Cybersecurity Awareness Model with Methods: Analytical Hierarchy Process and Structural Equation Model

Authors

DOI:

https://doi.org/10.4108/eetsis.6931

Keywords:

Cybersecurity, cybersecurity awareness, structural equation model

Abstract

This era of revolution has influenced all sectors of society, including education, where technological advancements are now integral to online teaching and learning. However, not everyone fully understands the potential negative impacts of internet usage. The purpose of this research was to investigate and analyze cybersecurity awareness. The study focused on students at Aerospace Air Marshal Suryadarma University. The research employed a quantitative design, either descriptive (where subjects are typically measured once) or experimental (where subjects are measured multiple times). A descriptive study establishes a relationship between variables, while an experimental study determines causation. To analyze the collected data, SEM AMOS was utilized to measure students' awareness of cybersecurity. The study focused on five key areas: (a) regulation, (b) internet usage, (c) password security, (d) data security, and (e) cyberattacks. Based on the research framework and these focus areas, several indicators were developed for the study. The findings concluded that students are aware of cybersecurity issues.

References

[1] H. Siburian, “Strategy of Cyber Security,” BSSN, 2023. https://www.bssn.go.id/strategi-keamanan-siber-nasional/.

[2] BPPTIK, “Statistical Data,” 2023. www.bpptik.kominfo.go.id.

[3] S. R. Puspita, “APJII : Survei Penetrasi Internet Indonesia 2024,” 2024. [Online]. Available: https://www.cloudcomputing.id/berita/apjii-survei-penetrasi-internet.

[4] M. Zwilling, G. Klien, D. Lesjak, Ł. Wiechetek, F. Cetin, and H. N. Basim, “Cyber Security Awareness, Knowledge and Behavior: A Comparative Study,” J. Comput. Inf. Syst., vol. 62, no. 1, pp. 82–97, 2022, doi: 10.1080/08874417.2020.1712269.

[5] M. Ulum and U. M. Jakarta, “Policy Brief Recommendation: Cyber Security and Defence Policy of Indonesia,” no. July, pp. 0–6, 2018, doi: 10.13140/RG.2.2.28227.09763.

[6] A. Kusumaningrum, H. Wijayanto, and B. D. Raharja, “Pengukuran Tingkat Kesadaran Keamanan Siber di Kalangan Mahasiswa saat Study From Home dengan Multiple Criteria Decision Analysis (MCDA),” J. Ilm. SINUS, vol. 20, no. 1, p. 69, 2022, doi: 10.30646/sinus.v20i1.586.

[7] R. Reid and J. Van Niekerk, “Decoding audience interpretations of awareness campaign messages,” Inf. Comput. Secur., vol. 24, no. 2, pp. 177–193, Jan. 2016, doi: 10.1108/ICS-01-2016-0003.

[8] F. Mokrini, L. Waeyenberge, N. Viaene, and M. Moens, “First Report of the Cereal Cyst Nematode Heterodera latipons on Wheat in Morocco,” Plant Dis., vol. 96, no. 5, p. 774, Feb. 2012, doi: 10.1094/PDIS-11-11-0999-PDN.

[9] J. Shropshire, M. Warkentin, A. Johnston, M. Schmidt, A. C. Johnston, and M. B. Schmidt, “Association for Information Systems AIS Electronic Library (AISeL) Personality and IT security: An application of the five-factor model Recommended Citation Mark, ‘Personality and IT security: An application of the five-factor model’ Personality and IT security: An application of the five-factor model,” p. 415, 2006, [Online]. Available: http://aisel.aisnet.org/amcis2006/415.

[10] A. McCormac, D. Calic, K. Parsons, M. Butavicius, M. Pattinson, and M. Lillie, “The effect of resilience and job stress on information security awareness,” Inf. Comput. Secur., vol. 26, no. 3, pp. 277–289, Jan. 2018, doi: 10.1108/ICS-03-2018-0032.

[11] R. Von Solms and J. Van Niekerk, “From information security to cyber security,” Comput. Secur., vol. 38, pp. 97–102, 2013, doi: 10.1016/j.cose.2013.04.004.

