233
i A Study of Cybersecurity for Telecommunication Services Concerning Smartphone Users in Thailand Varin Khera BIT Central Queensland University PG Cert Monash University M.S. Assumption University This Thesis is presented for the Degree of Doctor of Information Technology 2018

A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

  • Upload
    others

  • View
    15

  • Download
    0

Embed Size (px)

Citation preview

Page 1: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

i

A Study of Cybersecurity for Telecommunication Services

Concerning Smartphone Users in Thailand

Varin Khera

BIT Central Queensland University

PG Cert Monash University M.S. Assumption University

This Thesis is presented for the Degree of Doctor of Information Technology

2018

Page 2: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

ii

DECLARATION PAGE

I declare that this thesis is my own account of my research and contains as its main

content work which has not previously been submitted for a degree at any tertiary

education institutions.

Varin Khera

Page 3: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

iii

ABSTRACT

Smartphones are powerful handheld computers that allow users to connect in real-time

with others around the globe through high quality phone calls, and data exchange. They

are 2.1 billion smartphones users worldwide in 2016 with this number expected to grow

to almost 3 billion by the end of 2020 (www.statista.com). This enormous uptake

together with valuable information contained in smart phones makes them an attractive

target for attackers to exploit.

This study was conducted to indicate the abilities and behaviours of Thai smartphone

users in protecting their smartphones from cyber threats. The objectives of this study

are: (1) to investigate cyber threats on smartphones and trends; (2) to investigate

cybersecurity handlings for smartphone users in Thailand; (3) to investigate general

behaviours and protection behaviours of Thai smartphone users; and (4) to analyze

causal relationship among constructs of the proposed protection behaviour model.

This study utilizes mixed methods research, qualitative and quantitative studies, to

collect and analyze the data. Document research was performed in the qualitative part.

For the quantitative study, a total of 720 samples from smartphone users were collected

with cluster sampling technique from main regions of Thailand. Data were then

analyzed with descriptive statistic, T-Test, and ANOVA to create a model, based on

Roger, R.W. (1983)’s Protection Motivation Theory (PMT), with the Structural

Equation Modeling (S.E.M.) technique to find the factors that affect behaviour of Thai

in protecting their smartphones from cyber threats.

Based on the collected data, the main findings of this study show that: (1) threats on

smartphones that can be caused by attackers - malware attacks, wireless network

attacks, denial of service attacks, break-in attacks, and threats due to unawareness of

users themselves such as malfunctions, phishing, phone thefts/loses, and platform

alterations; (2) identification of the agent responsible for providing incident response

to computer security threats, the Thailand Computer Emergency Response Team or

ThaiCERT, and their services should be extended to the whole of Thailand; (3) the

overall protection behaviours of Thai people were in good level; (4) females had less

degree in protecting themselves from mobile threats than males; (5) people whose ages

Page 4: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

iv

between 41 – 60 had less degree in protecting themselves from mobile threats than the

other age-groups; (6) people who have never experienced with phone virus/malware

infection, who have never used public Wi-Fi, and who have never transferred money

using Internet banking on their phones had less degree in protecting themselves from

mobile threats than the other groups; and (7) the protection behaviour model of Thai

smartphone users consisted of the following variables: Perceived Vulnerability, Self-

efficacy, Social Influence, Threat Appraisal, Coping Appraisal, and Protection

Motivation and Protection Behaviours. Among these, only variables that had impacts

on Protection Behaviour of Thai smartphone users are: Self-efficacy, Social Influence,

Coping Appraisal, and Protection Motivation. The findings provide strategic directions

for the education and raising of awareness among smartphone users in Thailand so as

to strengthen their protection against potential threats.

Page 5: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

v

ACKNOWLEDGEMENTS

First and foremost, I would like to acknowledge my principal supervisor,

Emeritus Professor Lance Chun Che Fung who has provided invaluable and wise

guidance in the development of my research work. Without his support, constant

guidance and push for me to complete, I would have never completed this enormous

work.

I would especially like to acknowledge my lovely wife and parents whose supports and

unconditional love gave me the drive to pursue this near impossible and long enduring

dream.

I would like to thank my manager, Mr Stan Fiala, and my good friend and advisor, Dr.

Suthee Chantrapunth, for their support in helping me through this long and extensive

program.

Page 6: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

vi

CONTRIBUTION AND LIST OF PUBLICATIONS

Journal Papers

(J1) From Chapter 2 - Khera, V., Chantrapunth, S., & Fung, C., (2017). “Protection

Motivation Theory Model for Smartphone User.” RTAFA Journal of

Humanities and Social Sciences. Year 13 Volume 13.

Contribution to thesis - The paper proposes a protection behaviour model which

is based on Roger, R.W. (1983)’s Protection Behaviour Model (PMT) and

related studies. This model is useful for analyzing protection behaviour of

people who use internet connected devices (such as desktops, laptops,

smartphones, or tablets) in protecting themselves from cyber threats.

(J2) From Chapter 4 - Khera, V., Chantrapunth, S., & Fung, C., (2017). “Behaviours of

Thai in Protecting their Smartphones from Cyber Threats.” Volume 8, Number 2,

May – August 2017. National Defense Studies Institute Journal. pp.86-100.

Contribution to thesis – The paper compares mean values of the proposed

model’s constructs among demographic and characteristic of sample. The

results identified the groups of smartphone users, with low constructs’ mean

values, that have low security, and need to be concerned more in order to raise

their behaviour in protecting their phones from threats.

Conference Proceedings

(P1) From Chapter 5 - Khera, V., Chantrapunth, S., & Fung, C., (2017). “Developing

a Protection Behaviour Model for Smartphone User Security Assessment.” 8th

International Science, Social Science, Engineering and Energy Conference

(iSEEC 2017), 15th -17th March, 2017. Phranakhon Rajabhat University. ID

Paper: 161212160068.

Contribution to thesis – The paper details the result of testing the proposed

theoretical PMT model with empirical data which are smartphone users in

Thailand. The tested model shows the significant causal relationships among

the model’s constructs. The result also shows that two exogenous constructs,

Self-efficacy and Social Influence, are important in driving the behaviour of

Thai people in protecting themselves from smartphone threats.

Page 7: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

vii

(P2) From Chapter 2 - Khera V., Fung C., Chaisiri S. “A Review of Security Risks in the

Mobile Telecommunication Packet Core Network.” Advances in Information

Technology. IAIT 2013. Communications in Computer and Information Science,

vol. 409. Springer, Cham (DOI: https://doi.org/10.1007/978-3-319-03783-7_9)

Contribution to thesis – This paper reviews the security risks in the mobile core

network and then provides a recommendation on how to address these risks

using the ITU X.805 reference framework. This will benefit mobile operators

and network designers to secure the mobile packet core system.

(P3) From Chapter 6 - Fung, C.C., Khera, V., Depickere, A., Tantatsanawong, P. and

Boonbrahm, P. (2008). “Raising information security awareness in digital ecosystem

with games - a pilot study in Thailand.” In: 2nd IEEE International Conference on

Digital Ecosystems and Technologies, 2008. DEST 2008., 26-29 Feb. 2008,

Phitsanulok, Thailand pp. 375-380. (DOI: 10.1109/DEST.2008.4635145)

Contribution to thesis – This paper reports an initial pilot study on the use of a

simulation game for raising the awareness and knowledge on Information

Security among a small group of Thai students. The paper proves that simulation

can enhance and stimulate cyber security learning amongst young population,

therefore any government sponsored cyber security training program for smart

phones users should incorporate simulation to have the best impact on

participants

Page 8: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

viii

TABLE OF CONTENTS

Page

DECLARATION PAGE ii

ABSTRACT iii

ACKNOWLEDGEMENTS v

CONTRIBUTION AND LIST OF PUBLICATIONS vi

TABLE OF CONTENTS viii

LIST OF TABLES xii

LIST OF FIGURES xiv

ACRONYMS AND SYMBOLS xvii

CHAPTER 1 INTRODUCTION 1

1.1 Background of the Study 1

1.2 Statement of the Problem 2

1.3 Objectives of the Study 3

1.4 Research Questions 4

1.5 Research Methodology 5

1.6 Significance of the Study 5

1.7 Benefits of the Study 5

1.8 Scope of the Study 6

1.9 Limitations of this Study 7

1.10 Workflow of this Study 7

1.11 Organization of Thesis 9

1.12 Definition of Terms 10

1.13 Conclusion 11

CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12

2.1 Concepts of Cyber Threat and Cyber Security 12

2.2 Cyber Threats on Smartphones and Trends 13

2.2.1 Types of Cyber Threats and Effects 13

2.2.2 Statistic of Malware Attacks on Smartphones and Trend 14

2.3 Smartphone Threats Handling in Thailand 17

2.3.1 Organization Handling Cyber Threat in Thailand 17

2.3.2 Security on Mobile Telecommunication Network 19

Page 9: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

ix

Page

2.4 Behaviours of Smartphone Users 23

2.5 Protection Motivation Theory 23

2.6 Related Studies 25

2.6.1 Study by Liang & Xue (2009) 25

2.6.2 Study by Srisawang, Thongmak & Ngarmyarn (2015) 27

2.6.3 Study by Tu, Z.L. & Yuan, Y.F. (2012) 28

2.7 Proposed Theoretical PMT Model 30

2.7.1 Selected Constructs 30

2.7.2 Determining Relationships between Constructs 33

2.7.3 The Proposed Protection Motivation Model and Hypotheses 34

2.8 Operational Definitions 37

2.9 Conclusion 38

CHAPTER 3 SURVEY RESEARCH DESIGN 39

3.1 Population and Sampling 39

3.2 Protocol for Survey 40

3.3 Questionnaire Construction and Scale 40

3.3.1 Questionnaire Construction 40

3.3.2 Measuring Scale 44

3.4 Validity and Reliability Testing 45

3.4.1 Internal Validity Testing 45

3.4.2 Reliability Testing 45

3.5 Data Analysis 46

3.6 Conclusion 47

CHAPTER 4 DEMOGRAPHICS AND BEHAVIOURS OF THAI

SMARTPHONE USERS

48

4.1 Smartphone Users in Thailand 48

4.1.1 Demographic data of Smartphone Users in Thailand 48

4.1.2 Demographic data of Smartphone Users by Region 51

4.2 Behaviours of Thai Smartphone Users 56

4.2.1 Overall General Behaviours of Thai Smartphone Users 56

Page 10: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

x

Page

4.2.2 General Behaviours of Smartphone Users by Region 58

4.2.3 General Behaviours of Smartphone Users by Age 64

4.3 Overall Means of Constructs of Protection Behaviour Model 71

4.4 Compare Means of Constructs of Protection Behaviours Model 72

4.4.1 Means of Constructs by Gender 72

4.4.2 Means of Constructs by Age 73

4.4.3 Means of Constructs by Region 77

4.4.4 Means of Constructs by Virus Infection 78

4.4.5 Means of Constructs by Using Public Wi-Fi 79

4.4.6 Means of Constructs by Using Money Transfer Services via

Smartphones

80

4.5 Conclusion 81

CHAPTER 5 THE PMT MODEL OF THAI SMARTPHONE USERS 82

5.1 Testing Hypotheses for the Proposed Theoretical Model 82

5.2 Preparing the Model with AMOS Software 84

5.3 Testing Basic Assumptions of Structural Equation Modeling 85

5.3.1 Valid Sample Size for Structural Equation Modeling 85

5.3.2 Normality of Distribution of Data 86

5.4 Testing the Goodness of Fit of the Model 89

5.4.1 Goodness of Fit of the Measurement Model 89

5.4.2 Goodness of Fit of the Structural Equation Modeling 91

5.5 The Result PMT Model of Thai Smartphone Users 93

5.5.1 Results of Testing Hypotheses and the Final Model 93

5.5.2 Direct and Indirect Effects among PMT Constructs 95

5.6 Conclusion 97

CHAPTER 6 SUMMARY AND ANSWERS OF RESEARCH QUESTIONS 98

6.1 Recap of Objectives and Methodology 98

6.2 Summary of the Results 99

6.2.1 Answer for Research Question #1.1 99

6.2.2 Answer for Research Question #1.2 101

Page 11: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

xi

Page

6.2.3 Answer for Research Question #2.1 102

6.2.4 Answer for Research Question #2.2 102

6.2.5 Answer for Research Question #3.1 103

6.2.6 Answer for Research Question #3.2 104

6.2.7 Answer for Research Question #3.3 108

6.2.8 Answer for Research Question #4.1 116

6.2.9 Answer for Research Question #4.2 117

6.3 Conclusion 118

CHAPTER 7 DISCUSSION, CONCLUSION, AND RECOMMENDATION 119

7.1 Discussion and Conclusion 119

7.1.1 Smartphone Threats and Trend 119

7.1.2 Computer Security Incident Response Team 120

7.1.3 Secured Telecommunication Network for Smartphone 120

7.1.4 Protection Behaviour Model of Thai Smartphone Users 121

7.1.5 Factors’ Impact Values on Protection Behaviour 122

7.1.6 Groups with Low Protection Motivation and Behaviour 123

7.1.7 Increasing Protection Behaviour of Smartphone Users 124

7.2 Recommendations 127

7.3 Suggestions for Future Studies 130

BIBLIOGRAPHY 131

APPENDIX 136

APPENDIX A Questionnaire (THAI) 136

APPENDIX B Questionnaire (ENGLISH) 143

APPENDIX C Mean Difference Test 148

APPENDIX D Confirmatory Factor Analysis 189

APPENDIX E Structural Equation Modeling Analysis 191

APPENDIX F Examples of Increasing Self-efficacy and Social

Influences for Smartphone Users

210

Page 12: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

xii

LIST OF TABLES

Page

Table 2.1: Threats against Smartphones 13

Table 2.2: Symptoms of Smartphone Malwares 16

Table 2.3: Security Dimensions and risk Mitigations 22

Table 2.4: Summary of Constructs from Reviewed Theories and Related Studies 30

Table 2.5: Selected Constructs and References 32

Table 2.6: Relationships between Constructs and References 33

Table 2.7: Hypotheses for Testing the Theoretical Model 36

Table 3.1: Questionnaire Construction 41

Table 3.2: Result Interpretation Table 44

Table 3.3: Reliability of the Questionnaire 46

Table 4.1: Demographic Data of the Samples 49

Table 4.2: Number and Percentage of Sample’s Gender by Region 51

Table 4.3: Number and Percentage of Sample’s Age by Region 52

Table 4.4: Number and Percentage of Sample’s Education by Region 53

Table 4.5: Number and Percentage of Sample’s Education by Region 54

Table 4.6: Number and Percentage of Sample’s Monthly Income by Region 55

Table 4.7: Number and Percentage of Sample’ Behaviour in Using

Smartphone

56

Table 4.8: Number and Percentage of Preferred Phone Service by Region 59

Table 4.9: Number and Percentage of Operating System Usage by Region 60

Table 4.10: Number and Percentage of Phone Loss by Region 61

Table 4.11: Number and Percentage of Phone Infected by Virus by Region 62

Table 4.12: Number and Percentage of People who Use Public Wi-Fi by Region 63

Table 4.13: Number and Percentage of People who Transfer Money through

their Phones by Region

64

Table 4.14: Number and Percentage of Phone Service Usage by Age 65

Table 4.15: Number and Percentage of Operating System Usage by Age 66

Table 4.16: Number and Percentage of Phone Loss by Age 67

Table 4.17: Number and Percentage of Phone Infected by Virus of by Age 68

Page 13: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

xiii

Page

Table 4.18: Number and Percentage of People who Use Public Wi-Fi by Age 69

Table 4.19: Number and Percentage of People who Transferred Money by Phone 70

Table 4.20: Protection Behaviour Constructs of Smartphone Users in Thailand 71

Table 5.1: Null and Alternative Hypotheses for Testing the Theoretical Model 83

Table 5.2: Variables Used in the Hypothesized Model 85

Table 5.3: Number of Parameters of the Hypothesized Model 86

Table 5.4: Skewness and Kurtosis of Data 86

Table 5.5: Goodness of Fit Statistics of the Measurement Model 91

Table 5.6: Goodness of Fit Statistics for Structural Equation Modeling 92

Table 5.7: Relationships among Variable of the Hypothesized Model 93

Table 5.8: Summary of the Testing Hypothesis Ha – Hk 94

Table 5.9: Direct and Indirect Effects among Variables of the Model 95

Table 6.1: Summary of Threats Caused by Attackers 100

Table 6.2: Cyber Threats and Effects Caused from User’s Unawareness 100

Table 6.3: Summary of General Behaviours of Smartphone Users by Region 106

Table 6.4: Summary of General Behaviours of Smartphone Users by Age 107

Table 6.5: Summary of Overall Means of the Model’s Constructs 109

Table 6.6: Summary of Mean Comparisons of the Model’s Constructs 115

Table 6.7: Total Effects on Protection Behaviour Construct 118

Table 7.1: Summary of the Recommendations 127

Page 14: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

xiv

LIST OF FIGURES

Page

Figure 1.1: Workflow of this study 8

Figure 2.1: New Mobile Malware Threat Statistics 15

Figure 2.2: Distribution of Attacks by Malware Types (August 2013 – July

2014)

