USER ACCEPTANCE OF CYBER SECURITY APPLICATION (OUR CYBERHERO) AMONG SECONDARY SCHOOL STUDENTS, TEACHERS AND LOCAL COMMUNITIES IN COASTAL TERENGGANU DISTRICT: A PRELIMINARY STUDY FOR MARITIME EDUCATION
DOI:
https://doi.org/10.46754/jml.2022.12.006Keywords:
User acceptance, cyber security, Our CyberHero application, maritime education and coastal communityAbstract
This paper is based on knowledge transfer program to improve cyber security awareness among the coastal community in Kuala Terengganu with the use of Our CyberHero application. Thus, this paper introduces the application and adapt Technology Acceptance Model in maritime education settings. A series of these knowledge transfer programs can to some extent address this knowledge gap. This research has conducted a survey to the 59 coastal communities in Terengganu District. This program is a pilot project to the cyber security application Our CyberHero and is divided into two phases. The first phase was held a webinar on the importance of cyber security sustainability in today’s society. While the second phase gives exposure to the use of cyber security applications. This involves collaboration from the Educational Resources and Technology Sector, the Terengganu State Education Department, the Communications and Multimedia Commission and Cybersecurity Malaysia. The stakeholders involved were 24 high school students, 12 teachers and 23 communities from the coastal state of Terengganu. All 36 stakeholders are made up of 12 secondary schools that were selected as pioneers for the knowledge transfer program. Thus, the 23 other communities are besides the school children and the teachers. Acceptance of the use of cyber security application is very encouraging among students and teachers of coastal secondary schools in the Terengganu district. The 85% of the users feel easy to use the application as the module is easy to understand and friendly user. Therefore, the users feel confidence to use and share information widely (65%). With the high confidence level and understanding of the application, the users tend to trust the application system and the other users (59%). As a result, 57% users are intended to use Our CyberHero application and 52% of the users also feel the application is useful.
References
Andreatos, A. S. (2017). Designing educational scenarios to teach network security. IEEE Global Engineering Education Conference (EDUCON). https://doi.org/10.1109/EDUCON.2017.7943063 DOI: https://doi.org/10.1109/EDUCON.2017.7943063
Bernama (2022, September 22). Cyber security expert raises alarm over increasing data leaks in Malaysia. Astro Awani. https://www.astroawani.com/berita-malaysia/cyber-security-expert-raises-alarm-over-increasing-data-leaks-malaysia-382269
Bernama. (2020). Limited internet access among issues faced by rural teachers during PDP session. Bernama.com. https://www.bernama.com/en/general/news_covid-19.php?id=1833151
Bjurling-Sjöberg, P., Pöder, U., Jansson, I., Wadensten, B., & Nordgren, L. (2021). Action research improved general prerequisites for evidence-based practice. Heliyon, 7(4). https://doi.org/10.1016/j.heliyon.2021.e06814 DOI: https://doi.org/10.1016/j.heliyon.2021.e06814
Blythe, J. M., Sombatruang, N., & Johnson, S. D. (2019). What security features and crime prevention advice are communicated in consumer IoT device manuals and support pages? Journal of Cybersecurity, 5(1). https://doi.org/10.1093/cybsec/tyz005 DOI: https://doi.org/10.1093/cybsec/tyz005
Brigadier Deepak Malhotra. (2016). Social media and the armed forces. Centre for Joint Warfare Studies. https://cenjows.in/test/pdf/Social-Media-Armed-Forces.pdf
Dewan Bahasa dan Pustaka. (2022). Definisi Aduan. https://prpm.dbp.gov.my/Cari1?keyword=aduan&d=175768&.
Djaffar, R. (2017). Dissemination of Information Technology to fishermen society in the districts of Takalar and Barru. Jurnal Penelitian Komunikasi dan Opini Publik, 73-87.
