Cybersecurity Policy Implementation: A PLS-SEM Analysis of Awareness and Cyber Phenomena Impact

Cybersecurity Policy Implementation: A PLS-SEM Analysis of Awareness and Cyber Phenomena Impact

Authors

  • Listia Silviani Universitas Sebelas April
  • Warlina Universitas Sebelas April
  • Rizki Pangestu Universitas Sebelas April
  • Nina Kristina Universitas Sebelas April

Keywords:

Cyber Crime, SEM-PLS, awareness, malware, Cyber Phenomena

Abstract

This research investigates the influence of cybersecurity awareness and individual experience with cyber phenomena on the effective implementation of information security policies within organizations. Rapid advancements in information technology have led to increasingly complex cyber threats, necessitating not only comprehensive organizational policies but also well-informed personnel. Employing the Partial Least Squares Structural Equation Modeling (PLS-SEM) approach with data from 110 respondents via Google Form, the study reveals that both cybersecurity awareness and cyber phenomena experience positively and significantly impact information security policy implementation. Specifically, awareness demonstrates a more dominant influence with a path coefficient of 0.513, compared to cyber phenomena experience at 0.352. Collectively, these two independent variables substantially explain 67.7% of the variance in information security policy implementation, underscoring the model's strong predictive power and practical relevance in enhancing cybersecurity posture. This study emphasizes that continuous investment in awareness programs, such as regular training and phishing simulations, and the strategic use of real-world security incident case studies, are crucial for fostering compliance and building a resilient security culture against evolving cyber threats.

References

Edy Soesanto, Achmad Romadhon, Bima Dwi Mardika, and Moch Fahmi Setiawan, “Analisis dan Peningkatan Keamanan Cyber: Studi Kasus Ancaman dan Solusi dalam Lingkungan Digital Untuk Mengamankan Objek Vital dan File,” Sammajiva J. Penelit. Bisnis dan Manaj., vol. 1, no. 2, pp. 172–191, 2023, doi: 10.47861/sammajiva.v1i2.226.

S. Governance et al., “SERANGAN MALWARE RANSOMWARE DALAM PERSPEKTIF TRANSNATIONAL,” vol. 5, no. 2, pp. 1197–1213, 2025, doi: 10.53363/bureau.v5i2.615.

A. Djenna, A. Bouridane, S. Rubab, and I. M. Marou, “Artificial Intelligence-Based Malware Detection, Analysis, and Mitigation,” Symmetry (Basel)., vol. 15, no. 3, pp. 1–24, 2023, doi: 10.3390/sym15030677.

Ari Sandriana, Rianto, and Firmansyah Maulana, “Klasifikasi serangan Malware terhadap Lalu Lintas Jaringan Internet of Things menggunakan Algoritma K-Nearest Neighbour (K-NN),” E-JOINT (Electronica Electr. J. Innov. Technol., vol. 3, no. 1, pp. 12–22, 2022, doi: 10.35970/e-joint.v3i1.1559.

Helmiawan, M. A., Firmansyah, E., Fadil, I., Sofivan, Y., Mahardika, F., & Guntara, A. (2020). Analysis of web security using open web application security project 10. 2020 8th International Conference on Cyber and IT Service Management

Helmiawan, M. A., Julian, E., Cahyan, Y., & Saeppani, A. (2021). Experimental evaluation of security monitoring and notification on network intrusion detection system for server security. 2021 9th International Conference on Cyber and IT Service Management (CITSM ….

Helmiawan, M. A., Fadil, I., Sofiyan, Y., & Firmansyah, E. (2021). Security model using intrusion detection system on cloud computing security management. 2021 9th International Conference on Cyber and IT Service Management (CITSM ….

Helmiawan, M. A., & Nasution, A. I. (2022). The Effect of Internet Banking Use and Customer Protection Against Cyber Crime at Bank Rakyat Indonesia. Journal of Islamic Economics and Business, 2(2), 170–183.

K. M. Fitria, “Analisis Serangan Malware Dalam Perbankan Dan Perencanaan Solusi Keamanan,” J. Inform. dan Tek. Elektro Terap., vol. 11, no. 3, 2023, doi: 10.23960/jitet.v11i3.3312.

A. R. Gunawan, N. P. Sastra, and D. M. Wiharta, “Penerapan Keamanan Jaringan Menggunakan Sistem Snort dan Honeypot Sebagai Pendeteksi dan Pencegah Malware,” Maj. Ilm. Teknol. Elektro, vol. 20, no. 1, p. 81, 2021, doi: 10.24843/mite.2021.v20i01.p09.

N. S. Azzahra, A. M. Tambunan, N. N. Aulia, A. Binarsih, and T. H. Saepudin, “ Tinjauan Literatur Tentang Ancaman Cybercrime Dan Implementasi Keamanan Siber Di Industri Perbankan ,” Humanit. J. Humaniora, Sos. dan Bisnis, vol. 2, no. 7, pp. 692–700, 2024.

R. Nur Rohmah, “Upaya Membangun Kesadaran Keamanan Siber pada Konsumen E-commerce di Indonesia,” Cendekia Niaga, vol. 6, no. 1, pp. 1–11, 2022, doi: 10.52391/jcn.v6i1.629.