16

Figure 2.3: Thailand Computer Emergency Readiness Team (ThaiCERT) 18

Figure 2.4: Incident Survey 19

Figure 2.5: CIA Triad 20

Figure 2.6: ITU X.805 Framework 22

Figure 2.7: Cognitive Process of Protection Motivation Theory 25

Figure 2.8: The Variance Theory View of TTAT 26

Figure 2.9: The Proposed Research Model of Srisawang et al. (2015) 28

Figure 2.10: The Proposed Research Model of Tu, Z.L. & Yuan, Y.F. (2012) 29

Figure 2.11: The Proposed Protection Motivation Model 35

Figure 2.12: The Proposed Theoretical Model of this Study 36

Figure 4.1: Percentage of Demographic Data 48

Figure 4.2: Percentage of Sample’s Gender by Region 51

Figure 4.3: Percentage of Sample’s Age by Region 52

Figure 4.4: Percentage of Sample’s Education by Region 53

Figure 4.5: Percentage of Sample’s Education by Region 54

Figure 4.6: Percentage of Sample’s Monthly Income by Region 55

Figure 4.7: Overall Behaviour of Smartphone Users 56

Figure 4.8: Percentage of Phone Service Usage by Region 58

Figure 4.9: Percentage of Operating System Usage by Region 59

Figure 4.10: Percentage of Phone Loss by Region 60

Figure 4.11: Percentage of Smartphones Infected by Virus in Each Region 61

Figure 4.12: Percentage of People who Use Public Wi-Fi by Region 62

Figure 4.13: Percentage of People who Transferred Money through their

Phones by Region

63

Figure 4.14: Percentage of Phone Service Usage by Age 65

Page 15: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

xv

Page

Figure 4.15: Percentage of Operating System Usage by Age 66

Figure 4.16: Percentage of Phone Loss by Age 67

Figure 4.17: Percentage of Phone Infected by Virus of Each Age Group 68

Figure 4.18: Percentage of People who Use Public Wi-Fi by Age 69

Figure 4.19: Percentage of People Who Transferred Money by Phone 70

Figure 4.20: Behaviours of Smartphone Users 71

Figure 4.21: Gender of Samples 72

Figure 4.22: Comparison of the Model Constructs by Gender 73

Figure 4.23: Age of Samples 73

Figure 4.24: Comparison of the Model Constructs by Age 74

Figure 4.25: Smartphone Users in BKK & Metropolitan and Upcountry 77

Figure 4.26: Comparison of the Model Constructs by Region 77

Figure 4.27: Number of People whose Phones were Infected with Malware 78

Figure 4.28: Comparison of Constructs between People whose Phones were

Infected with Malware and those who were not

78

Figure 4.29: Number of People who Used Public Wi-Fi 79

Figure 4.30: Comparison of Constructs between People who Used Public Wi-Fi

and who did not

79

Figure 4.31: Number of People who Transfer Money via Phones 80

Figure 4.32: Comparison of Constructs between People who Transfer

Money via Smartphone and who did not

80

Figure 5.1: Theoretical Model for Testing 82

Figure 5.2: Theoretical Model Created by The AMOS Software for Testing 84

Figure 5.3: Test of Fitness of the Measurement Model 90

Figure 5.4: Test of Fitness of the Structural Equation Model 92

Figure 5.5: Result Model 94

Figure 6.1: Mobile Malware Attack During August 2013 – July 2014 101

Figure 6.2: Summary of the Demographic of this Study 104

Figure 6.3: Summary of the Behaviours Thai of Smartphone Users by

Region

105

Page 16: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

xvi

Page

Figure 6.4: Behaviours of Smartphone Users by Region 106

Figure 6.5: Behaviours of Smartphone Users by Age 108

Figure 6.6: Overall Meal of Model’s Constructs 109

Figure 6.7: Mean Difference of Construct by Gender 110

Figure 6.8: Mean Differences of Constructs by Age 110

Figure 6.9: Mean Differences of Protection Behaviour by Age 111

Figure 6.10: Mean Differences of Self-efficacy by Age 111

Figure 6.11: Mean Difference of Constructs by Region 112

Figure 6.12: Mean Difference of Constructs by Malware Infection 113

Figure 6.13: Mean Difference of Constructs by Using Public Wi-Fi 114

Figure 6.14: Mean Difference of Constructs by Transferring Money via Phone 115

Figure 6.15: The Result Model of This Study 116

Figure 6.16: Total Effects on Protection Behaviour Constructs 118

Figure 7.1 The Result Model 121

Page 17: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

xvii

ACRONYMS AND SYMBOLS

Symbol Meaning

n Number of Sample

X Mean

% Percentage

sd Standard Deviation

F

t

Statistical F Value

Statistical t Value

p Probability

Sig. / p-value Significance Level

* Statistical Significance at .05 Level

** Statistical Significance at .01 Level

df Degree of Freedom

Beta Coefficient

ANOVA Analysis of Variance

DTACT DTAC & DTAC Trinet

BKK Bangkok

WI-FI Wi-Fi (Wireless Fidelity)

Page 18: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

1

CHAPTER 1

INTRODUCTION

Thailand has one of the highest smartphone penetration rate in Southeast Asia (National

Statistical Office of Thailand, 2014). It is imperative that a research is needed to

understand the potential vulnerability of smartphone users in Thailand. This research

addressed this need by focusing on understanding of the state of cyber awareness and

behaviours of Thai smartphone users with respect to protection of their devices from

cyber threats. The research also investigated cybersecurity measures provided by the

governmental agency for internet users.

As telecommunication services provide the communication channels for smartphones,

any weakness in the network can compromise the entire communication flows. Thus,

this study also investigated the issues and recommends a secure telecommunication

network to increase security for smartphone users from cyber threats. Both quantitative

and qualitative methodologies were applied in this study. Results of the study indicate

the essential awareness and behaviour of Thai smartphone users that needed to be

focused on.

Finally, the recommendations for increasing cybersecurity capacity for Thai agency in

dealing with cyber threats and appropriate security standard that should be implemented

in the telecommunication network are also provided.

1.1 Background of the Study

Today’s world is undergoing an age of transformation in which more and more people

and devices are interconnected. The fundamental changes that have brought about this

development is mainly due to the availability of high speed Third Generation (3G) and

Fourth Generation (4G) telecommunication networks, and the advancement of

powerful and user-friendly portable devices that allow easy access to the Internet,

making the worldwide network of information being accessible almost anytime and

anywhere.

Page 19: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

2

A smartphone is essentially a mini computer capable of making high quality calls,

taking photos, sharing data and location information, downloading new applications

and providing on demand access to information from the Internet. Smartphone is

becoming around the clock companion to provide access online and it has become an

essential element in modern societies. However, as users shared every detail such as

their whereabouts and what they do on the social media, the factor most overlooked is

that it also presents a single point of attack, anyone with access to a user’s smartphone

may be able to acquire a lot of personal information about the user’s behaviours and

activities. This could subsequently lead to illegal or criminal acts such as identity thefts.

In Thailand, the number of Smartphone user obtained from a survey in 2015 was

estimated at 42 . 8 M (Thailand Mobile Landscape, 2015( . Given the amount of cyber

risks associated with smart phone and the lack of awareness on the topics, it is therefore

important that a study is needed to gauge the actual awareness of the Thai population

towards cyber security in smartphone usage, by analyzing their behaviours and

protection measures being put in place, and the level of awareness towards utilization

of possible security practices. With such information, it will be possible to provide a

clearer picture of the situation and to recommend the appropriate ways forward on how

best government agencies or related organizations can do in orer to develop successful

cyber defence policies that will help to reduce the risks from cyber threats for

smartphone users.

1.2 Statement of the Problem

The number of mobile internet subscriptions via smartphone, tablet or any other device

with a cellular connection is reaching around 550 million by the end of 2022(Ericson,

2016). As more and more people rely on daily use of smartphones, cyber threats are

now targeting more on smartphone users (Ruggiero & Foote, 2011). The cyber security

landscape, thus, has now changed and the focus needs to be shifted towards

smartphones in addition to computers and laptops.

Majority of the research have been conducted on the technical aspect of security

whereas limited research has been conducted on the weakest link of the chain, which is

Page 20: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

3

the people (Hong et al., 2015). In particular, little has been done with respect to the

subject on how smartphone users in Thailand should adopt security processes to protect

themselves from cyber threats.

In order to bridge these gaps, this study was conducted and it was based on the

Protection Behaviour Theory Model (PMT) developed by Roger (1983). The model

focuses on studying patients’ fear appeals that affect their intentions and behaviour in

protecting themselves from ailments and diseases. Recently, the PMT has been applied

to a study on information system security (Choobineh et al., 2007). The PMT can

explain security behaviours of users and it provides a theoretical explanation as to why

people have intention in performing secure behaviours in detecting and preventing their

computers from cyber threats (Crossler, R. E., 2010)

In this research, the PMT model was adopted as the base theory to study the cyber risks

associated with smartphone users in Thailand. The aim of this study was to evaluate the

strength and weakness of the fear appeal of Thai smartphone users that influent their

intentions and behaviours in protecting their phones from cyber threats.

1.3 Objectives of Study

This study is designed to gain insights into smartphone threats, levels of security

measures adopted, and users’ behaviours, with an aim to promote successful changes

and developments in using smartphones in Thailand. The main purpose of this study is

to investigate the cyber threats and security in Thailand, law and regulations, security

handlings, and the awareness and behaviours of smartphone users in Thailand. The

study is divided into four objectives below so as to meet the above-mentioned purpose:

1) to investigate cyber threats on smartphones and trends;

2) to investigate cybersecurity handlings for smartphone users in Thailand;

3) to investigate general behaviours and protection behaviours of Thai

smartphone users; and

4) to analyze the causal relationship among constructs of the proposed

protection behaviour model.

Page 21: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

4

1.4 Research Questions

In order to achieve the objectives of this study, the following research questions and

sub-questions are established:

1) Research Questions for Objective #1, “to investigate cyber threats on

smartphones and trends”:

1.1) “What are the types of cyber threats that smartphone users are confronting?”

1.2) “What are the statistics on malware attacks on smartphones and trends in the

future?”

2) Research Questions for Objective #2, “to investigate cybersecurity handlings for

smartphone users in Thailand”

2.1) “Which organizations handle cybersecurity in Thailand?”

2.2) “What should telecommunication network operators in Thailand do to handle

cybersecurity for smartphones?”

3) Research Questions for Objective #3, “to investigate general behaviours and

protection behaviours of Thai smartphone users”

3.1) “What are demographic of smartphone users in Thailand?”

3.2) “What are the general behaviours of Thai people in using smartphones?”

3.3) “What are the protection behaviours of Thai smartphone users?”

4) Question for Objective #4, “to analyze causal relationship among constructs of the

proposed protection behaviour model”

4.1) “What is the protection behaviour model of Thai smartphone users?”

4.2) “What are degrees of direct and indirect effects between constructs of

protection behaviour model of Thai smartphone users?”

Page 22: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

5

1.5 Research Methodology

This study used mixed-method approach which comprised qualitative study and

quantitative study, together with data collection and analysis. For the qualitative study,

related documents and literatures were reviewed, and key issues were drawn in order

to answer Research Questions#1 and #2 of this study. The quantitative study was aimed

to answer Research Questions#3 and #4. In this part, a survey research was conducted

and the collected data were then analyzed with statistical software package.

1.6 Significance of the Study

This study is important and significant for two reasons. First, results from this study

contributed broad knowledge as regard to the cyber threats targeting smartphones in

Thailand, and the security handling practices by relevant organizations, and what

network or telecommunication operators should do in order to provide protection for

the smartphone users in Thailand. Second, the study aimed to provide an in-depth

knowledge about Thai smartphone users’ security-perceptions and behaviours, and the

differences based on demographic distributions such as genders, ages, incomes,

occupations and residence locations. In addition, this study also aimed to establish the

causal relationship among various perceptions related to security and protection

behaviours of smartphone users in Thailand. The findings of this study therefore

provide detailed insights and recommendations for the government and network

operators that could lead to improvement on the security for smartphone users in Thailand.

1.7 Benefits of the Study

The overall benefits of this study include availability of detailed knowledge and

recommendations on secure smartphone usage in Thailand. To elaborate further, the

benefits of this study can be summarized in three areas:

1) Academic-related benefits: The insight gained from this study will provide a

broad view of cyber security awareness relating to smartphone usage among the

population in Thailand, contributes towards the identification of the current cyber

Page 23: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

6

threats landscape in Thailand, how it is handled and in what context does it relate

to smartphone users. The result obtained from this study will have a direct impact on

the wider community, allowing researchers to further the field of cyber security and

enabling government policy makers to compare between smartphone users in other

countries in creating or fine-tuning their policies to best match with the requirements to

alleviate the risks faced by the country;

2) Application-related benefits: Results obtained from this study will allow an

understanding of the causes or causal factors that impact protection behaviours for

smartphone users. This will allow building of models to assess the protection

behaviours of smartphone users at periodic points in order to find out what are the

strongest and the weakest links, allowing measurements based on empirical data by

comparing different types of data such as district or provincial areas, gender, education

level and other factors. This study will also allow researchers to develop software that

can assess patterns of behaviours that are risky and alert the users of such behaviours

and averting them to safer environments of usage; and

3) Policy-related benefits: Administrators can set policies or guidelines to

modify the behaviours of smartphone users in Thailand in order to avoid threats by

addressing the behavioural weaknesses and closing of gaps that may pose threats which

allow attackers to exploit. These policies or guidelines will result in reduction of risks

in Thailand and allowing the country to be less exposed to cyber security risks.

1.8 Scope of the Study

In order to gain the benefits, this study has focused on specific content, area of study

and time frame as follows:

1) Content: This study focused on cyber threats and security handlings in

Thailand. It also focused on the general behaviours and protection behaviours from

cyber threats among the smartphone users;

2) Area of study: This study covered six regions of Thailand, including Bangkok

and metropolitan area, central region, northern region, north-eastern region, eastern

region, and southern region; and

3) Time frame: This study was conducted during July 2015 to December 2016.

Page 24: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

7

1.9 Limitations of this Study

Smartphones as mobile communication devices have gained popularity in the world,

including Thailand. Statistics in 2015 showed that the age of Thai smartphone users

range between 6 to over 60 years old, and the majority of the smartphone users are

between 15 to 59 years old (Veedvil, 2015). For the sake of data gathering and

eliminating the minors, the participants in this study are those between 18 to 60 years

old only.

1.10 Workflow of this Study

This study composed of two main parts: a qualitative study and a non-experimental

quantitative study. In the qualitative study, analysis of relevant documents was

performed. In this part, relevant documents and information were reviewed, and the key

issues were drawn and categorized into themes. For the quantitative study, the

researcher reviewed the related theories and proposed a theoretical model. The model

was then tested against empirical data with the use of statistical software. Findings from

both parts were then integrated as outcomes from this study.

The study began with the interested issues of which related data were gathered using

qualitative and quantitative methods. These data were then subsequently analyzed and

synthesized as outcomes. Detail of the workflow in this study is shown in Figure 1.1.

Page 25: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

8

Figure 1.1: Workflow of this study

Data Analysis

1. Current cyber threats on smartphones and trends 2. Cybersecurity handling for smartphone users in Thailand

Outputs

Data Collection

Quantitative Method: Use survey questionnaire to

collect demographic data and behaviours of smartphone

users in Thailand

-Current cyber threats -Security handlings for smartphone users in Thailand

Interested Issues

1) Descriptive Statistics 2) t-test and ANOVA 3) Structural Equation Modeling

Document Analysis

Qualitative Method: Use record form to collect

data from related documents

Behaviours of smartphone users in protecting themselves from cyber threats

1. Demographic of Thai smartphone users 2. Perceptions and behaviours of Thai smartphone users 3. Degrees of effects of factors towards protection behaviours of Thai smartphone users

Recommendations for improving cybersecurity for Thai smartphone users

Outcomes

Page 26: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

9

1.11 Organization of Thesis

This document is divided into six chapters as described below.

Chapter 1 Introduction - This chapter mainly includes the background of this study,

objectives, research questions and methodologies used, the significance and benefits of

this study, scope, assumptions, and definition of terms. This chapter also describes the

research design and limitations of this study.

Chapter 2 Cyber Threats, Cybersecurity and PMT Model - This chapter depicts cyber

threats and security on smartphones and agency that handles cybersecurity in Thailand.

It also introduces a standard for telecommunication network that can increase security

for smartphones. Moreover, the chapter reviews the concept of the PMT model and the

related literatures that adopted this concept to investigate the fear appeal of internet

users. At the end of this chapter, a conceptual framework is created and the theoretical

PMT model is proposed for studying behaviours of Thai smartphone users in securing

their phones from cyber threats.

