Main Article Content
Abstract
The purpose of this study is to analyze the influence of awareness, knowledge, experience, and compliance on students' digital security behavior at the University of Papua, in the context of social media use. This study conceptualizes digital security behavior as a behavioral phenomenon shaped by psychological factors and social norms within the Theory of Reasoned Action. A quantitative approach with a survey method was employed. Data were collected through a structured questionnaire distributed to active students who regularly use social media and were analyzed using multiple linear regression. The research instrument was developed based on indicators validated in previous studies and was subjected to validity and reliability testing before the primary analysis. The findings indicate that awareness, knowledge, and compliance have a positive and significant effect on students’ digital security behavior, whereas experience does not. These results reinforce the relevance of the Theory of Reasoned Action, particularly the role of attitudes and subjective norms in shaping digital security actions. Although students exhibit a relatively high level of awareness, gaps remain in terms of applied knowledge and practical skills. This study offers important implications for the development of digital security literacy in higher education institutions. Universities are encouraged to design practice-oriented, norm-based educational interventions and to integrate digital security into curricula and systematic training programs to foster sustainable digital security behavior among students.
Keywords
Article Details

This work is licensed under a Creative Commons Attribution 4.0 International License.
References
- Acheampong, R., Balan, T. C., Popovici, D.-M., Tuyishime, E., Rekeraho, A., & Voinea, G. D. (2025). Balancing usability, user experience, security and privacy in XR systems: a multidimensional approach. International Journal of Information Security, 24(3), 112. https://doi.org/10.1007/s10207-025-01025-z
- Ajzen, I., & Fishbein, M. (1975). Belief, attitude, intention and behavior: An introduction to theory and research.
- Alraja, M. N., Butt, U. J., & Abbod, M. (2023). Information security policies compliance in a global setting: An employee’s perspective. Computers & Security, 129, 103208. https://doi.org/https://doi.org/10.1016/j.cose.2023.103208
- An, Q., Hong, W. C. H., Xu, X., Zhang, Y., & Kolletar-Zhu, K. (2023). How education level influences internet security knowledge, behaviour, and attitude: a comparison among undergraduates, postgraduates and working graduates. International Journal of Information Security, 22(2), 305–317. https://doi.org/10.1007/s10207-022-00637-z
- Bada, A., Sasse, M. A., & Nurse, J. R. (2021). The role of user education and awareness in improving cybersecurity: A review of recent literature. Computers & Security, 103, 102159.
- Baltuttis, D., Teubner, T., & Adam, M. T. P. (2024). A typology of cybersecurity behavior among knowledge workers. Computers & Security, 140, 103741. https://doi.org/https://doi.org/10.1016/j.cose.2024.103741
- Barth, S., de Jong, M. D. T., & Junger, M. (2022). Lost in privacy? Online privacy from a cybersecurity expert perspective. Telematics and Informatics, 68, 101782. https://doi.org/10.1016/j.tele.2022.101782
- Bishop, L. M., Asquith, P. M., & Morgan, P. L. (2025). The employee cybersecurity awareness framework. Human Behavior and Emerging Technologies, 2025(1), 1025045. https://doi.org/10.1155/hbe2/1025045
- Branley-Bell, D., Coventry, L., Dixon, M., Joinson, A., & Briggs, P. (2022). Exploring age and gender differences in ICT cybersecurity behaviour. Human Behavior and Emerging Technologies, 2022(1), 2693080. https://doi.org/10.1155/2022/2693080
- Cain, A. A., Edwards, M. E., & Still, J. D. (2018). An exploratory study of cyber hygiene behaviors and knowledge. Journal of Information Security and Applications, 42, 36–45. https://doi.org/10.1016/j.jisa.2018.08.002
