Cyber Hygiene Practices from The Lens of Professional Youth in Malaysia
DOI:
https://doi.org/10.21834/e-bpj.v8i25.4827Keywords:
Cyber Hygiene, Cybersecurity, Youth, ProfessionalAbstract
Researchers have recognized cyber hygiene as an essential factor in reducing cybersecurity breaches. Factors affecting cyber hygiene practices are cyber hygiene knowledge and demographic factors. Inconclusive research has been found to be concerned with the extent of expertise and demographic factors that may affect cyber hygiene practices. This current pilot study aims to diagnose the effect of knowledge and demographic factors on cyber hygiene practices among professional youth in Malaysia. Forty-one usable questionnaires were further analyzed. The result showed no significant differences between demographic factors and cyber hygiene practices; and no significant relationship between knowledge and cyber hygiene practices among professional youth in Malaysia.
References
Adholiya, A., & Adholiya, S. (2019). A Study on Cyber Security Practices and Tips Awareness among E-Banking Services Users of Udaipur, Rajasthan. Int. J. Sci. Res. in Multidisciplinary Studies Vol, 5(8).
Alharbi, F., Alsulami, M., Al-Solami, A., Al-Otaibi, Y., Al-Osimi, M., Al-Qanor, F., & Al-Otaibi, K. (2021). The impact of cybersecurity practices on cyberattack damage: The perspective of small enterprises in Saudi Arabia. Sensors, 21(20), 6901. DOI: https://doi.org/10.3390/s21206901
AL-Hawamleh, A. M. (2023). Predictions of Cybersecurity Experts on Future Cyber-Attacks and Related Cybersecurity Measures. International Journal of Advanced Computer Science and Applications, 14(2). DOI: https://doi.org/10.14569/IJACSA.2023.0140292
Alsulami, M. H., Alharbi, F. D., Almutairi, H. M., Almutairi, B. S., Alotaibi, M. M., Alanzi, M. E., Alotaibi, K. G., & Alharthi, S. S. (2021). Measuring awareness of social engineering in the educational sector in the Kingdom of Saudi Arabia. Information, 12(5), 208. DOI: https://doi.org/10.3390/info12050208
Anwar, M., He, W., Ash, I., Yuan, X., Li, L., & Xu, L. (2017). Gender difference and employees' cybersecurity behaviors. Computers in Human Behavior, 69, 437-443. DOI: https://doi.org/10.1016/j.chb.2016.12.040
bt Fikry, A., & Bustami, M. R. (2011). The impact of demographics on the Malaysian teenager's influence towards family purchase decision of the game console. 2011 IEEE Colloquium on Humanities, Science, and Engineering,
Chandrasekharan, S., Sreedharan, J., & Gopakumar, A. (2019). Statistical issues in small and large samples: need of optimum upper bound for the sample size. International Journal of Computational and Theoretical Statistics, 6(2). DOI: https://doi.org/10.12785/IJCTS/060201
Davinson, N., and Sillence, E. (2010). It won't happen to me: Promoting secure behavior among Internet users. Computers in Human Behavior, 26(6), 1739-1747. DOI: https://doi.org/10.1016/j.chb.2010.06.023
Fatokun, F., Hamid, S., Norman, A., & Fatokun, J. (2019). The impact of age, gender, and educational level on the cybersecurity behaviors of tertiary institution students: an empirical investigation on Malaysian universities. Journal of Physics: Conference Series, DOI: https://doi.org/10.1088/1742-6596/1339/1/012098
Gundu, T. (2019). Acknowledging and reducing the knowing and doing gap in employee cybersecurity compliance. ICCWS 2019 14th International Conference on Cyber Warfare and Security,
Haeussinger, F., & Kranz, J. (2017). Antecedents Of Employees' Information Security Awareness-Review, Synthesis, And Directions For Future Research.
