An Analysis of the Deployment of Synergistic Cyber Security Awareness Model for the Elderly (SCSAM-Elderly) in Malaysia

Nurul Alieyah Azam, Alya Geogiana Buja, Rabiah Ahmad, Shekh Faisal Abdul Latip, Nor Masri Sahri

Abstract


This study explores the deployment analysis of the Synergistic Cyber Security Awareness Model for the Elderly (SCSAM-Elderly) in Malaysia. The incidence of cyber security events has been steadily increasing, particularly affecting the elderly demographic. The SCSAM-Elderly has been developed to address persistent challenges posed by cybercrimes, such as phishing, romance scams, and identity theft, with the primary objective of educating and heightening awareness among the elderly. Designed to be user-friendly and tailored for the elderly population, the SCSAM-Elderly aims to enhance their awareness. The study's objective is to analyze the pre-survey and post-survey data collected from elderly individuals in Malaysia using SPSS to confirm and validate the effectiveness of the SCSAM-Elderly model. Surveys were distributed to 50 elderly individuals in Melaka, and the data were analyzed using SPSS Version 27.0. This study employed a paired sample t-test, a statistical method used to determine if there is a significant difference between the average scores of two related groups. In this study, the two groups are the pre-survey and post- survey scores from the same participants. The results indicated that the SCSAM-Elderly model showed a significant increase in awareness after the implementation of cybersecurity training compared to before the training. The findings indicate that elderly individuals who underwent cyber security awareness training using this model demonstrated an improved ability to detect and counteract the impacts of cybercrimes. The novelty of this study lies in being the first cybersecurity awareness model focusing on the elderly with less technicality.

Full Text:

PDF

References


Azam, N. A., Buja, A. G., Darus, M. Y. & Sahri, N. M. 2022. SCSAM-Elderly: A New Synergistic Cyber Security Model for the Elderly for IR4.0 Readiness in Malaysia. 2022 IEEE 12th Symposium on Computer Applications & Industrial Electronics (ISCAIE) : 117–122.

Basa, Y. D. M. &Indrawan, M. I. 2023. The Influence of Organizational Culture and Motivation on Performance with Competence as an Intervening Variable in the Financial Management Agency Regional Income and Assets of Binjai City. SINOMIKA Journal: Publikasi Ilmiah Bidang Ekonomi Dan Akuntansi 2(2): 307–322.

Britannica. 2023. identity theft. https://www.britannica.com/topic/identity-theft. Retrieved on : 15 September 2023.

Carlene G. Blackwood-Brown. 2018. An Empirical Assessment of Senior Citizens’ Cybersecurity Awareness, Computer Self-Efficacy, Perceived Risk of Identity Theft, Attitude, and Motivation to Acquire Cybersecurity Skills. CCE Theses and Dissertations, College of Engineering and Computing, Nova Southeastern University.

Casey Crane. 2019. 3 Cyber Fraud Tactics Targeting Seniors And Why They’re So Effective. Cybercrime Magazine, 13 September. https://cybersecurityventures.com/3-cyber-fraud-tactics-targeting-seniors-and-why-theyre-so-effective/#:~:text=Coercing%20seniors%20into%20providing%20their,of%20reverse%20mortgages%20and%20loans. Retrieved on : 15 September 2023.

Compeau, D. R. & Higgins, C. A. (1995). Computer Self-Efficacy: Development of a Measure and Initial Test. MIS Quarterly 19(2): 189-211.

Department of Statistics Malaysia. 2022. Current Population Estimates Malaysia 2022. Wilayah Persekutuan Putrajaya : Department of Statistics Malaysia.

Garba, A. A., Siraj, M. M., Othman, S. H. & Musa, M. A. 2020. A Study on Cybersecurity Awareness Among Students in Yobe : A Quantitative Approach. International Journal on Emerging Technologies 11(5) : 41-49.

