IDEAS home Printed from https://ideas.repec.org/a/sae/sagope/v14y2024i1p21582440241228920.html
   My bibliography  Save this article

Empowering Students for Cybersecurity Awareness Management in the Emerging Digital Era: The Role of Cybersecurity Attitude in the 4.0 Industrial Revolution Era

Author

Listed:
  • Bulbul Ahamed
  • Mohammad Rashed Hasan Polas
  • Ahmed Imran Kabir
  • Abu Saleh Md. Sohel-Uz-Zaman
  • Abdullah Al Fahad
  • Saima Chowdhury
  • Mrittika Rani Dey

Abstract

The purpose of the study is to examine how cybersecurity knowledge, password security, and self-perception of skill affect cybersecurity awareness issues via the mediating lens of cybersecurity attitude among university students in Bangladesh. A sample of 430 university students from two public and three private universities provided the data in Dhaka, Bangladesh. An approach known as stratified random sampling was used in this cross-sectional study. The positivist approach was used, and a hypothetical statistical induction technique was used. The research constructs, which were adopted from earlier studies, were measured using scales that had undergone validation. Smart PLS-SEM 3.3.9 was used to quantitatively analyze the data. The results indicated a positive and significant association between cybersecurity knowledge and password security with cybersecurity awareness. No conventional association was found between self-perception of skills and cybersecurity awareness. Moreover, the data analysis confirmed that cybersecurity attitudemediates the relationship between cybersecurity knowledge, password security and self-perception of skills with cybersecurity awareness. This study implies that more effort needs to be put into informing the general people likely students about cybersecurity and ethical internet use. Furthermore, the main contribution of this study is to emphasize the need of raising cybersecurity awareness among students.

Suggested Citation

  • Bulbul Ahamed & Mohammad Rashed Hasan Polas & Ahmed Imran Kabir & Abu Saleh Md. Sohel-Uz-Zaman & Abdullah Al Fahad & Saima Chowdhury & Mrittika Rani Dey, 2024. "Empowering Students for Cybersecurity Awareness Management in the Emerging Digital Era: The Role of Cybersecurity Attitude in the 4.0 Industrial Revolution Era," SAGE Open, , vol. 14(1), pages 21582440241, February.
  • Handle: RePEc:sae:sagope:v:14:y:2024:i:1:p:21582440241228920
    DOI: 10.1177/21582440241228920
    as

    Download full text from publisher

    File URL: https://journals.sagepub.com/doi/10.1177/21582440241228920
    Download Restriction: no