- Concari, A., Kok, G., Martens, P., & Brink, N. (2023). Investigating the Role of Goals and Motivation on Waste Separation Behavior Through the Lens of the Theory of Reasoned Goal Pursuit. Environmental Management, 72(5), 1019–1031. https://doi.org/10.1007/s00267-023-01820-1
- Gopinathan, S., Veeraya, S., Raman, M., & Jambulingam, M. (2025). Role of behavioral intention in implementation of green information systems among Malaysians. Discover Sustainability, 6(1), 139. https://doi.org/10.1007/s43621-025-00873-y
- Ifinedo, P., Mengesha, N., & Bekele, R. (2022). Effects of Personal Factors and Organizational Reinforcing Tools in Decreasing Employee Engagement in Unhygienic Cyber Practices: Perspectives From a Developing Country. Journal of Global Information Management (JGIM), 30(1), 1–27. https://doi.org/10.4018/JGIM.299324
- Iskandar, R., Maksum, A., & Marini, A. (2025). Digital citizenship literacy in Indonesia: The role of privacy awareness and social campaigns. Social Sciences & Humanities Open, 12, 101697. https://doi.org/https://doi.org/10.1016/j.ssaho.2025.101697
- Kannelønning, K., & Katsikas, S. K. (2023). A systematic literature review of how cybersecurity-related behavior has been assessed. Information and Computer Security, 31(4), 463–477. https://doi.org/10.1108/ICS-08-2022-0139
- Kavak, A. (2024). Impact of information security awareness on information security compliance of academic library staff in Türkiye. The Journal of Academic Librarianship, 50(5), 102937. https://doi.org/https://doi.org/10.1016/j.acalib.2024.102937
- Khan, N. F., Ikram, N., Murtaza, H., & Javed, M. (2023). Evaluating protection motivation based cybersecurity awareness training on Kirkpatrick’s Model. Computers & Security, 125, 103049. https://doi.org/https://doi.org/10.1016/j.cose.2022.103049
- Kovačević, A., Putnik, N., & Tošković, O. (2020). Factors related to cybersecurity behavior. IEEE Access, 8, 125140–125148. https://doi.org/10.1109/ACCESS.2020.3007867
- Li, L., He, W., Xu, L., Ash, I., Anwar, M., & Yuan, X. (2019). Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior. International Journal of Information Management, 45, 13–24. https://doi.org/https://doi.org/10.1016/j.ijinfomgt.2018.10.017
- Neri, M., Benevento, E., Stefanini, A., Aloini, D., Niccolini, F., Carducci, A., Federigi, I., & Dini, G. (2024). Understanding information security awareness: evidence from the public healthcare sector. Information and Computer Security, 33(3), 309–319. https://doi.org/10.1108/ICS-04-2024-0094
- Oroni, C. Z., Xianping, F., Ndunguru, D. D., & Ani, A. (2025). Enhancing cyber safety in e-learning environment through cybersecurity awareness and information security compliance: PLS-SEM and FsQCA analysis. Computers & Security, 150, 104276. https://doi.org/https://doi.org/10.1016/j.cose.2024.104276
- Paraskevi, G., Saprikis, V., & Avlogiaris, G. (2023). Modeling nonusers’ behavioral intention towards mobile chatbot adoption: An extension of the UTAUT2 model with mobile service quality determinants. Human Behavior and Emerging Technologies, 2023(1), 8859989. https://doi.org/10.1155/2023/8859989
- Patterson, C. M., Nurse, J. R. C., & Franqueira, V. N. L. (2023). Learning from cyber security incidents: A systematic review and future research agenda. Computers & Security, 132, 103309. https://doi.org/https://doi.org/10.1016/j.cose.2023.103309
- Pigola, A., da Costa, P. R., Vils, L., & Meirelles, F. de S. (2025). Enhancing information security management and performance through social and relational factors: a structural equation modelling approach. Behaviour & Information Technology, 1–23. https://doi.org/10.1080/0144929X.2025.2522206
- Prachaseree, K., Ahmad, N., & Md Isa, N. (2021). Applying Theory Elaboration for Theory of Reasoned Action (TRA) and Its Extensions. GIS-Business, 16(2), 35–57.