Chapter 3 Survey Research Design - This chapter describes details of the survey

methodology, tools, and analysis. It includes information on the target groups for

sampling, sample size, instrument design, validity and reliability testing, and data

analysis used in this study.

Chapter 4 Demographic and Behaviours of Thai Smartphone Users - This chapter

contains the survey findings, including the descriptive results of the demographics and

behaviours of smartphone users. In addition, comparisons of the perceptions on the

PMT’s constructs among difference categories of Thai smartphone users are deliberated

in this chapter.

Chapter 5 The PMT Model of Thai Smartphone Users - This chapter analyzes the

casual relationships among the variables in the theoretical PMT model, including

demonstrations of the goodness of fits of measurement in the model and a structural

equation model based on empirical data. The statistical significant relationships

between constructs of the theoretical PMT model are shown here. Lastly, the final PMT

Page 27: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

10

model with significant relationships are given, together with the calculated degrees of

direct and indirect effects of factors in the PMT model.

Chapter 6 Research Summary - This chapter contains a review of the research objectives,

methodologies used in this study, and the answers to the research questions.

Chapter 7 Discussion, Conclusion and Recommendation - This chapter deliberates all

the findings with respect to literatures and it also provides recommendations and

suggestions for further study.

1.12 Definitions of Terms

Cybersecurity: The ability to protect or defend the use of cyberspace from cyber-

attacks (Kissel, 2013).

Cyber threat/attack: An attack, via cyberspace, targeting an enterprise’s use of

cyberspace for the purpose of disrupting, disabling, destroying, or maliciously

controlling a computing environment/infrastructure; or destroying the integrity of the

data or stealing controlled information (Kissel, 2013).

Mobile device: A mobile device is a general term for any type of portable computing

device such as a smartphone or tablet computer (English Oxford Living Dictionary, 2016).

Smartphone: A mobile phone that serves as both a communication and computing

device with information storage capability (adapted from Kissel, 2013). It performs

many of the functions of a computer, typically having a touchscreen interface, Internet

access, and an operating system capable of executing downloaded application programs

(English Oxford Living Dictionary, 2016).

Protection Motivation Theory: Protection Motivation Theory (PMT) is the model

that describes how people can protect themselves from threats through four factors: (1)

perceiving severity of a threatening event; (2) perceiving vulnerability of the

occurrence; (3) responding to the recommended preventive behaviour; and (4)

perceiving self-efficacy (Rogers, 1975).

Page 28: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

11

1.13 Conclusion

This chapter provided the background to this thesis, a statement of the problem,

objectives of the research and formulation of the research questions, together with the

constraints of this research. In the next chapter, the theories and related literatures,

including concept of cyber threats and cyber security, cybersecurity agencies, secured

telecommunication network, and concept of PMT are reviewed. Subsequently, the

conceptual framework and theoretical PMT model of this study are established.

Page 29: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

12

CHAPTER 2

CYBER THREATS, CYBERSECURITY AND PMT MODEL

This chapter reviews the concepts of cyber threats and cybersecurity, the organization

that handles cybersecurity in Thailand, and secured telecommunication networks.

Moreover, theories and literatures related to Protection Motivation Theory (PMT) are

also covered in this chapter. The latter part of this chapter deliberates the constructs and

their relationships in the proposed theoretical model based on the PMT model for

testing with the empirical data.

2.1 Concepts of Cyber Threats and Cyber Security

Cyber threats denote possible danger that may exploit vulnerabilities in a system in

order to breach security and cause potential damages to the processing equipment such

as computers and mobile devices. A threat can be either "accidental", such as a

computer malfunction or natural disasters; or "intentional", such as hacking or stealing

of the device (Shirey, 2000). Cyber threats, especially the intentional one, intensify

along with an increase uptake of new technologies, and they have become a focal point

for cybercrime.

Cybersecurity is the protection of information systems from theft or damages to

the hardware, software, and the information processed by or stored in them.

Cybersecurity also means freedom from disruptions or misdirection from the services

provided by computer systems (Gasser, 1988). Cyber security includes controlling of

physical access to the hardware, as well as protecting the system against harm that may

originate via network access, data and code injection, (PC Mag, 2015). The threats may

also be due to malpractices by the operators, whether intentional, accidental, or due to

the operators being tricked into deviation from secure procedures (Rouse, 2015). The

field is of growing importance due to the increasing reliance on computer systems and

Internet in almost every modern society (Tate, 2013).

Page 30: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

13

2.2 Cyber Threats on Smartphones and Trends

2.2.1 Types of Cyber Threats and Effects

Cyber threats can occur in many forms which can cause damages to the economic,

financial and business systems, and critical infrastructures of any countries including

Thailand. Cyber threats can sabotage or espionage essential data and they can release

false information, discredit individuals or organizations by spoofing news releases to

destruction of the server’s operating system, personal computers, or mobile devices.

Cyber threats can be caused by any perpetrators or cybercriminals who want benefits

from these illegal activities.

Currently, mobile devices have computation capabilities compatible to personal

computers. On the other hand, smartphones have gained huge popularity and they have

outsold personal computers (Canalys, 2012). However, smartphones but generally lack

of security measures and they have become targets of perpetrators (Ruggiero, P. &

Foote, J., 2011).

According to Jeon, W. et al. (2011) who authored “A Practical Analysis of Smartphone

Security”, existing cyber threats of smartphones can be categorized into two groups:

threats caused by attackers, and threats caused by users’ unawareness of security.

Details of such threats are shown in Table 2.1.

Table 2.1: Threats against Smartphones

Threats Descriptions

Threats Caused by Attackers

Malware Attack Attacks that can change or illegally access private

information in smartphone, risk or affect availability by

meaningless operations such as random code execution, or,

abuse of costly services and functions.

Wireless Network

Attack

Attacks that can corrupt smartphones, block, or modify

information on the wireless network by sniffing, spoofing,

or eavesdropping.

Page 31: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

14

Threats Descriptions

Denial of Service Attacks that can risk availability of smartphone through

denial of service attacks to base stations, wireless networks,

web servers, or to intervene smartphones by using radio

interferences

Break-in Attack Attackers gain partial or full control over the target

smartphones by using flawed code, code injection or abuse

of logic errors.

Threats Caused by User Unawareness

Malfunction The smartphone users unintentionally disable or cause

malfunction to the applications by mistakes or

misappropriate configurations. Besides, smartphone

applications can malfunction themselves due to

incompatibility between platforms and applications

Phishing The users unintentionally expose private information in their

devices due to access of phishing sites, messenger phishing,

or SMS phishing

Phone Theft/Loss Smartphones can be lost or theft

Platform Alteration The user alters his/her smartphone platform intentionally

(e.g. jail breaking in iPhone, rooting in Android phone)

Source: Rewritten from Jeon, W. et al. (2010: 315)

2.2.2 Statistic of Malware Attacks on Smartphones and Trend

Over the years, there has been a dramatic increase in the number of new malware, as

well as increase in its sophistication and complexity. The McAfee Mobile Threat Report

2016 by Snell & Bruce, as shown in Figure 2.1, depicts the increasing number of

malware between year 2014 and 2015.

Page 32: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

15

Figure 2.1: New Mobile Malware Threat Statistics

Source: http://www.mcafee.com/us/resources/reports/rp-mobile-threat-report-2016.pdf

The above figure shows that number of new malware had been dramatically increased.

By the end of Q4 in 2015, the number of new malware had been tripled since 2014.

Moreover, Kaspersky Lab reported that, in the year 2015, there were 2,961,727

malicious installation packages worldwide and 884,774 were new malicious mobile

programs, which was three times increased from the year 2014. This was in addition to

7,030 mobile banking Trojans. Kaspersky Lab also stated that there is rising in the

number of malicious attachments that users are unable to delete, ransomware, programs

using super-user rights to display aggressive advertising, and cybercriminals actively

using phishing windows to conceal legitimate applications (Snell & Bruce, 2016).

Survey conducted by Kaspersky Lab also disclosed the top 10 most widespread

malware attacked during August 2013 – July 2014 (Kaspersky Lab, 2014) and they are

shown in Figure 2.2.

Page 33: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

16

Figure 2.2: Distribution of Attacks by Malware Types (August 2013 – July 2014)

Source: Kaspersky Lab and INTERPOL Joint Report, October 2014.

The above figure shows the distribution of malware attacks during August 2013 to July

2014. Trojan-SMS was the most widespread malware which was accounted for 57.08%

of all attacks. The next was the RiskTool which was accounted for 21.52%, followed

by AdWare (7.37%), Trojan (3.33%), Monitor (2.72%) and Backdoor (2.51%).

Symptoms of these malwares are shown in Table 2.2.

Table 2.2: Symptoms of Smartphone Malwares

Malwares Symptoms

Trojan SMS Infects smartphones keep sending text messages to

premium-rate SMS numbers.

RiskTool Concealing files in the system, hiding mobile device’s

running applications, or terminating active processes.

AdWare Automatically displays or downloads advertising material

(often unwanted) when mobile device is online.

Page 34: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

17

Malwares Symptoms

Trojan Enable cyber-criminals to spy on the mobile devices, steal

sensitive data, and gain backdoor access to the system. It

also deletes data, blocks data, modifies data, copies data, or

disrupts the performance.

Monitor Unauthorized access to the system or program by using

someone else's account or other methods.

Backdoor Exploit the system by bypassing security mechanisms of the

mobile device.

Trojan- Banker Gain access to confidential information stored or processed

through online banking systems.

Exploit An exploit is an attack on a system, especially one that takes

advantages of a particular vulnerability that the system

offers to intruders.

HackTool Generate keys for illegitimately-obtained versions of

different applications. It may also download harmful files

and deteriorate the system performance.

Trojan-

Downloader

Download additional malware onto the infected mobile

device.

Source Kaspersky Lab and INTERPOL Joint Report, October 2014.

2.3 Smartphone Threats Handling in Thailand

2.3.1 Organization Handling Cyber Threat in Thailand

Cyber threat surveillance and response teams are groups of experts that handle computer

security incidents. These teams are commonly recognized as the Computer Security

Incident Response Team (CSIRT) or the Computer Emergency Readiness Team

(CERT). The CERT organization is a part of the Software Engineering Institute

operated by Carnegie Mellon University, United States of America. This team provides

the necessary services to handle cyber threats and support its members (constituents) to

recover from security breaches. It provides appropriate technologies and practices in

order to (1) resist attacks on networked systems, (2) limit damage to the devices and

Page 35: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

18

networks, and (3) ensure continuity of critical services even though the systems have

been attacked (CERT, 2016).

In Thailand, the organization that is responsible of cybersecurity is ThaiCERT (Thailand

Computer Emergency Readiness Team). ThaiCERT is also the Computer Security

Incident Response Team (CSIRT) of Thailand. The organization was founded in 2000

by National Electronics and Computer Technology Center (NECTEC) under the

Ministry of Science and Technology. Presently, ThaiCERT is part of the Electronic

Transactions Development Agency (ETDA) under the supervision of the Ministry of

Information and Communication Technology (MICT).

Figure 2.3: Thailand Computer Emergency Readiness Team (ThaiCERT)

Source: ThaiCERT Annual Report 2013 by Wayuparb, S. et al. (2013)

ThaiCERT is responsible for providing incident response to computer security threats.

It provides an official trust contact-point for dealing with computer security incidents.

ThaiCERT has conducted various activities by collaborating with public and private

organizations, universities, Internet Service Providers (ISPs) and other relevant entities

to strengthen the integrity of important internal processes and infrastructure, and

safeguard cybersecurity for government agencies and the general public. Moreover,

the team gives necessary supports and advices for solutions to threats, follow up

actions and disseminates news and updates on computer security, including mobile

security, to the public.

Page 36: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

19

2.3.2 Security on Mobile Telecommunication Network

2.3.2.1 Introduction of Telecommunication Services in Thailand

The major mobile operators in Thailand are AIS, DTAC, and True Move. There is a

total of 93.6 million mobile subscribers with the proportion of non-voice (data packet)

revenue at 59% of the total revenue stream for the operators. 2G network has been

officially phased out in Thailand with current subscribers predominantly on 4G services

in large cities and 3G in remote areas, the main difference between 3G and 4G is speed

as 4G provides broadband services to the mobile phones.

2.3.2.2 Risks of Telecommunication Network in Thailand

Telecommunication network providers in Thailand operate and manage the complex

network infrastructures used by the users for voice and data services with every

communication traverses through the telecommunication networks. Therefore, these

networks and systems store and process vast amounts of sensitive information, making

them a top target for cyber attacks. The following description provides an overview of

a survey on the types of incidents that occurred in the telecommunication network

conducted by PWC in 2013.

Figure 2.4: Incident Survey

Source: Redrawn from PWC (2013)

0 5 10 15 20 25 30

Network Exploit

Application Exploit

Removable Stroage Exploit

Data Exploited

System Exploit

Mobile Device Exploit

Types of incident survey

Types of incident survey

Page 37: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

20

As indicated in the survey, one of the most exploited incident is network related issues.

This is one of the least understood areas as mobile telecommunication network consists

of two layered networks, namely access and core networks. Access networks are edge

networks where mobile devices (i.e., mobile users) connect to the telecommunication

system. The mobile core network plays the most important role of the mobile

telecommunication system since every access network is attached to the core. Thus,

vulnerabilities in the core network could severely affect the entire telecommunication

network (Chouhan, Gaikwad & Sharma, 2013).

Attacks at the packet core layer regardless of what technologies used at the access layer

can be categorised into three domains as shown in Figure 2.5.

Figure 2.5: CIA Triad

Confidentiality - A common form of attacks on the packet core network is the

confidentiality attacks. Confidentiality attack is usually carried out to steal information

traversing the packet network (Dimitriadis, 2007). This type of attack allows an attacker

to intercept and change data traversing the network in real time.

Availability - Another common type of attacks on the packet core network which is the

Denial of Service (DOS). A DoS is a highly visible attack and it could cause prominent

damages to the operator’s network (Xenakis, 2008).

I

C

A

Page 38: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

21

Integrity - One more common form of attack is related to integrity. In this form of

attacks, data is changed or modified without the consent of the users (Dimitriadis, 2007).

At the mobile packet core level integrity attacks is generally accomplished by

manipulating the billing information of the subscriber. This type of attacks allows an

attacker to target individual subscribers and potentially exploit them for trivial purposes

or bring them into an extensive social engineering scheme.

2.3.2.3 Improving Risks in Mobile Telecommunication Network in Thailand

To improve the security of the mobile core network from the risks related to

confidentiality, integrity and availability, the authors of “A Review of Security Risks

in the Mobile Telecommunication Packet Core Network” (Khera et al., 2013), proposed

the use of the ITU X.805 framework as the reference architecture to secure the mobile

core network.The ITU X.805 network security model provides a set of principles and

recommended guidelines to safeguard the network.

ITU X.805 including three layers (i.e., application, services, and infrastructure), three

planes (i.e., end user, control, and management planes), eight security dimensions (i.e.,

access control, authentication, non-repudiation, data confidentiality, communication

security, data integrity, availability, and privacy), and five threats/attacks (i.e.,

destruction, corruption, removal, disclosure, and interruption) which can be mapped to

the mobile core network in order to determine if a network is vulnerable to any attack

listed in the risk domains and to pinpoint where such weaknesses exist, and how to

mitigate the detected risks (Harmantzis & Malek, 2004). Figure 2.6 and Table 2.3 show

the framework and description of ITU X.805.

Page 39: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

22

Figure 2.6: ITU X.805 Framework

Source: ITU-T Recommendation X.805 (2003)

Table 2.3: Security Dimensions and risk Mitigations

Dimension Description Mitigation Threats Solved

Access Control Only allow access

to authorized

system

Firewall Destruction,

interruption

Authentication Verify the identity

of persons on device

who observe or

modify the data

Network access

control system

with single sign

on service

Disclosure,

disruption

Non-repudiation Provide a record that

identifies individuals

or devices that

observed or

modified the data

Certificate

authority, identity

management

system

Destruction,

corruption

Data

Confidentiality

Data is confidential

and is only

readable by

authorized person

Encryption such

as SSL/VPN

Disclosure

Page 40: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

23

Dimension Description Mitigation Threats Solved

Communication

Security

Data access and

communication is

secured

VPN/IPSec

Tunnel

Interruption

Data Integrity Data is not changed

or modified

Digital certificate Corruption

Availability Data or access is

available

DDos protection

system and

backup links

Destruction,

removal,

interruption

Privacy Privacy Encryption Disclosure

Source: Khera V., Fung C.C., Chaisiri S. (2013).

2.4 Behaviours of Smartphone Users

As users have become more dependent on mobile devices, such as smartphones users,

they have to be aware of threats and security as they go about their day-to-day activities.

Behaviours of smartphone users play an important role in keeping threats away from

their devices. Behaviours, such as, keeping the phone’s operating system updated, using

only applications from trustable providers, regularly scanning the phones for malicious

software, or using complicate password, can protect their phones from cyber threats.

