Level of Awareness of Jordanian Universities Professors of Cybersecurity: Skills and Challenges
DOI:
https://doi.org/10.35516/Hum.2025.7917Keywords:
cybersecurity, digital transformations, Jordanian universities, professorsAbstract
Objectives: The study aims to assess the level of awareness among Jordanian university professors regarding cybersecurity, identify the key challenges they face in acquiring sufficient knowledge about it, and explore its implications.
Methods: A descriptive approach was adopted, using a questionnaire distributed to 55 curriculum professors selected through an accumulative sample from a population of 120 professors in the same specialization from four Jordanian universities: Middle East University, Petra University, Amman Arab University, and Applied Science University. The sample was limited to those with at least the minimum knowledge required in higher education.
Results: The findings indicated that faculty members believe there is an organized global cyberwar and that communication applications do not adequately address cybersecurity needs. The most common motivations for cybersecurity violations were identified as extortion, theft, and obtaining information. Faculty members' skills were mainly limited to taking precautionary steps when receiving emails, but the biggest challenge was the lack of cybersecurity awareness courses provided by the universities.
Conclusions: The professors' skills were confined to taking precautionary measures in handling emails and securing their accounts using multiple methods. However, the most significant challenge was the scarcity of awareness activities that universities should organize for both professors and staff.
Downloads
References
Abdelhameed, M. (2007). Communication and Media on the Internet (1st ed.). The Books World.
Aho, K. (2005). Teaching Digital Communication to All Students. T H E Journal, 32(10).
Aleessawi, N. (2022). Using the Digital Platforms by Journalists of the Middle East and North Africa (MENA) in Promoting Common Human Values. Dirasat: Human and Social Sciences, 49(5), 454–465. https://doi.org/doi.org/10.35516/hum.v49i5.3494
Aleessawi, N. (2024). Cybersecurity. Media and Public Relations. https://najmaleessawi.blogspot.com/
Al-Manea, A. A. R. (2022). Requirements for achieving cybersecurity in Saudi universities in light of Vision 2030. Faculty of Education Journal, 38(1), 156–194.
Al-Otaibi, M. (2020). Electronic journalism’s treatment of cybersecurity crimes in the Kingdom of Saudi Arabia, content analysis study [ Master’s thesis]. Naif Arab University for Security Sciences.
Bin Trad, W., & Bouza, B. (2020). Theoretical frameworks that explain network media between effectiveness and limitation. Maalem Journal for Media and Communication Studies, 1(1), 44–77. https://www.asjp.cerist.dz/en/article/150327
Bougerara, Y. (2018). Cybernetic Security : The Algerian strategy of security and defense in cyberspace. Journal of African and Nile Basin, 1(3), 100–119.
Burton-Howard, V., & Jordan, L. (2018). Protecting Small Business Information from Cyber Security Criminals: A Qualitative Study. http://chain.kent.ac.uk/login?url=https://www.proquest.com/dissertations-theses/protecting-small-business-information-cyber/docview/2133581243/se-2?accountid=7408%0Ahttps://chain.kent.ac.uk/login?url=https://resolver.ebscohost.com/openurl?sid=&genre=disse
Bynum, T. W., & Rogerson, S. (2003). Computer Ethics and Professional Responsibility (1st ed.). Wiley-Blackwell.
Catota, F. E., Granger Morgan, M., & Sicker, D. C. (2019). Cybersecurity education in a developing nation: The Ecuadorian environment. Journal of Cybersecurity, 5(1). https://doi.org/10.1093/cybsec/tyz001
Cybertalents. (2023). What is Cybercrime? Types, Examples, and Prevention. Cybertalents. https://cybertalents.com/blog/what-is-cyber-crime-types-examples-and-prevention
Faraj, A. O. K. (2021). The Reasons for Promoting Cyber Security Culture in Light of Digital Transformation Prince Sattam Bin Abdulaziz University as a Model. Educational Journal, 94(1).
Fidler, R. (2012). Mediamorphosis: Understanding New Media. SAGE Publications, Inc. https://doi.org/10.4135/9781452233413
Herath, T. B. G., Khanna, P., & Ahmed, M. (2022). Cybersecurity Practices for Social Media Users: A Systematic Literature Review. Journal of Cybersecurity and Privacy, 2(1), 1–18. https://doi.org/10.3390/jcp2010001
Hernandez, J. (2024). Cybersecurity challenges in education. https://preyproject.com/blog/cybersecurity-challenges-in-education
Himma, K. E., & Tavani, H. T. (2009). The Handbook of Information and Computer Ethics. In The Handbook of Information and Computer Ethics. https://doi.org/10.1002/9780470281819
Jilani, D., & Yaqoub, B. (2021). Bets of National Cybersecurity in Light of Digital Transformation, A Reading of Cognitive Rooting and Legislative Confrontation Strategies. Journal of the Kuwait International College of Law, 1(37).
Alsayyed, M. N. (2021). Cyber Security and Its Relationship to Media Content in Light of Egypt’s Vision 2030. Arab Journal of Media and Communication Sciences, 2021(35), 484–514. https://doi.org/10.21608/jkom.2021.226471
Moskal, E. J. (2014). A model for establishing a cybersecurity center of excellence. 2014 Proceedings of the Information Systems Educators Conference, ISECON 2014.
Nyinkeu, N. D., Anye, D., Kwedeu, L., & Buttler, W. (2018). Cyber Education outside the Cyberspace: The case of the Catholic University Institute of Buea. International Journal of Technology in Teaching and Learning, 14(2). https://doi.org/10.37120/ijttl.2018.14.2.04
Olejnik, L., & Kurasiński, A. (2023). Philosophy of Cybersecurity. In Philosophy of Cybersecurity. https://doi.org/10.1201/9781003408260
Petra. (2024). The University of Petra. UOP. https://www.uop.edu.jo/ar/pages/default.aspx
Petra. (2024). Jordan Develops Advanced Infrastructure with Cybersecurity Law. Petra. https://www.petra.gov.jo/Include/InnerPage.jsp?ID=285846
Ris, K., & Puvača, M. (2024). Digital Transformation Handbook (1st ed.). CRC Press, Taylor & Francis Group.
Shea, S., & Gillis, A. S. (2024). The ultimate guide to cybersecurity planning for businesses. Tech Accelerator. https://www.techtarget.com/searchsecurity/definition/cybersecurity
StrongBox IT. (2024). The Role of Cybersecurity in Schools and Universities . StrongBox IT. https://www.linkedin.com/pulse/role-cybersecurity-schools-universities-strongbox-it-pvt-ltd-jpdte
Tammar, Y. (2010). Sample in Communication Media Studies. Baghdadi for publishing.
World Population Review. (2024). Internet Users by Country 2024. Worldpopulationreview. https://worldpopulationreview.com/country-rankings/internet-users-by-country
Zhang, Y., Li, M. D., & Zhang, H. B. (2017). Solution of Media Risk and Social Responsibility Governance of Social Media. ITM Web of Conferences, 11, 01007. https://doi.org/10.1051/itmconf/20171101007
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Dirasat: Human and Social Sciences

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Accepted 2024-10-20
Published 2025-10-01


