International Journal of Advanced Technology and Engineering Exploration (IJATEE) ISSN (Print): 2394-5443 ISSN (Online): 2394-7454 Volume - 11 Issue - 121 December - 2024

  1. Google Scholar
Enhancing cybersecurity awareness through mobile learning: a study on vocational accounting and finance students

Fivia Eliza, Radinal Fadli, Yayuk Hidayah, Herman Dwi Surjono and Ratna Candra Sari

Abstract

The rapid growth of the digital economy poses significant cybersecurity threats, particularly for individuals in accounting and finance. This study investigates the effectiveness of a mobile-based learning program in enhancing cybersecurity awareness among accounting and finance students. The research employs a 4D model approach (Define, Design, Develop, Disseminate). The instruments used include validity and reliability questionnaires, cybersecurity awareness tests, and effectiveness surveys. The mobile learning-based cybersecurity program developed was validated through expert assessment. Test results revealed a significant improvement in cybersecurity awareness among accounting and finance students. The key advantages of this approach include increased student engagement, high accessibility, lower costs, and applicability for students without a technology background. This study provides empirical evidence supporting the enhancement of students' cybersecurity understanding, enabling them to be more vigilant and proactive in safeguarding financial information. These findings can also inform policy development regarding the integration of cybersecurity education into institutional curricula. Given the success of mobile learning programs, further research is recommended to explore their long-term impacts and to customize learning content for diverse fields of expertise.

Keyword

Cybersecurity awareness, Mobile learning, Accounting and finance education, Digital economy threats, Educational technology.

Cite this article

Eliza F, Fadli R, Hidayah Y, Surjono HD, Sari RC.Enhancing cybersecurity awareness through mobile learning: a study on vocational accounting and finance students. International Journal of Advanced Technology and Engineering Exploration. 2024;11(121):1714-1731. DOI:10.19101/IJATEE.2024.111101097

Refference

[1]Anas T, Cahyawati E. Strategic investment policies for digital transformation. Journal of Southeast Asian Economies. 2023; 40(1):96-126.

[2]Sofwatunnisa AA, Kartawinata BR, Akbar A, Pradana M, Putra A, Hidayat AM. Quick response code as a game-changer of Indonesian digital transactions. WSEAS Transactions on Computer Research. 2023; 11:479-85.

[3]Alshboul Y, Al. Hamouri N. Cybersecurity antecedents of trust: toward OPS adoption in Jordan. International Journal of Information and Decision Sciences. 2023; 15(1):73-93.

[4]Shah MU, Iqbal F, Rehman U, Hung PC. A comparative assessment of human factors in cybersecurity: implications for cyber governance. IEEE Access. 2023; 11:87970-84.

[5]Nganga A, Scanlan J, Lützhöft M, Mallam S. Enabling cyber resilient shipping through maritime security operation center adoption: a human factors perspective. Applied Ergonomics. 2024; 119:104312.

[6]Kuttiyappan D. Improving the cyber security over banking sector by detecting the malicious attacks using the wrapper stepwise Resnet classifier. KSII Transactions on Internet & Information Systems. 2023; 17(6), 1657-73.

[7]Šijan A, Viduka D, Ilić L, Predić B, Karabašević D. Modeling cybersecurity risk: the integration of decision theory and pivot pairwise relative criteria importance assessment with scale for cybersecurity threat evaluation. Electronics. 2024; 13(21):1-14.

[8]Fadlika R, Ruldeviyani Y, Butarbutar ZT, Istiqomah RA, Fariz AA. Employee information security awareness in the power generation sector of PT ABC. International Journal of Advanced Computer Science and Applications. 2023; 14(4):594-603.

[9]Yeoh W, Huang H, Lee WS, Al JF, Mansson R. Simulated phishing attack and embedded training campaign. Journal of Computer Information Systems. 2022; 62(4):802-21.

[10]Fisk N. Developmental challenges: capture the flag and the professionalization of cybersecurity. Human Organization. 2023; 82(1):61-72.

[11]Rana S, Chicone R. The influence of gender and acceptance of VR cybersecurity training platforms. Issues in Information Systems. 2023; 24(1): 93-100.

[12]Zhang H, Zhang J, Wang J, Zhang H. Integrating mobile learning and SPOC‐based flipped classroom to teach a course in water supply and drainage science and engineering. Computer Applications in Engineering Education. 2023; 31(3):620-33.

[13]Errabo DD, Ongoco AA. Effects of interactive-mobile learning modules in students’ engagement and understanding in genetics. Journal of Research in Innovative Teaching & Learning. 2024; 17(2):327-51.

[14]Al-said K. Influence of teacher on student motivation: opportunities to increase motivational factors during mobile learning. Education and Information Technologies. 2023; 28(10):13439-57.

[15]Hameed AR, Sumari PB. Adoption and continued usage of mobile learning of virtual platforms in Iraqi higher education an unstable environment. International Journal of Information Management Data Insights. 2024; 4(2):100242.

[16]Nikkerdar N, Sepidar KS, Golshah A, Khavid A. Efficacy of a smartphone application as an aid to enhance the instruction of radiographic differential diagnosis of maxillofacial bony lesions. Journal of Dental Education. 2023; 87(5):702-10.

[17]Thaanyane M, Jita T. The use of mobile technology in higher education: implications for students and instructors. Edelweiss Applied Science and Technology. 2024; 8(4):1236-43.

[18]Whitty MT, Moustafa N, Grobler M. Cybersecurity when working from home during COVID-19: considering the human factors. Journal of Cybersecurity. 2024; 10(1):1-11.