Grimes, G. A., Hough, M. G., Mazur, E. & Signorella, M. L. 2010. Older Adults’ Knowledge of Internet Hazards. Educational Gerontology 36(3): 173–192.

Hair, J. F., Hult, G. T. M., Ringle, C. M. & Sarstedt, M. 2017. A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM). In 2nd Edition, Sage Publications. California: Thousand Oaks.

Hair, J. F., Sarstedt, M., Hopkins, L. & Kuppelwieser, V. G. 2014. Partial least squares structural equation modeling (PLS-SEM). European Business Review 26(2): 106–121.

Hasni, D. I. M. & Sarlan, A. 2023. Collaborative Visualization Framework For Cross-Field Working Group: Analysis Through Smart PLS. Journal of Theoretical and Applied Information Technology 101(11): 4377-4389.

Inan F. A., Namin A. S., Pogrund R. L. & K. S. Jones. 2019. Internet Use and Cybersecurity Concerns of Individuals with Visual Impairments. Journal of Educational Technology & Society 19(1): 28-40.

Jesrina Ann Xavier & Chong Wei Ying. 2023. Combating Financial Fraud Amongst Senior Citizens Through Design Thinking. BERNAMA, 21 August. https://www.bernama.com/en/thoughts/news.php?id=2216684#:~:text=Design%20thinking,-Design%20thinking%20is&text=It%20can%20be%20used%20to,are%20vulnerable%20to%20financial%20fraud. Retrieved on: 20 September 2023.

Kahar, A. F. & Indrawan, I. 2023. The Effect of Presenteeism on Employee Performance with Quality of Work as an Intervening Variable in North Binjai District. International Journal of Economics, Management and Accounting (IJEMA) 1(2): 35-46.

Kamarudin, N. Y., Ashari, Z. H. M., Yaacob, R. & Kosnin, A. M. 2021. Analisis Data Kaedah SEM SmartPLS Aplikasi Asas Dan Langkah Demi Langkah. Sekolah Pendidikan, Fakulti Sains Sosial dan Kemanusian. Johor Bharu: UTM Johor Bahru.

Levy, Y. T. Danet, 2010. Implementation success model in Government agencies: A case of a centralized identification system at NASA. International Journal of Information Systems in the Service Sector 2(2): 19-32.

Mahajan, R. & Kaur, M. 2021. A Review on Cyber Security and Its Threats. In EasyChair, Stockport: EasyChair Ltd.

Mertler, C. A. & Reinhart, R. V. 2016. Advanced and Multivariate Statistical Methods: Practical Application and Interpretation (6th ed.). In Routledge. New York: Taylor & Francis Group.

Quayyum, F., Cruzes, D. S. & Jaccheri, L. 2021. Cybersecurity awareness for children: A systematic literature review. International Journal of Child-Computer Interaction 30: 100343.

Rhee, H., Kim, C. & Ryu, Y. U. 2009. Self-efficacy in information security: Its influence on end users’ information security practice behavior. Computers & Security 28(8): 816–826.

Sekaran, U. and Bougie, R. 2013. Research Methods for Business: A Skill-Building Approach. In 7th Edition, Wiley & Sons, West Sussex. Hoboken: New Jersey.

Statistics How To. 2021. Cronbach’s Alpha: Definition, Interpretation, SPSS. https://www.statisticshowto.com/probability-and-statistics/statistics-definitions/cronbachs-alpha-spss/

White, G. L. 2015. Education and Prevention Relationships on Security Incidents for Home Computers. Journal of Computer Information Systems 55(3): 29-37.

Yuliana, Y. 2022. The importance of cybersecurity awareness for children. Lampung Journal of International Law 4(1): 41-48.

Zhou, Q., Zhu, K., Kang, L. & Dávid, L. D. 2023. Tea Culture Tourism Perception: A Study on the Harmony of Importance and Performance. Sustainability 15(3): 2838.


Refbacks

  • There are currently no refbacks.


ISSN: 0126-5008

eISSN: 0126-8694