Cybersecurity Risk Management: Integrating Technology And Digital Security Awareness
English
DOI:
https://doi.org/10.65254/ijese.v3i2.77Keywords:
Cybersecurity Technology, Cybersecurity Risk Management, Digital Security AwarenessAbstract
Purpose: This study examines how cybersecurity resilience can be strengthened by integrating technological capabilities and human factors. Specifically, it explores the role of cybersecurity technology and digital security awareness in enhancing cybersecurity risk management, using a combined perspective of the Technology Acceptance Model (TAM) and Resource-Based View (RBV).
Design/methodology/approach: A quantitative approach was employed using Partial Least Squares–Structural Equation Modeling (PLS-SEM). Data were collected from digital companies operating in Denpasar to test the proposed relationships and moderating effects.
Findings: The results indicate that cybersecurity technology significantly improves cybersecurity risk management. In addition, digital security awareness strengthens this relationship, suggesting that higher awareness enhances the effectiveness of technological tools.
Research limitations/implications: The study is limited by its focus on a single geographic area and a cross-sectional design, which may limit broader applicability. Future research is encouraged to involve multiple regions and longitudinal data.
Practical implications: Organizations should not rely solely on technological investments but also prioritize improving employees’ digital security awareness to achieve stronger cybersecurity resilience.
Originality/value: This study contributes by integrating TAM and RBV to highlight the interaction between technological and human capabilities in cybersecurity risk management.
Paper type: Research paper
Downloads
References
Ahavi, K. S. (2023). Rollins Scholarship Online Cyber Risk Management from a Resource Advantage Perspective.
Aljarrah, E., Elrehail, H., & Aababneh, B. (2016). E-voting in Jordan: Assessing readiness and developing a system. Computers in Human Behavior, 63, 860–867. https://doi.org/https://doi.org/10.1016/j.chb.2016.05.076
Assoratgoon, W., & Kantabutra, S. (2023). Toward a sustainability organizational culture model. Journal of Cleaner Production, 400, 136666. https://doi.org/https://doi.org/10.1016/j.jclepro.2023.136666
Bukartaite, R., & Hooper, D. (2023). Automation, artificial intelligence and future skills needs: an Irish perspective. European Journal of Training and Development, 47(10), 163–185. https://doi.org/10.1108/EJTD-03-2023-0045
Cheng, Z. M., Bonetti, F., de Regt, A., Ribeiro, J. Lo, & Plangger, K. (2024). Principles of responsible digital implementation: Developing operational business resilience to reduce resistance to digital innovations. Organizational Dynamics, 53(2), 101043. https://doi.org/https://doi.org/10.1016/j.orgdyn.2024.101043
Colabianchi, S., Costantino, F., Nonino, F., & Palombi, G. (2025). Transforming threats into opportunities: The role of human factors in enhancing cybersecurity. Journal of Innovation & Knowledge, 10(3), 100695. https://doi.org/https://doi.org/10.1016/j.jik.2025.100695
Cremer, F., Sheehan, B., Fortmann, M., Kia, A. N., Mullins, M., Murphy, F., & Materne, S. (2022). Cyber risk and cybersecurity: a systematic review of data availability. The Geneva Papers on Risk and Insurance. Issues and Practice, 47(3), 698–736. https://doi.org/10.1057/s41288-022-00266-6
Fatima, F., Hyatt, J. C., Rehman, S. U., De La Cruz, E., Nadella, G. S., & Meduri, K. (2024). Resilience and risk management in cybersecurity: A grounded theory study of emotional, psychological, and organizational dynamics. Journal of Economy and Technology, 2, 247–257. https://doi.org/https://doi.org/10.1016/j.ject.2024.08.004
Grassegger, T., & Nedbal, D. (2021). The Role of Employees’ Information Security Awareness on the Intention to Resist Social Engineering. Procedia Computer Science, 181, 59–66. https://doi.org/https://doi.org/10.1016/j.procs.2021.01.103
Haapamäki, E., & Sihvonen, J. (2019). Cybersecurity in accounting research. Managerial Auditing Journal, 34(7), 808–834. https://doi.org/10.1108/MAJ-09-2018-2004
