The Determinants of Risky Cybersecurity Behaviour: A Case Study Among Employees in Water Sector in Malaysia

Author:

Ramalu Subramaniam SriORCID,Abidin Norhaslinda Binti ZainalORCID,Nadarajah GunalanORCID,Anuar Amni Binti

Abstract

Objective: Cybersecurity threats are a growing concern around the world. Research found that the weakest element in the cybersecurity chain is that of the human. The use of security technologies failed to address the problem in instances where employees engage in activities that place themselves and the company at risk. Hence, the role human factors play in cybersecurity is crucial. The present study aims to examine the effects of information security issues awareness, top management support, leadership, information security policy and cybersecurity awareness training on risky cybersecurity behaviour among employees in water sector.   Method: The quantitative method was applied in this study. The data were collected from 425 employees from four water companies located in northern states of Malaysia. The respondents are selected using disproportionate stratified random sampling technique. The survey was conducted using questionnaire. PLS-SEM was used to test the proposed hypotheses.   Results: The results show that security issues awareness and top management support are negatively related to risky cybersecurity behaviour. This suggest that the greater security issues awareness and top management support, lower the tendency to engage in risky cybersecurity behaviour among employees. Contrary to the prediction, cybersecurity awareness training was found to be positively related with risky cybersecurity behaviour.   Conclusions: The findings of the study have several theoretical and practical implications. Security issues awareness and top management support are important factors to avoid threat of cyber-attacks. By ensuring cybersecurity, water security is stored hence the well-being of people is taken care since water is a fundamental need of human lives. The stability and security of the country also can be maintained with secure and sustainable water resiliency. Finally, the economic losses due to cyber-attacks can be reduced.

Publisher

South Florida Publishing LLC

Subject

Law,Development,Management, Monitoring, Policy and Law

Reference95 articles.

1. Abbaszadeh, M. A., Gholami, R., & Saghafi, F. (2010). The effect of top management support on knowledge management success. African Journal of Business Management, 4(13), 2849-2857.

2. Adu, K., & Ajei, G. O. (2018). Cybersecurity awareness and policies within corporate organizations in Ghana. Journal of Cybersecurity Research, 1(1), 13-24. https://doi.org/10.12966/jcr.03.02.2018

3. Aivazpour, L., & Rao, H. R. (2018). Cyber security threat taxonomy: A human-centered approach to classify and identify the effects of cyber security threats. Computers in Human Behavior, 80, 394-411. https://doi.org/10.1016/j.chb.2017.12.004

4. Alhanahnah, K., Alwasel, A., & Aljohani, N. (2016). A security framework for internet service providers in Saudi Arabia. International Journal of Advanced Computer Science and Applications, 7(2), 491-496. https://doi.org/10.14569/IJACSA.2016.070271

5. AlMindeel, A., & Martins, J. (2020). Information security awareness initiatives and their impact on individual information security behavior: A literature review. Information & Computer Security, 28(2), 139-161.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3