[12] O. Rokhman et al., “No 主観的健康感を中心とした在宅高齢者における 健康関連指標に関する共分散構造分析Title,” J. Berk. Epidemiol., vol. 5, no. 1, pp. 90–96, 2020, [Online]. Available: https://core.ac.uk/download/pdf/235085111.pdf%250Awebsite: http://www.kemkes.go.id%250Ahttp://www.yankes.kemkes.go.id/assets/downloads/PMK No. 57 Tahun 2013 tentang PTRM.pdf%250Ahttps://www.kemenpppa.go.id/lib/uploads/list/15242-profil-anak-indonesia_-2019.pdf%25.

[13] A. G. Gani, “Cybercrime (Kejahatan Berbasis Komputer),” J. Sist. Inf. Univ. Suryadarma, vol. 5, no. 1, pp. 16–29, 2014, doi: 10.35968/jsi.v5i1.18.

[14] I. Frank and E. Odunayo, “Approach to cyber security issues in nigeria: Challenges and solution,” Int. J. Cogn. Res. Sci. Eng. Educ., vol. 1, no. 1, 2013.

[15] L. Alzahrani, “Statistical Analysis of Cybersecurity Awareness Issues in Higher Education Institutes,” Int. J. Adv. Comput. Sci. Appl., vol. 12, no. 11, pp. 630–637, 2021, doi: 10.14569/IJACSA.2021.0121172.

[16] S. Y. Lee, Structural Equation Modelling. 2007.

[17] R. B. Kline, “Response to Leslie Hayduk’s review of principles and practice of structural equation modeling,1 4th edition,” Can. Stud. Popul., vol. 45, no. 3–4, pp. 188–195, 2018, doi: 10.25336/csp29418.

[18] H. A. Kruger and W. D. Kearney, “A prototype for assessing information security awareness,” Comput. Secur., vol. 25, no. 4, pp. 289–296, 2006, doi: https://doi.org/10.1016/j.cose.2006.02.008.

[19] S. Santoso, Application SEM Amos 22. 2014.

[20] J. E. Collier, “Applied Structural Equation Modeling Using AMOS,” Appl. Struct. Equ. Model. Using AMOS, 2020, doi: 10.4324/9781003018414.

[21] A. Purwanto, A. Sulaiman, and K. Fahmi, “The Role of Buzz and Viral Marketing on SMEs Online Shop Marketing Performance: CB-SEM AMOS Analysis,” Int. J. Soc. Manag. Stud., vol. 4, no. 3, pp. 1–7, 2023.

[22] B. M. Byrne, “Structural equation modeling with AMOS: Basic concepts, applications, and programming, 2nd ed.,” Structural equation modeling with AMOS: Basic concepts, applications, and programming, 2nd ed. Routledge/Taylor & Francis Group, New York, NY, US, pp. xix, 396–xix, 396, 2010.

[23] M. YAŞLIOĞLU and D. TOPLU YAŞLIOĞLU, “How and When to Use Which Fit Indices? A Practical and Critical Review of the Methodology,” Istanbul Manag. J., pp. 1–20, 2020, doi: 10.26650/imj.2020.88.0001.

[24] J. F. Hair Jr, Multivariate data analysis. 2014.

[25] de J. Carvalho and O. F. Chima, “Applications of Structural Equation Modeling in Social Sciences Research,” Am. Int. J. Contemp. Res., vol. Vol. 4, no. 1, pp. 6–11, 2014.

[26] T. N. Beran and C. Violato, “Structural equation modeling in medical,” BMC Res. Notes, vol. 3, no. 267, pp. 1–10, 2010, [Online]. Available: http://www.biomedcentral.com/1756-0500/3/267.

[27] “Structural Equation Modeling.” https://www.statisticssolutions.com/free-resources/directory-of-statistical-analyses/structural-equation-modeling/.

Downloads

Published

14-08-2024

How to Cite

1.
Gardenia Y, Gani AG. Cybersecurity Awareness Model with Methods: Analytical Hierarchy Process and Structural Equation Model. EAI Endorsed Scal Inf Syst [Internet]. 2024 Aug. 14 [cited 2024 Dec. 21];12(1). Available from: https://publications.eai.eu/index.php/sis/article/view/6931