Main Article Content

Abstract

The purpose of this study is to analyze the influence of awareness, knowledge, experience, and compliance on students' digital security behavior at the University of Papua, in the context of social media use. This study conceptualizes digital security behavior as a behavioral phenomenon shaped by psychological factors and social norms within the Theory of Reasoned Action. A quantitative approach with a survey method was employed. Data were collected through a structured questionnaire distributed to active students who regularly use social media and were analyzed using multiple linear regression. The research instrument was developed based on indicators validated in previous studies and was subjected to validity and reliability testing before the primary analysis. The findings indicate that awareness, knowledge, and compliance have a positive and significant effect on students’ digital security behavior, whereas experience does not. These results reinforce the relevance of the Theory of Reasoned Action, particularly the role of attitudes and subjective norms in shaping digital security actions. Although students exhibit a relatively high level of awareness, gaps remain in terms of applied knowledge and practical skills. This study offers important implications for the development of digital security literacy in higher education institutions. Universities are encouraged to design practice-oriented, norm-based educational interventions and to integrate digital security into curricula and systematic training programs to foster sustainable digital security behavior among students.

Keywords

Cybersecurity Awareness Digital Behavior Social Media Security Information Security Literacy Cybersecurity Education

Article Details

How to Cite
Numberi, C. L., Malino, M., Nua, R. N. N., & Sumari, J. (2025). The Gap Between Cybersecurity Experience and Behavior: A Case Study of Digital Native Students at the University of Papua. Amkop Management Accounting Review (AMAR), 5(2), 1638–1656. https://doi.org/10.37531/amar.v5i2.3464

