International Journal of Advanced Technology and Engineering Exploration (IJATEE) ISSN (P): 2394-5443 ISSN (O): 2394-7454 Vol - 8, Issue - 74, January 2021
  1. 1
    Google Scholar
Assessing the influential factors of cybersecurity awareness in Malaysia during the pandemic outbreak: a structural equation modeling

Siti Daleela Mohd Wahid, Alya Geogiana Buja, Mohd Nor Hajar Hasrol Jono and Azlan Abdul Aziz

Abstract

The advanced growth of communication technology today greatly has brought benefits in many ways, but it has indirectly led to the exposure of data privacy and safety of end users to the outsiders. Due to the Covid-19 pandemic, all citizens are required to stay at home and most of their times have been used on the internet for their leisure, study and work purposes. The massive use of internet lead to cybercriminal like scam, fraud, hacking and cyber bullying. It has been reported that the senior adult is the most affected group. Using the Information Security Awareness Model (ISACM) and the Situation Awareness Cybersecurity Education Model (SAOCE), this study aims to develop a cybersecurity awareness model that can assist the elderly from attacks in cyberspace. Methodologically, this paper is quantitative in nature and recruits 300 senior adults from age 50 until above 60 years via convenience sampling technique. We identified three factors namely organization, social and individual influencing cybersecurity awareness. The result revealed that organization factors significantly related to cybersecurity awareness with value of β=0.151, p=0.025, meanwhile for social and individual factors are found less significant to cybersecurity awareness with values β=-0.066, p=0.328 and β=0.045, p=0.463 respectively. With the development of cybersecurity awareness model, we are confident that our model can contribute to the body of knowledge within the cybersecurity context.

Keyword

Covid-19, Cybersecurity awareness, Elderly, Structural equation modelling.

Cite this article

Wahid SD, Buja AG, Jono MH, Aziz AA

Refference

[1][1]https://eandt.theiet.org/content/articles/2017/01/the-elderly-most-at-risk-from-cyber-crime-report-warns/. Accessed 26 October 2020.

[2][2]Shao J, Zhang Q, Ren Y, Li X, Lin T. Why are older adults victims of fraud? current knowledge and prospects regarding older adults’ vulnerability to fraud. Journal of Elder Abuse & Neglect. 2019; 31(3):225-43.

[3][3]König R, Seifert A, Doh M. Internet use among older Europeans: an analysis based on SHARE data. Universal Access in the Information Society. 2018; 17(3):621-33.

[4][4]https://cybersecurityventures.com/3-cyber-fraud-tactics-targeting-seniors-and-why-theyre-so-effective/. Accessed 26 October 2020.

[5][5]Morrison BA, Coventry L, Briggs P. Technological change in the retirement transition and the implications for cybersecurity vulnerability in older adults. Frontiers in Psychology. 2020; 11:623.

[6][6]Tan SL, Vergara RG, Khan N, Khan S. Cybersecurity and privacy impact on older persons amid COVID-19: a socio-legal study in Malaysia. Asian Journal of Research in Education and Social Sciences. 2020; 2(2):72-6.

[7][7]Poepjes R, Lane M. An information security awareness capability model (ISACM). Australian information security management conference. 2012.

[8][8]Dai J. Situation awareness-oriented cybersecurity education. In frontiers in education conference 2018 (pp. 1-8). IEEE.

[9][9]Simonet J, Teufel S. The influence of organizational, social and personal factors on cybersecurity awareness and behavior of home computer users. In IFIP international conference on ICT systems security and privacy protection 2019 (pp. 194-208). Springer, Cham.

[10][10]D Arcy J, Hovav A, Galletta D. User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach. Information Systems Research. 2009; 20(1):79-98.

[11][11]Haeussinger F, Kranz J. Information security awareness: its antecedents and mediating effects on security compliant behavior. International conference on information systems 2013.

[12][12]Alnatheer MA. Understanding and measuring information security culture in developing countries: case of Saudi Arabia (Doctoral Dissertation, Queensland University of Technology). 2012.

[13][13]Martins A, Elofe J. Information security culture. In security in the information society 2002 (pp. 203-14). Springer, Boston, MA.

[14][14]Alnatheer MA. A conceptual model to understand information security culture. International Journal of Social Science and Humanity. 2014; 4(2):104.

[15][15]Herath T, Rao HR. Protection motivation and deterrence: a framework for security policy compliance in organizations. European Journal of Information Systems. 2009; 18(2):106-25.

[16][16]Ng BY, Rahim M. A socio-behavioral study of home computer users intention to practice security. PACIS Proceedings. 2005:234-47.

[17][17]Bulgurcu B, Cavusoglu H, Benbasat I. Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS Quarterly. 2010; 34(3):523-48.

[18][18]Albuquerque Junior AE, Santos EM. Adoption of information security measures in public research institutes. JISTEM-Journal of Information Systems and Technology Management. 2015; 12(2):289-316.

[19][19]Dzazali S, Zolait AH. Assessment of information security maturity. Journal of Systems and Information Technology. 2012; 14(1):23-57.

[20][20]Shillair R, Dutton WH. Supporting a cybersecurity mindset: getting internet users into the cat and mouse game. Available at SSRN 2756736. 2016.

[21][21]Munanga A. Cybercrime: a new and growing problem for older adults. Journal of Gerontological Nursing. 2019; 45(2):3-5.

[22][22]Nurse JR. Cybercrime and you: how criminals attack and the human factors that they seek to exploit. arXiv preprint arXiv:1811.06624. 2018.

[23][23]Ricci J, Breitinger F, Baggili I. Survey results on adults and cybersecurity education. Education and Information Technologies. 2019; 24(1):231-49.

[24][24]Seifert A, Schelling HR. Seniors online: attitudes toward the internet and coping with everyday life. Journal of Applied Gerontology. 2018; 37(1):99-109.

[25][25]Wagner N, Hassanein K, Head M. Computer use by older adults: a multi-disciplinary review. Computers in Human Behavior. 2010; 26(5):870-82.

[26][26]Rhee HS, Kim C, Ryu YU. Self-efficacy in information security: its influence on end users information security practice behavior. Computers & Security. 2009; 28(8):816-26.

[27][27]Hair JF, Black WC, Babin BJ, Anderson RE, Tatham RL. Multivariate data analysis. Upper Saddle River, NJ: Prentice Hall.1998.

[28][28]Byrne BM. Structural equation modeling with AMOS: basic concepts, applications, and programming (multivariate applications series). New York: Taylor & Francis Group. 2010.

[29][29]Kline RB. Principles and practice of structural equation modeling. Guilford Publications. 2015.

[30][30]Awang Z. SEM made simple: a gentle approach to learning structural equation modeling. MPWS Rich Publication; 2015.