Hedström, K., Kolkowska, E., Karlsson, F., & Allen, J. P. (2011). Value conflicts for information security management. The Journal of Strategic Information Systems, 20(4), 373-384. DOI: https://doi.org/10.1016/j.jsis.2011.06.001
Herath, T. B., Khanna, P., & Ahmed, M. (2022). Cybersecurity practices for social media users: a systematic literature review. Journal of Cybersecurity and Privacy, 2(1), 1-18. DOI: https://doi.org/10.3390/jcp2010001
Ibrahim, W. N. A., Saharudin, N. S., & Lestari, D. F. (2023). Knowledge, Attitude, and Practice of Computer Vision Syndrome among Office Workers in UiTM Puncak Alam. Environment-Behaviour Proceedings Journal, 8(24), 315-322. DOI: https://doi.org/10.21834/ebpj.v8i24.4644
Ifinedo, P. (2012). Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers & Security, 31(1), 83-95. DOI: https://doi.org/10.1016/j.cose.2011.10.007
Kennison, S. M., & Chan-Tin, E. (2020). Taking risks with cybersecurity: Using knowledge and personal characteristics to predict self reported cybersecurity behaviors. Frontiers in Psychology, 11, 546546. DOI: https://doi.org/10.3389/fpsyg.2020.546546
Kure, H. I., Islam, S., & Razzaque, M. A. (2018). An integrated cyber security risk management approach for a cyber-physical system. Applied Sciences, 8(6), 898. Kshetri, N., & Chhetri, M. (2022). Gender asymmetry in cybersecurity: socioeconomic causes and consequences. Computer, 55(2), 72-77. DOI: https://doi.org/10.3390/app8060898
Muhammad, N. S., Fikry, A., Hussein, Z., Hamzah, M. I., Sudarwanto, T., & Marlena, N. (2023). Are there Significant Differences between Gender and Education Level toward Trust, Image Appeal, Emotion, and Mobile Apps Environment? DOI: https://doi.org/10.6007/IJARBSS/v13-i5/16984
Morris, M. G., Venkatesh, V., & Ackerman, P. L. (2005). Gender and age differences in employee decisions about new technology: An extension to the theory of planned behavior. IEEE Transactions on Engineering Management, 52(1), 69- 84. DOI: https://doi.org/10.1109/TEM.2004.839967
Nosek, B. A., Banaji, M., & Greenwald, A. G. (2002). Harvesting implicit group attitudes and beliefs from a demonstration website. Group Dynamics: Theory, Research, and Practice, 6(1), 101. DOI: https://doi.org/10.1037/1089-2699.6.1.101
Ng, B.Y., Kankanhalli, A., & Xu, Y. (2009). Studying users' computer security behavior using the health belief model. Decision Support Systems, 46(4), 815-825. DOI: https://doi.org/10.1016/j.dss.2008.11.010
Pham, H. C., Ulhaq, I., Nguyen, M., & Nkhoma, M. (2021). An exploratory study of the effects of knowledge sharing methods on cyber security practice. Australasian Journal of Information Systems, 25. DOI: https://doi.org/10.3127/ajis.v25i0.2177
Parsons, K., Calic, D., Pattinson, M., Butavicius, M., McCormac, A., & Zwaans, T. (2017). The human aspects of information security questionnaire (HAIS-Q): two further validation studies. Computers & Security, 66, 40-51. DOI: https://doi.org/10.1016/j.cose.2017.01.004
Sadok, M., Alter, S., & Bednar, P. (2020). It is not my job: to explore the disconnect between corporate security policies and actual security practices in SMEs. Information & Computer Security, 28(3), 467-483. DOI: https://doi.org/10.1108/ICS-01-2019-0010
Sarkar, S., Vance, A., Ramesh, B., Demestihas, M., & Wu, D. T. (2020). The influence of professional subculture on information security policy violations: A field study in a healthcare context. Information Systems Research, 31(4), 1240-1259. DOI: https://doi.org/10.1287/isre.2020.0941
Shah, P., & Agarwal, A. (2020). Cybersecurity behavior of smartphone users in India: an empirical analysis. Information & Computer Security, 28(2), 293-318. DOI: https://doi.org/10.1108/ICS-04-2019-0041
Shojaifar, A., Fricker, S. A., & Gwerder, M. (2020). Automating the Communication of Cybersecurity Knowledge: Multi-Case Study. Information Security Education. Information Security in Action: 13th IFIP WG 11.8 World Conference, WISE 13, Maribor, Slovenia, September 21–23, 2020, Proceedings 13,
Shih, D. H., Lin, B., Chiang, H. S., & Shih, M. H. (2008). Security aspects of mobile phone virus: a critical survey. Industrial Management & Data Systems, 108(4), 478- 494. DOI: https://doi.org/10.1108/02635570810868344
Uchendu, B., Nurse, J. R., Bada, M., & Furnell, S. (2021). Developing a cyber security culture: Current practices and future needs. Computers & Security, 109, 102387. DOI: https://doi.org/10.1016/j.cose.2021.102387
Vance, A., Siponen, M., & Pahnila, S. (2012). Motivating IS Security Compliance: Insights from Habit and Protection Motivation Theory. Information & Management, 49(3), 190- 198. DOI: https://doi.org/10.1016/j.im.2012.04.002
Van Niekerk, J., & Von Solms, R. (2010). Information security culture: A management perspective. Computers & Security, 29(4), 476-486. DOI: https://doi.org/10.1016/j.cose.2009.10.005
Vance, A., Siponen, M., & Pahnila, S. (2012). Motivating IS Security Compliance: Insights from Habit and Protection Motivation Theory. Information & Management, 49(3), 190- 198. DOI: https://doi.org/10.1016/j.im.2012.04.002
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Amily Fikry, Muhammad Iskandar Hamzah , Zuhal Hussein , Didin Hadi Saputra
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.