Implementation of PLS-SEM-Based information Security Outline
Keywords:
Information Security, PLS-SEM, Socialization, Awareness, Phenomenon, Security IntroductionAbstract
Information security has become an increasingly crucial issue amidst the rapid development of digital technology. The increase in cyberattacks, data leaks, and other threats requires every individual and organization to have awareness and good practices in protecting their information. This study aims to implement the results of the Partial Least Squares Structural Equation Modeling (PLS
SEM) model analysis on the relationship between awareness (Awareness), perception of threat phenomena (Phenomena), and implementation of security practices (Security). This project not only produces recommendations for data-based information security procedures but also conducts outreach activities to the public and documents them in the form of educational videos. The results show that public awareness and understanding of cyber phenomena have a significant influence on the security practices implemented.
References
T. N. Jagatic, N. A. Johnson, M. Jakobsson, and F. Menczer, "SOCIAL PHISHING," Communications of the ACM, vol. 50, no. 10, pp. 94-100, Oct. 2007.
K. K. Wong, "Partial least squares structural equation modeling (PLSSEM) techniques using SmartPLS," Marketing Bulletin, vol. 24, Technical Note 1, 2013.
T. Sander and P. L. Teh, "SmartPLS for the Human Resources Field To Evaluate a Model," in New Challenges of Economic and Business
Development - 2014, Riga, University of Latvia, May 8-10, 2014.
A. Humayed, J. Lin, F. Li, and B. Luo, "Cyber-Physical Systems Security - A Survey," arXiv:1701.04525v1 [cs.CR], 2017.
S. T. Hammond, "Threat and Coping Appraisals on Information Security Awareness Training Effectiveness: A Quasi-experimental Study," Ph.D. dissertation, Capella University, July 2019.
M. Y. Zahiroh, "Cybersecurity Awareness and Digital Skills on Readiness For Change in Digital Banking," Li Falah Jurnal Studi Ekonomi Dan Bisnis Islam, vol. 4, no. 2, pp. 53-73, 2019.
A. A. Al Shamsi, "Effectiveness of Cyber Security Awareness Program for young children: A Case Study in UAE," International Journal of Information Technology and Language Studies (IJITLS), 2019.
C. Bernier, "Evaluating the Effectiveness of Deterrents and Training Methods to Decrease Effectiveness of Social Engineering on Corporate Users Within Large Insurance Providers," Dissertation, Northcentral University, La Jolla, California, 2020.
J. J. Jean-Pierre, "User Awareness and Knowledge of Cybersecurity and the Impact of training in the Commonwealth of Dominica," Ph.D.
dissertation, Walden University, June 2021.
Y. K. Saheed, A. I. Abiodun, S. Misra, M. K. Holone, and R. ColomoPalacios, "A machine learning-based intrusion detection for detecting
internet of things network attacks," Alexandria Engineering Journal, vol. 61, pp. 9395-9409, 2022.
L. L. Schneider, "Customized Cybersecurity Awareness Training: Addressing the Human Factor," Dissertation, National University, San
Diego, California, 2023.
H. Taherdoost, "A Critical Review on Cybersecurity Awareness Frameworks and Training Models," Procedia Computer Science, vol.
235, pp. 1649-1663, 2024.
Helmiawan, M. A., Firmansyah, E., Fadil, I., Sofivan, Y., Mahardika, F., & Guntara, A. (2020). Analysis of web security using open web application security project 10. 2020 8th International Conference on Cyber and IT Service Management
Helmiawan, M. A., Julian, E., Cahyan, Y., & Saeppani, A. (2021). Experimental evaluation of security monitoring and notification on network intrusion detection system for server security. 2021 9th International Conference on Cyber and IT Service Management (CITSM ….
Helmiawan, M. A., Fadil, I., Sofiyan, Y., & Firmansyah, E. (2021). Security model using intrusion detection system on cloud computing security management. 2021 9th International Conference on Cyber and IT Service Management (CITSM ….
Helmiawan, M. A., & Nasution, A. I. (2022). The Effect of Internet Banking Use and Customer Protection Against Cyber Crime at Bank Rakyat Indonesia. Journal of Islamic Economics and Business, 2(2), 170–183.
V. A. Onih, "Phishing Detection Using Machine Learning: A Model Development and Integration," International Journal of Scientific and
Management Research, vol. 7, no. 4, pp. 27-63, 2024.
S. P. Saragih, I. Svinarky, and Ukas, "Pelatihan Cyber Security Awareness Kepada Masyarakat Menghadapi Perkembangan Kejahatan Siber," Puan Journal Indonesia, vol. 6, no. 2, 2025.
J. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd ed., vol. 2. Oxford: Clarendon, 1892, pp.68–73.