Journal Screenshot

International Journal of Academic Research in Business and Social Sciences

Open Access Journal

ISSN: 2222-6990

Beyond Bytes: Unveiling Cybersecurity Literacy and Individual Responsibilities in Malaysian University Settings

Muhammad Firdaus Aziz, Yusnaini Md. Yusoff, Nurul Hanis Aminuddin Jafry, An Wei Xun, Evellin Voon John, Cheng Boon Xing, Fa Wen Yi, Tan Pei Yong, Weng Mei Ting, Tan Sze Yean, Lek Zi Lin, Ahmad Firdhaus Arham

http://dx.doi.org/10.6007/IJARBSS/v14-i3/19757

Open access

In an era where cybersecurity plays a pivotal role in safeguarding digital landscapes, the escalating incidence of cybercrime in Malaysia, particularly among university students, underscores the urgent need for enhanced awareness and knowledge in this domain. This study aims to assess the level of awareness and understanding of cybercrime among Malaysians, focusing on the responsibilities of individuals in fostering a secure digital environment. Conducted in the Klang Valley, the pilot survey engaged 202 participants from diverse backgrounds enrolled in tertiary education, utilizing an online survey platform. The results of the study reveal a consensus among participants regarding the importance of strong passwords, emphasizing the significance of cybersecurity, and acknowledging the individual's role in maintaining a secure digital environment for online safety. Notably, participants expressed a collective sense of responsibility, with a mean score of agreement exceeding 3.58. The surveyed participants strongly assert that regularly changing passwords, educating family members, keeping electronic devices updated, avoiding public WiFi, implementing two-factor authentication, and exercising caution to steer clear of unknown or suspicious websites are integral aspects of their responsibility to ensure online safety. The significance of this research lies in its exploration of factors contributing to cybercrime, shedding light on the intricate landscape of digital risks and vulnerabilities. The study, centring on tertiary students, holds significance beyond academia, acknowledging their potential to significantly influence Malaysian society, particularly in the realm of technological advancements. The findings offer valuable insights for designing educational programs, shaping policies, and conducting awareness initiatives aimed at mitigating cyber threats.

Alharbi, T., & Tassaddiq, A. (2021). Assessment of cybersecurity awareness among students of Majmaah University. Big Data and Cognitive Computing, 5(2), 23.
Bhana, B., & Flowerday, S. V. (2022). Usability of the login authentication process: Passphrases and passwords. Information & Computer Security, 30(2), 280-305.
Cohen, M. C. (2018). Big data and service operations. Production and Operations Management, 27(9), 1709-1723.
Fire, M., Goldschmidt, R., & Elovici, Y. (2014). Online social networks: threats and solutions. IEEE Communications Surveys & Tutorials, 16(4), 2019-2036.
Hsu, J. S. C., Shih, S. P., Hung, Y. W., & Lowry, P. B. (2015). The role of extra-role behaviors and social controls in information security policy effectiveness. Information systems research, 26(2), 282-300.
Kritzinger, E., & von Solms, S. H. (2010). Cyber security for home users: A new way of protection through awareness enforcement. Computers & Security, 29(8), 840-847.
Nagle, J. (2018). Twitter, cyber-violence, and the need for a critical social media literacy in teacher education: A review of the literature. Teaching and teacher education, 76, 86-94.
Ojolo, T. L. (2020). A criminological investigation into the lived experiences of cybercrime perpetrators in southwest Nigeria (Doctoral dissertation).
Perwej, Y., Abbas, S. Q., Dixit, J. P., Akhtar, N., & Jaiswal, A. K. (2021). A systematic literature review on the cyber security. International Journal of scientific research and management, 9(12), 669-710.
Le, D. N., Kumar, R., Mishra, B. K., Chatterjee, J. M., & Khari, M. (Eds.). (2019). Cyber security in parallel and distributed computing: Concepts, techniques, applications and case studies. John Wiley & Sons.
Rasip, O. M., Salleh, M. M., Abd Rahman, S., Taib, M. N. M. M., & Rozlan, A. M. (2023). Kesan Pandemik Covid-19 Terhadap Keupayaan Keselamatan & Pertahanan Negara: The Effect of The Covid-19 Pandemic on National Security & Defense Capabilities. International Journal of Interdisciplinary and Strategic Studies, 4(6), 379-391.
Santos, D. J. P. dos. (2023). Key findings from the 1H 2023 FortiGuard Labs Threat Report: Fortiguard Labs. Fortinet Blog. https://www.fortinet.com/blog/threat-research/fortiguard-labs-threat-report-key-findings-1h-2023
Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust in Internet of Things: The road ahead. Computer networks, 76, 146-164.
Smith, R. G. (2013). Identity theft and fraud. In Handbook of internet crime (pp. 273-301). Willan.
White, D. S. D. (2006). Limiting Vulnerability Exposure through effective Patch Management: threat mitigation through vulnerability remediation (Doctoral dissertation, Rhodes University).
Wilson, M., & Hash, J. (2003). Building an information technology security awareness and training program. NIST Special publication, 800(50), 1-39.
Youn, S. (2009). Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents. Journal of Consumer affairs, 43(3), 389-418.

(Aziz et al., 2024)
Aziz, M. F., Yusoff, Y. M., Jafri, N. H. A., Leng, A. C. W. H., Subramaniam, S. S., Kumar, H., Hisamudin, H. S., Yusof, N. N., Azlan, S. ‘Asyiqin, & Arham, A. F. (2024). Beyond Bytes: Unveiling Cybersecurity Literacy and Individual Responsibilities in Malaysian University Settings. International Journal of Academic Research in Business and Social Sciences, 14(3), 1201–1210.