References

  1. Acheampong, R., Balan, T. C., Popovici, D.-M., Tuyishime, E., Rekeraho, A., & Voinea, G. D. (2025). Balancing usability, user experience, security and privacy in XR systems: a multidimensional approach. International Journal of Information Security, 24(3), 112. https://doi.org/10.1007/s10207-025-01025-z
  2. Ajzen, I., & Fishbein, M. (1975). Belief, attitude, intention and behavior: An introduction to theory and research.
  3. Alraja, M. N., Butt, U. J., & Abbod, M. (2023). Information security policies compliance in a global setting: An employee’s perspective. Computers & Security, 129, 103208. https://doi.org/https://doi.org/10.1016/j.cose.2023.103208
  4. An, Q., Hong, W. C. H., Xu, X., Zhang, Y., & Kolletar-Zhu, K. (2023). How education level influences internet security knowledge, behaviour, and attitude: a comparison among undergraduates, postgraduates and working graduates. International Journal of Information Security, 22(2), 305–317. https://doi.org/10.1007/s10207-022-00637-z
  5. Bada, A., Sasse, M. A., & Nurse, J. R. (2021). The role of user education and awareness in improving cybersecurity: A review of recent literature. Computers & Security, 103, 102159.
  6. Baltuttis, D., Teubner, T., & Adam, M. T. P. (2024). A typology of cybersecurity behavior among knowledge workers. Computers & Security, 140, 103741. https://doi.org/https://doi.org/10.1016/j.cose.2024.103741
  7. Barth, S., de Jong, M. D. T., & Junger, M. (2022). Lost in privacy? Online privacy from a cybersecurity expert perspective. Telematics and Informatics, 68, 101782. https://doi.org/10.1016/j.tele.2022.101782
  8. Bishop, L. M., Asquith, P. M., & Morgan, P. L. (2025). The employee cybersecurity awareness framework. Human Behavior and Emerging Technologies, 2025(1), 1025045. https://doi.org/10.1155/hbe2/1025045
  9. Branley-Bell, D., Coventry, L., Dixon, M., Joinson, A., & Briggs, P. (2022). Exploring age and gender differences in ICT cybersecurity behaviour. Human Behavior and Emerging Technologies, 2022(1), 2693080. https://doi.org/10.1155/2022/2693080
  10. Cain, A. A., Edwards, M. E., & Still, J. D. (2018). An exploratory study of cyber hygiene behaviors and knowledge. Journal of Information Security and Applications, 42, 36–45. https://doi.org/10.1016/j.jisa.2018.08.002
  11. Concari, A., Kok, G., Martens, P., & Brink, N. (2023). Investigating the Role of Goals and Motivation on Waste Separation Behavior Through the Lens of the Theory of Reasoned Goal Pursuit. Environmental Management, 72(5), 1019–1031. https://doi.org/10.1007/s00267-023-01820-1
  12. Gopinathan, S., Veeraya, S., Raman, M., & Jambulingam, M. (2025). Role of behavioral intention in implementation of green information systems among Malaysians. Discover Sustainability, 6(1), 139. https://doi.org/10.1007/s43621-025-00873-y
  13. Ifinedo, P., Mengesha, N., & Bekele, R. (2022). Effects of Personal Factors and Organizational Reinforcing Tools in Decreasing Employee Engagement in Unhygienic Cyber Practices: Perspectives From a Developing Country. Journal of Global Information Management (JGIM), 30(1), 1–27. https://doi.org/10.4018/JGIM.299324
  14. Iskandar, R., Maksum, A., & Marini, A. (2025). Digital citizenship literacy in Indonesia: The role of privacy awareness and social campaigns. Social Sciences & Humanities Open, 12, 101697. https://doi.org/https://doi.org/10.1016/j.ssaho.2025.101697
  15. Kannelønning, K., & Katsikas, S. K. (2023). A systematic literature review of how cybersecurity-related behavior has been assessed. Information and Computer Security, 31(4), 463–477. https://doi.org/10.1108/ICS-08-2022-0139
  16. Kavak, A. (2024). Impact of information security awareness on information security compliance of academic library staff in Türkiye. The Journal of Academic Librarianship, 50(5), 102937. https://doi.org/https://doi.org/10.1016/j.acalib.2024.102937
  17. Khan, N. F., Ikram, N., Murtaza, H., & Javed, M. (2023). Evaluating protection motivation based cybersecurity awareness training on Kirkpatrick’s Model. Computers & Security, 125, 103049. https://doi.org/https://doi.org/10.1016/j.cose.2022.103049
  18. Kovačević, A., Putnik, N., & Tošković, O. (2020). Factors related to cybersecurity behavior. IEEE Access, 8, 125140–125148. https://doi.org/10.1109/ACCESS.2020.3007867
  19. Li, L., He, W., Xu, L., Ash, I., Anwar, M., & Yuan, X. (2019). Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior. International Journal of Information Management, 45, 13–24. https://doi.org/https://doi.org/10.1016/j.ijinfomgt.2018.10.017