As a reason, the rest of this study focuses on studying the factors that can increase

behaviours of people in protecting their smartphones from cyber threats, and the

Protection Motivation Theory (PMT) model is used as the base theory of this study.

2.5 Protection Motivation Theory

R.W. Rogers developed the Protection Motivation Theory (PMT) in 1975 and it was later

expanded to a more general theory of persuasive communication in the social psychology

and health domains (Rippetoe & Rogers, 1987). PMT model is very popular and has been

considered as one of the most powerful explanatory theories for predicting an individual’s

intention to engage in protective actions (Anderson & Agarwal, 2010).The PMT is used to

explain if a threat is perceived by people as fearful, they will be more cautious and tend to

Page 41: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

24

prevent the possible threat (Humaidi & Balakrishnan, 2012). Originally, PMT was

designed to be used in the health area, to study how people react when diagnosed with

health-related illnesses. Currently, PMT has been extended to other areas of study such as

information security. Many recent studies have used the PMT in predicting behaviours

related to an individual’s computer security behaviours both at home and in organizations

(Srisawang, Thongmak & Ngarmyarn, 2015).

PMT is a concept for understanding the fear appeals of people by focusing on how people

behave and cope during stressful situations (Rogers, 1983). People can be motivated to

take a particular action, divert behaviour through the threat of impending danger or harm,

by arousing fear (Maddux & Rogers, 1983). PMT describes the adaptive and maladaptive

coping with particular health threat through process of appraisal of the health threat, and an

individual’s assessment of the level of danger posed by a threatening event (Woon et al.,

2005). Through the process of appraisal of the coping responses result, it will increase the

behaviour in lessening the threat (Boer & Seydel, 1996).

PMT model consists of threat appraisal and the coping appraisal that can increase the

behaviours in protecting people from threats (Boer & Seydel, 1996). For threat appraisal,

three factors are used to appraise the threats: (1) the perceived severity of a threatening

event; (2) the perceived probability of the occurrence and the probability that one will

experience harm; and, (3) rewards, the positive aspects of starting or continuing the

unhealthy behaviour, such as, continued smoking which is psychological pleasure

(Prentice-Dunn & McClendon, 2001).

The model shows that the total amount of threat experienced equals to the summation of

severity and vulnerability, minus with rewards. For coping appraisal, three factors are used

to evaluate the responsive result: (1) the efficacy of the recommended preventive behaviour

or response efficacy, which is the effectiveness of the recommended behaviour in removing

or preventing possible harm; (2) the perceived self-efficacy, which is the belief that one can

successfully enact the recommended behaviour (Roger, 1975); and (3) response costs which

are associated with the recommended behaviour. Lastly, the total amount of coping ability

that a person can experience is the summation of response effectiveness and self-efficacy,

minus the response costs. The PMT model proposed by Roger (1983) is shown in Figure 2.7.

Page 42: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

25

Figure 2.7: Cognitive Process of Protection Motivation Theory

Source: Redrawn from Rogers (1983)

2.6 Related Studies

2.6.1 Study by Liang & Xue (2009)

Liang & Xue (2009), proposed the Technology Threat Avoidance Theory (TTAT) in

“Avoidance of Information Technology Threats: A Theoretical Perspective” which

explains the preventing behaviours of the computer and internet users from cyber

threats. They contended that there are two cognitive processes that motivate users to

protect themselves from threats, they are: threat appraisal and coping appraisal. By

integrating models from three studies: PMT of Rogers (1975 & 1983); Health Belief

Model of Janz and Becker (1984) & Rosenstock (1974); and Risk Analysis Research

of Baskerville (1991 & 1991), Liang & Xue proposed the variance theory view of

TTAT which consists of three main parts, they are (1) Threat Appraisal;

(2) Coping Appraisal; and (3) Coping. Threat Appraisal consists of three constructs

including perceived susceptibility, perceived severity and perceived threat. Coping

Appraisal consists of four constructs, they are Perceived Effectiveness, Perceived

Costs, Self-efficacy, and Perceived Avoidability. Coping consists of three constructs,

they are: Avoidance Motivation, Avoidance Behaviour, and Emotion-focused Coping.

In addition, there are two social environment factors that affect the model, they are Risk

Tolerance and Social Influence. Details of the model are shown in Figure 2.8.

Severity

+ Vulnerability

- Rewards

Response Effectiveness

+ Self-efficacy

-Response Cost

Protection

Motivation

Threat

Appraisal

Coping

Appraisal

Page 43: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

26

Figure 2.8: The Variance Theory View of TTAT

Source: Redrawn from Liang & Xue (2009)

The figure above shows the relationships among the constructs and their sub-constructs

and they can be explained as follows:

1) Risk Tolerance and Social Influence affects threat response of IT users.

2) Threat Appraisal and Coping Appraisal leads to Problem-focused Coping

and Emotion-focused Coping.

Threat Appraisal

Coping Perceived Susceptibility

Perceived Severity

Perceived Threat

Perceived Avoidability

Avoidance Motivation

Avoidance Behaviour

Emotion-focused Coping

Perceived Effectiveness

Perceived Costs

Self-efficacy

Coping Appraisal

Problem-focused Coping

Risk Tolerance

Social Influence

Page 44: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

27

3) Perceived Susceptibility and Perceived Severity positively affect the

Perceived Threat.

4) Perceived Effectiveness, Perceived Costs, and Self-efficacy Severity

positively affect the Perceived Avoidability.

5) Perceived Threat positively affects the Avoidance Motivation and the

Emotion-focused Coping.

6) Perceived Avoidability positively affects the Avoidance Motivation and the

Emotion-focused Coping.

7) Avoidance Motivation positively affects the Avoidance Behaviour.

2.6.2 Study by Srisawang, Thongmak & Ngarmyarn (2015)

Srisawang, Thongmak & Ngarmyarn (2015) proposed “Factors Affecting Computer

Protection Behaviour” which is based on the PMT model. Their proposed factors that

affect computer crime protection behaviour (shown in Figure 2.9) include:

(1) Conscientious Personality, individuals’ traits of being painstaking and careful;

(2) Perceived Value of Data, individuals’ perceptions on the value of data in terms of

monetary value and emotional value; (3) Prior Experience, the past experiences of

individuals; (4) Subjective Norm, individual perception on social pressures to perform

or not to perform some things; (5) Security Knowledge, individuals’ knowledge of

computer security; and (6) Safeguard Costs, costs in performing the recommended

behaviour.

Page 45: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

28

Figure 2.9: The Proposed Research Model of Srisawang et al. (2015)

Source: Redrawn from Srisawang, Thongma & Ngarmyarn (2015)

The model was tested with 600 empirical data from participants who used personal

computers at homes and workplaces in Thailand. The results showed that all the factor

variables had significant effects on the computer crime protection behaviour. However,

coping appraisal has greater impacts on protection motivation and protection behaviour

than threat appraisal. The authors also recommended that the efforts to motivate users

in protecting their computers from threats is to focus on coping appraisal. Thus,

encourage individuals’ coping appraisal will increase the degree of protection

motivation and behaviour.

2.6.3 Study by Tu, Z.L. & Yuan, Y.F. (2012)

The study by Tu, Z.L. & Yuan, Y.F. (2012) in “Understanding User’s Behaviours in

Coping with Security Threat of Mobile Devices Loss and Theft” concerned the potential

+

+

+

+ +

+

+

+

+ + +

+

+

Threat Appraisal

Perceived Value of Data

Protection Behaviour

Protection Motivation

Prior (Threat) Experience

Security Knowledge

Subjective Norm

Coping Appraisal

Conscientious-nessPersonalit

Safeguard Costs

Page 46: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

29

risks of mobile devices being loss and theft, and the countermeasures to cope with these

risks. Their study adopted the PMT as the core model of the study. They presented a

framework for analyzing behaviours of mobile device users in coping with the risk of

mobile devices loss and theft (shown in Figure 2.10). The model consists of five

constructs: Threat Appraisal, Coping Appraisal, Social Influence, Coping Intention of

Mobile Devices Loss and Theft, and, Coping Behaviour of Loss and Theft Threat.

Threat Appraisal has two sub-constructs including Perceived Vulnerability and

Perceived Severity. On the other hand, Coping Appraisal has four sub-constructs:

Locus of Control, Self-efficacy, Perceived cost, and Perceived Effectiveness.

Figure 2.10: The Proposed Research Model of Tu, Z.L. & Yuan, Y.F. (2012)

Source: Redrawn form Tu, Z.L. & Yuan, Y.F. (2012)

+

+

+

+

+

+

+

+

Perceived Vulnerability

Perceived Severity

Locus of Control

Self-efficacy

Perceived Cost

Perceived Effectiveness

Social Influences

Loss and Theft Threat

Coping Behaviour

Threat Appraisal

Coping Appraisal

Intention to Cope with

Mobile Devices Loss and Theft

Page 47: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

30

According to the model, the authors proposed that user’s threat appraisal, coping

appraisal, and social influence impact the coping intention of mobile devices lost and

theft, and coping intention impacts the coping behaviour of loss and theft threat.

Moreover, the threat appraisal is determined by perceived vulnerability and perceived

severity, and the coping appraisal is determined by locus of control, self-efficacy,

perceived cost, and perceived effectiveness.

2.7 Proposed Theoretical PMT Model

2.7.1 Selected Constructs

The proposed model in this research study is established through analyzing and

choosing the essential constructs from the previous reviewed theories and related

studies. The constructs from the PMT and the related literatures are listed in two

categories - they are exogenous variables and endogenous variables. The exogenous

variables are independent variables (IVs) while the endogenous variables can be

independent variables and dependent variables (DVs). Details of the constructs are

shown in Table 2.4.

Table 2.4: Summary of Constructs from Reviewed Theories and Related Studies

Theories& Related

Studies

Constructs

Exogenous Variables

(IVs)

Endogenous Variables

(IVs& DVs)

PMT Model

(Rogers,1983)

1) Severity

2) Vulnerability

3) Rewards

4) Response

Effectiveness

5) Self-efficacy

6) Response Cost

1) Threat Appraisal

2) Coping Appraisal

3) Protection Motivation

Page 48: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

31

Theories& Related

Studies

Constructs

Exogenous Variables

(IVs)

Endogenous Variables

(IVs& DVs)

Avoidance of

Information Technology

Threats: A Theoretical

Perspective(Liang &

Xue, 2009)

1) Perceived

Susceptibility

2) Perceived Severity

3) Perceived

Effectiveness

4) Perceived Costs

5) Self-efficacy

6) Risk Tolerance

7) Social Influence

1) Perceived Threat

2) Perceived Avoidability

3) Avoidance Motivation

4) Avoidance Behaviour

5) Emotion-focused

Coping

Factors Affecting

Computer Protection

Behaviour (Srisawang,

Thongmak & Ngarmyarn,

2015)

1) Conscientiousness

Personality

2) Perceived Value of Data

3) Prior Experience

4) Subjective Norm

5) Security Knowledge

6) Safeguard Costs

1) Threat Appraisal

2) Coping Appraisal

3) Protection Motivation

4) Protection Behaviour

Understanding User’s

Behaviours in Coping

with Security Threat of

Mobile Devices Loss and

Theft (Tu, Z.L. & Yuan,

Y.F., 2012)

1) Perceived

Vulnerability

2) Perceived Severity

3) Locus of Control

4) Self-efficacy

5) Perceived Cost

6) Perceived

Effectiveness

7) Social Influence

1) Coping Intention

2) Coping Behaviour

Page 49: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

32

Based on the above table, it is observed that most of the constructs from the studies are

similar and they are based on the PMT. However, some constructs are slightly different

in names yet having similar meanings.

With respect to the selection of variables for this study, precedence is given to exogenous

and endogenous variables that basically comply with the PMT, and their impact on the

appraising abilities of the smartphone users in coping with cyber threats. The selected

constructs for this study are: (1) five exogenous variables: Perceived Severity, Perceived

Vulnerability, Social Influence, Self-efficacy, and Response Effectiveness; and (2) four

endogenous variables: Threat Appraisal, Coping Appraisal, Protection Motivation, and

Protection Behaviour. Details of these constructs and their supported scholars are shown

in Table 2.5.

Table 2.5: Selected Constructs and References

Selected Constructs

References

Rogers

(1983)

Liang

&Xue

(2009)

Srisawang,

Thongmak,

Ngarmyarn

(2015)

Tu, Z.L. &

Yuan, Y.F.

(2012)

Perceived Severity /

Prior (Threat)

Experience

Perceived Vulnerability /

Perceived Susceptibility

Social Influence /

Subjective Norm

Response Effectiveness

/ Perceived Effectiveness

Self-efficacy /

Security Knowledge

Page 50: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

33

Selected Constructs

References

Rogers

(1983)

Liang

&Xue

(2009)

Srisawang,

Thongmak,

Ngarmyarn

(2015)

Tu, Z.L. &

Yuan, Y.F.

(2012)

Threat Appraisal /

Perceived Threat

Coping Appraisal /

Perceived Avoidability

Protection Motivation /

Avoidance Motivation /

Coping Intention

Protection Behaviour /

Avoidance Behaviour /

Coping Behaviour

2.7.2 Determining Relationships between Constructs

Next, the relationships between the selected constructs are determined according to

PMT and the related studies. Details are shown in Table 2.6.

Table 2.6: Relationships between Constructs and References

Relationships

(Positive Impact)

References

Rogers

(1983)

Liang &

Xue (2009)

Srisawang,

Thongmak,

Ngarmyar

n (2015)

Tu, Z.L. &

Yuan, Y.F.

(2012)

Perceived

Severity

Threat

Appraisal

Perceived

Vulnerability

Threat

Appraisal

Page 51: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

34

Relationships

(Positive Impact)

References

Rogers

(1983)

Liang &

Xue (2009)

Srisawang,

Thongmak,

Ngarmyar

n (2015)

Tu, Z.L. &

Yuan, Y.F.

(2012)

Social

Influence

Threat

Appraisal

Social

Influence

Coping

Appraisal

Response

Effectiveness

Coping

Appraisal

Self-

efficacy

Coping

Appraisal

Threat

Appraisal

Protection

Motivation

Threat

Appraisal

Protection

Behaviour

Coping

Appraisal

Protection

Motivation

Coping

Appraisal

Protection

Behaviour

Protection

Motivation

Protection

Behaviour

2.7.3 The Proposed Protection Motivation Model and Hypotheses

Based on the selected constructs and their relationships found in the previous sections,

the constructs, their descriptions, and their relationships between them are depicted in

Figure 2.11 below.

Page 52: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

35

Figure 2.11: The Proposed Protection Motivation Model

+

+

+

+

+

+

+

+

+

+

+

Perceived Severity - severity of consequences of cyber threats on smartphone

Perceived Vulnerability

- probability that one’s smartphone may be attacked

Self-efficacy - believe in one’s ability to execute the recommend courses of action successfully

Response Effectiveness

- effectiveness of the recommended behaviour in avoiding the threat

Protection Behaviour

- perform the recommended behaviour

Protection Motivation

- variable that arouse, sustain and direct protective behaviour

Social Influence - social pressure to perform or not perform a given behaviour

Threat Appraisal

- estimation of chance of contracting a threat and seriousness of a threat

Coping Appraisal

- expectancy that carrying out recommendation to remove the threat

Page 53: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

36

The proposed theoretical model for testing with empirical data is shown in Figure 2.12.

Figure 2.12: The Proposed Theoretical Model of this Study

The hypotheses for testing this theoretical model are shown in Table 2.7.

Table 2.7: Hypotheses for Testing the Theoretical Model

Hypotheses Descriptions

Ha+ Perceived Severity has a positive effect on Threat Appraisal

Hb+ Perceived Vulnerability has a positive effect on Threat Appraisal

Hc+ Social Influence has a positive effect on Threat Appraisal

Hd+ Social Influence has a positive effect on Coping Appraisal

He+ Response Effectiveness has a positive effect on Coping Appraisal

Hf+ Self-efficacy has a positive effect on Coping Appraisal

Hg+ Threat Appraisal has a positive effect on Protection Motivation

Threat Appraisal

Perceived Severity

Protection Behaviour

Protection Motivation

Coping Appraisal

Perceived Vulnerabili

ty

Response Effectivene

ss

Self-efficacy

Social Influence

Ha

+

Hb

+

Hc+

Hd+

He

+

Hf+

Hh

+

Hj+

Hk+

Hg

+

Hi+

Page 54: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

37

Hypotheses Descriptions

Hh+ Threat Appraisal has a positive effect on Protection Behaviour

Hi+ Coping Appraisal has a positive effect on Protection Motivation

Hj+ Coping Appraisal has a positive effect on Protection Behaviour

Hk+ Protection Motivation has a positive effect on Protection Behaviour

2.8 Operational Definitions

Operational Definitions for the constructs of this study are as follows:

1) Perceived Severity: Severity of consequences of cyber threats on one’s smartphone

(Adapted from Boer & Seydel, 1996).

2) Perceived Vulnerability: Probability that one’s smartphone may be attacked by

cyber threats (Adapted from Boer & Seydel, 1996).

