Cyber Hygiene Practices from The Lens of Professional Youth in Malaysia

Authors

  • Amily Fikry Faculty of Business and Management, Universiti Teknologi MARA Puncak Alam, Malaysia
  • Muhammad Iskandar Hamzah Faculty of Business and Management, Universiti Teknologi MARA Puncak Alam, Malaysia
  • Zuhal Hussein Faculty of Business and Management, Universiti Teknologi MARA Kelantan, Malaysia
  • Didin Hadi Saputra Faculty of Administrative Science, University of Nahdatul Wathan Mataram, Kaktus Street, No.1-3, West Nusa Tenggara, Indonesia, Poskod 83125

DOI:

https://doi.org/10.21834/e-bpj.v8i25.4827

Keywords:

Cyber Hygiene, Cybersecurity, Youth, Professional

Abstract

Researchers have recognized cyber hygiene as an essential factor in reducing cybersecurity breaches. Factors affecting cyber hygiene practices are cyber hygiene knowledge and demographic factors. Inconclusive research has been found to be concerned with the extent of expertise and demographic factors that may affect cyber hygiene practices. This current pilot study aims to diagnose the effect of knowledge and demographic factors on cyber hygiene practices among professional youth in Malaysia. Forty-one usable questionnaires were further analyzed. The result showed no significant differences between demographic factors and cyber hygiene practices; and no significant relationship between knowledge and cyber hygiene practices among professional youth in Malaysia.

References

Adholiya, A., & Adholiya, S. (2019). A Study on Cyber Security Practices and Tips Awareness among E-Banking Services Users of Udaipur, Rajasthan. Int. J. Sci. Res. in Multidisciplinary Studies Vol, 5(8).

Alharbi, F., Alsulami, M., Al-Solami, A., Al-Otaibi, Y., Al-Osimi, M., Al-Qanor, F., & Al-Otaibi, K. (2021). The impact of cybersecurity practices on cyberattack damage: The perspective of small enterprises in Saudi Arabia. Sensors, 21(20), 6901. DOI: https://doi.org/10.3390/s21206901

AL-Hawamleh, A. M. (2023). Predictions of Cybersecurity Experts on Future Cyber-Attacks and Related Cybersecurity Measures. International Journal of Advanced Computer Science and Applications, 14(2). DOI: https://doi.org/10.14569/IJACSA.2023.0140292

Alsulami, M. H., Alharbi, F. D., Almutairi, H. M., Almutairi, B. S., Alotaibi, M. M., Alanzi, M. E., Alotaibi, K. G., & Alharthi, S. S. (2021). Measuring awareness of social engineering in the educational sector in the Kingdom of Saudi Arabia. Information, 12(5), 208. DOI: https://doi.org/10.3390/info12050208

Anwar, M., He, W., Ash, I., Yuan, X., Li, L., & Xu, L. (2017). Gender difference and employees' cybersecurity behaviors. Computers in Human Behavior, 69, 437-443. DOI: https://doi.org/10.1016/j.chb.2016.12.040

bt Fikry, A., & Bustami, M. R. (2011). The impact of demographics on the Malaysian teenager's influence towards family purchase decision of the game console. 2011 IEEE Colloquium on Humanities, Science, and Engineering,

Chandrasekharan, S., Sreedharan, J., & Gopakumar, A. (2019). Statistical issues in small and large samples: need of optimum upper bound for the sample size. International Journal of Computational and Theoretical Statistics, 6(2). DOI: https://doi.org/10.12785/IJCTS/060201

Davinson, N., and Sillence, E. (2010). It won't happen to me: Promoting secure behavior among Internet users. Computers in Human Behavior, 26(6), 1739-1747. DOI: https://doi.org/10.1016/j.chb.2010.06.023

Fatokun, F., Hamid, S., Norman, A., & Fatokun, J. (2019). The impact of age, gender, and educational level on the cybersecurity behaviors of tertiary institution students: an empirical investigation on Malaysian universities. Journal of Physics: Conference Series, DOI: https://doi.org/10.1088/1742-6596/1339/1/012098

Gundu, T. (2019). Acknowledging and reducing the knowing and doing gap in employee cybersecurity compliance. ICCWS 2019 14th International Conference on Cyber Warfare and Security,

Haeussinger, F., & Kranz, J. (2017). Antecedents Of Employees' Information Security Awareness-Review, Synthesis, And Directions For Future Research.

Hedström, K., Kolkowska, E., Karlsson, F., & Allen, J. P. (2011). Value conflicts for information security management. The Journal of Strategic Information Systems, 20(4), 373-384. DOI: https://doi.org/10.1016/j.jsis.2011.06.001

Herath, T. B., Khanna, P., & Ahmed, M. (2022). Cybersecurity practices for social media users: a systematic literature review. Journal of Cybersecurity and Privacy, 2(1), 1-18. DOI: https://doi.org/10.3390/jcp2010001

Ibrahim, W. N. A., Saharudin, N. S., & Lestari, D. F. (2023). Knowledge, Attitude, and Practice of Computer Vision Syndrome among Office Workers in UiTM Puncak Alam. Environment-Behaviour Proceedings Journal, 8(24), 315-322. DOI: https://doi.org/10.21834/ebpj.v8i24.4644

