FORMATION OF CYBER HYGIENE IN HIGHER EDUCATION INSTITUTIONS: ORGANIZATIONAL AND PEDAGOGICAL APPROACHES AND PRACTICAL STRATEGIES
DOI:
https://doi.org/10.31392/UDU-nc.series2.2025.24(31).07Keywords:
cyber hygiene, cybersecurity, higher education, pedagogical strategies, organizational measures, gamification, digital literacyAbstract
The article is dedicated to analyzing the organizational and pedagogical foundations of forming cyber hygiene in higher education institutions (HEIs) amid the growing cyber threats. The relevance is driven by the intensive digitalization of education, accompanied by an increase in cyber incidents such as phishing, data leaks, and attacks on HEI information systems. The aim is to develop conceptual approaches to forming cyber hygiene, considering organizational and pedagogical factors to ensure a secure digital environment. The study is based on a mixed methodology, including qualitative and quantitative methods. It analyzes the theoretical foundations of cyber hygiene, particularly psychological and behavioral aspects. The current state of cyber hygiene implementation in Ukrainian HEIs is examined, where resource shortages, fragmented regulatory frameworks, and low motivation among educational process participants hinder a systematic approach. A comparison is made with international experiences, including post-Soviet countries like Estonia, where cyber hygiene is integrated through public-private partnerships, and EU and US countries. Practical strategies are proposed: organizational measures, pedagogical approaches, collaboration with IT companies. A phased model for cyber hygiene formation is developed: needs assessment, creation of tailored materials, training of students, faculty, staff, and effectiveness monitoring. The results can be used to develop training programs, methodological guidelines, and regulations to enhance cybersecurity in education. Future research prospects include empirical testing of the strategies in Ukrainian HEIs, evaluating their impact on educational process security, and scaling the model to other educational levels, such as secondary education. The article emphasizes the need for an interdisciplinary approach combining organizational, pedagogical, and technological aspects.