ADAPTING CYBERSECURITY KNOWLEDGE MEASURES FOR MALAYSIAN UNIVERSITY STUDENTS: INSIGHTS FROM EXPLORATORY FACTOR ANALYSIS
DOI:
https://doi.org/10.35631/IJMOE.829042Keywords:
Cybersecurity Knowledge, Exploratory Factor Analysis, Principal Component AnalysisAbstract
The rise of digital threats in Malaysia underscores the need to integrate cybersecurity knowledge into higher education in STEM. However, contextually validated measurement tools remain scarce. This study adapted and validated a multidimensional instrument based on the six-dimensional Cybersecurity Scale (CS-S) framework. Following expert validation (I-CVI ≥ 0.78), the instrument was administered to 115 Malaysian STEM students. An Exploratory Factor Analysis (EFA) procedure using Principal Component Analysis (PCA) with Varimax rotation was employed to determine the factor structure. Results confirmed a robust six-component structure: Confidentiality, Integrity, Availability, Authenticity, Utility, and Possession/Control. The refined instrument demonstrated high internal consistency with a Cronbach’s Alpha of 0.80, exceeding the 0.70 threshold recommended for newly developed constructs. These findings provide a psychometrically sound foundation for subsequent Confirmatory Factor Analysis (CFA) and offer educators a reliable tool to assess cybersecurity preparedness. This research supports national digital resilience goals by providing a validated means to identify learning gaps among future STEM professionals.
Downloads
References
Alammari, A., Sohaib, O., & Younes, S. (2022). Developing and evaluating cybersecurity competencies for students in computing programs. Peerj Computer Science, 8, e827. https://doi.org/10.7717/peerj-cs.827
Alghamdi, M. A. (2025). Understanding Social Engineering in Cybersecurity and Mitigating Human-Centric Threats. In Complexities and Challenges for Securing Digital Assets and Infrastructure (pp. 563-584). IGI Global Scientific Publishing.
Alqahtani, S., Nanda, P., & Mohanty, M. (2024, December). Strengthening Cybersecurity: The Influence of Student Behavior, Perceived Factors, and Mitigating Strategies on Phishing Attack Perception. In International Conference on Web Information Systems Engineering (pp. 313-329). Singapore: Springer Nature Singapore.
Amdan, M. A., Janius, N., Saidin, M. S., & Kasdiah, M. A. H. (2024). Impact of Artificial Intelligence in TVET and STEM education among higher learning students in Malaysia. Journal of Research in Mathematics, Science and Technology Education. 1(2).
Andria, R. D. L., Sussolaikah, K., M-Dawam, S. R., Din, M. M. & Mansor, S. (2025). Bridging The Gaps: Evaluating Cybersecurity Awareness and Practices For Enhanced Digital Security. Journal Information and Technology Management (JISTM), 10(38). https://doi.org/10.35631/JISTM.1038013
Ariffin, S. A., Side, S. F., & Mutalib, M. F. H. (2018). A Preliminary Investigation of Malaysian Student's Daily Use of Mobile Devices as Potential Tools for STEM in a Local University Context. International Journal of Interactive Mobile Technologies, 12(2). https://doi.org/10.3991/ijim.v12i2.8015
Arpaci, I. & Sevinc, K. (2021). Development of the cybersecurity scale (CS-S): Evidence of validity and reliability. Information Development, 1 – 9, doi: 10.1177/0266666921997512
Awang, Z., Athanorhan, W., Lim, S., & Zainudin, N. F. S. (2023). SEM Made Simple 2.0. A Gentle Approach of Structural Equation Modelling. Gong Badak: Penerbit Unisza.
Azzeh, M., Altamimi, A. M., Albashayreh, M., & Al-Oudat, M. A. (2022). Adopting the Cybersecurity Concepts into Curriculum The Potential Effects on Students Cybersecurity Knowledge. arXiv preprint arXiv:2209.10407
Bognár, L., & Bottyán, L. (2024). Evaluating Online Security Behavior: Development and Validation of a Personal Cybersecurity Awareness Scale for University Students. Education Sciences, 14(6), 588. https://doi.org/10.3390/educsci14060588
Blanchard, E., Feldman, S., White, M., Allen, R., Phillips, T., & Brown, M. (2024). Design and implementation of tabletop cybersecurity simulation for health informatics graduate students. Applied Clinical Informatics, 15(05), 921-927. https://doi.org/10.1055/s-0044-1790551
Bruin, M. D., & Mersinas, K. (2024). Individual and Contextual Variables of Cyber Security Behaviour - An empirical analysis of national culture, industry, organisation, and individual variables of (in)secure human behaviour. ArXiv, abs/2405.16215.
