Cybersecurity in higher education institutions: An analysis from the perspective of Protection Motivation Theory

Authors

DOI:

https://doi.org/10.33010/ie_rie_rediech.v16i0.2271

Keywords:

cybersecurity, behavior, higher education, data protection, Protection Motivation Theory

Abstract

The importance of cybersecurity in the education sector lies in protecting sensitive data and information and maintaining a safe and reliable environment for students, faculty, and administrative staff. This research aims to analyze the factors influencing cybersecurity behavior of employees in higher education institutions in Northeastern Mexico. Protection Motivation Theory is used to understand the motivations and decisions related to digital security practices. For the method, 159 surveys were analyzed using Partial Least Squares Structural Equation Modeling (PLS-SEM). Results reveal that cybersecurity awareness positively influences both self-efficacy and response efficacy. Perceived severity and response self-efficacy are significant predictors of cybersecurity behavior. Interestingly, protection habit positively relates to self-efficacy but not to response efficacy. Moreover, no significant relationship was found between response efficacy and cybersecurity behavior. The findings emphasize the need for a holistic approach that considers individual and organizational factors to promote effective security practices within the Mexican educational context.

Author Biographies

Francisco Isaí Morales Sáenz, Universidad Autónoma de Tamaulipas, México

Profesor-Investigador de la Facultad de Comercio y Administración Victoria de la Universidad Autónoma de Tamaulipas, México. Es Maestro en Dirección Empresarial por la Universidad Autónoma de Tamaulipas y actualmente cursa el Doctorado en Ciencias Administrativas en la misma institución. Su línea de investigación se enfoca en las tecnologías de información en las organizaciones. En el ámbito de la divulgación científica, ha publicado artículos en revistas de alto impacto a nivel nacional e internacional.

José Melchor Medina Quintero , Universidad Autónoma de Tamaulipas, México

Profesor-Investigador de la Facultad de Comercio y Administración Victoria de la Universidad Autónoma de Tamaulipas, México. Es Doctor en Sistemas de Información de la Empresa por la Universidad Politécnica de Madrid, España. Experto en tecnologías y sistemas de información. Líder del Cuerpo Académico Consolidado “Tecnologías de Información y Estrategia”. Ha escrito 47 artículos indexados en Latindex y Scielo, 29 artículos académicos publicados en revistas de alto impacto tanto nacionales como internacionales y tres libros.

Demian Abrego Almazan, Universidad Autonoma de Tamulipas, México

(Autor de correspondencia). Profesor-Investigador de la Facultad de Comercio y Administración Victoria de la Universidad Autónoma de Tamaulipas, México. Es Doctor en Ciencias Administrativas y profesor de tiempo completo en la UAT, donde imparte clases en licenciatura, maestría y doctorado. En el ámbito de la divulgación científica, ha publicado artículos en revistas de alto impacto a nivel nacional e internacional. Además es coautor de ponencias, libros y capítulos de libros enfocados en tecnologías, sistemas de información, administración estratégica y estadística multivariante. Desde el año 2017 forma parte del Sistema Nacional de Investigadoras e Investigadores, Nivel 2.

References

Alhelaly, Y., Dhillon, G., y Oliviera, T. (2024). Mobile identity protection: The moderation role of self-efficacy. Australasian Journal of Information Systems, 28. https://doi.org/10.3127/ajis.v28.4397

Alsharida, R. A., Al-rimy, B. A. S., Al-Emran, M., y Zainal, A. (2023). A systematic review of multi perspectives on human cybersecurity behavior. Technology in Society, 73, 102258. https://doi.org/10.1016/j.techsoc.2023.102258

Alsharif, M., Mishra, S., y AlSheri, M. (2022). Impact of human vulnerabilities on cybersecurity. Computer Systems Science and Engineering, 40(3), 1153-1116. https://doi.org/10.32604/csse.2022.019938

Arriaza, R. E., Mutch, C., y Mutch, N. T. (2021). When Covid-19 is only part of the picture: Caring pedagogy in higher education in Guatemala. Pastoral Care in Education, 39(3), 236-249. https://doi.org/10.1080/02643944.2021.1938648

Atta, A., Zaman, N. U., y Khan, H. H. (2021). Battling the threat of workplace harassment: An appraisal based on Protection Motivation Theory. Journal of Asian Finance Economics and Business, 8(6), 491-504. https://doi.org/10.13106/jafeb.2021.vol8.no6.0491

