Awareness, Phenomenon, and Security Evaluation Model in Cybersecurity Using SmartPLS

Awareness, Phenomenon, and Security Evaluation Model in Cybersecurity Using SmartPLS

Authors

  • Herdianto Sukmana Sukmana Universitas Sebelas April Sumedang
  • Wishal Al-Faridz
  • Alip Rizky Firdaus
  • Muhammad Farid Abdillah

Abstract

In the digital age, understanding and awareness of cybersecurity has become very important, both for individuals and organizations. This study aims to evaluate the relationship between cybersecurity awareness (Awareness), perception of cyber threat phenomena (Phenomenon), and the implementation of security policies (Security) in the Indonesian society. A total of 100 respondents were collected through an online survey, and data was analyzed using the Partial Least Squares Structural Equation Modeling (PLS-SEM) approach with SmartPLS software. The results show that Awareness has a significant effect on Phenomenon, and Phenomenon has a significant effect on Security. However, the direct relationship between Awareness and Security is not significant. This study also found the issue of discriminant validity between the construct of Awareness and Phenomenon, which is a limitation of the research. This research confirms the importance of increasing awareness to strengthen overall cybersecurity.Düssel  

Keywords—Cybersecurity, PLS-SEM, SmartPLS, Awareness,

Threat Phenomena, Discriminating Validity

References

Y. Haji-Othman and M. S. S. Yusuff, “Assessing Reliability and Validity of Attitude Construct Using Partial Least Squares Structural Equation Modeling (PLS-SEM),” Int. J. Acad. Res. Bus. Soc. Sci., vol. 12, no. 5, May 2022, doi:10.6007/ijarbss/v12-i5/13289.

Y. Haji-Othman, M. S. Sheh Yusuff, and M. N. Md Hussain, “Data Analysis Using Partial Least Squares Structural Equation Modeling (PLS-SEM) in Conducting Quantitative Research,” Int. J. Acad. Res. Bus. Soc. Sci., vol. 14, no. 10, Oct. 2024, doi:10.6007/IJARBSS/v14-i10/23364.

A. S. M. Yusoff, et al., “Discriminant Validity Assessment of Religious Teacher Acceptance: The Use of HTMT Criterion,” J. Phys.: Conf. Ser., 2020, doi: 10.1088/1742-6596/1529/4/042045.

G. W. Cheung, et al., “Reporting reliability, convergent and discriminant validity with structural equation modeling: A review and best-practice recommendations,” Asia Pac. J.vManage., vol. 41, no. 2, pp. 745–783, Jun. 2024, doi:10.1007/s10490-023-09871-y.

Helmiawan, M. A., Firmansyah, E., Fadil, I., Sofivan, Y., Mahardika, F., & Guntara, A. (2020). Analysis of web security using open web application security project 10. 2020 8th International Conference on Cyber and IT Service Management

Helmiawan, M. A., Julian, E., Cahyan, Y., & Saeppani, A. (2021). Experimental evaluation of security monitoring and notification on network intrusion detection system for server security. 2021 9th International Conference on Cyber and IT Service Management (CITSM ….

Helmiawan, M. A., Fadil, I., Sofiyan, Y., & Firmansyah, E. (2021). Security model using intrusion detection system on cloud computing security management. 2021 9th International Conference on Cyber and IT Service Management

Helmiawan, M. A., & Nasution, A. I. (2022). The Effect of Internet Banking Use and Customer Protection Against Cyber Crime at Bank Rakyat Indonesia. Journal of Islamic Economics and Business, 2(2), 170–183.

Published

2025-08-22
Loading...