Evaluation of User Awareness and Behavior towards Cyber Threats through the PLS-SEM Approach and the Implementation of Digital Education

Evaluation of User Awareness and Behavior towards Cyber Threats through the PLS-SEM Approach and the Implementation of Digital Education

Authors

  • Nida Shofwatunnisa Universitas Sebelas April
  • Anisa Pebriyani Huslan
  • Devi Cahyati
  • Hikmawati Nurul Insani

Abstract

The level of awareness and behavior of users towards information security is a crucial aspect in facing the increasing cyber threats in the digital era. This study aims to evaluate the relationship between exposure to cyber phenomena (Phenomena), security awareness (Awareness), and digital security behavior (Security) using the Partial Least Squares Structural Equation Modeling (PLS-SEM) approach. The research instrument was developed in the form of an online questionnaire via Google Forms and distributed to 100 respondents, the majority of whom were students. The analysis results indicate that Phenomena has a strong positive influence on Awareness (coefficient = 0.574), Awareness influences Security (coefficient = 0.283), and Phenomena also has a direct influence on Security (coefficient = 0.410). These findings were used as the basis for developing educational materials in the form of educational posters containing six safe behavior procedures, which were directly communicated to students and university students. Observation results indicated that a simple visual approach is effective in conveying information security messages to non-technical target groups. This study recommends and concludes that education developed based on data analysis results can serve as a strategic approach in building awareness and a safe digital culture.

References

S. T. Zahwani and M. I. P. Nasution, “Analisis Kesadaran Masyarakat Terhadap Perlindungan Data Pribadi di Era Digital,” JOSES: Journal of Sharia Economics Scholar, vol. 2, no. 2, pp. 105-109, Jun. 2023, doi: 10.5281/zenodo.12608751.

L. I. Uzlah, R. A. Saputra, and Isnawaty, “Deteksi Serangan Siber Pada Jaringan Komputer Menggunakan Metode Random Forest,” JATI (Jurnal Mahasiswa Teknik Informatika), vol. 8, no. 3, pp. 2787-2793, Jun. 2024.

M. Hakimi, M. M. Quchi, and A. W. Fazil, “Human factors in cybersecurity: an in depth analysis of user centric studies,” Jurnal Ilmiah Multidisiplin Indonesia (JIM-ID), vol. 3, no. 01, pp. 20–33, Jan. 2024.

K. Khadka and A. B. Ullah, “Human Factors in Cybersecurity: An Interdisciplinary Review and Framework Proposal,” International Journal of Information Security, vol. 24, no. 119, 2025.

B. Alkhazi, M. Alshaikh, S. Alkhezi and H. Labbaci, “Assessment of the Impact of Information Security Awareness Training Methods on Knowledge, Attitude, and Behavior,” in IEEE Access, vol. 10, pp. 132132-132143, 2022, doi: 10.1109/ACCESS.2022.3230286.

T. Tan, H. Sama, T. Wibowo, G. Wijaya, O. E. Aboagye, “Kesadaran Keamanan Siber pada Kalangan Mahasiswa Universitas di Kota Batam,” Jurnal Teknologi dan Informasi (JATI), vol. 14, no. 2, pp. 163–173, Sep. 2024, doi: 10.34010/jati.v14i2.12518.

Helmiawan, M. A., Firmansyah, E., Fadil, I., Sofivan, Y., Mahardika, F., & Guntara, A. (2020). Analysis of web security using open web application security project 10. 2020 8th International Conference on Cyber and IT Service Management

Helmiawan, M. A., Julian, E., Cahyan, Y., & Saeppani, A. (2021). Experimental evaluation of security monitoring and notification on network intrusion detection system for server security. 2021 9th International Conference on Cyber and IT Service Management (CITSM ….

