The Influence of Cyber Awareness on Perceived Digital Security: An Empirical Study Using PLS-SEM
Based on Quantitative Analysis with 100 Respondents
Keywords:
Cybersecurity, Digital Awareness, Digital Literacy, PLS-SEM, Information PrivacyAbstract
This study aims to thoroughly analyze the relationship between cyber awareness, perceptions of digital threat phenomena, and perceptions of digital security using the Partial Least Squares Structural Equation Modeling (PLS-SEM) approach with the SmartPLS 4.0 software. In this study, a total of 100 respondents from various age groups, educational backgrounds, and professions completed a Likert-scale-based questionnaire comprising three main constructs: Awareness, Phenomena, and Security, each measured by seven indicators. The data analysis results show that the path coefficients between Awareness → Phenomena (0.931) and Phenomena → Security (0.890) are statistically significant, with R-square values of 0.866 and 0.792, respectively. These findings indicate that the higher an individual's awareness of cyber issues, the greater their perception of digital risks, which in turn strengthens their perception of the importance of digital security. This study emphasizes that digital literacy and increased cyber awareness are critical factors in fostering a safe and responsible digital behavior culture amid growing cyber threats.
References
P. Limna, T. Kraiwanit, and S. Siripipattanakul, “The relationship between cyber security knowledge, awareness and behavioural choice protection among mobile banking users in Thailand,” Int. J. Cyber Res., 2023. [Online]. Available: https://www.academia.edu/download/107696642/378-1-548-2-10-20221128.pdf
S. Hassan, N. H. Mai, M. B. Amin, and M. Hassan, “Digital Fintech Platforms Adoption Intention in Cyber Risk Environment among Gen Z: A Dual-Method Approach Using PLS-SEM and Necessary Condition Analysis,” Computers in Human Behavior Reports, vol. 12, 2025. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S2451958825001022
H. Y. Zainal, “Examining the factors affecting users' cybersecurity behaviour in mobile payment contactless technologies: A hybrid SEM-ANN approach,” BUID Thesis, 2022. [Online]. Available: https://www.mdpi.com/2073-431X/14/4/129
A. Vafaei-Zadeh, D. Nikbin, and K. Y. Teoh, “Cybersecurity awareness and fear of cyberattacks among online banking users in Malaysia,” Int. J. Bank Mark., 2025. [Online]. Available: https://www.emerald.com/insight/content/doi/10.1108/ijbm-03-2024-0138/full/html
D. V. Tran, P. V. Nguyen, and L. P. Le, “From awareness to behaviour: understanding cybersecurity compliance in Vietnam,” Int. J. Organizational Analysis, 2025. [Online]. Available: https://www.emerald.com/insight/content/doi/10.1108/IJOA-12-2023-4147/full/html
N. S. Sulaiman and S. F. Abd Latif, “Development of Cybersecurity Awareness Model Based on Protection Motivation Theory (PMT) for Digital IR 4.0 in Malaysia,” Int. J. Emerg. Technol., 2025. [Online]. Available: https://thesai.org/Downloads/Volume16No3/Paper_117-Development_of_Cybersecurity_Awareness_Model.pdf
M. Al-Emran, M. A. Al-Sharafi, and B. Foroughi, “Evaluating the barriers affecting cybersecurity behavior in the Metaverse using PLS-SEM and fuzzy sets (fsQCA),” Computers in Human Behavior, vol. 147, 2024. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S0747563224001833
H. Chen, Y. Zhang, and T. Lyu, “Exploring the role of gamified information security education systems on information security awareness and protection behavioral intention,” Education and Information Technologies, 2023. [Online]. Available: https://link.springer.com/article/10.1007/s10639-023-11771-z
B. Ahamed, M. R. H. Polas, and A. I. Kabir, “Empowering students for cybersecurity awareness management in the emerging digital era,” SAGE Open, vol. 14, no. 2, 2024. [Online]. Available: https://journals.sagepub.com/doi/abs/10.1177/21582440241228920
Helmiawan, M. A., Firmansyah, E., Fadil, I., Sofivan, Y., Mahardika, F., & Guntara, A. (2020). Analysis of web security using open web application security project 10. 2020 8th International Conference on Cyber and IT Service Management
Helmiawan, M. A., Julian, E., Cahyan, Y., & Saeppani, A. (2021). Experimental evaluation of security monitoring and notification on network intrusion detection system for server security. 2021 9th International Conference on Cyber and IT Service Management (CITSM ….
Helmiawan, M. A., Fadil, I., Sofiyan, Y., & Firmansyah, E. (2021). Security model using intrusion detection system on cloud computing security management. 2021 9th International Conference on Cyber and IT Service Management (CITSM ….
Helmiawan, M. A., & Nasution, A. I. (2022). The Effect of Internet Banking Use and Customer Protection Against Cyber Crime at Bank Rakyat Indonesia. Journal of Islamic Economics and Business, 2(2), 170–183.
R. A. Alsharida, B. A. S. Al-Rimy, and M. Al-Emran, “Predicting cybersecurity behaviors in the metaverse through the lenses of TTAT and TPB: a hybrid SEM-ANN approach,” Online Information Review, 2025. [Online]. Available: https://researchportal.port.ac.uk/files/104163811/Alsharida_et_al_2025_AAM.pdf
N. S. Sulaiman, M. A. Fauzi, S. Hussain, and W. Wider, “Cybersecurity behavior among government employees: The role of protection motivation theory and responsibility in mitigating cyberattacks,” Information, vol. 13, no. 9, 2022. [Online]. Available: https://www.mdpi.com/2078-2489/13/9/413
R. A. Alsharida, B. A. S. Al-Rimy, and M. Al-Emran, “An integrated SEM-ANN approach to evaluating cybersecurity behaviors in the metaverse,” Int. J. Hum.-Comput. Interact., 2025. [Online]. Available: https://www.researchgate.net/publication/390562785
A. A. Alfalah, “The role of internet security awareness as a moderating variable on cybersecurity perception: Learning management system as a case study,” Int. J. Adv. Appl. Sci., vol. 10, no. 5, pp. 45–54, 2023. [Online]. Available: https://www.researchgate.net/publication/370418843
R. C. Chanda, A. Vafaei-Zadeh, H. Hanifah, and T. Ramayah, “Investigating factors influencing individual users’ intention to adopt cloud computing: A hybrid approach using PLS-SEM and fsQCA,” Kybernetes, vol. 53, no. 2, 2024. [Online]. Available: https://www.researchgate.net/publication/372454090