Cybersecurity Risk Management: Integrating Technology And Digital Security Awareness

English

Authors

  • Ni Wayan Lasmi Universitas Pendidikan Nasional
  • Komang Widhya Sedana Putra P Universitas Pendidikan Nasional
  • Wayan Sri Maitri Universitas Pendidikan Nasional

DOI:

https://doi.org/10.65254/ijese.v3i2.77

Keywords:

Cybersecurity Technology, Cybersecurity Risk Management, Digital Security Awareness

Abstract

Purpose: This study examines how cybersecurity resilience can be strengthened by integrating technological capabilities and human factors. Specifically, it explores the role of cybersecurity technology and digital security awareness in enhancing cybersecurity risk management, using a combined perspective of the Technology Acceptance Model (TAM) and Resource-Based View (RBV).

Design/methodology/approach: A quantitative approach was employed using Partial Least Squares–Structural Equation Modeling (PLS-SEM). Data were collected from digital companies operating in Denpasar to test the proposed relationships and moderating effects.

Findings: The results indicate that cybersecurity technology significantly improves cybersecurity risk management. In addition, digital security awareness strengthens this relationship, suggesting that higher awareness enhances the effectiveness of technological tools.

Research limitations/implications: The study is limited by its focus on a single geographic area and a cross-sectional design, which may limit broader applicability. Future research is encouraged to involve multiple regions and longitudinal data.

Practical implications: Organizations should not rely solely on technological investments but also prioritize improving employees’ digital security awareness to achieve stronger cybersecurity resilience.

Originality/value: This study contributes by integrating TAM and RBV to highlight the interaction between technological and human capabilities in cybersecurity risk management.

Paper type: Research paper

Downloads

Download data is not yet available.

References

Ahavi, K. S. (2023). Rollins Scholarship Online Cyber Risk Management from a Resource Advantage Perspective.

Aljarrah, E., Elrehail, H., & Aababneh, B. (2016). E-voting in Jordan: Assessing readiness and developing a system. Computers in Human Behavior, 63, 860–867. https://doi.org/https://doi.org/10.1016/j.chb.2016.05.076

Assoratgoon, W., & Kantabutra, S. (2023). Toward a sustainability organizational culture model. Journal of Cleaner Production, 400, 136666. https://doi.org/https://doi.org/10.1016/j.jclepro.2023.136666

Bukartaite, R., & Hooper, D. (2023). Automation, artificial intelligence and future skills needs: an Irish perspective. European Journal of Training and Development, 47(10), 163–185. https://doi.org/10.1108/EJTD-03-2023-0045

Cheng, Z. M., Bonetti, F., de Regt, A., Ribeiro, J. Lo, & Plangger, K. (2024). Principles of responsible digital implementation: Developing operational business resilience to reduce resistance to digital innovations. Organizational Dynamics, 53(2), 101043. https://doi.org/https://doi.org/10.1016/j.orgdyn.2024.101043

Colabianchi, S., Costantino, F., Nonino, F., & Palombi, G. (2025). Transforming threats into opportunities: The role of human factors in enhancing cybersecurity. Journal of Innovation & Knowledge, 10(3), 100695. https://doi.org/https://doi.org/10.1016/j.jik.2025.100695

Cremer, F., Sheehan, B., Fortmann, M., Kia, A. N., Mullins, M., Murphy, F., & Materne, S. (2022). Cyber risk and cybersecurity: a systematic review of data availability. The Geneva Papers on Risk and Insurance. Issues and Practice, 47(3), 698–736. https://doi.org/10.1057/s41288-022-00266-6

Fatima, F., Hyatt, J. C., Rehman, S. U., De La Cruz, E., Nadella, G. S., & Meduri, K. (2024). Resilience and risk management in cybersecurity: A grounded theory study of emotional, psychological, and organizational dynamics. Journal of Economy and Technology, 2, 247–257. https://doi.org/https://doi.org/10.1016/j.ject.2024.08.004

Grassegger, T., & Nedbal, D. (2021). The Role of Employees’ Information Security Awareness on the Intention to Resist Social Engineering. Procedia Computer Science, 181, 59–66. https://doi.org/https://doi.org/10.1016/j.procs.2021.01.103

Haapamäki, E., & Sihvonen, J. (2019). Cybersecurity in accounting research. Managerial Auditing Journal, 34(7), 808–834. https://doi.org/10.1108/MAJ-09-2018-2004

Hair, J. (2022). Partial Least Squares Structural Equation Modeling (PLS-SEM) in second language and education research: Guidelines using an applied example. Research Methods in Applied Linguistics, 1(3), 100027. https://doi.org/https://doi.org/10.1016/j.rmal.2022.100027