Fajrie, M. (2020). The Variety and Meaning of The Coastal Community Tradition of Bungo Wedung Indonesia. (Ragam dan Makna Tradisi Masyarakat Pesisir Bungo Wedung Indonesia). Mozaik Humaniora, 20(1), 70-78. https://doi.org/10.20473/mozaik.v20i1.15470 DOI: https://doi.org/10.20473/mozaik.v20i1.15470
Feng, X., Feng, Y., & Dawam, E. S. (2020). Artificial intelligence cyber security strategy. 2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), pp. 328–333. https://doi.org/10.1109/DASC-PICom-CBDCom-CyberSciTech49142.2020.00064 DOI: https://doi.org/10.1109/DASC-PICom-CBDCom-CyberSciTech49142.2020.00064
Hagger, M. S., Smith, S. R., Keech, J. J., Moyers, S. A., & Hamilton, K. (2020). Predicting social distancing intention and behavior during the COVID-19 pandemic: An integrated social cognition model. Annals of Behavioral Medicine: A Publication of the Society of Behavioral Medicine, 54(10). https://doi.org/10.1093/abm/kaaa073 DOI: https://doi.org/10.1093/abm/kaaa073
Harris, R. (2007). Telecentre Sustainability: Financing ICTs for the poor, APDIP e- Note 15/ 2007. Retrieved from https://www.unapcict.org/sites/default/files/2019-01/enote15.pdf
Internet Crime Complaint Center. (2019). 2019 Internet Crime Report. https://www.fbi.gov/news/stories/2019-internet-crime-report-released-021120#:~:text=IC3%20received%20467%2C361%20complaints%20in,%2Ddelivery%20scams%2C%20and%20extortion.
KKMM. (2021). KKMM, Cybersecurity Malaysia Committed to Strengthening National Cyberspace Security. https://www.kkmm.gov.my/en/public/news/19316-kkmm-cybersecurity-malaysia-committed-to-strengthening-national-cyberspace-security
Malaysia National Security (MKN). (2021). Malaysia Cyber Security Strategy 2020-2024. National Security Council. Prime Minister Department.
Marhaini, M. N. (2021). A Sustainable Rural Telecentre Concept on Sustainability Pillars. Journal of Sustainable Development, 14(6), 42-53. https://doi.org/10.5539/jsd.v14n6p42 DOI: https://doi.org/10.5539/jsd.v14n6p42
Ramli, N. S., N. Man, M. S. Hassan, A. S. Bahaman, S. Z. Omar, Y. Sarina, N. A. A Rahman & M. S. Ibrahim. (2019). Pattern of mobile phone usage among paddy farmers. International Journal of Research in Business and Social Science, 9(12), 642-653. https://doi.org/10.6007/IJARBSS/v9-i6/5969 DOI: https://doi.org/10.6007/IJARBSS/v9-i6/5969
Sara, B. M. (2021). Use of social media for health information and associated factors among students in Debrebirhan University. Journal of Healthcare Communications, 6(6), 6308.
Tabassum G., Narayanan Kulathuramaiyer, Roger Harris & Alvin W. Yeo (2017). True value of telecentre contribution to Bario community development. In Choudrie, J., Islam, M., Wahid, F., Bass, J., Priyatma, J. (Eds.). Information and Communication Technologies for Development. ICT4D 2017, IFIP AICT, 504, pp. 640–653, 2017. https://doi.org/10.1007/978-3-319-59111-7_52 DOI: https://doi.org/10.1007/978-3-319-59111-7_52
Tambun, S., Sitorus, R. R., & Pramudya, T. A. (2020). Pengaruh technology acceptance model dan digital taxation terhadap kepatuhan wajib pajak dengan pemahaman internet sebagai variabel moderating. Balance Vocation Accounting Journal, 4(1), 1-12. http://dx.doi.org/10.31000/bvaj.v4i1.2699 DOI: https://doi.org/10.31000/bvaj.v4i1.2699
UNICEF. (2022). Disrupting harm in Malaysia: Evidence on online child sexual exploitation and abuse. https://www.unicef.org/malaysia/press-releases/report-finds-promising-government-initiatives-help-end-online
Van den Berg, J. (2018). Cybersecurity for Everyone. In Bartsch, M., Frey, S. (Eds) Cybersecurity best practices. Springer Vieweg. Wiesbaden. https://doi.org/10.1007/978-3-658-21655-9_40 DOI: https://doi.org/10.1007/978-3-658-21655-9_40
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 PENERBIT UMT
This work is licensed under a Creative Commons Attribution 4.0 International License.