- Rachmadana, S. L., Mufida, N., Rusdy, H., Agung, A., & Masiku, G. (2024). Theory of Reasoned Action as a Framework for Analyzing Investment Knowledge in Generation Z. Fundamental and Applied Management Journal (FAMJ), 2(1), 16–21. https://doi.org/10.61220/famj.v2i1.2243
- Reuben-Owoh, B., & Haig, E. (2025). A Systematic Review of Voluntary Cybersecurity Standards and Frameworks. International Journal of Information Security, 24(5), 206. https://doi.org/10.1007/s10207-025-01121-0
- Shillair, R., Esteve-González, P., Dutton, W. H., Creese, S., Nagyfejeo, E., & von Solms, B. (2022). Cybersecurity education, awareness raising, and training initiatives: National level evidence-based results, challenges, and promise. Computers & Security, 119, 102756. https://doi.org/https://doi.org/10.1016/j.cose.2022.102756
- Shukla, S. S., Tiwari, M., Lokhande, A. C., Tiwari, T., Singh, R., & Beri, A. (2022). A comparative study of cyber security awareness, competence and behavior. 2022 5th International Conference on Contemporary Computing and Informatics (IC3I), 1704–1709. https://doi.org/10.1109/IC3I56241.2022.10072880
- Švábenský, V., Čeleda, P., Vykopal, J., & Brišáková, S. (2021). Cybersecurity knowledge and skills taught in capture the flag challenges. Computers & Security, 102, 102154. https://doi.org/https://doi.org/10.1016/j.cose.2020.102154
- Taha, I. M., Hussein, R., Ali, A., & Abbas, A. A. (2025). The Impact of Students ’ Cybersecurity Vulnerability Behavior on E-Learning Obstacles. Organizacija, 58(1), 85–104. https://doi.org/10.2478/orga-2025-0006
- Taherdoost, H. (2024). A Critical Review on Cybersecurity Awareness Frameworks and Training Models. Procedia Computer Science, 235, 1649–1663. https://doi.org/https://doi.org/10.1016/j.procs.2024.04.156
- Tejay, G. P. S., & Winkfield, M. (2025). Does Leadership Approach Matter? Examining Behavioral Influences of Leaders on Employees’ Information Security Compliance. Information Systems Frontiers. https://doi.org/10.1007/s10796-025-10592-4
- Vedadi, A., Warkentin, M., Straub, D. W., & Shropshire, J. (2024). Fostering information security compliance as organizational citizenship behavior. Inf. Manage., 61(5). https://doi.org/10.1016/j.im.2024.103968
- Xu, F., Hsu, C., Wang, T., & Lowry, P. B. (2024). The antecedents of employees’ proactive information security behaviour: The perspective of proactive motivation. Information Systems Journal, 34(4), 1144–1174. https://doi.org/10.1111/isj.12488
- Yazdanmehr, A., Li, Y., & Wang, J. (2023). Employee responses to information security related stress: Coping and violation intention. Information Systems Journal, 33(3), 598–639. https://doi.org/10.1111/isj.12417
- Zwilling, M., Klien, G., Lesjak, D., Wiechetek, Ł., Cetin, F., & Basim, H. N. (2022). Cyber security awareness, knowledge and behavior: A comparative study. Journal of Computer Information Systems, 62(1), 82–97. https://doi.org/10.1080/08874417.2020.1712269
References
Acheampong, R., Balan, T. C., Popovici, D.-M., Tuyishime, E., Rekeraho, A., & Voinea, G. D. (2025). Balancing usability, user experience, security and privacy in XR systems: a multidimensional approach. International Journal of Information Security, 24(3), 112. https://doi.org/10.1007/s10207-025-01025-z
Ajzen, I., & Fishbein, M. (1975). Belief, attitude, intention and behavior: An introduction to theory and research.
Alraja, M. N., Butt, U. J., & Abbod, M. (2023). Information security policies compliance in a global setting: An employee’s perspective. Computers & Security, 129, 103208. https://doi.org/https://doi.org/10.1016/j.cose.2023.103208
An, Q., Hong, W. C. H., Xu, X., Zhang, Y., & Kolletar-Zhu, K. (2023). How education level influences internet security knowledge, behaviour, and attitude: a comparison among undergraduates, postgraduates and working graduates. International Journal of Information Security, 22(2), 305–317. https://doi.org/10.1007/s10207-022-00637-z
Bada, A., Sasse, M. A., & Nurse, J. R. (2021). The role of user education and awareness in improving cybersecurity: A review of recent literature. Computers & Security, 103, 102159.
