Mediating Role of Security Awareness in the Relationship between Cybercrime Phenomena and Internet User Security Behavior
Keywords:
Cyber Security, Cyber Security Awareness, Cyber Security Behavior, PLS-SEM, Cyber PhenomenaAbstract
This study aims to examine the mediating role of security awareness in the relationship between exposure to cybercrime phenomena and security behavior among internet users. Amidst rising cyber threats, understanding the psychological mechanisms that drive protective actions is crucial. This research employs a quantitative approach using a partial least squares structural equation model (PLS-SEM) to analyze data collected from an online questionnaire. The analysis results show that exposure to cybercrime phenomena has a positive and significant effect on security awareness (β = 0.617, p < 0.05). Furthermore, security awareness is also proven to have a positive and significant effect on security behavior (β = 0.647, p < 0.05). The mediation test indicates that security awareness significantly mediates the relationship between cybercrime phenomena and security behavior (β = 0.399, p < 0.05). These findings underscore the crucial role of awareness as a bridge that transforms threat perception into tangible action. The implication of this research is the importance of designing campaigns that not only disseminate information about threats but also actively build awareness to encourage better security practices.
References
World Economic Forum, "The Global Risks Report 2024," WEF, Geneva, 2024.
K. K. Caputo, S. L. Pfleeger, J. D. Sroufe, and E. L. Fitz-Gerald, "The human factor in security: Why we can't patch people," IEEE Security & Privacy, vol. 12, no. 2, pp. 88-92, 2014.
M. A. Sasse, S. Brostoff, and D. Weirich, "Transforming the 'weakest link'—a human/computer interaction approach to usable and effective security," BT Technology Journal, vol. 19, no. 3, pp. 122-131, 2001.
B. Bulgurcu, H. Cavusoglu, and I. Benbasat, "Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness," MIS quarterly, vol. 34, no. 3, pp. 523-548, 2010.
I. Ajzen, "The theory of planned behavior," Organizational behavior and human decision processes, vol. 50, no. 2, pp. 179-211, 1991.R. Nicole, “Title of paper with only first word capitalized,” J. Name Stand. Abbrev., in press.
R. W. Rogers, "A protection motivation theory of fear appeals and attitude change," The journal of psychology, vol. 91, no. 1, pp. 93-114, 1975.
Helmiawan, M. A., Fadil, I., Sofiyan, Y., & Firmansyah, E. (2021). Security model using intrusion detection system on cloud computing security management. 2021 9th International Conference on Cyber and IT Service Management
Helmiawan, M. A., & Nasution, A. I. (2022). The Effect of Internet Banking Use and Customer Protection Against Cyber Crime at Bank Rakyat Indonesia. Journal of Islamic Economics and Business, 2(2), 170–183.
Helmiawan, M. A., Firmansyah, E., Fadil, I., Sofivan, Y., Mahardika, F., & Guntara, A. (2020). Analysis of web security using open web application security project 10. 2020 8th International Conference on Cyber and IT Service Management
Helmiawan, M. A., Julian, E., Cahyan, Y., & Saeppani, A. (2021). Experimental evaluation of security monitoring and notification on network intrusion detection system for server security. 2021 9th International Conference on Cyber and IT Service Management
T. D'Arcy, A. Hovav, and D. Galletta, "User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach," Information Systems Research, vol. 20, no. 1, pp. 79-98, 2009.
R. M. Baron and D. A. Kenny, "The moderator–mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerations," Journal of personality and social psychology, vol. 51, no. 6, p. 1173, 1986.
J. F. Hair Jr, G. T. M. Hult, C. M. Ringle, and M. Sarstedt, A primer on partial least squares structural equation modeling (PLS-SEM). Sage publications, 2016.