Bezbaruah, K. (2022). Information, communication and technology and its application in teaching learning process of philosophy. International Journal of Early Childhood Special Education, 14(3), 3143-3146. https://doi.org/10.1207/s15566935eed1703_1

Caldarulo, M., Welch, E. W., y Freeney, M. K. (2022). Determinants of cyber-incidents amog small and medium US cities. Government Information Quarterly, 39(3), 101703. https://doi.org/10.1016/j.giq.2022.101703

Chin, W. W. (1998). The partial least squares approach to structural equation modeling. Modern Methods for Business Research, 295(2), 295-336.

CUDI [Corporación Universitaria para el Desarrollo de Internet] (2021, jul. 1). Resultados de la Encuesta de Ciberseguridad en IES Miembros CUDI. http://repositorio.cudi.edu.mx/handle/11305/2186

Cummings, C. L., Rosenthal, S., y Kong, W. Y. (2021). Secondary Risk Theory: Validation of a novel model of protection motivation. Risk Analysis, 41(1), 204-220. https://doi.org/10.1111/risa.13573

Dawadi, S., Giri, R. A., y Simkhada, P. (2020). Impact of COVID-19 on the education sector in Nepal: Challenges and coping strategies [Prepint]. Sage Submissions. https://doi.org/10.31124/advance.12344336.v1

Dijkstra, T. K., y Henseler, J. (2015). Consistent and asymptotically normal PLS estimators forlinear structural equations. Computational Statistics & Data Analysis, 81(1), 10-23.

Domínguez, R. A. (2021). Ciberdelitos, alarma mundial y políticas de información en ciberseguridad: un acercamiento al contexto de Tamaulipas. En R. A. Domínguez, Problemas sociales de información, comunicación e interacción en espacios digitales: panorama expuesto en una sociedad pandémica (pp. 12-37). El Colegio de Tamaulipas.

Dzyana, H., Pasichnyk, V., Garmash, Y., Naumko, M., y Didych, O. (2022). The system for ensuring the information security of the organization in the context of Covid-19 based on Public. Private partnership. IJCSNS International Journal of Computer Science and Network Security, 22(6), 19-24. https://doi.org/10.22937/IJCSNS.2022.22.6.4

ENISA [European Union Agency for Cybersecurity] (2018, feb. 6). Cyber security culture in organisations. https://www.enisa.europa.eu/publications/cyber-security-culture-in-organisations

FBI [Federal Bureau of Investigation] (2022). Internet Crime Report 2022. https://www.ic3.gov/Media/PDF/AnnualReport/2022_IC3Report.pdf

Fornell, C., y Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39-50. https://doi.org/10.2307/3151312

Fouad, N. S. (2022). The security economics of EdTech: Vendors’ responsibility and the cybersecurity challenge in the education sector. Digital Policy Regulation and Governance, 24(3), 259-273. https://doi.org/10.1108/DPRG-07-2021-0090

Furnell, S., Haney, J., y Theofanos, M. (2021). Pandemic parallels: What can cybersecurity learn from COVID-19? Computer, 54(3). https://doi.org/10.1109/MC.2020.3046888

Geil, A., Sagers, G., Spaulding, A. D., y Wolf, J. R. (2018). Cyber security on the farm: an assessment of cyber security practices in the United States agriculture industry. International Food and Agribusiness Management Review, 21(3), 317-334. https://doi.org/10.22434/IFAMR2017.0045

GOV.UK (2022, jul. 11). Official Statistics: Educational institutions findings annex - Cyber Security Breaches Survey 2022. https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2022/educational-institutions-findings-annex-cyber-security-breaches-survey-2022#appendix-a-further-information

Hair, J., Hult, T., Ringle, C., Sarstedt, M., Castillo, J., Cepeda, G., y Roldán, J. (2019). Manual de Partial Least Squares Structural Equation Modeling (PLS-SEM). Sage.