    File URL: https://libkey.io/10.1177/21582440241228920?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Ilyas Masudin & Candra Adelia Mawarni & Rahmad Wisnu Wardana & Dian Palupi Restuputri, 2023. "Supplier selection using Fuzzy DEA credibility constrained and relative closeness index: A case of Indonesian manufacturing industry," Cogent Business & Management, Taylor & Francis Journals, vol. 10(2), pages 2228555-222, December.
    2. Heidt, Margareta & Gerlach, Jin & Buxmann, Peter, 2019. "Investigating the Security Divide between SME and Large Companies: How SME Characteristics Influence Organizational IT Security Investments," Publications of Darmstadt Technical University, Institute for Business Studies (BWL) 118284, Darmstadt Technical University, Department of Business Administration, Economics and Law, Institute for Business Studies (BWL).
    3. Rohit Aggarwal & David Kryscynski & Vishal Midha & Harpreet Singh, 2015. "Early to Adopt and Early to Discontinue: The Impact of Self-Perceived and Actual IT Knowledge on Technology Use Behaviors of End Users," Information Systems Research, INFORMS, vol. 26(1), pages 127-144, March.
    4. Katrin Hartwig & Christian Reuter, 2022. "Nudging users towards better security decisions in password creation using whitebox-based multidimensional visualisations," Behaviour and Information Technology, Taylor & Francis Journals, vol. 41(7), pages 1357-1380, May.
    5. Yi-feng Zhang & Min-xuan Ji & Xiu-zhi Zheng, 2023. "Digital Economy, Agricultural Technology Innovation, and Agricultural Green Total Factor Productivity," SAGE Open, , vol. 13(3), pages 21582440231, August.
    6. Gemachis Debala & Mohd Abass Bhat & Shagufta Tariq Khan, 2023. "Exploring the Nexus of inventory optimization and operational efficiency: Data-driven insights from public sector organizations in Ethiopia," Cogent Business & Management, Taylor & Francis Journals, vol. 10(2), pages 2213966-221, December.
    7. Samaher Al-Janabi & Ibrahim Al-Shourbaji, 2016. "A Study of Cyber Security Awareness in Educational Environment in the Middle East," Journal of Information & Knowledge Management (JIKM), World Scientific Publishing Co. Pte. Ltd., vol. 15(01), pages 1-30, March.
    8. Margareta Heidt & Jin P. Gerlach & Peter Buxmann, 2019. "Investigating the Security Divide between SME and Large Companies: How SME Characteristics Influence Organizational IT Security Investments," Information Systems Frontiers, Springer, vol. 21(6), pages 1285-1305, December.
    9. Yoonjoo Lee, 2023. "The COVID-19 Pandemic and Family Time Among Married Working Women in South Korea," SAGE Open, , vol. 13(3), pages 21582440231, August.
    10. Anand Sasikumar & Padmanav Acharya & Malini Nair & Abdul Ghafar, 2023. "Applying lean Six Sigma for waste reduction in a bias tyre manufacturing environment," Cogent Business & Management, Taylor & Francis Journals, vol. 10(2), pages 2228551-222, December.
    11. Li, Ling & He, Wu & Xu, Li & Ash, Ivan & Anwar, Mohd & Yuan, Xiaohong, 2019. "Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior," International Journal of Information Management, Elsevier, vol. 45(C), pages 13-24.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Chin Lay Gan & Yi Yong Lee & Tze Wei Liew, 2024. "Fishing for phishy messages: predicting phishing susceptibility through the lens of cyber-routine activities theory and heuristic-systematic model," Palgrave Communications, Palgrave Macmillan, vol. 11(1), pages 1-17, December.
    2. Mohammed Afzal & Mohd. Shamim Ansari & Naseem Ahmad & Mohammad Shahid & Mohd. Shoeb, 2024. "Cyberfraud, usage intention, and cybersecurity awareness among e-banking users in India: an integrated model approach," Journal of Financial Services Marketing, Palgrave Macmillan, vol. 29(4), pages 1503-1523, December.
    3. Ishraq Jerin & Amer Hamzah Jantan & Abu Bakar Abdul Hamid, 2024. "Adoption Intention of Technology in SMEs Conceptualizing and Framing the Adoption Intention of Next Level Technology in Food and Beverage Manufacturing SMES in Bangladesh," International Journal of Research and Innovation in Social Science, International Journal of Research and Innovation in Social Science (IJRISS), vol. 8(11), pages 3153-3173, November.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Abderrazak Laghouag & Faiz bin Zafrah & Mohamed Rafik Noor Mohamed Qureshi & Alhussain Ali Sahli, 2024. "Eliminating Non-Value-Added Activities and Optimizing Manufacturing Processes Using Process Mining: A Stock of Challenges for Family SMEs," Sustainability, MDPI, vol. 16(4), pages 1-20, February.
    2. Simon Kratzer & Andreas Drechsler & Markus Westner & Susanne Strahringer, 2022. "The Fractional CIO in SMEs: conceptualization and research agenda," Information Systems and e-Business Management, Springer, vol. 20(3), pages 581-611, September.
