An Analysis of the Deployment of Synergistic Cyber Security Awareness Model for the Elderly (SCSAM-Elderly) in Malaysia
Abstract
Full Text:
PDFReferences
Azam, N. A., Buja, A. G., Darus, M. Y. & Sahri, N. M. 2022. SCSAM-Elderly: A New Synergistic Cyber Security Model for the Elderly for IR4.0 Readiness in Malaysia. 2022 IEEE 12th Symposium on Computer Applications & Industrial Electronics (ISCAIE) : 117–122.
Basa, Y. D. M. &Indrawan, M. I. 2023. The Influence of Organizational Culture and Motivation on Performance with Competence as an Intervening Variable in the Financial Management Agency Regional Income and Assets of Binjai City. SINOMIKA Journal: Publikasi Ilmiah Bidang Ekonomi Dan Akuntansi 2(2): 307–322.
Britannica. 2023. identity theft. https://www.britannica.com/topic/identity-theft. Retrieved on : 15 September 2023.
Carlene G. Blackwood-Brown. 2018. An Empirical Assessment of Senior Citizens’ Cybersecurity Awareness, Computer Self-Efficacy, Perceived Risk of Identity Theft, Attitude, and Motivation to Acquire Cybersecurity Skills. CCE Theses and Dissertations, College of Engineering and Computing, Nova Southeastern University.
Casey Crane. 2019. 3 Cyber Fraud Tactics Targeting Seniors And Why They’re So Effective. Cybercrime Magazine, 13 September. https://cybersecurityventures.com/3-cyber-fraud-tactics-targeting-seniors-and-why-theyre-so-effective/#:~:text=Coercing%20seniors%20into%20providing%20their,of%20reverse%20mortgages%20and%20loans. Retrieved on : 15 September 2023.
Compeau, D. R. & Higgins, C. A. (1995). Computer Self-Efficacy: Development of a Measure and Initial Test. MIS Quarterly 19(2): 189-211.
Department of Statistics Malaysia. 2022. Current Population Estimates Malaysia 2022. Wilayah Persekutuan Putrajaya : Department of Statistics Malaysia.
Garba, A. A., Siraj, M. M., Othman, S. H. & Musa, M. A. 2020. A Study on Cybersecurity Awareness Among Students in Yobe : A Quantitative Approach. International Journal on Emerging Technologies 11(5) : 41-49.
Grimes, G. A., Hough, M. G., Mazur, E. & Signorella, M. L. 2010. Older Adults’ Knowledge of Internet Hazards. Educational Gerontology 36(3): 173–192.
Hair, J. F., Hult, G. T. M., Ringle, C. M. & Sarstedt, M. 2017. A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM). In 2nd Edition, Sage Publications. California: Thousand Oaks.
Hair, J. F., Sarstedt, M., Hopkins, L. & Kuppelwieser, V. G. 2014. Partial least squares structural equation modeling (PLS-SEM). European Business Review 26(2): 106–121.
Hasni, D. I. M. & Sarlan, A. 2023. Collaborative Visualization Framework For Cross-Field Working Group: Analysis Through Smart PLS. Journal of Theoretical and Applied Information Technology 101(11): 4377-4389.
Inan F. A., Namin A. S., Pogrund R. L. & K. S. Jones. 2019. Internet Use and Cybersecurity Concerns of Individuals with Visual Impairments. Journal of Educational Technology & Society 19(1): 28-40.
Jesrina Ann Xavier & Chong Wei Ying. 2023. Combating Financial Fraud Amongst Senior Citizens Through Design Thinking. BERNAMA, 21 August. https://www.bernama.com/en/thoughts/news.php?id=2216684#:~:text=Design%20thinking,-Design%20thinking%20is&text=It%20can%20be%20used%20to,are%20vulnerable%20to%20financial%20fraud. Retrieved on: 20 September 2023.
Kahar, A. F. & Indrawan, I. 2023. The Effect of Presenteeism on Employee Performance with Quality of Work as an Intervening Variable in North Binjai District. International Journal of Economics, Management and Accounting (IJEMA) 1(2): 35-46.
Kamarudin, N. Y., Ashari, Z. H. M., Yaacob, R. & Kosnin, A. M. 2021. Analisis Data Kaedah SEM SmartPLS Aplikasi Asas Dan Langkah Demi Langkah. Sekolah Pendidikan, Fakulti Sains Sosial dan Kemanusian. Johor Bharu: UTM Johor Bahru.
Levy, Y. T. Danet, 2010. Implementation success model in Government agencies: A case of a centralized identification system at NASA. International Journal of Information Systems in the Service Sector 2(2): 19-32.
Mahajan, R. & Kaur, M. 2021. A Review on Cyber Security and Its Threats. In EasyChair, Stockport: EasyChair Ltd.
Mertler, C. A. & Reinhart, R. V. 2016. Advanced and Multivariate Statistical Methods: Practical Application and Interpretation (6th ed.). In Routledge. New York: Taylor & Francis Group.
Quayyum, F., Cruzes, D. S. & Jaccheri, L. 2021. Cybersecurity awareness for children: A systematic literature review. International Journal of Child-Computer Interaction 30: 100343.
Rhee, H., Kim, C. & Ryu, Y. U. 2009. Self-efficacy in information security: Its influence on end users’ information security practice behavior. Computers & Security 28(8): 816–826.
Sekaran, U. and Bougie, R. 2013. Research Methods for Business: A Skill-Building Approach. In 7th Edition, Wiley & Sons, West Sussex. Hoboken: New Jersey.
Statistics How To. 2021. Cronbach’s Alpha: Definition, Interpretation, SPSS. https://www.statisticshowto.com/probability-and-statistics/statistics-definitions/cronbachs-alpha-spss/
White, G. L. 2015. Education and Prevention Relationships on Security Incidents for Home Computers. Journal of Computer Information Systems 55(3): 29-37.
Yuliana, Y. 2022. The importance of cybersecurity awareness for children. Lampung Journal of International Law 4(1): 41-48.
Zhou, Q., Zhu, K., Kang, L. & Dávid, L. D. 2023. Tea Culture Tourism Perception: A Study on the Harmony of Importance and Performance. Sustainability 15(3): 2838.
Refbacks
- There are currently no refbacks.
ISSN: 0126-5008
eISSN: 0126-8694