UPSI Digital Repository (UDRep)
|
![]() |
|
|
Abstract : Universiti Pendidikan Sultan Idris |
Embracing digital business enhances company resilience, yet small and medium-sized enterprises (SMEs) often lack resources to combat cyber threats, unlike larger enterprises. Sophisticated cyberattacks surpass standard antivirus software, necessitating a shift in cybersecurity strategies. Therefore, this study aimed to investigate the relationship between knowledge, perceived usefulness, perceived ease of use, and the adoption of cybersecurity among small-and-medium entrepreneurs in Perak, Malaysia. Guided by the Technology Acceptance Model (TAM), this ongoing research employed a quantitative approach by distributing questionnaires to 400 digital entrepreneurs in the small and medium-sized business sectors in Perak. The findings revealed that the majority of entrepreneurs possessed a relatively high level of knowledge about cybersecurity. Furthermore, the study identified a strong positive correlation between knowledge and perceived usefulness (correlation coefficient r = 0.639), as well as a moderately positive correlation between knowledge and perceived ease of use (correlation coefficient r = 0.435) among small and medium entrepreneurs in Perak. Consequently, this study contributes to a better understanding of the Technology Acceptance Model (TAM) within the context of perceived usefulness, perceived ease of use, and the adoption of cybersecurity, thereby enriching the existing literature on cybersecurity among small and medium entrepreneurs in the era of digital business. _ 2024, Creative Publishing House. All rights reserved. |
References |
Adleena Huzaizi, A. H., Ahmad Tajuddin, S. N. A., Bahari, K. A., Manan, K. A., & Abd Mubin, N. N. (2021). Cyber-Security Culture towards Digital Marketing Communications among Small and Medium-Sized (SME) Entrepreneurs. Asian Culture and History, 13(2), 20. https://doi.org/10.5539/ach.v13n2p20. Allen, M. (2017). The SAGE Encyclopedia of Communication Research Methods. SAGE Publications Ltd. Alnemer, H. A. (2022). Determinants of digital banking adoption in the Kingdom of Saudi Arabia: A technology acceptance modelapproach. Digital Business, 2(2). https://doi.org/10.1016/j.digbus.2022.100037. Alsobeh, A. M. R., Alazzam, I., Shatnawi, A. M. J., & Khasawneh, I. (2023). Cybersecurity awareness factors among adolescentsin Jordan: Mediation effect of cyber scale and personal factors. Online Journal of Communication and Media Technologies, 13(2). https://doi.org/10.30935/ojcmt/12942. Awa, H. O., Ojiabo, O. U., & Emecheta, B. C. (2015). Integrating TAM, TPB and TOE frameworks and expanding their characteristic constructs for e-commerce adoption by SMEs. Journal of Science and Technology Policy Management, 6(1), 76-94. https://doi.org/10.1108/JSTPM-04-2014-0012 Ayob, A. H. (2021). E-commerce adoption in ASEAN: who and where? Future Business Journal, 7(1), 1-11. https://doi.org/10.1186/s43093-020-00051-8. Bada, M., Sasse, A. M., & Nurse, J. R. C. (2019). Cyber Security Awareness Campaigns: Why do they fail to change behaviour? 1-11. http://arxiv.org/abs/1901.02672. Bernama. (2023, July 27). KDNK PMKS Malaysia melonjak11.6 peratus kepada RM580.4 bilion pada 2022. Bernama.Candra, Y. T. A., Wulandari, I., & Wafa, Z. (2023). Analysis of MSME Strategies in Responding to Crisis: A Case Study of MSMEin Gunungkidul Regency. International Business Education ..., 16(1), 12-21. https://ojs.upsi.edu.my/index.php/IBEJ/article/view/7664%0Ahttps://ojs.upsi.edu.my/index.php/IBEJ/article/download/7664/4423. Chai, K. Y., & Zolkipli, M. F. (2021). Review on Confidentiality, Integrity and Availability in Information Security. Journalof ICT In Education, 8(2), 34-42. https://doi.org/10.37134/jictie.vol8.2.4.2021. Ching, G. H., & Zolkipli, M. F. (2021). Review on Cryptography Techniques in Network Security. Journal of ICT in Education, 8(2), 125-135. Cho, J., Cheon, Y., Jun, J. W., & Lee, S. (2022). Digital advertising policy acceptance by out-of-home advertising firms: a combination of TAM and TOE framework. International Journal of Advertising, 41(3), 500-518. https://doi.org/10.1080/02650487.2021.1888562. Creswell, J. W., & Creswell, J. D. (2018). Research DesignQualitative, Quantitative, and Mixed Methods Approaches. In SAGE Publications.Davis, F. D. (1985). A technology acceptance model for empirically testing new end-user information systems: Theory and results. In Doctoral dissertation, Massachusetts Institute of Technology. https://doi.org/10.1126/science.146.3652.1648. Davis, F. D. (1987). User Acceptance of Information Systems: The Technology Acceptance Model (TAM). In University of Michigan. https://doi.org/10.1002/9781119678816.iehc0776. Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User Acceptance of Computer Technology: A Comparison of Two Theoretical Models. Management Science, 35(8), 982-1003. https://doi.org/10.1287/mnsc.35.8.982. Dunakhe, K., & Panse, C. (2022). Impact of digital marketing -abibliometric review. International Journal of Innovation Science, 14(3-4), 506-518. https://doi.org/10.1108/IJIS-11-2020-0263. Dwivedi, Y. K., Ismagilova, E., Hughes, D. L., Carlson, J., Filieri, R., Jacobson, J., Jain, V., Karjaluoto, H., Kefi, H., Krishen, A. S., Kumar, V., Rahman, M. M., Raman, R., Rauschnabel, P. A., Rowley, J., Salo, J., Tran, G. A., & Wang, Y. (2021). Setting the future of digital and social media marketing research: Perspectives and research propositions. International Journal of Information Management, 59(May 2020), 102168. https://doi.org/10.1016/j.ijinfomgt.2020.102168. Fernandez De Arroyabe, I., & Fernandez de Arroyabe, J. C. (2023). The severity and effects of Cyber-breaches in SMEs: a machine learning approach. Enterprise Information Systems, 17(3), 1-27. https://doi.org/10.1080/17517575.2021.1942997. Filiz Bozkurt Bekoglu, & Cemre Onayli. (2016). Strategic Approach in Social Media Marketing and a Study on Successful Facebook Cases. European Scientific Journal, ESJ, 12(7), 261-274. https://doi.org/https://doi.org/10.19044/esj.2016.v12n7p261. |
This material may be protected under Copyright Act which governs the making of photocopies or reproductions of copyrighted materials. You may use the digitized material for private study, scholarship, or research. |