    3. Federico Iannacci & Colm Fearon & Kristine Pole, 2021. "From Acceptance to Adaptive Acceptance of Social Media Policy Change: a Set-Theoretic Analysis of B2B SMEs," Information Systems Frontiers, Springer, vol. 23(3), pages 663-680, June.
    4. Alessandro Acquisti & Tamara Dinev & Mark Keil, 2019. "Editorial: Special issue on cyber security, privacy and ethics of information systems," Information Systems Frontiers, Springer, vol. 21(6), pages 1203-1205, December.
    5. Chenglong Zhang & Nan Feng & Jianjian Chen & Dahui Li & Minqiang Li, 0. "Outsourcing Strategies for Information Security: Correlated Losses and Security Externalities," Information Systems Frontiers, Springer, vol. 0, pages 1-18.
    6. Chenglong Zhang & Nan Feng & Jianjian Chen & Dahui Li & Minqiang Li, 2021. "Outsourcing Strategies for Information Security: Correlated Losses and Security Externalities," Information Systems Frontiers, Springer, vol. 23(3), pages 773-790, June.
    7. Elvira Ismagilova & Laurie Hughes & Nripendra P. Rana & Yogesh K. Dwivedi, 2022. "Security, Privacy and Risks Within Smart Cities: Literature Review and Development of a Smart City Interaction Framework," Information Systems Frontiers, Springer, vol. 24(2), pages 393-414, April.
    8. Tejaswini C. Herath & Hemantha S. B. Herath & David Cullum, 2023. "An Information Security Performance Measurement Tool for Senior Managers: Balanced Scorecard Integration for Security Governance and Control Frameworks," Information Systems Frontiers, Springer, vol. 25(2), pages 681-721, April.
    9. Marcel Rolf Pfeifer, 2021. "Development of a Smart Manufacturing Execution System Architecture for SMEs: A Czech Case Study," Sustainability, MDPI, vol. 13(18), pages 1-23, September.
    10. Charlotte Wendt & Martin Adam & Alexander Benlian & Sascha Kraus, 2022. "Let’s Connect to Keep the Distance: How SMEs Leverage Information and Communication Technologies to Address the COVID-19 Crisis," Information Systems Frontiers, Springer, vol. 24(4), pages 1061-1079, August.
    11. You-Shyang Chen & Jerome Chih-Lung Chou & Yu-Sheng Lin & Ying-Hsun Hung & Xuan-Han Chen, 2023. "Identification of SMEs in the Critical Factors of an IS Backup System Using a Three-Stage Advanced Hybrid MDM–AHP Model," Sustainability, MDPI, vol. 15(4), pages 1-29, February.
    12. Agbodoh-Falschau, Kouassi Raymond & Ravaonorohanta, Bako Harinivo, 2023. "Investigating the influence of governance determinants on reporting cybersecurity incidents to police: Evidence from Canadian organizations’ perspectives," Technology in Society, Elsevier, vol. 74(C).
    13. Shahzad, Khuram & Zhang, Qingyu & Zafar, Abaid Ullah & Ashfaq, Muhammad & Rehman, Shafique Ur, 2023. "The role of blockchain-enabled traceability, task technology fit, and user self-efficacy in mobile food delivery applications," Journal of Retailing and Consumer Services, Elsevier, vol. 73(C).
    14. Linlin Fu & Jiajun Min & Cheng Luo & Xiaohong Mao & Ziqi Liu, 2024. "The Impact of Digitalization on Agricultural Green Development: Evidence from China’s Provinces," Sustainability, MDPI, vol. 16(21), pages 1-18, October.
    15. An, Siyang & Cheung, Chi Fai & Willoughby, Kelvin W., 2024. "A gamification approach for enhancing older adults' technology adoption and knowledge transfer: A case study in mobile payments technology," Technological Forecasting and Social Change, Elsevier, vol. 205(C).
    16. Mustufa Haider Abidi & Hisham Alkhalefah & Usama Umer, 2022. "Fuzzy harmony search based optimal control strategy for wireless cyber physical system with industry 4.0," Journal of Intelligent Manufacturing, Springer, vol. 33(6), pages 1795-1812, August.
    17. Han, Kookyoung & Choi, Jin Hyuk, 2023. "Implications of false alarms in dynamic games on cyber-security," Chaos, Solitons & Fractals, Elsevier, vol. 169(C).
    18. Naume Sonhera & David Mhlanga, 2022. "Reducing Cyber Incidents through Good Online Behavioral Norms: Lessons from South Africa," Eurasian Journal of Social Sciences, Eurasian Publications, vol. 10(1), pages 37-48.
    19. Canitgia Tambariki, 2024. "Drivers of banking consumers' cybersecurity behavior: Applying the extended protection motivation theory ," GATR Journals jmmr327, Global Academy of Training and Research (GATR) Enterprise.
    20. Tahereh Hasani & Norman O’Reilly & Ali Dehghantanha & Davar Rezania & Nadège Levallet, 2023. "Evaluating the adoption of cybersecurity and its influence on organizational performance," SN Business & Economics, Springer, vol. 3(5), pages 1-38, May.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:sae:sagope:v:14:y:2024:i:1:p:21582440241228920. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: SAGE Publications (email available below). General contact details of provider: .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.