Cybersecurity behavior among government employees: The role of protection motivation theory and responsibility in mitigating cyberattacks
This study examines the factors influencing government employees’ cybersecurity behavior in Malaysia. The country is considered the most vulnerable in Southeast Asia. Applying the protection motivation theory, this study addresses the gap by investigating how government employees behave toward corre...
| Main Authors: | Noor Suhani, Sulaiman, M. A., Fauzi, Suhaidah, Hussain, Wider, Walton |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
MDPI AG
2022
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/35212/ http://umpir.ump.edu.my/id/eprint/35212/1/2022_Information_Cybersecurity%20Behavior%20among%20Government%20Employees.pdf |
Similar Items
Antecedents of cyber security behavior: the roles of coping appraisal, threat appraisal and responsibility norms among government employees
by: Noor Suhani, Sulaiman
Published: (2023)
by: Noor Suhani, Sulaiman
Published: (2023)
Implementation of serious games for data privacy and protection awareness in Cybersecurity
by: Siti Normaziah, Ihsan, et al.
Published: (2023)
by: Siti Normaziah, Ihsan, et al.
Published: (2023)
Protection motivation theory
by: Mullan, Barbara, et al.
Published: (2015)
by: Mullan, Barbara, et al.
Published: (2015)
Cyber–information security compliance and violation behaviour in organisations: A systematic review
by: Sulaiman, Noor Suhani, et al.
Published: (2022)
by: Sulaiman, Noor Suhani, et al.
Published: (2022)
Ethics, Cybersecurity and the Military
by: Ford, Shannon
Published: (2013)
by: Ford, Shannon
Published: (2013)
Metamorphic testing for cybersecurity
by: Chen, Tsong Yueh, et al.
Published: (2016)
by: Chen, Tsong Yueh, et al.
Published: (2016)
Examining consumer's purchasing behavior of energy-efficient appliance through the lenses of theory of planned behavior and environmental factors
by: Muhammad Ashraf, Fauzi, et al.
Published: (2022)
by: Muhammad Ashraf, Fauzi, et al.
Published: (2022)
Enhancement of cybersecurity awareness program on personal data protection among youngsters in Malaysia: an assessment
by: Abd Rahim, Noor Hayani, et al.
Published: (2019)
by: Abd Rahim, Noor Hayani, et al.
Published: (2019)
Pro-environmental behavior and the theory of planned behavior: A state of the art science mapping
by: Laili, Zulkepeli, et al.
Published: (2024)
by: Laili, Zulkepeli, et al.
Published: (2024)
The predictive effects of protection motivation theory on adaptive behavior towards urban air quality
by: Sahrir, Syazwani, et al.
Published: (2019)
by: Sahrir, Syazwani, et al.
Published: (2019)
The cybersecurity governance in changing the security psychology and security posture: insights into e-procurement
by: Dawood Gani, Anisha Banu, et al.
Published: (2021)
by: Dawood Gani, Anisha Banu, et al.
Published: (2021)
The Role Of Investor Protection And Corporate Governance In Mitigating Insider Trading
by: Lye, Chun Teck
Published: (2017)
by: Lye, Chun Teck
Published: (2017)
Determinants of energy efficient appliances among Malaysian households: Roles of theory of planned behavior, social interaction and appliance quality
by: Siti Aminah, Harun, et al.
Published: (2022)
by: Siti Aminah, Harun, et al.
Published: (2022)
Understanding Cybersecurity: Ethical and Conceptual Considerations
by: Ford, Shannon
Published: (2013)
by: Ford, Shannon
Published: (2013)
Examining information disclosure behavior on social network sites using protection motivation theory, trust and risk
by: Salleh , Norsaremah, et al.
Published: (2012)
by: Salleh , Norsaremah, et al.
Published: (2012)
Moderating effect of self-efficacy in the relationship between knowledge, attitude and environment behavior of cybersecurity awareness
by: Che Zainal, Norhafizah, et al.
Published: (2021)
by: Che Zainal, Norhafizah, et al.
Published: (2021)
Factors influencing employee motivation in the Malaysian banking industry
by: Pereira, Dalina Alpons, et al.
Published: (2024)
by: Pereira, Dalina Alpons, et al.
Published: (2024)
Blockchain-enabled cybersecurity framework for healthcare domain
by: Islam, Md Shohidul
Published: (2025)
by: Islam, Md Shohidul
Published: (2025)
The Challenges and Solutions of Cybersecurity Among Malaysian Companies
by: Puteri Fadzline, Muhamad Tamyez
Published: (2019)
by: Puteri Fadzline, Muhamad Tamyez
Published: (2019)
Assessment of cybersecurity awareness program on personal data protection among youngsters in Malaysia / Noor Hayani Abd Rahim
by: Noor Hayani , Abd Rahim
Published: (2017)
by: Noor Hayani , Abd Rahim
Published: (2017)
Bibliometric insights into HRM and innovative work behavior nexus: tracing past, present and future developments
by: Wider, Walton, et al.
