The Influence of Cyber Threat Awareness and Exposure on Cybersecurity Behavior

The Influence of Cyber Threat Awareness and Exposure on Cybersecurity Behavior

Authors

  • Muhamad Taufik Abdurrahman Muhamad Taufik Abdurrahman University sebelas april sumedang
  • Putra Dinnur Rohman Putra Dinnur Rohman universitas sebelas april sumedang
  • Radhi Rabbani Radhi Rabbani universitas sebelas april sumedang

Keywords:

Cybersecurity, Awareness, Cyber Threats, Security Behavior, PLS-SEM

Abstract

This study aims to analyze the influence of cybersecurity awareness and exposure to cyber threats on individuals' cybersecurity behavior. A quantitative method was employed using a survey technique involving 100 respondents, primarily university students who are active users of digital services. Data were analyzed using Partial Least Squares Structural Equation Modeling (PLS-SEM) via the SmartPLS application. The results indicate that awareness has a significant and dominant influence on security behavior (β = 0.594; p = 0.000), while exposure to cyber threats also has a significant but lesser effect (β = 0.269; p = 0.009). These findings highlight the importance of education and experience in shaping safe and responsible digital behavior.

References

Saqib Saeed and others, ‘Digital Transformation and Cybersecurity Challenges for Businesses Resilience : Issues and Recommendations’, 2023, pp. 1–20.

‘CYBERSECURITY IN BANKING : A GLOBAL PERSPECTIVE WITH A FOCUS ON CYBERSECURITY IN BANKING : A GLOBAL PERSPECTIVE WITH A FOCUS ON NIGERIAN PRACTICES’, March, 2024, doi:10.51594/csitrj.v5i.701.

Adebimpe Bolatito Ige, Eseoghene Kupa, and Oluwatosin Ilori, ‘Aligning Sustainable Development Goals with Cybersecurity Strategies : Ensuring a Secure and Sustainable Future’, 2024.

Nicolas Guzman Camacho, ‘The Role of AI in Cybersecurity : Addressing Threats in the Digital Age Objectives ’:, 3.1.

Maanak Gupta, Senior Member, and Charankumar Akiri, ‘From ChatGPT to ThreatGPT : Impact of Generative AI in Cybersecurity and Privacy’, 11.August (2023).

Ankit Kumar and others, ‘Online Social Networks Security and Privacy : Comprehensive Review and Analysis’, Complex & Intelligent Systems, 7.5 (2021), pp. 2157–77, doi:10.1007/s40747-021-00409-7.

Merve Ozkan-okay, ‘On Intrusion Detection Systems’, 2021, pp. 157727–60, doi:10.1109/ACCESS.2021.3129336.

Ntebatseng Mahlake and others, ‘A Lightweight Encryption Algorithm to Enhance Wireless Sensor

Network Security on the Internet of Things’, 18.1 (2023), doi:10.12720/jcm.18.1.47-57.

Afnan Alotaibi and Murad A Rassam, ‘Adversarial Machine Learning Attacks against Intrusion Detection Systems : A Survey on Strategies and Defense’, 2023.

Muhammad Sajid Farooq and others, ‘BlockchainBased Smart Home Networks Security Empowered’, 2022, pp. 1–13.

Zahedi Azam, Motaharul Islam, and Mohammad Nurul Huda, ‘Comparative Analysis of Intrusion Detection Systems and Machine Learning-Based Model Analysis Through Decision Tree’, 11.June (2023).

J A N Lansky and others, ‘Deep Learning-Based Intrusion Detection Systems : A Systematic Review’, 9 (2021).

Pierpaolo Dini, Andrea Begni, and others, ‘Design and Testing Novel One-Class Classifier Based on Polynomial Interpolation With Application to Networking Security’, IEEE Access, 10.June (2022), pp. 67910–24, doi:10.1109/ACCESS.2022.3186026.

Diogo Barradas and others, ‘FlowLens : Enabling Efficient Flow Classification for ML-Based Network Security Applications’, February, 2021.

Mohammad Aljanabi, Mohd Arfian Ismail, and Ahmed Hussein Ali, ‘Intrusion Detection Systems , Issues , Challenges , and Needs’, 14.1 (2021), pp. 560–71.

Jasmin Praful Bharadiya, ‘Machine Learning in Cybersecurity : Techniques and Challenges’.

Pierpaolo Dini, Abdussalam Elhanashi, and others, ‘Applied Sciences Overview on Intrusion Detection Systems Design Exploiting Machine Learning for Networking Cybersecurity’, 2023.

Anwar Mohammed, ‘Protecting Space Assets : Cybersecurity Challenges and Solutions for the Final Frontier Abstract : Introduction : Unique Vulnerabilities in Space-Based Systems ’:, pp. 55–61.

Michael Zipperle, New South, and Cyber Security, ‘Provenance-Based Intrusion Detection Systems : A Survey’, 55.7 (2022), doi:10.1145/3539605.

Satish Kumar, Sunanda Gupta, and Sakshi Arora, ‘Research Trends in Network-Based Intrusion Detection Systems : A Review’, IEEE Access, 9 (2021), pp. 157761–79, doi:10.1109/ACCESS.2021.3129775.

Helmiawan, M. A., & Wiharko, T. (2018). Application of Fingerprint Security System on Motorcycles using Arduino Microcontroller. J-Tin’s-Jurnal Teknik Informatika, 2(1).

Helmiawan, M. A., Juna, D. I., & Ramdhani, B. (2018). Pengamanan Sistem Dan Data E-Voting Berbasis Network. INTERNAL (Information System Journal), 1(1), 1–10.

Helmiawan, M. A., Firmansyah, E., Fadil, I., Sofivan, Y., Mahardika, F., & Guntara, A. (2020). Analysis of web security using open web application security project 10. 2020 8th International Conference on Cyber and IT Service Management

Helmiawan, M. A., Julian, E., Cahyan, Y., & Saeppani, A. (2021). Experimental evaluation of security monitoring and notification on network intrusion detection system for server security. 2021 9th International Conference on Cyber and IT Service Management (CITSM ….

Helmiawan, M. A., Fadil, I., Sofiyan, Y., & Firmansyah, E. (2021). Security model using intrusion detection system on cloud computing security management. 2021 9th International Conference on Cyber and IT Service Management (CITSM ….

Helmiawan, M. A., & Nasution, A. I. (2022). The Effect of Internet Banking Use and Customer Protection Against Cyber Crime at Bank Rakyat Indonesia. Journal of Islamic Economics and Business, 2(2), 170–183.

Published

2025-08-20
Loading...