Hasan, S., Ali, M., Kurnia, S., y Thurasamy, R. (2021). Evaluating the cyber security readiness of organizations and it influence on performance. Journal of Information Security and Applications, 58, 102726. https://doi.org/10.1016/j.jisa.2020.102726

Hernández, A. (2021, mar. 31). Policía de Tamaulipas recibe 2 mil 300 denuncias por delitos cibernéticos. Milenio. https://www.milenio.com/policia/tamaulipas-policia-recibe-2-mil-300-denuncias-delitos-internet

Hina, S., Selvam, D. D., y Lowry, P. B. (2019). Institutional governance and protection motivation: Theoretical insights into shaping employees’ security compliance behavior in higher education institutions in the developing world. Computers & Security, 87, 101594. https://doi.org/10.1016/j.cose.2019.101594

Holgeid, K. K., Krogstie, J., Mikalef, P., Saur, E. E., y Sjoberg, D. (2022). Benefits management and information technology work distribution. IET Software, 16(4), 438-454. https://doi.org/10.1049/sfw2.12062

Hong, Y., y Furnell, S. (2021). Understanding cybersecurity behavioral habits: Insights from situational support. Journal of Information Security and Applications, 57, 102710. https://doi.org/10.1016/j.jisa.2020.102710

Ivari, N., Sharma, S., y Ventä-Olkkonen, L. (2020). Digital transformation of everyday life – How COVID-19 pandemic transformed the basic education of the young generation and why information management research should care? International Journal of Informacion Management, 55, 102183. https://doi.org/10.1016/j.ijinfomgt.2020.102183

Jansen, J., y Van Schaik, P. (2018). Testing a model of precautionary online behaviour: The case of online banking. Computers in Human Behavior, 87, 371-383. https://doi.org/10.1016/j.chb.2018.05.010

Kennison, S. M., y Chan-Tin, E. (2020). Taking risk with cybersecurity: Using knowledge and personal characteristics to predict self-reported cybersecurity behaviors. Frontiers in Psychology, 11, 546546. https://doi.org/10.3389/fpsyg.2020.546546

Khando, K., Gao, S., Islam, S. M., y Salman, A. (2021). Enhancing employees information security awareness in private and public organisations: A systematic literature review. Computers & Society, 106, 102267. https://doi.org/10.1016/j.cose.2021.102267

Kim, B. J., Kim, M. J., y Lee, J. (2024). Examining the impact of work overload on cybersecurity behavior: highlighting self-efficacy in the realm of artificial intelligence. Current Psychology, 43, 17146-17162. https://doi.org/10.1007/s12144-024-05692-4

Kondruss, B. (2023). Cyber attacks on universities. University ransomware attacks & data breaches worldwide. KonBriefing. https://konbriefing.com/en-topics/cyber-attacks-universities.html

Koohang, A., Anderson, J., Nord, J. H., y Paliszkiewicz, J. (2020). Building an awareness-centered information security policy compliance model. Industrial Management & Data Systems, 120(1), 231-247. https://doi.org/10.1108/IMDS-07-2019-0412

Lahiri, A., Jha, S. S., Chakraborty, A., Dobe, M., y Dey, A. (2021). Role of threat and coping appraisal in protection motivation for adoption of preventive behavior during COVID-19 pandemic. Frontiers in Public Healt, 9, 678566. https://doi.org/10.3389/fpubh.2021.678566

Li, L., He, W., Xu, L., Ash, I., Anwar, M., y Yuan, X. (2019). Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior. International Journal of Information Management, 45, 13-24. https://doi.org/10.1016/j.ijinfomgt.2018.10.017

Li, L., Xu, L., y He, W. (2022). The effects of antecedents and mediating factors on cybersecurity protection behavior. Computers in Human Behavior Reports, 5, 100165. https://doi.org/10.1016/j.chbr.2021.100165

Microsoft (2023). Microsoft Security Intelligence. https://www.microsoft.com/en-us/wdsi/threats

Morales-Sáenz, F. I., Medina-Quintero, J. M., y Rodríguez, F. O. (2024a). Seguridad digital y violencias estructurales: perspectivas y desafíos contemporáneos. Dilemas Contemporáneos: Educación, Política y Valores, 12(esp.). https://doi.org/10.46377/dilemas.v12i.4486

Morales-Sáenz, F. I., Medina-Quintero, J. M., y Reyna-Castillo, M. (2024b). Beyond data protection: Exploring the convergence between cybersecurity and sustainable development in business. Sustainability, 16(14), 5884. https://doi.org/10.3390/su16145884