3) Social Influence: Perceived social pressure to perform or not perform a given

behaviour (Adapted from Ajzen, 1991).

4) Response Effectiveness: Effectiveness of the recommended behaviour in avoiding

the negative consequence (Adapted from Boer & Seydel, 1996).

5) Self-efficacy: The extent that a person can perform the recommended behaviour

successfully (Adapted from Boer & Seydel, 1996).

6) Threat Appraisals: Assessment of the level of danger on my smartphone posed by the

threat (Adapted from Woon et al., 2005).

7) Coping Appraisals: Assessment of one’s ability to cope with and avert the potential

loss or damage resulting from the danger (Adapted from Woon et al., 2005).

8) Protection Motivations: Person’s intention to perform the recommended behaviour

(Adapted from Boer & Seydel, 1996).

9) Protection Behaviour: Performing the recommended behaviour (Adapted from Boer &

Seydel, 1996).

Page 55: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

38

2.9 Conclusion

This chapter provided a model, derived from the PMT theory, for testing the

smartphone user data in Thailand. The next chapter will cover the research design

which includes the research methodologies used in this study, creating and testing the

questionnaire, defining steps for gathering the data, and statistical methods used to

analyze the data.

Page 56: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

39

CHAPTER 3

SURVEY RESEARCH DESIGN

This chapter describes the quantitative methodology used in this study including

population and sampling, questionnaire development and testing, and, data analysis.

3.1 Population and Sampling

In order to obtain a set of appropriate samples to generalize over 40 million Thai

smartphone user spectrum (Digital Advertising Association Thailand, 2015), at least

625 samples are required (at 4% margin of error, Yamane, 1973). To allow for margin,

a total of 720 samples were used in this study. The cluster sampling technique was

adopted to gather data from six regions of Thailand including Bangkok and

metropolitan area, central and western region, northern, north eastern, eastern and

southern. 120 samples were drawn from large-population provinces in each region. The

selected participants were people who used smartphones at the condensed areas, such

as, shopping mall, schools, and/or public/private offices of targeted provinces. The ages

of the participants were from 18 to 60 years old, and they are divided into 5 groups as

follows: 18 – 22 years old, 23 – 30 years old, 31 – 40 years old, 41 – 50 years old and

51 – 60 years old. The lowest sample age of 18 is the starting age for an individual to

register a smartphone in Thailand. 60 is the official retirement age in Thailand and the

group above 60 have provided very limited information about their phone security

status. They were therefore excluded from the survey. The range in between was

divided in 5 groups. 18-22 corresponds to most of the college or university students.

23-30, 31-40, 41-50 and 51-60 are considered at different stages of career and they

largely correspond to the ranges of income in the survey.

Page 57: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

40

3.2 Protocol for Survey

Protocols of the survey are as follows:

1) The surveyor invited and distributed the information to potential

participants to participate in the survey study. The information explained the purpose

and objectives of the study, the time and efforts it required from the participants to

answer the questions.

2) After a participant had granted his/her consent to take part in the survey, the

surveyor provided him/her a notebook or tablet with online questionnaire to fill in.

3) Participants were advised that they can withdraw their consent and

participation in the survey at any time.

4) The survey closed after the completion and submission of answers to the

questionnaire by the participant.

5) Interested participants who had indicated their interest to receive feedback

and research outcomes were sent a summary of the research findings after the study

was completed via email.

3.3 Questionnaire Construction and Scale

3.3.1 Questionnaire Construction

The instrument was developed in order to gather all the information needed for this

study. It was created for a cross-sectional study, which uses the data gathered from

samples of the population of interest at a single point in time with only one instrument

(Ary, Jacobs & Razavieh, 1996: pp.377). Based on the PMT and related instruments

created by many scholars, the survey questionnaire of this study was developed. It

consisted of two main parts: Part 1 demographic, used for gathering demographic of

the smartphone users; Part 2 perceptions and behaviour of smartphone users, used for

gathering users’ perceptions that related to severity and vulnerability to cyber threats,

social influences, response effectiveness, their efficacies, appraisals, intention

motivations, and their protection behaviours. The questionnaire developing is shown in

Table 3.1.

Page 58: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

41

Table 3.1: Questionnaire Construction

Construct and Item Description Reference

Perceived Severity: Severity of consequences of cyber

threats on my smartphone.

Adapted from Boer &

Seydel (1996)

1) Overall, I am aware of the potential security threats

and their negative consequences.

Adapted from

Bulgurcu et al. (2010)

2) I understand the concerns regarding information

security and the risks they pose in general.

Adapted from

Bulgurcu et al. (2010)

3) I have sufficient knowledge about the cost of

potential security problems.

Adapted from

Bulgurcu et al. (2010)

Perceived Vulnerability: Probability that my smartphone

may be attacked by cyber threats.

Adapted from Boer &

Seydel (1996)

4) I think that my chance of getting virus on my

smartphone is high.

Created by the

researcher

5) I think that my chance that my identity can be

thieved is high.

Created by the

researcher

6) I think that the chance that my important data can

be thieved is high.

Created by the

researcher

Response Effectiveness: Effectiveness of the recommended

behaviour in avoiding the negative consequence.

Adapted from Boer &

Seydel (1996)

7) Using complicated password would secure my

smartphone.

Created by the

researcher

8) Update software or applications often can secure

my smartphone.

Created by the

researcher

9) Using virus protection software can protect my

smartphone.

Created by the

researcher

Self-efficacy: The extent that a person can perform the

recommended behaviour successfully.

Adapted from Boer &

Seydel (1996)

10) I know how to use complicate password on my

smartphone.

Created by the

researcher

Page 59: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

42

Construct and Item Description Reference

11) I can install virus protection software on my

smartphone.

Created by the

researcher

12) I know how to setup my smartphone for advanced

protection.

Created by the

researcher

13) I know how to update software or applications on

my smartphone.

Created by the

researcher

Social Influence: Perceived social pressure to perform or

not perform a given behaviour.

Adapted from Ajzen

(1991)

14) My friends often talk about bad things happening

on their smartphones.

Adapted from Chai et

al. (2009)

15) My friends would think that I should take security

measures on my smartphones.

Adapted from

Anderson & Agarwal

(2010)

16) It is likely that the majority of smartphone users

comply with the smartphone security recommendations.

Adapted from Brown

& Venkatesh (2005)

17) Information from mass media (TV, radio,

newspapers, internet) suggests that I should comply

with the smartphone security recommendations.

Adapted from Brown

& Venkatesh (2005)

Threat Appraisal: My assessment of the level of danger on

my smartphone posed by the threat.

Adapted from Woonet

al. (2005)

18) I know my smartphone could be vulnerable to

security breaches if I don't adhere to protection

measures.

Adapted from Ifinedo

(2011)

19) It is extremely likely that cyber threats will infect

my smartphone.

Adapted from Liang

& Xue (2010)

20) Threats to the security of my smartphone are

harmful.

Adapted from Liang

& Xue (2010)

21) The likelihood of an information security violation

occurring at my smartphone is likely.

Adapted from

Johnston &

Warkentin (2010)

Page 60: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

43

Construct and Item Description Reference

Coping Appraisal: Assessment of my ability to cope with

and avert the potential loss or damage resulting from the

danger.

Adapted from Woon

et al. (2005)

22) I have the necessary skills to protect my

smartphones from information security violations.

Adapted from

Johnston &

Warkentin (2010)

23) I have the expertise to implement preventative

measures to stop people from getting my confidential

information.

Adapted from

Srisawang, Thongmak

& Ngarmyarn (2015)

24) For me, taking information security precautions is

easy.

Adapted from

Srisawang, Thongmak

& Ngarmyarn (2015)

Protection Motivation: Person’s intention to perform the

recommended behaviour.

Adapted from Boer &

Seydel (1996)

25) I intend to follow the information security

guidelines on how to use a smartphone safely.

Adapted from Liang

& Xue (2010)

26) I intend to use antivirus/anti-spyware software on

my smartphone.

Adapted from Liang

& Xue (2010)

27) I intend to protect my smartphone from cyber

threats.

Adapted from

Siponen et al. (2010)

28) I intend to follow the security news and find out

how to prevent cyber threats.

Adapted from

Srisawang, T hongmak

& Ngarmyarn (2015)

Protection Behaviour: Performing the recommended

behaviours.

Adapted from Boer &

Seydel (1996)

29) I always using complicated password on my

smartphone.

Created by the

researcher

30) I always logout/sign out after finishing using

applications (such as ebanking, email or facebook).

Created by the

researcher

Page 61: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

44

Construct and Item Description Reference

31) I always use antivirus software to prevent my

smartphone from getting virus and malware.

Adapted from (Liang

& Xue 2010)

32) I always update software or applications on my

smartphones.

Adapted from (Liang

& Xue 2010)

33) I always follow the suggestions for using a

smartphone safely and appropriately.

Created by the

researcher

3.3.2 Measuring Scale

The questionnaire asked respondents to describe the factors used in the theoretical

model. The questionnaire employed a 5-point Likert scale, ranging from one to five

points. The anchors used for each scale were as follows:

1 = Strongly Disagree

2 = Disagree

3 = Neutral

4 = Agree

5 = Strongly Agree

The interval for interpreting result can be calculated as follows:

Interval = Range Class

= 5 – 1

5

= .80

With this range, the result interpretation table can be defined as shown in Table 3.2.

Table 3.2: Result Interpretation Table

Internal Level

4.21 – 5.00 Very High

3.41 – 4.20 High

2.61 – 3.40 Neutral

1.81 – 2.60 Low

1.00 – 1.80 Very Low

Page 62: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

45

3.4 Validity and Reliability Testing

3.4.1 Internal Validity Testing

Validity refers to whether the questionnaire or survey measures what it is intended to

measure. Internal validity testing is a method for checking how accurately the

instrument measures the underlying phenomenon of interest. The validity of the

instrument was determined with content-related testing. This test was established

through a panel of experts chosen based on their familiarity with the concepts of

information technology, consumer behaviours and research methodology. The chosen

expert panel was comprised of:

1) Professor Dr. Sulyuth Sawangwan, an instructor at the Royal Thai Air Force

Academy. He is an expert in the field of information technology.

2) Associate Professor Anuruk Chotidirok, an instructor at the Royal Thai Air Force

Academy. He is an expert in the field of research methodology.

3) Mr. Atcha Yamkesorn, consultant at The Association of Researchers of Thailand.

He is an expert in the field of research methodology.

The panel of experts was requested to evaluate the questionnaire on clarity of using the

Thai language in the questionnaire, the clarity of the instructions and questions on the

questionnaire, and the comprehensibility of the questionnaire. The researcher contacted

each member to explain the details of the study and their role in inspecting this

instrument. Each of them was, then, given a questionnaire for review and return the

instruments with their comments to the researcher within one week. The next phase of

the construct content and face validity of the instrument was to revise the instrument

based on the suggestions from the experts.

3.4.2 Reliability Testing

Reliability refers to the consistency of a measure. The primary purpose of the pilot testing

was to determine the consistency of measurement instruments and to identify potential

problems that might occur during the formal data collection phase. The reliability of a

measurement instrument concerns whether it produces identical results in repeated

applications.

Page 63: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

46

After passing the internal validity testing, the researcher conducted a pilot study used a

separate sample of 30 participants who use smartphones. The data were tested for reliability

through the internal consistency method, specifically Cronbach’s Alpha. Further, an item

analysis was conducted on the questionnaire to determine the measure of internal

consistency or Cronbach Alpha measure. The internal consistency of this instrument, as

shown in Table 3.3, showed that the Cronbach Alpha of each domain was .70 or higher,

demonstrating an acceptable level of internal consistency (Nunnally, 1978: 245).

Table 3.3: Reliability of the Questionnaire

Constructs Number of

Items Cronbach

Alpha

Perceived Severity 3 .752

Perceived Vulnerability 3 .726

Response Effectiveness 3 .835

Self-efficacy 4 .881

Social Influences 4 .806

Threat Appraisal 4 .801

Coping Appraisal 3 .769

Protection Motivation 4 .823

Protection Behaviour 5 .738

3.5 Data Analysis

The surveyed data were analyzed with descriptive statistics. Frequency and percentage

calculations were performed on categorized data such as genders or educations of

smartphone users. Mean and standard deviation calculations were performed on ordinal

data such as perceptions and behaviours of smartphone users. The comparisons of mean

and standard deviation of smartphone users’ perceptions and behaviours between different

groups (such as male and female) were performed via t-test and ANOVA (Analysis of

Variance). The t-test was used to compare means between two groups while ANOVA was

used to compare means between 3 groups or more.

Page 64: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

47

Finally, the causal relationship among exogenous variables and endogenous variables

defined in the conceptual model of this study were explored with the SEM (Structural

Equation Modeling) technique.

3.6 Conclusion

This chapter covers the research design which includes the research methodologies,

creating and testing the questionnaire, defining steps for gathering the data, and

statistical methods used for analyzing the data. The data and results from the survey are

described in the two subsequent chapters. Chapter 3 provides the details of the survey

methodology, tools, and analysis. It includes target group for sampling, sample size,

instrument design, validity and reliability testing, and data analysis used in this study

and Chapter 4 contains the survey findings, including the descriptive results of the

demographics and behaviours of smartphone users. In addition, comparisons of the

perceptions on the PMT’s constructs among difference categories of Thai smartphone

users are deliberated Chapter 4.

Page 65: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

48

CHAPTER 4 DEMOGRAPHIC AND BEHAVIOURS OF THAI SMARTPHONE

USERS

In this chapter, the data were analyzed with descriptive statistic, t-test and ANOVA.

The analysis results computed by using the SPSS software package are shown in

Appendix C.

4.1 Smartphone Users in Thailand

4.1.1 Demographic data of Smartphone Users in Thailand

A detailed breakdown in terms of the demographics from the samples is shown in

Figure 4.1 and Table 4.1.

Figure 4.1: Percentage of Demographic Data

-

10.0

20.0

30.0

40.0

50.0

60.0

Mal

e

Fem

ale

18

–2

2 Y

ears

Old

23

–3

0 Y

ears

Old

31

–4

0 Y

ears

Old

41

–5

0 Y

ears

Old

51

–6

0 Y

ears

Old

Bel

ow

Bac

hel

or

Deg

ree

Bac

hel

or

De

gree

Mas

ter

Deg

ree

or

Ab

ove

Stu

den

t

Entr

epre

neu

r

Go

vern

men

t Em

plo

yee

Stat

e En

terp

rise

Co

mp

any

Emp

loye

e

No

Em

plo

ymen

t

Less

th

an 1

5,0

00

Bh

t.

15

,00

1 -

30

,00

0 B

ht.

30

,00

1 -

40

,00

0 B

ht.

40

,00

1 –

50

,00

0 B

ht.

50

,00

1 B

ht.

or

abo

ve

47.8 52.2

20.0 21.1

21.0 20.0

17.9

45.1 44.6

10.3

22.5 20.6

19.7

2.2

24.4

10.6

43.2

25.4

12.8 11.1

7.5

Gender Age Education Employment Monthly Income

Page 66: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

49

Table 4.1: Demographic Data of the Samples

Demographic Data

Number of Samples N = 720

n %

Gender

Male 344 47.8

Female 376 52.2

Age

18 – 22 Years Old 144 20.0

23 – 30 Years Old 152 21.1

31 – 40 Years Old 151 21.0

41 – 50 Years Old 144 20.0

51 – 60 Years Old 129 17.9

Education

Below Bachelor Degree 325 45.1

Bachelor Degree 321 44.6

Master Degree or Above 74 10.3

Occupation

Student 162 22.5

Entrepreneur 148 20.6

Government Employee 142 19.7

State Enterprise 16 2.2

Company Employee 176 24.4

Page 67: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

50

Demographic Data

Number of Samples N = 720

n %

No Employment 76 10.6

Monthly Income

Less than 15,000 Bht. 311 43.2

15,001 - 30,000 Bht. 183 25.4

30,001 - 40,000 Bht. 92 12.8

40,001 – 50,000 Bht. 80 11.1

50,001 Bht. or above 54 7.5

Note: 33 Baht = 1 USD.

Table 4.1 above shows that the total number of sample size taken was 720. Out of this,

47.8% of the total (or 344 samples) were male and the rest 52.2% were female. The

samples age between 18 years to 60 years old and they were divided into 5 ranges, each

range has around 20% of the total sample size. When analyzing the data for education,

45.1% of samples have below bachelor degree, 44.6% were at bachelor degree level,

and the rest 10.3% have degree at master level or above. When analyzing the data for

occupation, 24.4% of samples were company employees, 22.5% were students, 20.6%

were entrepreneurs, 19.7% were government employees, 10.6% have no occupation (or

housekeeper), and the rest 2.2% were state enterprises. In terms of income, the majority

of 43.2% have incomes less than 15,000Bht. a month, 25.4% have incomes between

15,001 - 30,000Bht. a month, 12.8% have 30,001– 40,000 Bht. a month, 11.1% have

40,001 - 50,000 Bht. a month, and the rest 7.5% have 50,001 Bht. or above per month.