Baltuttis, D., Teubner, T., & Adam, M. T. P. (2024). A typology of cybersecurity behavior among knowledge workers. Computers & Security, 140, 103741. https://doi.org/https://doi.org/10.1016/j.cose.2024.103741
Barth, S., de Jong, M. D. T., & Junger, M. (2022). Lost in privacy? Online privacy from a cybersecurity expert perspective. Telematics and Informatics, 68, 101782. https://doi.org/10.1016/j.tele.2022.101782
Bishop, L. M., Asquith, P. M., & Morgan, P. L. (2025). The employee cybersecurity awareness framework. Human Behavior and Emerging Technologies, 2025(1), 1025045. https://doi.org/10.1155/hbe2/1025045
Branley-Bell, D., Coventry, L., Dixon, M., Joinson, A., & Briggs, P. (2022). Exploring age and gender differences in ICT cybersecurity behaviour. Human Behavior and Emerging Technologies, 2022(1), 2693080. https://doi.org/10.1155/2022/2693080
Cain, A. A., Edwards, M. E., & Still, J. D. (2018). An exploratory study of cyber hygiene behaviors and knowledge. Journal of Information Security and Applications, 42, 36–45. https://doi.org/10.1016/j.jisa.2018.08.002
Concari, A., Kok, G., Martens, P., & Brink, N. (2023). Investigating the Role of Goals and Motivation on Waste Separation Behavior Through the Lens of the Theory of Reasoned Goal Pursuit. Environmental Management, 72(5), 1019–1031. https://doi.org/10.1007/s00267-023-01820-1
Gopinathan, S., Veeraya, S., Raman, M., & Jambulingam, M. (2025). Role of behavioral intention in implementation of green information systems among Malaysians. Discover Sustainability, 6(1), 139. https://doi.org/10.1007/s43621-025-00873-y
Ifinedo, P., Mengesha, N., & Bekele, R. (2022). Effects of Personal Factors and Organizational Reinforcing Tools in Decreasing Employee Engagement in Unhygienic Cyber Practices: Perspectives From a Developing Country. Journal of Global Information Management (JGIM), 30(1), 1–27. https://doi.org/10.4018/JGIM.299324
Iskandar, R., Maksum, A., & Marini, A. (2025). Digital citizenship literacy in Indonesia: The role of privacy awareness and social campaigns. Social Sciences & Humanities Open, 12, 101697. https://doi.org/https://doi.org/10.1016/j.ssaho.2025.101697
Kannelønning, K., & Katsikas, S. K. (2023). A systematic literature review of how cybersecurity-related behavior has been assessed. Information and Computer Security, 31(4), 463–477. https://doi.org/10.1108/ICS-08-2022-0139
Kavak, A. (2024). Impact of information security awareness on information security compliance of academic library staff in Türkiye. The Journal of Academic Librarianship, 50(5), 102937. https://doi.org/https://doi.org/10.1016/j.acalib.2024.102937
Khan, N. F., Ikram, N., Murtaza, H., & Javed, M. (2023). Evaluating protection motivation based cybersecurity awareness training on Kirkpatrick’s Model. Computers & Security, 125, 103049. https://doi.org/https://doi.org/10.1016/j.cose.2022.103049
Kovačević, A., Putnik, N., & Tošković, O. (2020). Factors related to cybersecurity behavior. IEEE Access, 8, 125140–125148. https://doi.org/10.1109/ACCESS.2020.3007867
Li, L., He, W., Xu, L., Ash, I., Anwar, M., & Yuan, X. (2019). Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior. International Journal of Information Management, 45, 13–24. https://doi.org/https://doi.org/10.1016/j.ijinfomgt.2018.10.017
Neri, M., Benevento, E., Stefanini, A., Aloini, D., Niccolini, F., Carducci, A., Federigi, I., & Dini, G. (2024). Understanding information security awareness: evidence from the public healthcare sector. Information and Computer Security, 33(3), 309–319. https://doi.org/10.1108/ICS-04-2024-0094
Oroni, C. Z., Xianping, F., Ndunguru, D. D., & Ani, A. (2025). Enhancing cyber safety in e-learning environment through cybersecurity awareness and information security compliance: PLS-SEM and FsQCA analysis. Computers & Security, 150, 104276. https://doi.org/https://doi.org/10.1016/j.cose.2024.104276
Paraskevi, G., Saprikis, V., & Avlogiaris, G. (2023). Modeling nonusers’ behavioral intention towards mobile chatbot adoption: An extension of the UTAUT2 model with mobile service quality determinants. Human Behavior and Emerging Technologies, 2023(1), 8859989. https://doi.org/10.1155/2023/8859989
Patterson, C. M., Nurse, J. R. C., & Franqueira, V. N. L. (2023). Learning from cyber security incidents: A systematic review and future research agenda. Computers & Security, 132, 103309. https://doi.org/https://doi.org/10.1016/j.cose.2023.103309
Pigola, A., da Costa, P. R., Vils, L., & Meirelles, F. de S. (2025). Enhancing information security management and performance through social and relational factors: a structural equation modelling approach. Behaviour & Information Technology, 1–23. https://doi.org/10.1080/0144929X.2025.2522206
Prachaseree, K., Ahmad, N., & Md Isa, N. (2021). Applying Theory Elaboration for Theory of Reasoned Action (TRA) and Its Extensions. GIS-Business, 16(2), 35–57.