Hakimi, M., Amiri, G. A., Jalalzai, S., Darmel, F. A., & Ezam, Z. (2024). Exploring the Integration of AI and Cloud Computing: Navigating Opportunities and Overcoming Challenges. TIERS Information Technology Journal, 5(1), 57–69. https://doi.org/10.38043/tiers.v5i1.5496

Jiang, S., Li, H., & Gan, D. (2025). Technology acceptance model for online education: identifying interdisciplinary topics and their evolution based on BERTopic model. Social Sciences & Humanities Open, 12, 101831. https://doi.org/https://doi.org/10.1016/j.ssaho.2025.101831

Kayode Saheed, Y., Idris Abiodun, A., Misra, S., Kristiansen Holone, M., & Colomo-Palacios, R. (2022). A machine learning-based intrusion detection for detecting internet of things network attacks. Alexandria Engineering Journal, 61(12), 9395–9409. https://doi.org/https://doi.org/10.1016/j.aej.2022.02.063

Loske, A., Widjaja, T., Benlian, A., & Buxmann, P. (2014). Perceived it security risks in cloud adoption: The role of perceptual incongruence between users and providers. ECIS 2014 Proceedings - 22nd European Conference on Information Systems, 0–16.

Magno, F., Cassia, F., & Ringle, C. M. (2024). A brief review of partial least squares structural equation modeling (PLS-SEM) use in quality management studies. The TQM Journal, 36(5), 1242–1251. https://doi.org/10.1108/TQM-06-2022-0197

Mailani, D., Hulu, M. Z. T., Simamora, M. R., & Kesuma, S. A. (2024). Resource-Based View Theory to Achieve a Sustainable Competitive Advantage of the Firm : Systematic Literature Review. International Journal of Entrepreneurship and Sustainability Studies, 4(1), 1–15.

Murad, H. A., & Qudah, M. (2025). The attitudes of communicators toward cybersecurity concerning security, safety in national institutions. Frontiers in Communication, 10(July), 1–22. https://doi.org/10.3389/fcomm.2025.1552520

Pankajakshan, J., & Maheshwari Bangur, R. (2024). Employee Awareness and Attitudes Towards Cybersecurity Technologies. Journal of Advances and Scholarly Researches in Allied Education, 21(5), 113–120. www.ignited.in

Parambil, M. M. A., Rustamov, J., Ahmed, S. G., Rustamov, Z., Awad, A. I., Zaki, N., & Alnajjar, F. (2024). Integrating AI-based and conventional cybersecurity measures into online higher education settings: Challenges, opportunities, and prospects. Computers and Education: Artificial Intelligence, 7, 100327. https://doi.org/https://doi.org/10.1016/j.caeai.2024.100327

Russ, M. (Ed.). (2017). Human Capital and Assets in the Networked World. Emerald Publishing Limited. https://doi.org/10.1108/9781787148277

Slapničar, S., Vuko, T., Čular, M., & Drašček, M. (2022). Effectiveness of cybersecurity audit. International Journal of Accounting Information Systems, 44, 100548. https://doi.org/https://doi.org/10.1016/j.accinf.2021.100548

Tambwe, O. T., Aigbavboa, C. O., & Akinradewo, O. (2023). Benefits of construction data risks management in the construction industry. Journal of Engineering, Design and Technology, 23(2), 458–476. https://doi.org/10.1108/JEDT-11-2022-0577

Ussher-eke, D. (2025). Building a cyber-resilient workforce through HR and IT Collaboration. 27(June), 706–716.

Wandira, R., & Fauzi, A. (2022). TAM Approach: Effect of Security on Customer Behavioral Intentions to Use Mobile Banking. Daengku: Journal of Humanities and Social Sciences Innovation, 2(2), 192–200. https://doi.org/10.35877/454ri.daengku872

Yeo, L. H., & Banfield, J. (2022). Human Factors in Electronic Health Records Cybersecurity Breach: An Exploratory Analysis. Perspectives in Health Information Managemen, 19(Spring), 1i.

Downloads

Published

2026-03-30

How to Cite

Wayan Lasmi, N., Komang Widhya Sedana Putra P, & Wayan Sri Maitri. (2026). Cybersecurity Risk Management: Integrating Technology And Digital Security Awareness: English. International Journal of Economics, Science, and Education, 3(2), 63–72. https://doi.org/10.65254/ijese.v3i2.77

Similar Articles

<< < 1 2 3 4 > >> 

You may also start an advanced similarity search for this article.