Page 68: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

51

4.1.2 Demographic data of Smartphone Users by Region

Next, the breakdowns on the demographic data of sample categorized by regions are

illustrated in the following figures and tables.

The gender of the samples categorized by region is shown in Figure 4.2 and Table 4.2.

It illustrates the ratios between males and females collected from each region were

about 50% each.

Figure 4.2: Percentage of Sample’s Gender by Region

Table 4.2: Number and Percentage of Sample’s Gender by Region

BKK & Metro.

Northern North

Eastern Eastern

Central Reg.

Southern

Gender n % n % n % n % n % n %

Male 55 45.8 56 46.7 61 50.8 60 50.0 57 47.5 55 47.8

Female 65 54.2 64 53.3 59 49.2 60 50.0 63 52.5 65 52.2

Total 120 100.0 120 100.0 120 100.0 120 100.0 120 100.0 120 100.0

40.0

42.0

44.0

46.0

48.0

50.0

52.0

54.0

56.0

BKK &Metro.

Northern NorthEastern

Eastern CentralRegion

Southern

45.8 46.7

50.8 50.0

47.5 47.8

54.2 53.3

49.2 50.0

52.5 52.2

Male Female

Page 69: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

52

The next figures show the percentage of sample’s age ranges by region. It was planned to

collect equal number of sample (around 20%) for each age ranges, spanned from 18 – 22

years old, 23 – 30 years old, 31 – 40 years old, 41 – 50 years old, and 51 – 60 years old.

However, the number of sample of each age ranges of Bangkok & Metropolitan area were

a bit deviant from 20% as planned. Details are shown in Figure 4.3 and Table 4.3.

Figure 4.3: Percentage of Sample’s Age by Region

Table 4.3: Number and Percentage of Sample’s Age by Region

BKK & Metro.

Northern North

Eastern Eastern

Central Reg.

Southern

Age n % n % n % n % n % n %

18 - 22 19 15.8 24 20.0 25 20.8 25 20.8 28 23.3 23 20.0

23 – 30 32 26.7 24 20.0 24 20.0 24 20.0 24 20 24 21.1

31 – 40 30 25.0 27 22.5 23 19.2 24 20.0 22 18.3 25 21.0

41 – 50 26 21.7 25 20.8 25 20.8 23 19.2 21 17.5 24 20.0

51 – 60 13 10.8 20 16.7 23 19.2 24 20.0 25 20.8 24 17.9

Total 120 100.0 120 100.0 120 100.0 120 100.0 120 100.0 120 100.0

-

5.0

10.0

15.0

20.0

25.0

30.0

BKK & Metro. Northern North Eastern Eastern CentralRegion

Southern

15.8

20.0 20.8 20.8

23.3

20.0

26.7

20.0 20.0 20.0 20.0 21.1

25.0

22.5

19.2 20.0

18.3

21.0 21.7 20.8

20.8 19.2

17.5 20.0

10.8

16.7 19.2

20.0 20.8

17.9

18 - 22 23 – 30 31 – 40 41 – 50 51 – 60

Page 70: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

53

The distribution of sample’s education by region is shown in Figure 4.4 and Table 4.4.

The bar-chart shows that most samples from Bangkok & Metropolitan and Northern

areas had Bachelor degree, while samples of North Eastern, Central Region, and

Southern had almost equal percentage in Below Bachelor degree and Bachelor degree.

However, most samples from the Eastern area had Bachelor degree.

Figure 4.4: Percentage of Samples’ Education by Region

Table 4.4: Number and Percentage of Samples’ Education by Region

BKK & Metro.

Northern North

Eastern Eastern

Central Reg.

Southern

Education n % n % n % n % n % n %

Below Bachelor

20 16.7 45 37.5 56 46.7 83 69.2 50 41.7 71 45.1

Bachelor 74 61.7 66 55.0 49 40.8 35 29.2 55 45.8 42 44.6

Master or Above

26 21.7 9 7.5 15 12.5 2 1.7 15 12.5 7 10.3

Total 120 100.0 120 100.0 120 100.0 120 100.0 120 100.0 120 100.0

-

10.0

20.0

30.0

40.0

50.0

60.0

70.0

BKK & Metro. Northern North Eastern Eastern CentralRegion

Southern

16.7

37.5

46.7

69.2

41.7 45.1

61.7 55.0

40.8

29.2

45.8 44.6

21.7

7.5 12.5

1.7

12.5 10.3

Below Bachelor Bachelor Master or Above

Page 71: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

54

The occupations of the samples are distributed in 6 ranges, including: student;

entrepreneur; government employee; state enterprise; company employee; and no

employment. It was obvious that most samples of Bangkok & Metropolitan area were

company employees, of Eastern area were entrepreneurs, and of central region area

were government employees. Details are shown in Figure 4.5 and Table 4.5.

Figure 4.5: Percentage of Sample’s Education by Region

Table 4.5: Number and Percentage of Sample’s Education by Region

BKK & Metro.

Northern North

Eastern Eastern

Central Reg.

Southern

Occupation n % n % n % n % n % n %

Student 26 21.7 33 27.5 36 30.0 11 9.2 34 28.3 22 22.5

Entrepreneur 11 9.2 23 19.2 31 25.8 57 47.5 7 5.8 19 20.6

Government Employee

3 2.5 20 16.7 14 11.7 5 4.2 63 52.5 37 19.7

State Enterprise

3 2.5 4 3.3 3 2.5 1 0.8 3 2.5 2 2.2

Company Employee

66 55.0 33 27.5 27 22.5 19 15.8 10 8.3 21 24.4

No Employment

11 9.2 7 5.8 9 7.5 27 22.5 3 2.5 19 10.6

Total 120 100.0 120 100.0 120 100.0 120 100.0 120 100.0 120 100.0

-

10.0

20.0

30.0

40.0

50.0

60.0

BKK & Metro. Northern North Eastern Eastern CentralRegion

Southern

21.7

27.5 30.0

9.2

28.3

22.5

9.2

19.2 25.8

47.5

5.8

20.6

2.5

16.7 11.7

4.2

52.5

19.7

2.5 3.3 2.5 0.8 2.5 2.2

55.0

27.5 22.5

15.8

8.3

24.4

9.2 5.8 7.5

22.5

2.5

10.6

Student Entrepreneur Government Employee

State Enterprise Company Employee No Employment

Page 72: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

55

Figure 4.6 and Table 4.6 show the monthly incomes of the samples categorized by

region. It was shown that most samples from Bangkok & Metropolitan, Northern,

Northeastern, Central Region, and Southern had income below 15,000 baht per month,

except most samples in the Eastern region which had income between 15,001 – 30,000

baht per month.

Figure 4.6: Percentage of Samples’ Monthly Income by Region

Table 4.6: Number and Percentage of Samples’ Monthly Income by Region

BKK & Metro.

Northern North

Eastern Eastern

Central Reg.

Southern

Monthly Income

n % n % n % n % n % n %

Less than 15,000 Baht

36 30.0 59 49.2 50 41.7 37 30.8 62 51.7 67 43.2

15,001 - 30,000 Baht

26 21.7 31 25.8 32 26.7 42 35.0 28 23.3 24 25.4

30,001 - 40,000 Baht

15 12.5 13 10.8 16 13.3 21 17.5 12 10.0 15 12.8

40,001 - 50,000 Baht

23 19.2 6 5.0 16 13.3 11 9.2 13 10.8 11 11.1

50,001 Baht or above

20 16.7 11 9.2 6 5.0 9 7.5 5 4.2 3 7.5

Total 120 100.0 120 100.0 120 100.0 120 100.0 120 100.0 120 100.0

-

10.0

20.0

30.0

40.0

50.0

60.0

BKK & Metro. Northern North Eastern Eastern Central Region Southern

30.0

49.2

41.7

30.8

51.7

43.2

21.7 25.8 26.7

35.0

23.3 25.4

12.5 10.8 13.3

17.5

10.0 12.8

19.2

5.0

13.3

9.2 10.8 11.1

16.7

9.2 5.0

7.5 4.2

7.5

Less than 15,000 Baht 15,001 - 30,000 Baht 30,001 - 40,000 Baht

40,001 - 50,000 Baht 50,001 Baht or above

Page 73: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

56

4.2 Behaviours of Thai Smartphone Users 4.2.1 Overall General Behaviours of Thai Smartphone Users

General behaviours of smartphone users encompass the users’ characteristics in using

smartphone such as service provider they selected, type of operating systems, losing

their smartphones, their smartphone infected by virus and others. Figure 4.7 and

Table 4.7 provide a detailed breakdown of in terms of the samples’ general behaviours

in using smartphones.

Figure 4.7: Overall Behaviours of Smartphone Users

Table 4.7: Number and Percentage of Sample’s Behaviour in Using Smartphone

Behaviours

Number of Samples (N = 720)

n %

Phone Service

Truemove 161 22.4

DTACT 219 30.4

AIS 335 46.5

Don’t know 5 0.7

Phone O.S.

-

10.0

20.0

30.0

40.0

50.0

60.0

70.0

80.0

Tru

em

ove

DTA

CT

AIS

Do

n’t

kn

ow

iOS

An

dro

id

Win

do

ws

Sym

bia

n

Do

n’t

kn

ow

Oth

ers

No

Yes

No

Yes

Nev

er

Som

etim

es

Alw

ays

Nev

er

Som

etim

es

Alw

ays

22.4

30.4

46.5

0.7

36.0

53.1

3.6 0.8

5.6 1.0

73.9

26.1

68.8

31.3

39.4

46.3

14.3

58.2

30.4

11.4

Service Provider Operating System Phone Lost Virus Infected Use Public Wifi Transfer Money

Page 74: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

57

Behaviours

Number of Samples (N = 720)

n %

iOS 259 36.0

Android 382 53.1

Windows 26 3.6

Symbian 6 0.8

Don’t know 40 5.6

Others 7 1.0

Phone Loss

No 532 73.9

Yes 188 26.1

Virus Infection

No 495 68.8

Yes 225 31.3

Use Free Public Wi-Fi

Never 284 39.4

Sometimes 333 46.3

Always 103 14.3

Transferring Money

Never 419 58.2

Sometimes 219 30.4

Always 82 11.4

Table 4.7 above shows that the majority of 46.5% of samples were using AIS service

provider, 30.4% were DTACT, and 22.4% were True move. For operating system, the

majority of the system in used was Android at 53.1% following by IOS at 36.0%,

Page 75: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

58

Windows phone 3.6%, Symbian 0.8%, don’t know 5.6%, and other system not listed

above at 1%. When asked if samples had ever lost their phone, 73.9% indicated that

they have never lost their phone while 26.1% have lost their phone in the past. When

asked if the samples smartphones have been infected with a virus 68.8% said they have

never been infected whereas 31.3% believed they phone has been infected at some

point. When asked if the samples have ever used public Wi-Fi 33.9% said they have

never used a public Wi-Fi whereas 46.3% indicated that they use public Wi-Fi at some

point and 14.3% indicated that they are always connected to public Wi-Fi when it’s

available to them. Next the samples were asked if they have ever transferred or made

payment via their smartphone such as access to mobile banking and email commerce

websites. 58.3% indicated that they have never used, 30.4% indicated that they used it

sometimes and 11.4% used it on a daily basis.

4.2.2 General Behaviours of Smartphone Users by Region

For phone service provider, the result shows that samples preferred to use AIS in most

regions, except North Eastern where DTACT was a little more popular. Details show

in Figure 4.8 and Table 4.8.

Figure 4.8: Percentage of Phone Service Usage by Region

-

10.0

20.0

30.0

40.0

50.0

60.0

BKK&Metro.

Northern NorthEastern

Eastern CentralRegion

Southern

28.3 23.3

20.8 15.8

27.5 22.4

32.5

40.0

22.5

40.8

23.3 30.4

39.2 35.8

56.7

42.5 46.7 46.5

- 0.8 - 0.8 2.5 0.7

Truemove DTACT AIS Don’t know

Page 76: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

59

Table 4.8: Number and Percentage of Preferred Phone Service by Region

Service Provider

Region

BKK& Metro.

Northern

North Eastern

Eastern

Central Region

Southern

n % n % n % n % n % n %

Truemove 34 28.3 28 23.3 25 20.8 19 15.8 33 27.5 22 22.4

DTACT 39 32.5 48 40.0 27 22.5 49 40.8 28 23.3 28 30.4

AIS 47 39.2 43 35.8 68 56.7 51 42.5 56 46.7 70 46.5

Don’t know

0 0.0 1 0.8 0 0.0 1 0.8 3 2.5 0 0.7

Total 120 100.0 120 100.0 120 100.0 120 100.0 120 100.0 120 100.0

Next is the distribution of preferred operating systems used by the samples. Figure 4.9

and Table 4.9 show that Android was the most popular operating system in most

regions except Northern where iOS was more preferred.

Figure 4.9: Percentage of Operating System Usage by Region

-

10.0

20.0

30.0

40.0

50.0

60.0

70.0

BKK&Metro.

Northern NorthEastern

Eastern CentralRegion

Southern

41.7 50.0

31.7 34.2

28.3 30.0

55.0

41.7 50.0

55.8 61.7

54.2

1.7

1.7 11.7

1.7 1.7 3.3

- 0.8 - -3.3 0.8

0.8 5.0 5.8 6.7 4.2 10.8

0.8 0.8 0.8 1.7 0.8 0.8

iOS Android Windows Symbian Don’t know Others

Page 77: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

60

Table 4.9: Number and Percentage of Operating System Usage by Region

Phone O.S.

Region

BKK& Metro.

Northern

North Eastern

Eastern

Central Region

Southern

n % n % n % n % n % n %

iOS 50 41.7 60 50.0 38 31.7 41 34.2 34 28.3 36 30.0

Android 66 55.0 50 41.7 60 50.0 67 55.8 74 61.7 65 54.2

Windows 2 1.7 2 1.7 14 11.7 2 1.7 2 1.7 4 3.3

Symbian 0 0.0 1 0.8 0 0.0 0 0.0 4 3.3 1 0.8

Don’t know 1 0.8 6 5.0 7 5.8 8 6.7 5 4.2 13 10.8

Others 1 0.8 1 0.8 1 0.8 2 1.7 1 0.8 1 0.8

Total 120 100.0 120 100.0 120 100.0 120 100.0 120 100.0 120 100.0

One interesting piece of data analyzed from the responses is in term of phone loss. The

result shows that Bangkok & Metropolitan had the highest percentage of phone loss (at

37.5%), followed with Central Region (29.2%) and Southern (26.1%). Details are

shown in Figure 4.10 and Table 4.10.

Figure 4.10: Percentage of Phone Loss by Region

-

5.0

10.0

15.0

20.0

25.0

30.0

35.0

40.0

BKK&Metro.

Northern NorthEastern

Eastern CentralRegion

Southern

37.5

24.2 20.0 21.7

29.2 26.1

Page 78: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

61

Table 4.10: Number and Percentage of Phone Loss by Region

Phone Loss

Region

BKK& Metro.

Northern

North Eastern

Eastern

Central Region

Southern

n % n % n % n % n % n %

No 75 62.5 91 75.8 96 80.0 94 78.3 85 70.8 91 73.9

Yes 45 37.5 29 24.2 24 20.0 26 21.7 35 29.2 29 26.1

Total 120 100.0 120 100.0 120 100.0 120 100.0 120 100.0 120 100.0

When focusing on virus infection, the result shows that Bangkok & Metropolitan had

the highest percentage of people who experienced with virus infection on their phones

(40.0%), follows with Central Region (37.5%) and Southern (31.3%). Details are

shown in Figure 4.11 and Table 4.11.

Figure 4.11: Percentage of Smartphones Infected by Virus in Each Region

-

10.0

20.0

30.0

40.0

BKK&Metro.

Northern NorthEastern

Eastern CentralRegion

Southern

40.0

28.3 24.2

20.0

37.5

31.3

Page 79: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

62

Table 4.11: Number and Percentage of Phone Infected by Virus by Region

Virus Infection

Region

BKK& Metro.

Northern

North Eastern

Eastern

Central Region

Southern

n % n % n % n % n % n %

No 72 60.0 86 71.7 91 75.8 96 80.0 75 62.5 75 68.8

Yes 48 40.0 34 28.3 29 24.2 24 20.0 45 37.5 45 31.3

Total 120 100.0 120 100.0 120 100.0 120 100.0 120 100.0 120 100.0

Free public Wi-Fi are internet services offered in many places, such as, restaurants,

shopping malls, and hotels. The following bar-chart shows the percentage of people

who preferred to connect their smartphones to the free public Wi-Fi. Obviously,

Bangkok & Metropolitan had the highest percentage of using free public Wi-Fi

(75.0%), followed with Central Region (71.7%) and Northern (64.2%). Details are

shown in Figure 4.12 and Table 4.12.