[19]Dornheim P, Zarnekow R. Determining cybersecurity culture maturity and deriving verifiable improvement measures. Information & Computer Security. 2023; 32(2):179-96.

[20]Shombot ES, Dusserre G, Bestak R, Ahmed NB. An application for predicting phishing attacks: a case of implementing a support vector machine learning model. Cyber Security and Applications. 2024; 2:100036.

[21]Moskvin DA. Assessing the security of a cyber-physical system based on an analysis of malware signatures. Automatic Control and Computer Sciences. 2023; 57(8):894-903.

[22]Kemp S. Exploring public cybercrime prevention campaigns and victimization of businesses: a bayesian model averaging approach. Computers & Security. 2023; 127:103089.

[23]Georgiadou A, Michalitsi-psarrou A, Askounis D. A security awareness and competency evaluation in the energy sector. Computers & Security. 2023; 129:103199.

[24]Lee I, Choi C. Camp2Vec: embedding cyber campaign with ATT&CK framework for attack group analysis. ICT Express. 2023; 9(6):1065-70.

[25]Vrhovec S, Bernik I, Markelj B. Explaining information seeking intentions: insights from a Slovenian social engineering awareness campaign. Computers & Security. 2023; 125:103038.

[26]Balogun NA, Abdulrahaman MD, Aka K. Exploring the prevalence of internet crimes among undergraduate students in a Nigerian university: a case study of the university of Ilorin. Nigerian Journal of Technology. 2024; 43(1):71-9.

[27]Childers G, Linsky CL, Payne B, Byers J, Baker D. K-12 educators’ self-confidence in designing and implementing cybersecurity lessons. Computers and Education Open. 2023; 4:100119.

[28]Wusylko C, Xu Z, Dawson KM, Antonenko PD, Koh DH, Lee M, et al. Using a comic book to engage students in a cryptology and cybersecurity curriculum. Journal of Research on Technology in Education. 2024; 56(4):373-91.

[29]Kim SK, Jang ET, Park H, Park KW. Pwnable-sherpa: an interactive coaching system with a case study of pwnable challenges. Computers & Security. 2023; 125:103009.

[30]Purbo OW, Prasetyo P, Dimaz AP, Agung BP, Tubagus AN. Identifying large young hacker concentration in Indonesia. Journal of Internet Services and Information Security. 2024;14(1):52-63.

[31]Ortiz-garcés I, Govea J, Sánchez-viteri S, Villegas-ch W. CyberEduPlatform: an educational tool to improve cybersecurity through anomaly detection with artificial intelligence. Peer Journal Computer Science. 2024; 10:1-33.

[32]Reddy B, Nagal A, Sood AK, Reddy SLR. Enhancing cyber security at scale with ML/AI frameworks. Network Security. 2023; 2023(5):83-91.

[33]Soon JNP, Chan RQ, Lee QH, Loke DE, Chun SLH, Yuen PK. User perceptions of artificial intelligence powered phishing attacks on facebook’s resilient infrastructure. International Journal of Advances in Applied Sciences. 2024;13(4):878–86.

[34]Mishra N, Shivaji GB, Barekar SS, Dari SS, Dhabliya D, Patil M. Artificial intelligence and machine learning in healthcare cybersecurity of current applications and future directions. South Eastern European Journal of Public Health. 2024; 23(2):56-61.

[35]Padli P, Setiawan Y, Soniawan V, Mardela R. Developing robotic cricket batting test technology with camera sensor and grid system. International Journal of Interactive Mobile Technologies. 2023; 17(7): 58-68.

[36]Fisher D. Mathematics mobile blended learning development: student-oriented high order thinking skill learning. European Journal of Educational Research. 2022; 11(1):69-81.

[37]Zanke A, Weber T, Dornheim P, Engel M. Assessing information security culture: a mixed-methods approach to navigating challenges in international corporate IT departments. Computers & Security. 2024:103938.

[38]Alhadidi I, Nweiran A, Hilal G. The influence of cybercrime and legal awareness on the behavior of university of Jordan students. Heliyon. 2024; 10(12):1-16.

[39]Thron E, Faily S, Dogan H, Freer M. Human factors and cyber-security risks on the railway–the critical role played by signalling operations. Information & Computer Security. 2024; 32(2):236-63.

[40]Mohanty SN, Singh T, Goel R, Baral SK, Kumar R. A study on building awareness in cyber security for educational system in India using interpretive structural modellings. International Journal of System Assurance Engineering and Management. 2024; 15: 2518–28.

[41]Zhu Q, Luo X, Liu Y, Gan C, Wu Y, Yang LX. Impact of cybersecurity awareness on mobile malware propagation: a dynamical model. Computer Communications. 2024; 220:1-11.

[42]Samala AD, Howard NJ, Budiman RD, Hakiki M, Hidayah Y. What does an IMoART application look like? IMoART--an interactive mobile augmented reality application for support learning experiences in computer hardware. International Journal of Interactive Mobile Technologies. 2024; 18(13): 148:65.

[43]Taherdoost H. Towards an innovative model for cybersecurity awareness training. Information. 2024; 15(9):1-19.

[44]Hodhod R, Hardage H, Abbas S, Aldakheel EA. CyberHero: an adaptive serious game to promote cybersecurity awareness. Electronics. 2023; 12(17):1-18.

[45]Ortiz-garces I, Gutierrez R, Guerra D, Sanchez-viteri S, Villegas-ch W. Development of a platform for learning cybersecurity using capturing the flag competitions. Electronics. 2023; 12(7):1-15.

[46]Kim M, Jo D, Jeong J. Evaluation of mobile risk perception training system for improving the safety awareness of construction workers. Buildings. 2023; 13(12):1-14.