International Conference on Emerging Technologies in Electronics, Computing and Communication (ICETECC) 2022




Conference Proceedings

The International Conference on Emerging Technologies in Electronics, Computing and Communication 2022

(ICETECC`22)

The Desire for Cybersecurity: Factors Influencing User Adoption of Security Practices in the Context of the AIDUA Framework

Md Mehedi Hasan Emon1; Tahsina Khan2*; Kh. Mustafizur Rahman3; Avishek Nath1;
1American International University- Bangladesh
2Bangladesh University of Professionals (BUP)
3World University of Bangladesh


ABSTRACT
This research examines the determinants affecting user adoption of cybersecurity practices by synthesizing elements from the AIDUA (Awareness, Interest, Desire, Understanding, and Action) Theory. The study investigates the role of Perceived Threat, self-efficacy, social influence, perceived ease of use, Perceived Usefulness, attitudes towards security practices, and Cybersecurity Awareness on the adoption of secure behaviors. A quantitative methodology was used, using a standardized questionnaire disseminated to a varied sample. Data analysis using Structural Equation Modeling (SEM) to assess the correlations among the variables. The results indicate that PT, SE, PU, and ATSP strongly affect user adoption of cybersecurity measures. CSA has identified as a crucial mediator, especially between Perceived Usefulness and adoption, although other mediating associations were insignificant. These findings underscore the need of improving awareness initiatives and developing user-friendly technologies to promote security practices. The study's constraints are its cross-sectional design, dependence on self-reported data, and regional emphasis, which may restrict generalizability. Practical ramifications necessitate that governments and organizations emphasize user-centric methodologies and use social influence to advocate for safe practices. The social consequences emphasize the need of cybersecurity in safeguarding people and communities from digital dangers, hence fostering confidence in online systems. This study's novelty stems from its amalgamation of AIDUA structures, offering a holistic framework for comprehending cybersecurity adoption, hence advancing theory and providing practical answers.



-->