Figure 4.12: Percentage of People who Use Public Wi-Fi by Region

-

20.0

40.0

60.0

80.0

BKK&Metro.

Northern NorthEastern

Eastern CentralRegion

Southern

25.0

35.8

53.3 62.5

28.3

39.4

53.3 45.8

38.3 32.5

58.4

46.3

21.7 18.3

8.3 5.0 13.3 14.3

Never Sometimes Always

Page 80: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

63

Table 4.12: Number and Percentage of People who Use Public Wi-Fi by Region

Use Public Wi-Fi

Region

BKK& Metro.

Northern

North Eastern

Eastern

Central Region

Southern

n % n % n % n % n % n %

Never 30 25.0 43 35.8 64 53.3 75 62.5 34 28.3 38 39.4

Sometimes 64 53.3 55 45.8 46 38.3 39 32.5 70 58.4 59 46.3

Always 26 21.7 22 18.3 10 8.3 6 5.0 16 13.3 23 14.3

Total 120 100.0 120 100.0 120 100.0 120 100.0 120 100.0 120 100.0

For using smartphone to transfer money, it became apparent that people in Bangkok &

Metropolitan had the highest percentage in using this service (65.8%), followed with

Northern (42.5%), Southern (41.8%) and Central Region (41.7%). Details are shown in

Figure 4.13 and Table 4.13.

Figure 4.13: Percentage of People who Transferred Money through their Phones by Region

-

20.0

40.0

60.0

80.0

BKK&Metro.

Northern NorthEastern

Eastern CentralRegion

Southern

34.2

57.5

68.3 75.0

58.3 58.2

44.2

26.7 27.5 17.5

30.1 30.4 21.7

15.8 4.2 7.5 11.6 11.4

Never Sometimes Always

Page 81: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

64

Table 4.13: Number and Percentage of People who Transfer Money through their

Phones by Region

Transfer Money

Region

BKK& Metro.

Northern

North Eastern

Eastern

Central Region

Southern

n % n % n % n % n % n %

Never 41 34.2 69 57.5 82 68.3 90 75.0 70 58.3 67 58.2

Sometimes 53 44.2 32 26.7 33 27.5 21 17.5 36 30.1 44 30.4

Always 26 21.7 19 15.8 5 4.2 9 7.5 14 11.6 9 11.4

Total 120 100.0 120 100.0 120 100.0 120 100.0 120 100.0 120 100.0

In conclusion, it is evident that the behaviours of smartphone users in BKK &

Metropolitan were quite different from other five regions, namely Northern, North

Eastern, Eastern, Central Region, and Southern, in many aspects. Thus, the researcher

combined all five regions into one variable called “Upcountry” for further analysis

purpose.

4.2.3 General Behaviours of Smartphone Users by Age

Concerning phone service providers, it was clear that most samples in all age

ranges preferred AIS, followed with DTACT and Truemove. Details are shown in

Figure 4.14 and Table 4.14.

Page 82: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

65

Figure 4.14: Percentage of Phone Service Usage by Age

Table 4.14: Number and Percentage of Phone Service Usage by Age

Service Provider

Age Range (Years Old)

18 – 22 23 – 30 31 – 40 41 – 50 51 – 60

n % n % n % n % n %

Truemove 38 26.4 37 24.3 33 21.9 30 20.8 23 17.8

DTACT 39 27.1 52 34.2 46 30.5 40 27.8 42 32.6

AIS 65 45.1 63 41.4 72 47.7 73 50.7 62 48.1

Don’t know

2 1.4 0 0.0 0 0.0 1 0.7 2 1.6

Total 144 100.0 152 100.0 151 100.0 144 100.0 129 100.0

.0

10.0

20.0

30.0

40.0

50.0

60.0

18 - 22 Years Old 23 - 30 Years Old 31 - 40 Years Old 41 - 50 Years Old 51 - 60 Years Old

26.424.3

21.9 20.817.8

27.1

34.230.5

27.8

32.6

45.1

41.4

47.7 50.748.1

1.4 .0 .0 .71.6

Truemove DTACT AIS Don’t know

Page 83: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

66

For operating system used in the phone, the result shows that people of all age ranges

preferred to use Android to iOS. Surprisingly, 20.2% of people of ages 51 – 60 did not

know what operating system they were using. Details are shown in Figure 4.15 and

Table 4.15.

Figure 4.15: Percentage of Operating System Usage by Age

Table 4.15: Number and Percentage of Operating System Usage by Age

Operating System

Age Range (Years Old)

18 – 22 23 – 30 31 – 40 41 – 50 51 – 60

n % n % n % n % n %

iOS 57 39.6 62 40.8 69 45.7 46 31.9 25 19.4

Android 76 52.8 81 53.3 74 49.0 83 57.6 68 52.7

Windows 1 0.7 4 2.6 5 3.3 9 6.3 7 5.4

Symbian 5 3.5 0 0.0 0 0.0 0 0.0 1 0.8

Don’t know

4 2.8 3 2.0 2 1.3 5 3.5 26 20.2

Others 1 0.7 2 1.3 1 0.7 1 0.7 2 1.6

Total 144 100.0 152 100.0 151 100.0 144 100.0 129 100.0

-

10.0

20.0

30.0

40.0

50.0

60.0

18 - 22 Years Old 23 - 30 Years Old 31 - 40 Years Old 41 - 50 Years Old 51 - 60 Years Old

39.6 40.8

45.7

31.9

19.4

52.8 53.3 49.0

57.6

52.7

0.7 2.6 3.3

6.3 5.4

3.5 - - - 0.8

2.8

2.0 1.3 3.5

20.2

0.7 1.3 0.7 0.7 1.6

iOS Android Windows Symbian Don’t know Others

Page 84: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

67

When considering phone loss, the result shows that people ages 18 – 22 years old had

lost their phones at the highest percentage (34.0% of people in their age range),

followed with 23 – 30 years old (28.9%), and 31 – 40 years old (25.2%). Details are

shown in Figure 4.16 and Table 4.16.

Figure 4.16: Percentage of Phone Loss by Age

Table 4.16: Number and Percentage of Phone Loss by Age

Phone Loss

Age Range (Years Old)

18 – 22 23 – 30 31 – 40 41 – 50 51 – 60

n % n % n % n % n %

No 95 66.0 108 71.1 113 74.8 108 75.0 108 83.7

Yes 49 34.0 44 28.9 38 25.2 36 25.0 21 16.3

Total 144 100.0 152 100.0 151 100.0 144 100.0 129 100.0

-

5.0

10.0

15.0

20.0

25.0

30.0

35.0

18 - 22 YearsOld

23 - 30 YearsOld

31 - 40 YearsOld

41 - 50 YearsOld

51 - 60 YearsOld

34.0

28.9 25.2 25.0

16.3

Page 85: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

68

For Virus Infection, the results show similar patterns to phone loss. Users age 18 -22

had the highest percentage of virus infection (42.4% of sample in their age range),

followed by the group ages 23 – 30 years old (35.5%), and ages 31 – 40 years old

(33.1%). Details are shown in Figure 4.17 and Table 4.17.

Figure 4.17: Percentage of Phone Infected by Virus of Each Age Group

Table 4.17: Number and Percentage of Phone Infected by Virus by Age

Virus Infected

Age Range (Years Old)

18 – 22 23 – 30 31 – 40 41 – 50 51 – 60

n % n % n % n % n %

No 83 57.6 98 64.5 101 66.9 105 72.9 108 83.7

Yes 61 42.4 54 35.5 50 33.1 39 27.1 21 16.3

Total 144 100.0 152 100.0 151 100.0 144 100.0 129 100.0

-

5.0

10.0

15.0

20.0

25.0

30.0

35.0

40.0

45.0

18 - 22 YearsOld

23 - 30 YearsOld

31 - 40 YearsOld

41 - 50 YearsOld

51 - 60 YearsOld

42.4

35.5 33.1

27.1

16.3

Page 86: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

69

When focusing on using public Wi-Fi, the result shows that smartphone 74.3% of

smartphone users of ages 23 – 30 years old used free public Wi-Fi, followed by18 – 22

year olds (73.6%), and 31 – 40 years old (67.5%). On the other hand, only 30.2% of

ages 51 – 60 years old used free public Wi-Fi. Details are shown in Figure 4.18 and

Table 4.18.

Figure 4.18: Percentage of People who Use Public Wi-Fi by Age

Table 4.18: Number and Percentage of People who Use Public Wi-Fi by Age

Use Public Wi-Fi

Age Range (Years Old)

18 – 22 23 – 30 31 – 40 41 – 50 51 – 60

n % n % n % n % n %

Never 38 26.4 39 25.7 49 32.5 68 47.2 90 69.8

Sometimes 78 54.2 92 60.5 76 50.3 51 35.4 36 27.9

Always 28 19.4 21 13.8 26 17.2 25 17.4 3 2.3

Total 144 100.0 152 100.0 151 100.0 144 100.0 129 100.0

-

10.0

20.0

30.0

40.0

50.0

60.0

70.0

18 - 22 YearsOld

23 - 30 YearsOld

31 - 40 YearsOld

41 - 50 YearsOld

51 - 60 YearsOld

26.4 25.7 32.5

47.2

69.8

54.2 60.5

50.3

35.4

27.9

19.4 13.8 17.2 17.4

2.3

Never Sometimes Always

Page 87: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

70

For transferring money, the result shows that 57.6% of smartphone users of ages 31 –

40 years old transferred money through their phones, and 54.6% of ages 23 – 30 years

old used this service. However, only 10.1% of ages 51 – 60 years old used this service.

Details are shown in Figure 4.19 and Table 4.19.

Figure 4.19: Percentage of People who Transferred Money by Phone

Table 4.19: Number and Percentage of People who Transferred Money by Phone

Transfer Money

Age Range (Years Old)

18 – 22 23 – 30 31 – 40 41 – 50 51 – 60

n % n % n % n % n %

Never 78 54.2 69 45.4 64 42.4 92 63.9 116 89.9

Sometimes 54 37.5 60 39.5 55 36.4 38 26.4 12 9.3

Always 12 8.3 23 15.1 32 21.2 14 9.7 1 0.8

Total 144 100.0 152 100.0 151 100.0 144 100.0 129 100.0

-

20.0

40.0

60.0

80.0

100.0

18 - 22 YearsOld

23 - 30 YearsOld

31 - 40 YearsOld

41 - 50 YearsOld

51 - 60 YearsOld

54.2 45.4 42.4

63.9

89.9

37.5 39.5 36.4 26.4

9.3 8.3

15.1 21.2

9.7 0.8

Never Sometimes Always

Page 88: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

71

4.3 Overall Means of Constructs of Protection Behaviour Model

The overall means of Constructs of protection behaviour of Thai smartphone users in

Figure 4.20 and Table 4.20 show that only 7 constructs, including Perceived Severity,

Perceived Vulnerability, Response Effectiveness, Self-efficacy, Coping Appraisal,

Protection Motivation, and Protection Behaviour were in between 3.48 - 3.85 which

were in “high-level” range and the details were explained in Section 3.3.2 of

Chapter 3. Among these constructs, Perceived Severity had the highest mean of 3.85,

followed with Protection Behaviour with the mean of 3.62, and Perceived Vulnerability

with the mean of 3.58. There were two constructs, namely Social Influence and Threat

Appraisal, were at “neutral-level” range with the means of 3.34 and 3.40 respectively.

Figure 4.20: Behaviours of Smartphone Users

Table 4.20: Protection Behaviour Constructs of Smartphone Users in Thailand

Behaviours X S.D. Level

Perceived Severity: Severity of consequences of

cyber threats on smartphone 3.85 .753 high

Perceived Vulnerability: Probability that smartphone

may be attacked by cyber threats 3.58 .829 high

Social Influence: Perceived social pressure to

perform or not perform a given behaviour 3.34 .853 neutral

Response Effectiveness: Effectiveness of the

recommended behaviour in avoiding the negative

consequence

3.57 .783 high

2.0

2.5

3.0

3.5

4.0

Persev PerVuln SocInfe ResEffe SelEffi ThrAppr CopAppr BehMoti ProBeha

3.853.58

3.343.57 3.55

3.40 3.48 3.53 3.62

Page 89: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

72

Behaviours X S.D. Level

Self-efficacy: The extent that a person can perform

the recommended behaviour successfully 3.55 .839 high

Threat Appraisal: Assessment of the level of danger

on smartphone posed by the threat 3.40 .827 neutral

Coping Appraisal: Assessment of ability to cope with

and avert the potential loss or damage resulting from

the danger

3.48 .772 high

Protection Motivation: Intention to perform the

recommended behaviour 3.53 .783 high

Protection Behaviour: Performing the recommended

behaviour 3.62 .747 high

4.4 Compare Means of Constructs of Protection Behaviours Model

4.4.1 Means of Constructs by Gender

Using descriptive statistic, the samples were categorized by gender and the pie chart in

Figure 4.21 shows that, from a total of 720 samples, 344 (47.8%) were males and 376

(52.2%) were female.

Figure 4.21: Gender of Samples

Page 90: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

73

By using t-test statistic to compare the mean differences of all the constructs by gender,

the result shows that male’s Response Effectiveness (with a mean of 3.64) was 0.14

higher than female’s (3.58) at .05 statistically significant level. Details are shown in

Figure 4.22.

Figure 4.22: Comparison of the Model Constructs by Gender

4.4.2 Means of Constructs by Age

The age spectrum of samples of this study were between 18 – 60 years old and they

were divided into 5 different age groups: 18 – 22 years old, 22 – 30 years old, 31 – 40

years old, 41 – 50 years old, and 51 – 60 years old. In each group, around 120 samples

were collected and the details are shown in Figure 4.23.

Figure 4.23: Age of Samples

When considering the comparison between Thai smartphone users on the proposed

model’s constructs by age, the results are shown in Figure 4.24.

3.0

3.2

3.4

3.6

3.8

4.0

PerSev PerVuln SocInflu ResEffec SelEffi ThrAppr CopAppr ProMoti ProBeha

3.86

3.57

3.28

3.64 3.61

3.453.52 3.54

3.64

3.84

3.58

3.383.50 3.50

3.353.44

3.523.61

Male Female

Page 91: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

74

Figure 4.24: Comparison of the Model Constructs by Age

Each constructs can be explained as follows:

1) for Perceived Severity, the group of ages 51 – 60 had the largest mean in

Perceived Severity (with a mean of 3.93), followed by the group of ages 31 – 40 (3.92),

and ages 23 – 30 (3.87).The group of ages 18 – 22 had the lowest mean (3.69). With

the use of ANOVA for comparing means of Perceived Severity between 5 different age

groups, the result shows that there were no significance differences among these means

(at .05 statistically significance level);

2) considering Perceived Vulnerability, the top three groups with the high mean

were users of ages 31 – 40 (3.69), ages 41 – 50 (3.64), and ages 23 – 30 (3.61)

respectively, while users of ages 18 – 22 had the lowest mean (3.44). Nevertheless, the

ANOVA result shows that these mean have no significance differences (at .05

statistically significance level);

3) for Social Influence, the bar chart shows that group ages 18 – 50 had mean

in between 3.38 - 3.41. Surprisingly, the group of ages 51 – 60 had a very low mean of

3.04.When comparing the mean of Social Influence among difference age groups by

using ANOVA (Appendix C), the result shows that smartphone users of ages 51 – 60

had lower mean in Social Influence (with a mean of 3.04) than all other groups, namely

ages 18 – 22 (with a mean of 3.38), ages 23 – 30 (3.41), ages 31 – 40 (3.41), and ages

41 – 50 (3.40), all at .05 statistically significance level. Thus, it was clear that

smartphone users of ages 51 -60 had less influence form social than other groups in

protecting themselves from smartphone threats;

3.0

3.2

3.4

3.6

3.8

4.0

4.2

PerServ PerVuln SocInflu ResEffec SelEffi ThrAppr CopAppr ProMoti ProBeha

3.69

3.44 3.38

3.47

3.67

3.51

3.61 3.64 3.62

3.87

3.61

3.41

3.68

3.73

3.42

3.593.63

3.71

3.92

3.69

3.41

3.60 3.64

3.37 3.533.59

3.61

3.85

3.64

3.40

3.57 3.53

3.463.46

3.603.69

3.93

3.50

3.04

3.48

3.11

3.23 3.16 3.15

3.46

18-22 Yrs. Old 23–30 Yrs. Old 31–40 Yrs. Old 41–50 Yrs. Old 51–60 Yrs. Old

Page 92: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

75

4) when considering Response Effectiveness, smartphone users of ages 23 – 30

had the largest mean of Response Effectiveness (3.68), the second largest was users

ages 31 – 40 (3.60), and the third largest was users ages 41 – 50 (3.57). The ANOVA

result shows that the groups ages 18 – 22 and 51 – 60 had almost equal mean of

Response Effectiveness (with mean of 3.47 and 3.48 respectively). Yet, the analysis in

Appendix C shows that there were no significant differences among these means (at .05

statistically significance level);

5) concerning Self-efficacy, the large mean went to smartphone users ages 23 – 30

(with mean of 3.73), ages 18 – 22 (3.67), and ages 31 – 40 (3.64) respectively.