Hair, J. (2022). Partial Least Squares Structural Equation Modeling (PLS-SEM) in second language and education research: Guidelines using an applied example. Research Methods in Applied Linguistics, 1(3), 100027. https://doi.org/https://doi.org/10.1016/j.rmal.2022.100027
Hakimi, M., Amiri, G. A., Jalalzai, S., Darmel, F. A., & Ezam, Z. (2024). Exploring the Integration of AI and Cloud Computing: Navigating Opportunities and Overcoming Challenges. TIERS Information Technology Journal, 5(1), 57–69. https://doi.org/10.38043/tiers.v5i1.5496
Jiang, S., Li, H., & Gan, D. (2025). Technology acceptance model for online education: identifying interdisciplinary topics and their evolution based on BERTopic model. Social Sciences & Humanities Open, 12, 101831. https://doi.org/https://doi.org/10.1016/j.ssaho.2025.101831
Kayode Saheed, Y., Idris Abiodun, A., Misra, S., Kristiansen Holone, M., & Colomo-Palacios, R. (2022). A machine learning-based intrusion detection for detecting internet of things network attacks. Alexandria Engineering Journal, 61(12), 9395–9409. https://doi.org/https://doi.org/10.1016/j.aej.2022.02.063
Loske, A., Widjaja, T., Benlian, A., & Buxmann, P. (2014). Perceived it security risks in cloud adoption: The role of perceptual incongruence between users and providers. ECIS 2014 Proceedings - 22nd European Conference on Information Systems, 0–16.
Magno, F., Cassia, F., & Ringle, C. M. (2024). A brief review of partial least squares structural equation modeling (PLS-SEM) use in quality management studies. The TQM Journal, 36(5), 1242–1251. https://doi.org/10.1108/TQM-06-2022-0197
Mailani, D., Hulu, M. Z. T., Simamora, M. R., & Kesuma, S. A. (2024). Resource-Based View Theory to Achieve a Sustainable Competitive Advantage of the Firm : Systematic Literature Review. International Journal of Entrepreneurship and Sustainability Studies, 4(1), 1–15.
Murad, H. A., & Qudah, M. (2025). The attitudes of communicators toward cybersecurity concerning security, safety in national institutions. Frontiers in Communication, 10(July), 1–22. https://doi.org/10.3389/fcomm.2025.1552520
Pankajakshan, J., & Maheshwari Bangur, R. (2024). Employee Awareness and Attitudes Towards Cybersecurity Technologies. Journal of Advances and Scholarly Researches in Allied Education, 21(5), 113–120. www.ignited.in
Parambil, M. M. A., Rustamov, J., Ahmed, S. G., Rustamov, Z., Awad, A. I., Zaki, N., & Alnajjar, F. (2024). Integrating AI-based and conventional cybersecurity measures into online higher education settings: Challenges, opportunities, and prospects. Computers and Education: Artificial Intelligence, 7, 100327. https://doi.org/https://doi.org/10.1016/j.caeai.2024.100327
Russ, M. (Ed.). (2017). Human Capital and Assets in the Networked World. Emerald Publishing Limited. https://doi.org/10.1108/9781787148277
Slapničar, S., Vuko, T., Čular, M., & Drašček, M. (2022). Effectiveness of cybersecurity audit. International Journal of Accounting Information Systems, 44, 100548. https://doi.org/https://doi.org/10.1016/j.accinf.2021.100548
Tambwe, O. T., Aigbavboa, C. O., & Akinradewo, O. (2023). Benefits of construction data risks management in the construction industry. Journal of Engineering, Design and Technology, 23(2), 458–476. https://doi.org/10.1108/JEDT-11-2022-0577
Ussher-eke, D. (2025). Building a cyber-resilient workforce through HR and IT Collaboration. 27(June), 706–716.
Wandira, R., & Fauzi, A. (2022). TAM Approach: Effect of Security on Customer Behavioral Intentions to Use Mobile Banking. Daengku: Journal of Humanities and Social Sciences Innovation, 2(2), 192–200. https://doi.org/10.35877/454ri.daengku872
Yeo, L. H., & Banfield, J. (2022). Human Factors in Electronic Health Records Cybersecurity Breach: An Exploratory Analysis. Perspectives in Health Information Managemen, 19(Spring), 1i.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 Ni Wayan Lasmi, Komang Widhya Sedana Putra P, Wayan Sri Maitri

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.