Buniel, J. M., Intano, J., Cuartero, O., Grustan, K. J., Sumaoy, R., Reyes Jr, N,...& Cortes, S. (2025). Modeling the influence of AI dependence to research productivity among STEM undergraduate students: case of a state university in the Philippines. In Frontiers in Education (Vol. 10, p. 1535466). Frontiers Media SA.
Chuan, Z. L., Wei, C. T., Japashov, N., Yuan, S. K., Qing, T. W., Ismail, N., Liong, C., Hiae, T. E. (2023). Analyzing Enrolment Patterns: Stacked Ensemble Statistical Learning-Based Approach to Educational Decision Making.13 December 2023, PREPRINT (Version 1) available at Research Square.
Colomé, M., Nunes, R., & Silva, L. (2019). Case-based cybersecurity incident resolution. https://doi.org/10.18293/seke2019-204
Deng, Y., Zeng, Z., Jha, K., & Huang, D. (2022). Problem-based cybersecurity lab with a knowledge graph as guidance. Journal of Artificial Intelligence and Technology, 2(2). 55-61. https://doi.org/10.37965/jait.2022.0066
Dioubate, B. M., Daud, W., & Norhayate, W. (2022). Cyber security risk management frameworks implementation in Malaysian higher education institutions. International journal of academic research in business and social sciences, 12(4), 1356-1371. https://doi.org/10.6007/IJARBSS/v12-i4/12300
Fatokun, F. B., Hamid, S., Norman, A., & Fatokun, J. O. (2019, December). The impact of age, gender, and educational level on the cybersecurity behaviors of tertiary institution students: an empirical investigation on Malaysian universities. In Journal of Physics: Conference Series (Vol. 1339, No. 1, p. 012098). IOP Publishing.
Garba, A. A., Siraj, M. M., & Musa, M. A. (2020). A Study on Cybersecurity Awareness Among Students in Yobe: A Quantitative Approach. International Journal on Emerging Technology, 11(5), 41-49.
Granström, M. & Oppi, P. (2025) Student engagement with AI tools in learning: evidence from a large-scale Estonian survey. Front. Educ. 10:1688092. doi: 10.3389/feduc.2025.1688092
Hakimi, M., Quchi, M. M., & Fazil, A. W. (2024). Human factors in cybersecurity: an in depth analysis of user centric studies. Jurnal Ilmiah Multidisiplin Indonesia (JIM-ID), 3(01), 20-33. https://doi.org/10.58471/esaprom.v3i01.3832.
Hair, J. F., Black, W. C., Babin, B. J., & Anderson, R. E. (2019). Multivariate data analysis. Cengage Learning EMEA.
Hidayat Muhamad. (2025, January 5). Keselamatan siber di Malaysia: Analisis trend tahun 2024 dan harapan untuk tahun 2025. Dewan Kosmik. https://www.majalahsains.com/keselamatan-siber-di-malaysia-analisis-trend-tahun-2024-dan-harapan-untuk-tahun-2025/
Hong, W.C.H., Chi, C., Liu, J. et al. (2022). The influence of social education level on cybersecurity awareness and behaviour: a comparative study of university students and working graduates. Education and Information Technology, 28, 439–470. https://doi.org/10.1007/s10639-022-11121-5
Ismail, M. H., Fadzil, H. M., Saat, R. M., & Salleh, M. F. M. (2022). A needs analysis study for the preparation of integrated STEM instructional practices through Scientist-Teacher-Student Partnership (STSP). ASM Science Journal, 17, 1-16. https://doi.org/10.32802/asmscj.2022.1112
Jinn, L. C., Zaman, I. A. K., Zakaria, S., Mahali, S. & Aleng, N. A. (2023). Analysing The Undergraduate Enrolment Pattern In Malaysian Public Universities Using Statistical Methods. Journal of Mathematical Sciences and Informatics, 2(2), 1 – 16, http://doi.org/10.46754/jmsi.2022.12.001
Karpudewan, M., Krishnan, P., Ali, M. N., & Yoon Fah, L. (2022). Analysing The Undergraduate Enrolment Pattern In Malaysian Public Universities Using Statistical Methods. Designing instrument to measure STEM teaching practices of Malaysian teachers. Plos One, 17(5), e0268509. https://doi.org/10.1371/journal.pone.0268509
Lam, C. P., & Siew, N. M. (2024). Flipped classroom in science education: Correlating student experience with attitudes. Problems of Education in the 21st Century, 82(5), 672.
Lavidas, K., Papadakis, S., Manesis, D., Grigoriadou, A. S., & Gialamas, V. (2022a). The effects of social desirability on students' self-reports in two social contexts: Lectures vs. lectures and lab classes. Information, 13(10), 491.