Pranggono, B., y Arabo, A. (2020). COVID-19 pandemic cybersecurity issues. Internet Technology Letters, 4(2). https://doi.org/10.1002/itl2.247

Priestman, W., Anstis, T., Sebire, I. G., Sridharan, S., y Sebire, N. J. (2019). Phishing in healthcare organisations: Threats, mitigation and approaches. BMJ Health & Care Informatics, 26(1), e100031. https://doi.org/10.1136/bmjhci-2019-100031

Rajab, M., y Eydgahi, A. (2019). Evaluating the explanatory power of theoretical frameworks on intention to comply with information security policies in higher education. Computers & Security, 80, 211-223. https://doi.org/10.1016/j.cose.2018.09.016

Rhee, H., Cheongtag, K., y Ryu, Y. U. (2009). Self-efficacy in information security: Its influence on end users’ information security practice behavior. Computers & Security, 28(8), 816-826. https://doi.org/10.1016/j.cose.2009.05.008

Rogers, R. W. (1983). Cognitive and physiological processes in fear appeals and attitude change: A revised Theory of Protection Motivation. En J. Cacioppo y R. Petty, Social psychophysiology (pp. 153-177). Guildford Press.

Saeed, S. (2023). Education, online presence and cybersecurity implications: A study of information security practices of computing students in Saudi Arabia. Sustainability, 15(12), 9426. https://doi.org/10.3390/su15129426

Shahbaznezhad, H., Kolini, F., y Radhidirad, M. (2021). Employees’ behavior in phishing attacks: What individual, organizational, and technological factors matter? Journal of Computer Information Systems, 61(6), 539-550. https://doi.org/10.1080/08874417.2020.1812134

Siponen, M., Mahmood, M. A., y Pahnila, S. (2014). Employees’ adherence to information security policies: An exploratory field study. Information & Management, 51(2), 217-224. https://doi.org/10.1016/j.im.2013.08.006

SmartPLS (2022). SmartPLS 4. https://www.smartpls.com

Sulaiman, N. S., Fauzi, M. A., Hussain, S., y Wider, W. (2022). Cybersecurity behavior among government employees: The role of Protection Motivation Theory and responsibility in mitigating cyberattacks. Information, 13(17), 9528. https://doi.org/10.3390/su13179528

Taborda, M. A., Collazos, F. A., Marulanda, C. A., y Villalba, K. M. (2021). Dynamic cybersecurity model based on ISO standards for higher education institutions in Colombia. Ingeniería Solidaria, 17(3). https://doi.org/10.16925/2357-6014.2021.03.05

Torten, R., Reaiche, C., y Boyle S. (2018). The impact of security awareness on information technology professionals’ behavior. Computers & Security, 79, 68-79. https://doi.org/10.1016/j.cose.2018.08.007

Tsai, H. Y., Jiang, M., Alhabash, S., LaRose, R., Rifon, N. J., y Cotten , S. R. (2016). Understanding online safety behaviors: A Protection Motivation Theory perspective. Computers & Security, 59, 138-150. https://doi.org/10.1016/j.cose.2016.02.009

Ulven, J. B., y Wangen, G. (2021). A systematic review of cybersecurity risks in higher education. Future Internet, 13(2). https://doi.org/10.3390/fi13020039

Valiente-Lopez, N., y Tejera-Reyte, C. C. (2022). Information and communication technologies as teaching- learning means. Luz, 21(1), 28-37.

Vance, A., Siponen, M., y Pahnila, S. (2012). Motivating is security compliance: Insights from Habit and Protection Motivation Theory. Information & Management, 49(3-4), 190-198. https://doi.org/10.1016/j.im.2012.04.002

Vrhovec, S., y Mihelic, A. (2021). Redefining threat appraisals of organizational insiders and exploring the moderating role of fear in cyberattack protection motivation. Computer & Security, 106, 102309. https://doi.org/10.1016/j.cose.2021.102309

Published

2025-03-03

How to Cite

Morales Sáenz, F. I. ., Medina Quintero , J. M., & Abrego Almazan, D. (2025). Cybersecurity in higher education institutions: An analysis from the perspective of Protection Motivation Theory. IE Revista De Investigación Educativa De La REDIECH, 16, e2271. https://doi.org/10.33010/ie_rie_rediech.v16i0.2271