A. Kusumaningrum, H. Wijayanto, and B. D. Raharja, “Pengukuran Tingkat Kesadaran Keamanan Siber di Kalangan Mahasiswa saat Study From Home dengan Multiple Criteria Decision Analysis (MCDA),” J. Ilm. SINUS, vol. 20, no. 1, p. 69, 2022, doi: 10.30646/sinus.v20i1.586.

Dola Ramalinda, Jayadi, and Agung Rachmat Raharja, “Strategi Perlindungan Data Menggunakan Sistem Kriptografi Dalam Keamanan Informasi,” J. Int. Multidiscip. Res., vol. 2, no. 6, pp. 665–671, 2024, doi: 10.62504/jimr679.

T. Yusnanto, K. Mustofa, M. A. Mahmudi, and S. Wahyudiono, “Fenomena Keamanan Informasi Pasca,” vol. 17, no. 2, pp. 24–35, 2021.

S. Matandatu, “Determinasi Faktor-Faktor Kesadaran Pengguna Mobile Banking terhadap Ancaman Keamanan Siber di Era Digital,” vol. 1, no. 3, p. 2025, 2025, [Online]. Available: https://indojurnal.com/index.php/jejakdigital

H. G. Afiansyah and N. A. Kadarwati Febriyani, “Penyusunan Kebijakan Pengamanan dan Pengelolaan Infrastruktur Operasi Keamanan Siber Menggunakan NIST CSF 2.0 dan ISO/IEC 27001:2022,” Info Kripto, vol. 17, no. 3, 2023, doi: 10.56706/ik.v17i3.81.

O. Purwaningrum, “Studi Literatur : Framework Cobit 5 Pada Tata Kelola Teknologi Informasi,” SCAN - J. Teknol. Inf. dan Komun., vol. 16, no. 2, 2021, doi: 10.33005/scan.v16i2.2598.

H. A. Pratiwi and L. Wulandari, “Evaluasi Tingkat Kesiapan Keamanan Informasi Menggunakan Indeks Keamanan Informasi (Indeks KAMI) Versi 4.0 pada Dinas Komunikasi dan Informatika Kota Bogor,” J. Ind. Eng. Manag. Res., vol. 2, no. 5, pp. 146–163, 2021.

N. Ramadhanty, “Implementasi Kerangka Keamanan NIST Dan ISO/IEC 27001 Dalam Menghadapi Ancaman Risiko Siber,” J. Indones. Manag., vol. 4, no. 4, pp. 1–9, 2024, doi: 10.53697/jim.v4i4.1973.

L. D. A. Jelita, M. N. Al Azam, and A. Nugroho, “Evaluasi Keamanan Teknologi Informasi Menggunakan Indeks Keamanan Informasi 5.0 dan ISO/EIC 27001:2022,” J. SAINTEKOM, vol. 14, no. 1, pp. 84–94, 2024, doi: 10.33020/saintekom.v14i1.623.

H. Haeruddin, S. E. Prasetyo, and A. W. Kaharuddin, “Optimalisasi Keamanan Jaringan Di Era Digital menggunakan metode Zero Trust,” J. Inf. Syst. Technol., vol. 5, no. 3, pp. 15–24, 2024, doi: 10.37253/joint.v5i3.9986.

S. Sarkar, G. Choudhary, S. K. Shandilya, A. Hussain, and H. Kim, “Security of Zero Trust Networks in Cloud Computing: A Comparative Review,” Sustain., vol. 14, no. 18, pp. 1–21, 2022, doi: 10.3390/su141811213.

H. Syahrizal and M. S. Jailani, “Jenis-Jenis Penelitian Dalam Penelitian Kuantitatif dan Kualitatif,” J. QOSIM J. Pendidik. Sos. Hum., vol. 1, no. 1, pp. 13–23, 2023, doi: 10.61104/jq.v1i1.49.

Teguh Iman Santoso and D. Indrajaya, “Penggunaan SEM – PLS dan Aplikasi SmartPLS Untuk Dosen dan Mahasiswa,” J. Pengabdi. Masy. Akad., vol. 2, no. 2, pp. 97–104, 2023, doi: 10.54099/jpma.v2i2.630.

K. Yuliawan, “Pelatihan SmartPLS 3.0 Untuk Pengujian Hipotesis Penelitian Kuantitatif,” J. Pengabdi. Kpd. Masy., vol. 5, no. 1, pp. 43–50, 2021.

R. R. Marliana, “Pelatihan Pls-Sem Menggunakan Smartpls 3.0 Dosen Mata Kuliah Statistika Fisip Uin Sunan Gunung Djati Bandung,” J. Abdimas Sang Buana, vol. 2, no. 2, p. 43, 2021, doi: 10.32897/abdimasusb.v2i2.711.

Harfizar, M. W. Wicaksono, M. B. Hakim, F. H. Wijaya, T. Saleh, and E. Sana, “Analyzing the Influence of Artificial Intelligence on Digital Innovation: A SmartPLS Approach,” IAIC Trans. Sustain. Digit. Innov., vol. 5, no. 2, pp. 108–116, 2024, doi: 10.34306/itsdi.v5i2.659.

M. A. Helmiawan and A. I. Nasution, “The Effect of Internet Banking Use and Customer Protection Against Cyber Crime at Bank Rakyat Indonesia,” J. Islam. Econ. Bus., vol. 2, no. 2, pp. 170–183, 2023, doi: 10.15575/jieb.v2i2.22346.

Published

2025-08-22
Loading...