Rachmadana, S. L., Mufida, N., Rusdy, H., Agung, A., & Masiku, G. (2024). Theory of Reasoned Action as a Framework for Analyzing Investment Knowledge in Generation Z. Fundamental and Applied Management Journal (FAMJ), 2(1), 16–21. https://doi.org/10.61220/famj.v2i1.2243
Reuben-Owoh, B., & Haig, E. (2025). A Systematic Review of Voluntary Cybersecurity Standards and Frameworks. International Journal of Information Security, 24(5), 206. https://doi.org/10.1007/s10207-025-01121-0
Shillair, R., Esteve-González, P., Dutton, W. H., Creese, S., Nagyfejeo, E., & von Solms, B. (2022). Cybersecurity education, awareness raising, and training initiatives: National level evidence-based results, challenges, and promise. Computers & Security, 119, 102756. https://doi.org/https://doi.org/10.1016/j.cose.2022.102756
Shukla, S. S., Tiwari, M., Lokhande, A. C., Tiwari, T., Singh, R., & Beri, A. (2022). A comparative study of cyber security awareness, competence and behavior. 2022 5th International Conference on Contemporary Computing and Informatics (IC3I), 1704–1709. https://doi.org/10.1109/IC3I56241.2022.10072880
Švábenský, V., Čeleda, P., Vykopal, J., & Brišáková, S. (2021). Cybersecurity knowledge and skills taught in capture the flag challenges. Computers & Security, 102, 102154. https://doi.org/https://doi.org/10.1016/j.cose.2020.102154
Taha, I. M., Hussein, R., Ali, A., & Abbas, A. A. (2025). The Impact of Students ’ Cybersecurity Vulnerability Behavior on E-Learning Obstacles. Organizacija, 58(1), 85–104. https://doi.org/10.2478/orga-2025-0006
Taherdoost, H. (2024). A Critical Review on Cybersecurity Awareness Frameworks and Training Models. Procedia Computer Science, 235, 1649–1663. https://doi.org/https://doi.org/10.1016/j.procs.2024.04.156
Tejay, G. P. S., & Winkfield, M. (2025). Does Leadership Approach Matter? Examining Behavioral Influences of Leaders on Employees’ Information Security Compliance. Information Systems Frontiers. https://doi.org/10.1007/s10796-025-10592-4
Vedadi, A., Warkentin, M., Straub, D. W., & Shropshire, J. (2024). Fostering information security compliance as organizational citizenship behavior. Inf. Manage., 61(5). https://doi.org/10.1016/j.im.2024.103968
Xu, F., Hsu, C., Wang, T., & Lowry, P. B. (2024). The antecedents of employees’ proactive information security behaviour: The perspective of proactive motivation. Information Systems Journal, 34(4), 1144–1174. https://doi.org/10.1111/isj.12488
Yazdanmehr, A., Li, Y., & Wang, J. (2023). Employee responses to information security related stress: Coping and violation intention. Information Systems Journal, 33(3), 598–639. https://doi.org/10.1111/isj.12417
Zwilling, M., Klien, G., Lesjak, D., Wiechetek, Ł., Cetin, F., & Basim, H. N. (2022). Cyber security awareness, knowledge and behavior: A comparative study. Journal of Computer Information Systems, 62(1), 82–97. https://doi.org/10.1080/08874417.2020.1712269