Level of Awareness of Jordanian Universities Professors of Cybersecurity: Skills and ‎Challenges

Authors

DOI:

https://doi.org/10.35516/Hum.2025.7917

Keywords:

cybersecurity, digital transformations, Jordanian universities, professors

Abstract

Objectives: The study aims to assess the level of awareness among Jordanian university professors regarding cybersecurity, identify the key challenges they face in acquiring sufficient knowledge about it, and explore its implications.

Methods: A descriptive approach was adopted, using a questionnaire distributed to 55 curriculum professors selected through an accumulative sample from a population of 120 professors in the same specialization from four Jordanian universities: Middle East University, Petra University, Amman Arab University, and Applied Science University. The sample was limited to those with at least the minimum knowledge required in higher education.

Results: The findings indicated that faculty members believe there is an organized global cyberwar and that communication applications do not adequately address cybersecurity needs. The most common motivations for cybersecurity violations were identified as extortion, theft, and obtaining information. Faculty members' skills were mainly limited to taking precautionary steps when receiving emails, but the biggest challenge was the lack of cybersecurity awareness courses provided by the universities.

Conclusions: The professors' skills were confined to taking precautionary measures in handling emails and securing their accounts using multiple methods. However, the most significant challenge was the scarcity of awareness activities that universities should organize for both professors and staff.

Downloads

Download data is not yet available.

References

Abdelhameed, M. (2007). Communication and Media on the Internet (1st ed.). The Books World.

Aho, K. (2005). Teaching Digital Communication to All Students. T H E Journal, 32(10).

Aleessawi, N. (2022). Using the Digital Platforms by Journalists of the Middle East and North Africa (MENA) in Promoting Common Human Values. Dirasat: Human and Social Sciences, 49(5), 454–465. https://doi.org/doi.org/10.35516/hum.v49i5.3494

Aleessawi, N. (2024). Cybersecurity. Media and Public Relations. https://najmaleessawi.blogspot.com/

Al-Manea, A. A. R. (2022). Requirements for achieving cybersecurity in Saudi universities in light of Vision 2030. Faculty of Education Journal, 38(1), 156–194.

Al-Otaibi, M. (2020). Electronic journalism’s treatment of cybersecurity crimes in the Kingdom of Saudi Arabia, content analysis study [ Master’s thesis]. Naif Arab University for Security Sciences.

Bin Trad, W., & Bouza, B. (2020). Theoretical frameworks that explain network media between effectiveness and limitation. Maalem Journal for Media and Communication Studies, 1(1), 44–77. https://www.asjp.cerist.dz/en/article/150327

Bougerara, Y. (2018). Cybernetic Security : The Algerian strategy of security and defense in cyberspace. Journal of African and Nile Basin, 1(3), 100–119.

Burton-Howard, V., & Jordan, L. (2018). Protecting Small Business Information from Cyber Security Criminals: A Qualitative Study. http://chain.kent.ac.uk/login?url=https://www.proquest.com/dissertations-theses/protecting-small-business-information-cyber/docview/2133581243/se-2?accountid=7408%0Ahttps://chain.kent.ac.uk/login?url=https://resolver.ebscohost.com/openurl?sid=&genre=disse

Bynum, T. W., & Rogerson, S. (2003). Computer Ethics and Professional Responsibility (1st ed.). Wiley-Blackwell.

Catota, F. E., Granger Morgan, M., & Sicker, D. C. (2019). Cybersecurity education in a developing nation: The Ecuadorian environment. Journal of Cybersecurity, 5(1). https://doi.org/10.1093/cybsec/tyz001

Cybertalents. (2023). What is Cybercrime? Types, Examples, and Prevention. Cybertalents. https://cybertalents.com/blog/what-is-cyber-crime-types-examples-and-prevention

Faraj, A. O. K. (2021). The Reasons for Promoting Cyber Security Culture in Light of Digital Transformation Prince Sattam Bin Abdulaziz University as a Model. Educational Journal, 94(1).

Fidler, R. (2012). Mediamorphosis: Understanding New Media. SAGE Publications, Inc. https://doi.org/10.4135/9781452233413

Herath, T. B. G., Khanna, P., & Ahmed, M. (2022). Cybersecurity Practices for Social Media Users: A Systematic Literature Review. Journal of Cybersecurity and Privacy, 2(1), 1–18. https://doi.org/10.3390/jcp2010001

Hernandez, J. (2024). Cybersecurity challenges in education. https://preyproject.com/blog/cybersecurity-challenges-in-education

Himma, K. E., & Tavani, H. T. (2009). The Handbook of Information and Computer Ethics. In The Handbook of Information and Computer Ethics. https://doi.org/10.1002/9780470281819

Jilani, D., & Yaqoub, B. (2021). Bets of National Cybersecurity in Light of Digital Transformation, A Reading of Cognitive Rooting and Legislative Confrontation Strategies. Journal of the Kuwait International College of Law, 1(37).

Alsayyed, M. N. (2021). Cyber Security and Its Relationship to Media Content in Light of Egypt’s Vision 2030. Arab Journal of Media and Communication Sciences, 2021(35), 484–514. https://doi.org/10.21608/jkom.2021.226471

Moskal, E. J. (2014). A model for establishing a cybersecurity center of excellence. 2014 Proceedings of the Information Systems Educators Conference, ISECON 2014.

Nyinkeu, N. D., Anye, D., Kwedeu, L., & Buttler, W. (2018). Cyber Education outside the Cyberspace: The case of the Catholic University Institute of Buea. International Journal of Technology in Teaching and Learning, 14(2). https://doi.org/10.37120/ijttl.2018.14.2.04

Olejnik, L., & Kurasiński, A. (2023). Philosophy of Cybersecurity. In Philosophy of Cybersecurity. https://doi.org/10.1201/9781003408260

Petra. (2024). The University of Petra. UOP. https://www.uop.edu.jo/ar/pages/default.aspx

Petra. (2024). Jordan Develops Advanced Infrastructure with Cybersecurity Law. Petra. https://www.petra.gov.jo/Include/InnerPage.jsp?ID=285846

Ris, K., & Puvača, M. (2024). Digital Transformation Handbook (1st ed.). CRC Press, Taylor & Francis Group.

Shea, S., & Gillis, A. S. (2024). The ultimate guide to cybersecurity planning for businesses. Tech Accelerator. https://www.techtarget.com/searchsecurity/definition/cybersecurity

StrongBox IT. (2024). The Role of Cybersecurity in Schools and Universities . StrongBox IT. https://www.linkedin.com/pulse/role-cybersecurity-schools-universities-strongbox-it-pvt-ltd-jpdte

Tammar, Y. (2010). Sample in Communication Media Studies. Baghdadi for publishing.

World Population Review. (2024). Internet Users by Country 2024. Worldpopulationreview. https://worldpopulationreview.com/country-rankings/internet-users-by-country

Zhang, Y., Li, M. D., & Zhang, H. B. (2017). Solution of Media Risk and Social Responsibility Governance of Social Media. ITM Web of Conferences, 11, 01007. https://doi.org/10.1051/itmconf/20171101007

Downloads

Published

2025-10-01

How to Cite

Makanai, S. Y., Aleessawi, N. A. K. A., & Altarawneh, M. H. M. (2025). Level of Awareness of Jordanian Universities Professors of Cybersecurity: Skills and ‎Challenges. Dirasat: Human and Social Sciences, 53(3), 7917. https://doi.org/10.35516/Hum.2025.7917

Issue

Section

Mass Communication
Received 2024-06-10
Accepted 2024-10-20
Published 2025-10-01