(Publisher of Peer Reviewed Open Access Journals)

International Journal of Advanced Technology and Engineering Exploration (IJATEE)

ISSN (Print):2394-5443    ISSN (Online):2394-7454
Volume-8 Issue-74 January-2021
Full-Text PDF
Paper Title : Assessing the influential factors of cybersecurity awareness in Malaysia during the pandemic outbreak: a structural equation modeling
Author Name : Siti Daleela Mohd Wahid, Alya Geogiana Buja, Mohd Nor Hajar Hasrol Jono and Azlan Abdul Aziz
Abstract :

The advanced growth of communication technology today greatly has brought benefits in many ways, but it has indirectly led to the exposure of data privacy and safety of end users to the outsiders. Due to the Covid-19 pandemic, all citizens are required to stay at home and most of their times have been used on the internet for their leisure, study and work purposes. The massive use of internet lead to cybercriminal like scam, fraud, hacking and cyber bullying. It has been reported that the senior adult is the most affected group. Using the Information Security Awareness Model (ISACM) and the Situation Awareness Cybersecurity Education Model (SAOCE), this study aims to develop a cybersecurity awareness model that can assist the elderly from attacks in cyberspace. Methodologically, this paper is quantitative in nature and recruits 300 senior adults from age 50 until above 60 years via convenience sampling technique. We identified three factors namely organization, social and individual influencing cybersecurity awareness. The result revealed that organization factors significantly related to cybersecurity awareness with value of β=0.151, p=0.025, meanwhile for social and individual factors are found less significant to cybersecurity awareness with values β=-0.066, p=0.328 and β=0.045, p=0.463 respectively. With the development of cybersecurity awareness model, we are confident that our model can contribute to the body of knowledge within the cybersecurity context.

