Inicio  /  Information  /  Vol: 13 Par: 9 (2022)  /  Artículo
ARTÍCULO
TITULO

Cybersecurity Behavior among Government Employees: The Role of Protection Motivation Theory and Responsibility in Mitigating Cyberattacks

Noor Suhani Sulaiman    
Muhammad Ashraf Fauzi    
Suhaidah Hussain and Walton Wider    

Resumen

This study examines the factors influencing government employees? cybersecurity behavior in Malaysia. The country is considered the most vulnerable in Southeast Asia. Applying the protection motivation theory, this study addresses the gap by investigating how government employees behave toward corresponding cyberrisks and threats. Using partial least-squares structural equation modeling (PLS-SEM), 446 respondents participated and were analyzed. The findings suggest that highly motivated employees with high severity, vulnerability, response efficacy, and self-efficacy exercise cybersecurity. Incorporating the users? perceptions of vulnerability and severity facilitates behavioral change and increases the understanding of cybersecurity behavior?s role in addressing cybersecurity threats?particularly the impact of the threat response in predicting the cybersecurity behavior of government employees. The implications include providing robust information security protection to the government information systems.

 Artículos similares

       
 
Serhii Yevseiev,Oleksandr Milov,Stanislav Milevskyi,Oleksandr Voitko,Maksym Kasianenko,Yevgen Melenti,Serhii Pohasii,Hrygorii Stepanov,Oleksandr Turinskyi,Serhii Faraon     Pág. 15 - 29
A game-theoretic approach is presented, which claims to be a universal method for solving most problems in the field of cybersecurity. As arguments to confirm the superiority of game theory, mathematical validity and provability of the optimality of deci... ver más

 
Llanos Tobarra, Antonio Robles-Gómez, Rafael Pastor, Roberto Hernández, Andrés Duque and Jesús Cano    
Presently, the ever-increasing use of new technologies helps people to acquire additional skills for developing an applied critical thinking in many contexts of our society. When it comes to education, and more particularly in any Engineering subject, pr... ver más
Revista: Applied Sciences

 
Oleksandr Milov,Serhii Yevseiev,Volodymyr Aleksiyev,Polina Berdnik,Oleksandr Voitko,Valentyn Dyptan,Yevheniia Ivanchenko,Maxim Pavlenko,Anatolii Salii,Serhiy Yarovyy     Pág. 46 - 57
The results of modeling and analysis of scenarios of the behavior of interacting agents in conditions of cyber conflict are presented. General approaches to the development of a scenario of the behavior of antagonistic agents are presented. The definitio... ver más

 
Alvaro Parres-Peredo, Ivan Piza-Davila and Francisco Cervantes    
Anomaly-based intrusion detection systems use profiles to characterize expected behavior of network users. Most of these systems characterize the entire network traffic within a single profile. This work proposes a user-level anomaly-based intrusion dete... ver más
Revista: Applied Sciences

 
Oleksandr Milov,Serhii Yevseiev,Yevheniia Ivanchenko,Stanislav Milevskyi,Oleksandr Nesterov,Oleksandr Puchkov,Anatolii Salii,Oleksandr Timochko,Vitalii Tiurin,?leksandr Yarovyi     Pág. 6 - 19
The results of the development of the model of the antagonistic agents behavior in a cyber conflict are presented. It is shown that the resulting model can be used to analyze investment processes in security systems, taking into account the assumption th... ver más