M. Zwilling, G. Klien, D. Lesjak, L. Wiechetek, F. Cetin, and H. N. Basim, “Cyber Security Awareness, Knowledge and Behavior: A Comparative Study,” Journal of Computer Information Systems, vol. 62, no. 1, pp. 82–97, 2020. doi: 10.1080/08874417.2020.1712269.

D. R. Jacobs, N. Darmawaskita, and T. McDaniel, “Unraveling the Real-World Impacts of Cyber Incidents on Individuals,” In HCI for Cybersecurity, Privacy and Trust: 6th International Conference, HCI-CPT 2024, Held as Part of the 26th HCI International Conference, HCII 2024, Washington, DC, USA, Proceedings, Part II. Springer-Verlag, Berlin, Heidelberg, pp. 40–55, 2024. https://doi.org/10.1007/978-3-031-61382-1_3.

National Institute of Standards and Technology, The NIST Cybersecurity Framework (CSF) 2.0, NIST Cybersecurity White Paper (CSWP) 29, Gaithersburg, MD, USA, Feb. 26, 2024. [Online]. Available: https://doi.org/10.6028/NIST.CSWP.29.

ISO/IEC, Information security, cybersecurity and privacy protection — Information security management systems — Requirements, ISO/IEC 27001:2022, 3rd ed., Oct. 2022. [Online]. Available: https://www.iso.org/standard/82875.html.

J. F. Hair Jr., G. T. M. Hult, C. M. Ringle, and M. Sarstedt, “A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM),” 3rd ed., Sage Publications, 2021.

L. K. Harahap, “Analisis SEM (Structural Equation Modelling) dengan SMARTPLS (partial least square),” Fakultas Sains Dan Teknologi Uin Walisongo Semarang, pp. 1-11, 2020.

S. Chaudhary, M. Kompara, S. Pape, and V. Gkioulos, “Properties for Cybersecurity Awareness Posters’ Design and Quality Assessment,” In Proceedings of the 17th International Conference on Availability, Reliability and Security (ARES '22). Association for Computing Machinery, New York, NY, USA, pp. 1–8, 2022. https://doi.org/10.1145/3538969.3543794.

A. Andria, K. Sussolaikah, R. D. Laksono, adn M. Lenawati, “Pelatihan Keamanan Siber Guna Meningkatkan Literasi Digital di SMPN 14 Kota Madiun,” Jurnal Abdimas Teknologi Informatika & Komputer (JATIK), vol. 1 no. 2, pp. 53-60, 2024.

B. J. Hutagaol, R. S. Sitorus, and N. Hutagaol, “Identifikasi Tingkat Kesadaran Pengguna Mobile Banking terhadap Ancaman Cybercrime,” Jurnal Teknologi Sistem Informasi dan Aplikasi, vol. 7, no. 3, pp. 1043-1054, Juli 2024, doi: 10.32493/jtsi.v7i3.41639.

M. Yusuf, “Pengaruh Promosi, Gaya Hidup, dan Persepsi Risiko terhadap Niat Beli Motor Listrik menggunakan Metode SEM - PLS,” G-Tech: Jurnal Teknologi Terapan, vol. 6, no. 2, pp. 241-248, Okt. 2022.

U. Proboyekti, R. Ferdiana, and P. I. Santosa, “Pendekatan PLS-SEM pada Persepsi Percaya dan Penggunaan Informasi untuk Situs Web Informasional,” Jurnal Nasional Teknik Elektro dan Teknologi Informasi, vol. 14, no. 1, pp. 15-24, Feb. 2025.

Helmiawan, M. A., Fadil, I., Sofiyan, Y., & Firmansyah, E. (2021). Security model using intrusion detection system on cloud computing security management. 2021 9th International Conference on Cyber and IT Service Management

Helmiawan, M. A., & Nasution, A. I. (2022). The Effect of Internet Banking Use and Customer Protection Against Cyber Crime at Bank Rakyat Indonesia. Journal of Islamic Economics and Business, 2(2), 170–183.

Published

2025-08-22
Loading...