Application of PLS-SEM to Evaluate the Relationship between Cyber Phenomena Perception, Awareness, and Security Behavior
Keywords:
Cyber Security Behavior, Cyber Security Awareness, Threat Perception, PLS-SEM, Know-Do GapAbstract
The increasing prevalence of cyber threats poses a significant challenge for internet users and Micro, Small, and Medium Enterprises (MSMEs) in Indonesia, where low awareness is often a primary vulnerability factor. This study aims to evaluate the relationship between the perception of cyber phenomena (Phenomena), the level of cybersecurity awareness (Awareness), and the implementation of security behavior (Security) using a quantitative approach. Data were collected through a questionnaire survey from 100 respondents in Indonesia and analyzed using the Partial Least Squares Structural Equation Modeling (PLS-SEM) method. The analysis reveals that the Phenomena variable has a significant positive influence on Awareness (T-Statistic = 7.889; P-Value = 0.000). However, Awareness was not found to have a significant direct effect on Security behavior (P-Value = 0.209). These findings indicate a significant 'know-do gap' between awareness and action, implying that raising awareness alone is insufficient to drive secure cyber behavior. This suggests a need for interventions that focus more concretely on behavioral change rather than solely on educational campaigns.
References
O. Pratama, R. A. Aladin, B. Lim, and A. M. Sundjaja, “Determinants of Security Behavior Intention in State-Owned Enterprises: Applying
Protection Motivation Theory to Phishing Emails,” Int. J. Saf. Secur. Eng., vol. 15, no. 3, pp. 443–453, 2025, doi: 10.18280/ijsse.150304.
A. M. Perspective, K. Molati, D. Snyman, and W. Chigona, “Association for Information Systems Cybersecurity Culture Through Swidler ’ s Culture-in-Action Theory : Cybersecurity Culture Through Culture-in- Action : A Mechanism-Based Perspective,” no. July, 2025.
N. Martínez-Velilla and A. L. Gordon, “75 Years after Marjory Warren, the ‘know-do’ gap around hospital- associated functional decline is as wide as ever,” Age Ageing, vol. 54, no. 5, pp. 1–2, 2025, doi:10.1093/ageing/afaf134.
C. Sinha, M. G. Ingabire, and A. M. Schryer-Roy, “Bridging the know-do gap: improved adolescent sexual and reproductive health and health information systems in West Africa and the Middle East,” Reprod. Heal. , vol. 22, no. Suppl 1, pp. 1–8, 2025, doi: 10.1186/s12978-025-01987-2.
N. Ahmad Badela, M. Ayu, M. Ariff, and P. Pazui, “Cybersecurity Knowledge and Practices: a Survey of Students and Staff At Politeknik Mersing,” no. June.2024
C. Paul and R. C. Complutense, “Measuring the Effectiveness of Cybersecurity Training Programs in SMEs Measuring the Effectiveness of Cybersecurity Training Programs in SMEs,” no. June, 2025.
E. M. Alrawhani, A. Romli, and M. A. Al-Sharafi, “Evaluating the role of protection motivation theory in information security policy compliance: Insights from the banking sector using PLS-SEM approach,” J. Open Innov. Technol. Mark. Complex., vol. 11, no. 1,
p. 100463, 2025, doi: 10.1016/j.joitmc.2024.100463.
S. Mitra, B. Elly, and L. Shumar, “Consumer Behavior Towards Personalized Marketing Amidst Privacy Concerns,” no. January, 2025.
S. P. Saragih and I. Svinarky, “PELATIHAN CYBER SECURITY AWARENESS KEPADA MASYARAKAT MENGHADAPI
PERKEMBANGAN KEJAHATAN SIBER Cybersecurity Awareness Training for Society in Addressing the Advancements of Cybercrime,” Ed. Januari, vol. 6, no. 2, pp. 565–572, 2025.
Brahmandika, Leonard, BHINNEKA TUNGGAL IKA: Pancasila Jurnal Internasional Berbahasa Indonesia Tinjauan Filsafat Pancasila FenomenaCyber bullying di Media Sosial sebagai Pelanggaran Sila Kedua Pancasila
Esi Mansa Aidoo, World Journal of Advanced Research and Reviews Advancing precision medicine and health education for chronic disease prevention in vulnerable maternal and child populations
EWERTOWSKI, Tomasz KROLL, Nina, Communications of International Proceedings Analysis of Selected Aspects of a Local Community Safety: A Quantitative and Qualitative Research in A District of Poznan, Poland
Chen Chuen, L., Jamaludin, N. A.A., Abdul Rauf, U. F., Awang, N. F., International Journal on Informatics Visualization Awareness of Cybersecurity: A Case Study in a Logistics Organizations
Sutanto, Jason Matthew Nadia, Nadia, Engineering, Mathematics and Computer Science Journal (EMACS) Cyber Security Awareness Simulation for Web Phishing in E-Commerce
Samarasinghe, T Dilushika Karunarathne,Neranjan Samarasinghe, T D, Analyzing the implementation factors of Zero-Trust Architecture as perceived by Information Security Professionals in Western Province, Sri Lanka
Hassan, Md Sharif Mai, Nguyen Hong Wahab, Nor Shaipah Abdul Amin, Mohammad Bin Hassan, Md Maruf Oláh, Judit, Computers in Human Behavior Reports Decentralized fintech platforms adoption intention in cyber risk environment among GenZ: A dual-method approach using PLS SEM and necessary condition analysis
Helmiawan, M. A., & Wiharko, T. (2018). Application of Fingerprint Security System on Motorcycles using Arduino Microcontroller. J-Tin’s-Jurnal Teknik Informatika, 2(1).
Helmiawan, M. A., Juna, D. I., & Ramdhani, B. (2018). Pengamanan Sistem Dan Data E-Voting Berbasis Network. INTERNAL (Information System Journal), 1(1), 1–10.
Helmiawan, M. A., Firmansyah, E., Fadil, I., Sofivan, Y., Mahardika, F., & Guntara, A. (2020). Analysis of web security using open web application security project 10. 2020 8th International Conference on Cyber and IT Service Management
Helmiawan, M. A., Julian, E., Cahyan, Y., & Saeppani, A. (2021). Experimental evaluation of security monitoring and notification on network intrusion detection system for server security. 2021 9th International Conference on Cyber and IT Service Management (CITSM ….
Helmiawan, M. A., Fadil, I., Sofiyan, Y., & Firmansyah, E. (2021). Security model using intrusion detection system on cloud computing security management. 2021 9th International Conference on Cyber and IT Service Management (CITSM ….
Helmiawan, M. A., & Nasution, A. I. (2022). The Effect of Internet Banking Use and Customer Protection Against Cyber Crime at Bank Rakyat Indonesia. Journal of Islamic Economics and Business, 2(2), 170–183.