Published: (2024)
by: Wider, Walton, et al.
Published: (2024)
Applicability of theory of planned behavior and protection motivation theory in predicting intention to purchase health insurance / Nor Azmaniza Azizam … [et al.]
by: Azizam, Nor Azmaniza, et al.
Published: (2020)
by: Azizam, Nor Azmaniza, et al.
Published: (2020)
Conceptualizing a framework to enhance information security culture and compliance behavior in organizations through protection motivation theory
by: Alrawhani, Ebrahim Mohammed, et al.
Published: (2024)
by: Alrawhani, Ebrahim Mohammed, et al.
Published: (2024)
Factors Influencing Users’ Intention To Adopt Artificial Intelligence Cybersecurity Systems At Government And Semi-government Organizations In The United Arab Emirates
by: Alneyadi, Mohammed Rashed Mohammed Al Humaid Alneyadi
Published: (2023)
by: Alneyadi, Mohammed Rashed Mohammed Al Humaid Alneyadi
Published: (2023)
Leveraging web and behavioural data for usable adaptive cybersecurity
by: Addae, Joyce Hoese
Published: (2019)
by: Addae, Joyce Hoese
Published: (2019)
Measuring attitude towards personal data for adaptive cybersecurity
by: Addae, Joyce Hoese, et al.
Published: (2017)
by: Addae, Joyce Hoese, et al.
Published: (2017)
Cybersecurity, Trustworthiness and Resilient Systems: Guiding Values for Policy
by: Henschke, A., et al.
Published: (2017)
by: Henschke, A., et al.
Published: (2017)
The role of cybersecurity on the performance of Malaysian higher education institutions
by: Balla Moussa Dioubate,, et al.
Published: (2023)
by: Balla Moussa Dioubate,, et al.
Published: (2023)
Exploring the use of blockchain technology in cybersecurity and data science
by: Rahmat, Robaisya, et al.
Published: (2023)
by: Rahmat, Robaisya, et al.
Published: (2023)
Digital addiction among young adolescent: mitigating the Impact of media technological adversity
by: Muhammad Ashraf, Fauzi, et al.
Published: (2020)
by: Muhammad Ashraf, Fauzi, et al.
Published: (2020)
Integration of information systems and cybersecurity countermeasures: An exposure to risk perspective
by: Baskerville, Richard, et al.
Published: (2018)
by: Baskerville, Richard, et al.
Published: (2018)
UMP, CyberSecurity tingkat keupayaan pakar keselamatan siber
by: Nor Salwana, Mohammad Idris
Published: (2021)
by: Nor Salwana, Mohammad Idris
Published: (2021)
Securing the IoT frontier: exploring the limitation and future directions in cybersecurity
by: Mahmoud Ahmed, Moustafa Abdelrahman, et al.
Published: (2024)
by: Mahmoud Ahmed, Moustafa Abdelrahman, et al.
Published: (2024)
Understanding social media usage at work from the perspective of social capital theory
by: Kasim, Nur Muneerah, et al.
Published: (2022)
by: Kasim, Nur Muneerah, et al.
Published: (2022)
Self-determination theory applied to work motivation and organizational behavior
by: Gagné, Marylène, et al.
Published: (2017)
by: Gagné, Marylène, et al.
Published: (2017)
The Review of Automotive Industry in Malaysia: Good Governance Perspective
by: Manimaharan, Malini, et al.
Published: (2021)
by: Manimaharan, Malini, et al.
Published: (2021)
Cybersecurity behavioural model for students in the tertiary institutions / Fatokun Faith Boluwatife
by: Fatokun Faith , Boluwatife
Published: (2020)
by: Fatokun Faith , Boluwatife
Published: (2020)
A framework for cybersecurity strategy for developing countries: case study of Afghanistan
by: Salamzada, Khosraw, et al.
Published: (2015)
by: Salamzada, Khosraw, et al.
Published: (2015)
Impact of training on cybersecurity awareness / Zuriani Ahmad Zukarnain ... [et al].
by: Ahmad Zukarnain, Zuriani, et al.
Published: (2020)
by: Ahmad Zukarnain, Zuriani, et al.
Published: (2020)
Incremental learning for large-scale stream data and its application to cybersecurity
by: Ali, Siti Hajar Aminah
Published: (2015)
by: Ali, Siti Hajar Aminah
Published: (2015)
Similar Items
-
Antecedents of cyber security behavior: the roles of coping appraisal, threat appraisal and responsibility norms among government employees
by: Noor Suhani, Sulaiman
Published: (2023) -
Implementation of serious games for data privacy and protection awareness in Cybersecurity
by: Siti Normaziah, Ihsan, et al.
Published: (2023) -
Protection motivation theory
by: Mullan, Barbara, et al.
Published: (2015) -
Cyber–information security compliance and violation behaviour in organisations: A systematic review
by: Sulaiman, Noor Suhani, et al.
Published: (2022) -
Ethics, Cybersecurity and the Military
by: Ford, Shannon
Published: (2013)