(Publisher of Peer Reviewed Open Access Journals)

International Journal of Advanced Technology and Engineering Exploration (IJATEE)

ISSN (Print):2394-5443    ISSN (Online):2394-7454
Volume-8 Issue-76 March-2021
Full-Text PDF
Paper Title : Development of organization, social and individual cyber security awareness model (OSICSAM) for the elderly
Author Name : Alya Geogiana Buja, Siti Daleela Mohd Wahid, Teh Faradilla Abdul Rahman, Noor Afni Deraman, Mohd Nor Hajar Hasrol Jono and Azlan Abdul Aziz
Abstract :

This paper proposes a cyber security awareness model for the elderly. The massive use of internet has led towards cybercriminals like scamming, fraud, hacking and cyber bullying. It has been reported that the number of cyber security incidents is increasing and among the affected group is the elderly. In line with the government initiative for cyber security, therefore, this study aims to develop a cyber security awareness model for the elderly. Firstly, a feasibility study was conducted and several literatures related to cyber security awareness and the elderly’s learning styles were reviewed thoroughly. Secondly, based on the literatures, the existing cyber security awareness models were analyzed by identifying the approaches used. Thirdly, the learning styles of the elderly were studied based on the elderly’s impairments and concerns. Finally, the cyber security awareness models were mapped to the elderly’s learning styles. Based on the mapping results, a cyber security awareness model has been developed for the elderly based on the Information Security Awareness Capability Model (ISACM), Information Security Awareness Program (ISAPM) General Model, Peer Education Model, and Security Awareness Model. The expected result of this study is a cyber security model consists of the involvement of organization, social and individual factors that are important in creating cyber security awareness for the elderly. Further works are recommended to analyse the effectiveness of the proposed model towards the elderly and experts’ reviews are required.

Keywords : Adult, Cyber-attack, Cyber security, Peer education, Structural equation, Modelling.
Cite this article : Buja AG, Wahid SD, Rahman TA, Deraman NA, Jono MN, Aziz AA. Development of organization, social and individual cyber security awareness model (OSICSAM) for the elderly. International Journal of Advanced Technology and Engineering Exploration. 2021; 8(76):511-519. DOI:10.19101/IJATEE.2020.762185.
References :
[1]https://www.kpwkm.gov.my/kpwkm/uploads/files/Muat%20Turun/MOST/S4_P1_Tuan%20Hj_%20Fazari.pdf. Accessed 20 September 2020.
[2]Wang S, Bolling K, Mao W, Reichstadt J, Jeste D, Kim HC, et al. Technology to support aging in place: older adults’ perspectives. Healthcare 2019; 7(2):1-18.
[Crossref] [Google Scholar]
[3]Parrish A, Impagliazzo J, Raj RK, Santos H, Asghar MR, Jøsang A, et al. Global perspectives on cybersecurity education for 2030: a case for a meta-discipline. In proceedings companion of the ACM conference on innovation and technology in computer science education 2018 (pp. 36-54).
[Crossref] [Google Scholar]
[4]Dai J. Situation awareness-oriented cybersecurity education. In IEEE frontiers in education conference 2018 (pp. 1-8). IEEE.
[Crossref] [Google Scholar]
[5]Baldassarre MT, Santa Barletta V, Caivano D, Raguseo D, Scalera M. Teaching cyber security: the HACK-SPACE integrated model. In ITASEC 2019 (pp.1-13).
[Google Scholar]
[6]Kortjan N, Von Solms R. A conceptual framework for cyber-security awareness and education in SA. South African Computer Journal. 2014; 52(1):29-41.
[Google Scholar]
[7]Poepjes R, Lane M. An information security awareness capability model (ISACM). Australian information security management conference 2012 (pp. 1-8).
[Crossref] [Google Scholar]
[8]Yunos Z, Ab Hamid RS, Ahmad M. Development of a cyber security awareness strategy using focus group discussion. In SAI computing conference 2016 (pp. 1063-7). IEEE.
[Crossref] [Google Scholar]
[9]https://www.energy.gov/sites/prod/files/2014/03/f13/C2M2-v1-1_cor.pdf. Accessed 20 September 2020.
[10]Maqousi A, Balikhina T, Mackay M. An effective method for information security awareness raising initiatives. International Journal of Computer Science & Information Technology. 2013; 5(2):63-72.
[Crossref] [Google Scholar]
[11]https://cltc.berkeley.edu/wp-content/uploads/2019/04/ CLTC_Underserved_Populations.pdf. Accessed 20 September 2020.
[12]https://www.cotansw.com.au/MediaPDFs/Peer%20Education%20-%20Group%20Organiser%20Info%20Sheet.pdf. Accessed 20 September 2020.
[13]https://humanrights.gov.au/our-work/legal/inquiry-cybersafety-senior-australians-2012. Accessed 20 September 2020.
[14]Teets C, Grimes K. Assessment of learning styles and learning retention among the elderly population in Frankfort, Kentucky. Kentucky State University. 2019.
[Google Scholar]
[15]Gatti FM, Brivio E, Galimberti C. “The future is ours too”: a training process to enable the learning perception and increase self-efficacy in the use of tablets in the elderly. Educational Gerontology. 2017; 43(4):209-24.
[Crossref] [Google Scholar]
[16]Ramadhani A, Bramantoro T, Khotimah FK, Santosa LM, Sudiartha NC, Mudara IK, et al. SEIMUT PERSIA: promoting dental and oral health care and physical performance in elderly. Indonesian Journal of Dental Medicine. 2020; 3(1):10-12.
[Google Scholar]