Lavidas, K., Petropoulou, A., Papadakis, S., Apostolou, Z., Komis, V., Jimoyiannis, A., & Gialamas, V. (2022b). Factors affecting response rates of the web survey with teachers. Computers, 11(9), 127.
Lazarov, W., Schafeitel-Tähtinen, T., Squillace, J., Martinasek, Z., Coufalikova, A., Helenius, M., Gallus, P., Fujdiak, R. (2025). Lessons Learned from Using Cyber Range to Teach Cybersecurity at Different Levels of Education. Technology, Knowledge Learning. https://doi.org/10.1007/s10758-025-09840-y
MacCallum, R. C., Widaman, K. F., Zhang, S., & Hong, S. (1999). Sample size in factor analysis. Psychological Methods, 4(1), 84–99. https://doi.org/10.1037/1082-989X.4.1.84
Ministry of Digital (2024). Press Statement: Malaysia Cyber Security Academy to Begin Operations In 2025. Kuala Lumpur: Ministry of Digital Malaysia.
Mohamed, M., Awang, M., & Syariff, M. (2025). Development of Items to Measure Work Stress Among Secondary School Teachers in Sarawak: An Exploratory Factor Analysis Procedure. International Journal of Academic Research, 14(1).
Nair, P. (2023). Enhancing cybersecurity awareness training through the nist framework. Ijarcce, 12(12). https://doi.org/10.17148/ijarcce.2023.121203
National Cyber Coordination and Command Centre. (2024). Advisory on heightened cyber activities targeting Malaysian digital infrastructure. National Cyber Security Agency (NACSA). https://www.nc4.gov.my
Pirta-Dreimane, R., Brilingaitė, A., Roponena, E., Parish, K., Grabis, J., Lugo, R. G., Bonders, M. (2023). CyberEscape Approach to Advancing Hard and Soft Skills in Cybersecurity Education. In: Schmorrow, D.D., Fidopiastis, C.M. (eds) Augmented Cognition. HCII 2023. Lecture Notes in Computer Science, vol 14019. Springer, Cham. https://doi.org/10.1007/978-3-031-35017-7_28
Poulsen, S., Herman, G. L., Peterson, P. A., Golaszewski, E., Gorti, A., Oliva, L., ... & Sherman, A. T. (2021). Psychometric evaluation of the cybersecurity concept inventory. ACM Transactions on Computing Education (TOCE), 22(1), 1-18.
PwC. (2024). Cyber threat intelligence: A year in retrospect. PricewaterhouseCoopers.
Razack, A. and Saad, M. (2024). Enhancing cybersecurity awareness through gamification: design an interactive cybersecurity learning platform for multimedia university students. Journal of Informatics and Web Engineering, 3(3), 21-40. https://doi.org/10.33093/jiwe.2024.3.3.2
Shalevska, E. (2024). Human Rights in the Age of AI: Understanding the Risks, Ethical Dilemmas, and the Role of Education in Mitigating Threats. Journal of Legal and Political Education, 1(2), 38-52.
Shi, J., Mo, X., & Sun, Z. (2012). Content validity index in scale development. Zhong Nan Da Xue Xue Bao Yi Xue Ban (Journal of Central South University. Medical Sciences), 37(2), 152–155. https://doi.org/10.3969/j.issn.1672-7347.2012.02.007
Spencer, R. (2025). The Urgency of Instituting Systemic Cybersecurity Curriculum within STEM at Secondary Educational Levels in Preparation for Postsecondary Institutions. Journal of Cybersecurity Education, Research and Practice, 2025(1), 4
Tee Kai Vern (2025). Study on Awareness of Cybersecurity Issues and Social Media Usage Among Youths. (Master’s Thesis/Scopus-indexed proceeding), Universiti Kebangsaan Malaysia.
Terzieva, V., Paunova-Hubenova, E., Slavcheva, S. (2024). Trends, Challenges, Opportunities, and Innovations in STEM Education, IFAC-PapersOnLine, 58(3), 106 – 111, https://doi.org/10.1016/j.ifacol.2024.07.134
Triplett, W. (2023). Addressing cybersecurity challenges in education. International Journal of Stem Education for Sustainability, 3(1), 47-67. https://doi.org/10.53889/ijses.v3i1.132
Ugraş, H., Ugraş, M., Papadakis, S., & Kalogiannakis, M. (2024). Innovative early childhood STEM education with ChatGPT: Teacher perspectives. Technology, Knowledge and Learning.
Vergara Cobos, E. B., & Cakir, S. (2024). A Review of the Economic Costs of Cyber Incidents. World Bank Group, Working Paper.
Zulkifli, I. Z. Z., Razi, N. F. M., Mohammad, N. H.,& Sarkam, N. A. (2024). The association between performance and mathematical subjects among diploma students. Journal of Computing Research and Innovation, 9(2), 232-243.