Ifinedo, P. (2012). Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers & Security, 31(1), 83-95. DOI: https://doi.org/10.1016/j.cose.2011.10.007

Kennison, S. M., & Chan-Tin, E. (2020). Taking risks with cybersecurity: Using knowledge and personal characteristics to predict self reported cybersecurity behaviors. Frontiers in Psychology, 11, 546546. DOI: https://doi.org/10.3389/fpsyg.2020.546546

Kure, H. I., Islam, S., & Razzaque, M. A. (2018). An integrated cyber security risk management approach for a cyber-physical system. Applied Sciences, 8(6), 898. Kshetri, N., & Chhetri, M. (2022). Gender asymmetry in cybersecurity: socioeconomic causes and consequences. Computer, 55(2), 72-77. DOI: https://doi.org/10.3390/app8060898

Muhammad, N. S., Fikry, A., Hussein, Z., Hamzah, M. I., Sudarwanto, T., & Marlena, N. (2023). Are there Significant Differences between Gender and Education Level toward Trust, Image Appeal, Emotion, and Mobile Apps Environment? DOI: https://doi.org/10.6007/IJARBSS/v13-i5/16984

Morris, M. G., Venkatesh, V., & Ackerman, P. L. (2005). Gender and age differences in employee decisions about new technology: An extension to the theory of planned behavior. IEEE Transactions on Engineering Management, 52(1), 69- 84. DOI: https://doi.org/10.1109/TEM.2004.839967

Nosek, B. A., Banaji, M., & Greenwald, A. G. (2002). Harvesting implicit group attitudes and beliefs from a demonstration website. Group Dynamics: Theory, Research, and Practice, 6(1), 101. DOI: https://doi.org/10.1037/1089-2699.6.1.101

Ng, B.Y., Kankanhalli, A., & Xu, Y. (2009). Studying users' computer security behavior using the health belief model. Decision Support Systems, 46(4), 815-825. DOI: https://doi.org/10.1016/j.dss.2008.11.010

Pham, H. C., Ulhaq, I., Nguyen, M., & Nkhoma, M. (2021). An exploratory study of the effects of knowledge sharing methods on cyber security practice. Australasian Journal of Information Systems, 25. DOI: https://doi.org/10.3127/ajis.v25i0.2177

Parsons, K., Calic, D., Pattinson, M., Butavicius, M., McCormac, A., & Zwaans, T. (2017). The human aspects of information security questionnaire (HAIS-Q): two further validation studies. Computers & Security, 66, 40-51. DOI: https://doi.org/10.1016/j.cose.2017.01.004

Sadok, M., Alter, S., & Bednar, P. (2020). It is not my job: to explore the disconnect between corporate security policies and actual security practices in SMEs. Information & Computer Security, 28(3), 467-483. DOI: https://doi.org/10.1108/ICS-01-2019-0010

Sarkar, S., Vance, A., Ramesh, B., Demestihas, M., & Wu, D. T. (2020). The influence of professional subculture on information security policy violations: A field study in a healthcare context. Information Systems Research, 31(4), 1240-1259. DOI: https://doi.org/10.1287/isre.2020.0941

Shah, P., & Agarwal, A. (2020). Cybersecurity behavior of smartphone users in India: an empirical analysis. Information & Computer Security, 28(2), 293-318. DOI: https://doi.org/10.1108/ICS-04-2019-0041

Shojaifar, A., Fricker, S. A., & Gwerder, M. (2020). Automating the Communication of Cybersecurity Knowledge: Multi-Case Study. Information Security Education. Information Security in Action: 13th IFIP WG 11.8 World Conference, WISE 13, Maribor, Slovenia, September 21–23, 2020, Proceedings 13,

Shih, D. H., Lin, B., Chiang, H. S., & Shih, M. H. (2008). Security aspects of mobile phone virus: a critical survey. Industrial Management & Data Systems, 108(4), 478- 494. DOI: https://doi.org/10.1108/02635570810868344

Uchendu, B., Nurse, J. R., Bada, M., & Furnell, S. (2021). Developing a cyber security culture: Current practices and future needs. Computers & Security, 109, 102387. DOI: https://doi.org/10.1016/j.cose.2021.102387

Vance, A., Siponen, M., & Pahnila, S. (2012). Motivating IS Security Compliance: Insights from Habit and Protection Motivation Theory. Information & Management, 49(3), 190- 198. DOI: https://doi.org/10.1016/j.im.2012.04.002

Van Niekerk, J., & Von Solms, R. (2010). Information security culture: A management perspective. Computers & Security, 29(4), 476-486. DOI: https://doi.org/10.1016/j.cose.2009.10.005

Vance, A., Siponen, M., & Pahnila, S. (2012). Motivating IS Security Compliance: Insights from Habit and Protection Motivation Theory. Information & Management, 49(3), 190- 198. DOI: https://doi.org/10.1016/j.im.2012.04.002

Downloads

Published

2023-07-31

How to Cite

Fikry, A., Hamzah , M. I., Hussein , Z., & Saputra , D. H. (2023). Cyber Hygiene Practices from The Lens of Professional Youth in Malaysia . Environment-Behaviour Proceedings Journal, 8(25), 187–193. https://doi.org/10.21834/e-bpj.v8i25.4827