  20. Neri, M., Benevento, E., Stefanini, A., Aloini, D., Niccolini, F., Carducci, A., Federigi, I., & Dini, G. (2024). Understanding information security awareness: evidence from the public healthcare sector. Information and Computer Security, 33(3), 309–319. https://doi.org/10.1108/ICS-04-2024-0094
  21. Oroni, C. Z., Xianping, F., Ndunguru, D. D., & Ani, A. (2025). Enhancing cyber safety in e-learning environment through cybersecurity awareness and information security compliance: PLS-SEM and FsQCA analysis. Computers & Security, 150, 104276. https://doi.org/https://doi.org/10.1016/j.cose.2024.104276
  22. Paraskevi, G., Saprikis, V., & Avlogiaris, G. (2023). Modeling nonusers’ behavioral intention towards mobile chatbot adoption: An extension of the UTAUT2 model with mobile service quality determinants. Human Behavior and Emerging Technologies, 2023(1), 8859989. https://doi.org/10.1155/2023/8859989
  23. Patterson, C. M., Nurse, J. R. C., & Franqueira, V. N. L. (2023). Learning from cyber security incidents: A systematic review and future research agenda. Computers & Security, 132, 103309. https://doi.org/https://doi.org/10.1016/j.cose.2023.103309
  24. Pigola, A., da Costa, P. R., Vils, L., & Meirelles, F. de S. (2025). Enhancing information security management and performance through social and relational factors: a structural equation modelling approach. Behaviour & Information Technology, 1–23. https://doi.org/10.1080/0144929X.2025.2522206
  25. Prachaseree, K., Ahmad, N., & Md Isa, N. (2021). Applying Theory Elaboration for Theory of Reasoned Action (TRA) and Its Extensions. GIS-Business, 16(2), 35–57.
  26. Rachmadana, S. L., Mufida, N., Rusdy, H., Agung, A., & Masiku, G. (2024). Theory of Reasoned Action as a Framework for Analyzing Investment Knowledge in Generation Z. Fundamental and Applied Management Journal (FAMJ), 2(1), 16–21. https://doi.org/10.61220/famj.v2i1.2243
  27. Reuben-Owoh, B., & Haig, E. (2025). A Systematic Review of Voluntary Cybersecurity Standards and Frameworks. International Journal of Information Security, 24(5), 206. https://doi.org/10.1007/s10207-025-01121-0
  28. Shillair, R., Esteve-González, P., Dutton, W. H., Creese, S., Nagyfejeo, E., & von Solms, B. (2022). Cybersecurity education, awareness raising, and training initiatives: National level evidence-based results, challenges, and promise. Computers & Security, 119, 102756. https://doi.org/https://doi.org/10.1016/j.cose.2022.102756
  29. Shukla, S. S., Tiwari, M., Lokhande, A. C., Tiwari, T., Singh, R., & Beri, A. (2022). A comparative study of cyber security awareness, competence and behavior. 2022 5th International Conference on Contemporary Computing and Informatics (IC3I), 1704–1709. https://doi.org/10.1109/IC3I56241.2022.10072880
  30. Švábenský, V., Čeleda, P., Vykopal, J., & Brišáková, S. (2021). Cybersecurity knowledge and skills taught in capture the flag challenges. Computers & Security, 102, 102154. https://doi.org/https://doi.org/10.1016/j.cose.2020.102154
  31. Taha, I. M., Hussein, R., Ali, A., & Abbas, A. A. (2025). The Impact of Students ’ Cybersecurity Vulnerability Behavior on E-Learning Obstacles. Organizacija, 58(1), 85–104. https://doi.org/10.2478/orga-2025-0006
  32. Taherdoost, H. (2024). A Critical Review on Cybersecurity Awareness Frameworks and Training Models. Procedia Computer Science, 235, 1649–1663. https://doi.org/https://doi.org/10.1016/j.procs.2024.04.156
  33. Tejay, G. P. S., & Winkfield, M. (2025). Does Leadership Approach Matter? Examining Behavioral Influences of Leaders on Employees’ Information Security Compliance. Information Systems Frontiers. https://doi.org/10.1007/s10796-025-10592-4
  34. Vedadi, A., Warkentin, M., Straub, D. W., & Shropshire, J. (2024). Fostering information security compliance as organizational citizenship behavior. Inf. Manage., 61(5). https://doi.org/10.1016/j.im.2024.103968
  35. Xu, F., Hsu, C., Wang, T., & Lowry, P. B. (2024). The antecedents of employees’ proactive information security behaviour: The perspective of proactive motivation. Information Systems Journal, 34(4), 1144–1174. https://doi.org/10.1111/isj.12488
  36. Yazdanmehr, A., Li, Y., & Wang, J. (2023). Employee responses to information security related stress: Coping and violation intention. Information Systems Journal, 33(3), 598–639. https://doi.org/10.1111/isj.12417
  37. Zwilling, M., Klien, G., Lesjak, D., Wiechetek, Ł., Cetin, F., & Basim, H. N. (2022). Cyber security awareness, knowledge and behavior: A comparative study. Journal of Computer Information Systems, 62(1), 82–97. https://doi.org/10.1080/08874417.2020.1712269

Similar Articles

<< < 13 14 15 16 17 18 19 20 21 > >> 

You may also start an advanced similarity search for this article.