Keywords : Covid-19, Cybersecurity awareness, Elderly, Structural equation modelling.
Cite this article : Wahid SD, Buja AG, Jono MH, Aziz AA. Assessing the influential factors of cybersecurity awareness in Malaysia during the pandemic outbreak: a structural equation modeling. International Journal of Advanced Technology and Engineering Exploration. 2021; 8(74):73-81. DOI:10.19101/IJATEE.2020.S1762116.
References :
[1]https://eandt.theiet.org/content/articles/2017/01/the-elderly-most-at-risk-from-cyber-crime-report-warns/. Accessed 26 October 2020.
[2]Shao J, Zhang Q, Ren Y, Li X, Lin T. Why are older adults victims of fraud? current knowledge and prospects regarding older adults’ vulnerability to fraud. Journal of Elder Abuse & Neglect. 2019; 31(3):225-43.
[Crossref] [Google Scholar]
[3]König R, Seifert A, Doh M. Internet use among older Europeans: an analysis based on SHARE data. Universal Access in the Information Society. 2018; 17(3):621-33.
[Crossref] [Google Scholar]
[4]https://cybersecurityventures.com/3-cyber-fraud-tactics-targeting-seniors-and-why-theyre-so-effective/. Accessed 26 October 2020.
[5]Morrison BA, Coventry L, Briggs P. Technological change in the retirement transition and the implications for cybersecurity vulnerability in older adults. Frontiers in Psychology. 2020; 11:623.
[Crossref] [Google Scholar]
[6]Tan SL, Vergara RG, Khan N, Khan S. Cybersecurity and privacy impact on older persons amid COVID-19: a socio-legal study in Malaysia. Asian Journal of Research in Education and Social Sciences. 2020; 2(2):72-6.
[Google Scholar]
[7]Poepjes R, Lane M. An information security awareness capability model (ISACM). Australian information security management conference. 2012.
[Crossref] [Google Scholar]
[8]Dai J. Situation awareness-oriented cybersecurity education. In frontiers in education conference 2018 (pp. 1-8). IEEE.
[Crossref] [Google Scholar]
[9]Simonet J, Teufel S. The influence of organizational, social and personal factors on cybersecurity awareness and behavior of home computer users. In IFIP international conference on ICT systems security and privacy protection 2019 (pp. 194-208). Springer, Cham.
[Crossref] [Google Scholar]
[10]D Arcy J, Hovav A, Galletta D. User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach. Information Systems Research. 2009; 20(1):79-98.
[Crossref] [Google Scholar]
[11]Haeussinger F, Kranz J. Information security awareness: its antecedents and mediating effects on security compliant behavior. International conference on information systems 2013.
[Google Scholar]
[12]Alnatheer MA. Understanding and measuring information security culture in developing countries: case of Saudi Arabia (Doctoral Dissertation, Queensland University of Technology). 2012.
[Google Scholar]
[13]Martins A, Elofe J. Information security culture. In security in the information society 2002 (pp. 203-14). Springer, Boston, MA.
[Crossref] [Google Scholar]
[14]Alnatheer MA. A conceptual model to understand information security culture. International Journal of Social Science and Humanity. 2014; 4(2):104.
[Crossref] [Google Scholar]
[15]Herath T, Rao HR. Protection motivation and deterrence: a framework for security policy compliance in organizations. European Journal of Information Systems. 2009; 18(2):106-25.
[Crossref] [Google Scholar]
[16]Ng BY, Rahim M. A socio-behavioral study of home computer users intention to practice security. PACIS Proceedings. 2005:234-47.
[Google Scholar]
[17]Bulgurcu B, Cavusoglu H, Benbasat I. Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS Quarterly. 2010; 34(3):523-48.
[Google Scholar]
[18]Albuquerque Junior AE, Santos EM. Adoption of information security measures in public research institutes. JISTEM-Journal of Information Systems and Technology Management. 2015; 12(2):289-316.
[Crossref] [Google Scholar]
[19]Dzazali S, Zolait AH. Assessment of information security maturity. Journal of Systems and Information Technology. 2012; 14(1):23-57.
[Crossref] [Google Scholar]
[20]Shillair R, Dutton WH. Supporting a cybersecurity mindset: getting internet users into the cat and mouse game. Available at SSRN 2756736. 2016.
[Crossref] [Google Scholar]
[21]Munanga A. Cybercrime: a new and growing problem for older adults. Journal of Gerontological Nursing. 2019; 45(2):3-5.
[Crossref] [Google Scholar]
[22]Nurse JR. Cybercrime and you: how criminals attack and the human factors that they seek to exploit. arXiv preprint arXiv:1811.06624. 2018.
[Google Scholar]
[23]Ricci J, Breitinger F, Baggili I. Survey results on adults and cybersecurity education. Education and Information Technologies. 2019; 24(1):231-49.
[Crossref] [Google Scholar]
[24]Seifert A, Schelling HR. Seniors online: attitudes toward the internet and coping with everyday life. Journal of Applied Gerontology. 2018; 37(1):99-109.
[Crossref] [Google Scholar]
[25]Wagner N, Hassanein K, Head M. Computer use by older adults: a multi-disciplinary review. Computers in Human Behavior. 2010; 26(5):870-82.
[Crossref] [Google Scholar]
[26]Rhee HS, Kim C, Ryu YU. Self-efficacy in information security: its influence on end users information security practice behavior. Computers & Security. 2009; 28(8):816-26.
[Crossref] [Google Scholar]
[27]Hair JF, Black WC, Babin BJ, Anderson RE, Tatham RL. Multivariate data analysis. Upper Saddle River, NJ: Prentice Hall.1998.
[Google Scholar]
[28]Byrne BM. Structural equation modeling with AMOS: basic concepts, applications, and programming (multivariate applications series). New York: Taylor & Francis Group. 2010.
[Google Scholar]
[29]Kline RB. Principles and practice of structural equation modeling. Guilford Publications. 2015.
[Google Scholar]
[30]Awang Z. SEM made simple: a gentle approach to learning structural equation modeling. MPWS Rich Publication; 2015.
[Google Scholar]