as most respondents came from non-technical Senior High School strands (70%). Statistical analysis showed no significant differences in cybersecurity literacy and online risk management practices between male and female students (p = 0.815). Furthermore, Pearson correlation analysis revealed a statistically significant but weak positive relationship between cybersecurity literacy and online risk management (r = 0.27, p = 0.001).
The research findings indicated a discrepancy between students' self-assessed cybersecurity preparedness and their actual online behaviors. Specifically, students' expressed confidence did not always correlate with secure practices. Consequently, the study suggested incorporating practical, scenario-driven cybersecurity instruction into the foundational IT curriculum. This integration aimed to boost students' digital resilience and encourage safer online conduct.

Keywords

Cybersecurity, Cybersecurity literacy

Downloads

References

1. Abdulla, R. M., Faraj, H. A., Abdullah, C. O., Amin, A. H., & Rashid, T. A. (2023). Analysis of social engineering awareness among students and lecturers. IEEE Access, 11, 101098–101111. https://doi.org/10.1109/access.2023.3311708 [Google Scholar] [Crossref]

2. Albladi, S. M., & Weir, G. R. S. (2018). User characteristics that influence judgment of social engineering attacks in social networks. Human-Centric Computing and Information Sciences, 8(1). https://doi.org/10.1186/s13673-018-0128-7 [Google Scholar] [Crossref]

3. Aldawood, H., Alashoor, T., & Skinner, G. (2020). Does awareness of social engineering make employees more secure? International Journal of Computer Applications, 177(38). https://www.ijcaonline.org/archives/volume177/number38/aldawood-2020-ijca-919891.pdf [Google Scholar] [Crossref]

4. Alnifie, K. M., & Kim, C. (2023). Appraising the manifestation of optimism bias and its impact on human perception of cyber security: A meta-analysis. Journal of Information Security, 14(2), 93–110. https://doi.org/10.4236/jis.2023.142007 [Google Scholar] [Crossref]

5. Alshammari, S. S., Soh, B., & Li, A. (2025). Understanding social engineering victimisation on social networking sites: A comprehensive review of factors influencing user susceptibility to cyber-attacks. Information, 16(2), 153. https://doi.org/10.3390/info16020153 [Google Scholar] [Crossref]

6. Bandura, A. (1997). Self-efficacy: The exercise of control. W. H. Freeman. [Google Scholar] [Crossref]

7. Bashir, M., Wee, C., Memon, N., & Guo, B. (2016). Profiling cybersecurity competition participants: Self-efficacy, decision-making, and interests predict effectiveness of competitions as a recruitment tool. Computers & Security, 65, 153–165. https://doi.org/10.1016/j.cose.2016.10.007 [Google Scholar] [Crossref]

8. Concon, A. F., Arances, A. C., Lorican, F., & Soberano, K. (2025). Cyber literacy and cyber risk mitigation program of one municipal college in the Philippines. GAS Journal of Engineering and Technology, 2(6), 21–29. https://gaspublishers.com/wp-content/uploads/2025/08/Cyber-Literacy-and-Cyber-Risk-Mitigation-Program-of-One-Municipal-College-in-the-Philippines.pdf [Google Scholar] [Crossref]

9. Djatsa, F. (2019). How perceived benefits and barriers affect millennial professionals’ online security behaviors. Journal of Information Security, 10(4), 278–301. https://doi.org/10.4236/jis.2019.104016 [Google Scholar] [Crossref]

10. Furnell, S., & Clarke, N. (2012). Power to the people: The evolving recognition of human aspects of security. Computers & Security, 31(8), 983–988. https://doi.org/10.1016/j.cose.2012.01.008 [Google Scholar] [Crossref]

11. Javier, D. R. C. (2023). Awareness of senior high school students on digital literacy skills: A qualitative study. ResearchGate. https://www.researchgate.net/publication/369243517 [Google Scholar] [Crossref]

12. Ng, B., Kankanhalli, A., & Xu, Y. (2008). Studying users’ computer security behavior: A health belief perspective. Decision Support Systems, 46(4), 815–825. https://doi.org/10.1016/j.dss.2008.11.010 [Google Scholar] [Crossref]

13. Parikh, V., & Nimbekar, M. (2023). Socializing the Impact: An analysis of the theory of planned behavior’s influence on increasing university students’ cybersecurity awareness. Journal of Community and Development, 4(2), 139–156. https://doi.org/10.47134/comdev.v4i2.162 [Google Scholar] [Crossref]

14. Saeed, S. (2023). Education, online presence and cybersecurity implications: A study of information security practices of computing students in Saudi Arabia. Sustainability, 15(12), 9426. https://doi.org/10.3390/su15129426 [Google Scholar] [Crossref]

15. Xue, B., Warkentin, M., Mutchler, L. A., & Balozian, P. (2021). Self-efficacy in information security: A replication study. Journal of Computer Information Systems, 63(1), 1–10. https://doi.org/10.1080/08874417.2021.2015725 [Google Scholar] [Crossref]

16. Zwilling, M., Klien, G., Lesjak, D., Wiechetek, Ł., Cetin, F., & Basim, H. N. (2020). Cyber Security Awareness, Knowledge and Behavior: A Comparative study. Journal of Computer Information Systems, 62(1), 82–97. https://doi.org/10.1080/08874417.2020.1712269 [Google Scholar] [Crossref]

Metrics

Views & Downloads

Similar Articles