Interestingly, people of ages 51 – 60 had the lowest mean in Self-efficacy with mean

of 3.11. According to ANOVA results in Appendix C, it was clear that smartphone

users of ages 51 – 60 had lower mean of Self-efficacy than the others. The bar chart

shows that people of ages 51 – 60 had lower mean in Self-efficacy (with a mean of

3.11) than people of ages 18 – 22 (with a mean of 3.67), ages 23 – 30 (3.73), ages 31 – 40

(3.64), and ages 41 – 50 (3.53), all at .05 statistically significance level. Furthermore,

people of ages 41 – 50 also had mean in Social Influence (with a mean of 3.53) lower

than people of ages 23 – 30 (3.73) at .05 statistically significance level. This could be

concluded that Thai smartphone users of ages 51 – 60 had the lowest Self-efficacy of

all other age groups, while people of ages 41 – 50 had lower Self-efficacy when

compared to people of ages 23 – 30;

6) for Threat Appraisal, the chart shows that smartphone users ages 18 – 22 had

the largest mean (with mean 3.51), the second largest was people ages 41 – 50 (3.46),

and the third largest was people ages 23 – 30 (3.42). When considering deliberately,

people age 51 – 60 had the lowest mean (3.23). Nonetheless, the mean of all age groups

were not significantly different (at .05 statistically significance difference);

7) for Coping Appraisal, smartphone users ages 18 – 22 had the largest mean

(with a mean of 3.61), followed by ages 23 – 30 (3.59), and ages 31 – 40 (3.53). With

the use of ANOVA as detailed in Appendix C, it was clear that smartphone users of

ages 51 – 60 had the lowest mean in Coping Appraisal when compared with all other

age groups. Their mean in Coping Appraisal (which was 3.16) was lower than people

of ages 18 - 22 (with a mean of 3.61), ages 23 – 30 (3.59), ages 31 – 40 (3.53), and ages

41 – 50 (3.46) at .05 statistically significance level. It could be concluded that Thai

Page 93: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

76

smartphone users of ages 51 – 60 had lower appraising ability in coping with cyber

threats on their smartphones;

8) considering Protection Motivation, Thai smartphone users ages 18 – 50 were

between 3.46 – 3.64, except people ages 51 – 60 which had the lowest mean. The

ANOVA results show that people of ages 51 – 60 had a mean of 3.15 in Protection

Motivation which is lower than people of ages 18 - 22 (with a mean of 3.64), ages 23 – 30

(3.63), ages 31 – 40 (3.59), and ages 41 – 50 (3.60) at .05 statistically significance level. In

other words, Thai smartphone users of ages 51 – 60 had the lowest motivation in

protecting themselves from cyber threats on their phones. This can be concluded that,

among all other groups, people of ages 51 – 60 had the least motivation in protecting

their smartphones from cyber threats;

9) lastly, for Protection Behaviour, Thai smartphone users ages 23 – 30 had the

largest mean (with a mean of 3.71), the second largest came to people ages 41 – 50

(3.69). Following the first two came with people ages 18 – 22 (3.62) and ages 31 – 40(3.61)

while people ages 51 – 60 had the lowest mean. However, when deliberately analyzed with

ANOVA, the results show that smartphone users ages 51 – 60 had lower mean (3.46)

than people of ages 23 – 30 (3.71) and ages 41 – 50 (3.69) at .05 statistically significance

level. This result can be interpreted that people of ages 18 – 22 had the lower Protection

Behaviour than people of ages 23 – 30 and ages 41 – 50. Since the mean of Protection

Behaviour of people ages 51 – 60 were not significantly different from people of ages

18 – 22 and ages31 – 40, it can be concluded that people of ages 18 – 22, ages 31 – 40,

and ages 51 – 60 had low protection behaviour.

Page 94: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

77

4.4.3 Means of Constructs by Region

As there were a significant difference between smartphone users who lived in Bangkok

& Metropolitan and Upcountry. Detail is shown in Figure 4.25.

Figure 4.25: Smartphone Users in BKK & Metropolitan and Upcountry

By using t-test to compare the model constructs between smartphone users who lived

in BKK & Metropolitan and those who lived in Upcountry, the result shows that people

in BKK & Metropolitan had lower mean in Perceived Vulnerability (3.29), Threat

Appraisal (3.21), and Coping Appraisal (3.26) than people who lived in Upcountry

(with mean of 3.64, 3.44, and 3.52) at .05 statistically significant level. The details are

shown in Figure 4.26.

Figure 4.26: Comparison of the Model Constructs by Region

Thus, it can be concluded that smartphone users who live in Bangkok & Metropolitan area

had lower abilities than upcountry people in perceiving their phones’ vulnerabilities to

BKK & Metro.,

120, 17%

Upcountry, 600, 83%

Region

2.80

3.00

3.20

3.40

3.60

3.80

4.00

PerServ PerVuln SocInfe ResEffe SelEffi ThrAppr CopAppr BehMoti ProBeha

3.61

3.293.23

3.383.46

3.213.26

3.463.55

3.90

3.64

3.36

3.60 3.57

3.443.52 3.54

3.64

BKK & Metro. Upcountry

Page 95: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

78

cyber threats, lower abilities in evaluating the consequences from cyber threats, and lower

ability to assess their own ability in coping with cyber threats.

4.4.4 Means of Constructs by Virus Infection

Virus or malware is a type of cyber threat that can pose a serious threat to smartphones.

The pie chart in Figure 4.27 shows that 31.3% of samples used to have bad experience

with virus/malware infection on their phones.

Figure 4.27: Number of People whose Phones were Infected with Malware

The bar chart above shows a comparison of constructs of Thai people whose

smartphones used to be infected against those who had never experienced this incident.

The details are shown in Figure 4.28.

Figure 4.28: Comparison of Constructs between People whose Phones were Infected

with Malware and those who were not

The t-test result shows that the people whose smartphones were infected by virus/malware:

(1) had larger mean in Perceived Vulnerability (with a mean of 3.68) than other group who

were not (3.53); (2) had larger mean in Threat Appraisal (3.53) than other group who were

not (3.34); and (3) had larger mean in Protection Motivation (3.61) than other group who

were not (3.49), all were at .05 statistically significance level.

3.0

3.2

3.4

3.6

3.8

4.0

PerSev PerVuln SocInflu ResEffec SelEffi ThrAppr CopAppr ProMoti ProBeha

3.82

3.68

3.35

3.55 3.63.53 3.49

3.61 3.64

3.86

3.53

3.33

3.57 3.53

3.34

3.47 3.493.61

Yes No

Page 96: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

79

4.4.5 Means of Constructs by Using Public Wi-Fi

Public Wi-Fi are free internet connection services provided by many stores such as

shopping malls or restaurants. Pie chart in Figure 4.29 shows that 60.6% of samples

prefer to connect their phones through public Wi-Fi.

Figure 4.29: Number of People who Used Public Wi-Fi

The following bar chart in Figure 4.30 shows a comparison between people who used

public Wi-Fi and who did not. The chart illustrated that that people who used public

Wi-Fi to access the internet had larger mean in all constructs than people who do not.

Figure 4.30: Comparison of Constructs between People who Used Public Wi-Fi and

who did not

However, when taking a closer look into the comparisons by using the t-test technique,

the results show that people who used public Wi-Fi had larger mean in Self-efficacy

(3.67), in Coping Appraisal (3.53), and in Protection Motivation (3.60), and in

3.0

3.2

3.4

3.6

3.8

4.0

PerSev PerVuln SocInfe ResEffe SelEffi ThrAppr CopAppr ProMoti ProBeha

3.89

3.62

3.35

3.58

3.67

3.41

3.533.60

3.69

3.79

3.51

3.31

3.54

3.37 3.39 3.40 3.42

3.51

Yes No

Page 97: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

80

Protection Behaviour (3.69) than people who did not (with mean of 3.37, 3.40, 3.42,

and 3.51 respectively). All were at .05 statistically significance level.

4.4.6 Means of Constructs by Using Money Transfer Services via Smartphones

Nowadays, buying goods or transferring money can be done easily through the use of

smartphone. The pie chart in Figure 4.31 shows that 41.8% of samples preferred

transferring money through their phones, while the rest did not.

Figure 4.31: Number of People who Transfer Money via Phones

The bar chart in Figure 4.32 compares mean of the model’s constructs between people

who had used their phone to buy things or transfer money and those who had not. The

chart shows that people who had transferred money through their phones had larger

mean in all constructs.

The following chart compares level of constructs’ mean between people who

transferred money through smartphone and who did not.

Figure 4.32: Comparison of Constructs between People who Transfer Money via

Smartphone and who did not

3.0

3.2

3.4

3.6

3.8

4.0

PerSev PerVuln SocInfe ResEffe SelEffi ThrAppr CopAppr ProMoti ProBeha

3.90

3.65

3.46

3.64

3.75

3.46

3.59

3.71 3.723.82

3.52

3.24

3.513.40

3.363.40 3.40

3.55

Yes No

Use Smartphone to Transfer Money

Page 98: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

81

However, after comparing these means by using the t-test, the result shows that there

were significance differences in the means of all constructs, except Perceive Severity

and Threat Appraisal, between people who transferred money through their phones

(at .05 statistically significant level). The first largest difference was in Self-efficacy,

in which the mean of people who transferred money through their phones )3.75) is .35

larger than people who did not (3.40). The second largest difference was in Protection

Motivation, whereas the mean of people who used their phones to transfer money (3.71)

was .31 higher than the other (3.40).

4.5 Conclusion

In summary, this chapter shows the results of the survey data which are the

demographics and the comparisons of the perceptions on the PMT’s constructs among

difference categories of Thai smartphone users. The next chapter will demonstrate the

analysis part of the theoretical PMT model with the survey data of Thai smartphone

users.

Page 99: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

82

CHAPTER 5

THE PMT MODEL OF THAI SMARTPHONE USERS

The aim of this chapter is to analyze the theoretical model with empirical data, to

indicate the significant relations in the model and to calculate the direct and indirect

effects between constructs toward the dependent construct, the Protection Behaviour.

To perform the analysis, a number of steps are needed which include: restate the

hypotheses for testing the proposed theoretical PMT model; test the required basic

assumptions for SEM; test the goodness of fit of the Measurement Model and Structural

Equation Modeling; and identify valid causal relationships and calculate the effects

among constructs on the dependent variable of the empirical model.

5.1 Testing Hypotheses for the Proposed Theoretical Model

The proposed theoretical model as developed in Chapter 2, is repeated in Figure 5.1 to

show its causal relationships among its 11 constructs. The relationships are

hypothesized with Ha to Hk for testing its statistically significant validity.

Figure 5.1: Theoretical Model for Testing

Threat Appraisal

Perceived Severity

Protection Behaviour

Protection Motivation

Coping Appraisal

Perceived Vulnerabili

ty

Response Effectivenes

s

Self-efficacy

Social Influence

Ha+

Hb

+

Hc+

Hd+

He+

Hf+

Hh

+

Hj+

Hk+

Hg

+

Hi+

Page 100: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

83

There are a total of 11 testing hypotheses (Ha to Hk), each of them is hypothesized as

null hypothesis (H0) and alternative hypothesis (H1) for testing as shown in Table 5.1.

Table 5.1: Null and Alternative Hypotheses for Testing the Theoretical Model

Relationship

Hypotheses Null and Alternative Hypotheses for Testing

Ha H0: Perceived Severity does not positively affect Threat Appraisal

H1: Perceived Severity positively affects Threat Appraisal

Hb H0: Perceived Vulnerability does not positively affects Threat Appraisal

H1: Perceived Vulnerability positively affects Threat Appraisal

Hc H0: Social Influence does not positively affects Threat Appraisal

H1: Social Influence positively affects Threat Appraisal

Hd H0: Social Influence does not positively affects Coping Appraisal

H1: Social Influence positively affects Coping Appraisal

He H0: Response Effectiveness does not positively affects Coping Appraisal

H1: Response Effectiveness positively affects Coping Appraisal

Hf H0: Self-efficacy does not positively affects Coping Appraisal

H1: Self-efficacy positively affects Coping Appraisal

Hg H0: Threat Appraisal does not positively affects Protection Motivation

H1: Threat Appraisal positively affects Protection Motivation

Hh H0: Threat Appraisal does not positively affects Protection Behaviour

H1:Threat Appraisal positively affects Protection Behaviour

Hi H0: Coping Appraisal does not positively affects Protection Motivation

H1: Coping Appraisal positively affects Protection Motivation

Hj H0: Coping Appraisal does not positively affects Protection Behaviour

H1:Coping Appraisal positively affects Protection Behaviour

Hk H0: Protection Motivation does not positively affects Protection Behaviour

H1: Protection Motivation positively affects Protection Behaviour

Page 101: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

84

5.2 Preparing the Model with AMOS Software

Prior to testing with empirical data, the theoretical model was created with the AMOS

software package as shown in Figure 5.2. Notice that the latent variables of the model

were explained by the data gathered by all questions in the questionnaire except

question q7, q20, q21, q24, q29, and q33, since they provided low factor weighs for

each latent variable they explained (the analysis of this part is shown in Appendix D).

Figure 5.2: Theoretical Model Created by the AMOS Software for Testing

Page 102: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

85

This model consists of five exogenous latent-variables, including: Perceived Severity

(PerSev), Perceived Vulnerability (PerVul), Social Influence (SocInf), Response

Effectiveness (ResEff), and Self Efficacy (SelEff). It also consists of four endogenous

latent-variables and they are: Threat Appraisal (TheApp), Coping Appraisal (CopApp),

Protection Motivation (BehMot), Protection Behaviour (ProBeh). These latent

variables were measured through observed variables which are questionnaire q1 – q33

(from Appendix B). Details are deliberated in Table 5.2.

Table 5.2: Variables Used in the Hypothesized Model

Latent Variable Independent or

Dependent Variables (IV or DV)

Observed Variable (questions from the

questionnaire) Exogenous Variables

Perceived Severity IV q1 – q3

Perceived Vulnerability IV q4 – q6

Social Influence IV q14 – q17

Response Effectiveness IV q8 – q9

Self Efficacy IV q10 – q13

Endogenous Variables

Threat Appraisal IV and DV q18 – q19

Coping Appraisal IV and DV q22 – q23

Protection Motivation IV and DV q25 – q28

Protection Behaviour DV q30 – q32

5.3 Testing Basic Assumptions of Structural Equation Modeling

5.3.1 Valid Sample Size for Structural Equation Modeling

In performing path analysis, a set of appropriate samples for testing the theoretical

model must be provided. Bentler & Cho (1987) suggests that there should be 5 – 10

observations per estimated parameters. Result from AMOS shows that there are 127

parameters in the theoretical model (Appendix E), the number of samples required for

this study should be no less than 127*5, which equals to 635 samples. Details are shown

in Table 5.3.

Page 103: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

86

Table 5.3: Number of Parameters of the Hypothesized Model

Weights Covariances Variances Means Intercepts Total

Fixed 40 0 0 0 0 40

Labeled 0 0 0 0 0 0

Unlabeled 29 22 36 0 0 87

Total 69 22 36 0 0 127

5.3.2 Normality of Distribution of Data

To use the data in analyzing the SEM and other analyses, the data has to be normally

distributed which is measured through skewness and kurtosis of the data. Skewness is

a measure of symmetry of the data distribution, while kurtosis is a measure of whether

the data are heavy-tailed or light-tailed relative to a normal distribution. For normality

of distribution of data, Bulmer M. G. (1979) suggested that its skewness should not be

less than -1 or greater than 1. George & Mallery (2010) stated that the kurtosis between

-2 and +2 are considered acceptable for normal distribution. Moreover, Kline (2011)

proposed that the absolute value of skewness and kurtosis should not be greater than 3

and 10 for normal distribution of a data set.

The data of this study had skewness and kurtosis between -1 and 1, thus it was well-

modeled by a normal distribution. The details are shown in Table 5.4.

Table 5.4: Skewness and Kurtosis of Data

Variable Skewness Kurtosis

Q1: Overall, I am aware of the potential security threats

and their negative consequences. -.794 .698

Q2: I understand the concerns regarding information

security and the risks they pose in general. -.759 .531

Q3: I have sufficient knowledge about the cost of

potential security problems. -.800 .738

Q4: I think that my chance of getting virus on my

smartphone is high. -.599 .092

Page 104: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

87

Variable Skewness Kurtosis

Q5: I think that the chance that my identity can be

stolen is high. -.739 .220

Q6: I think that the chance that my important data can

be stolen is high. -.560 .003

Q7: Using complicated password would secure my

smartphone. -.654 -.008

Q8: Software or applications updates can increase the

security of my smartphone. -.423 -.016

Q9: Using virus protection software can increase the

security of my smartphone. -.482 .153

Q10: I know how to use complicate password on my

smartphone. -.619 -.077

Q11: I can install virus protection software on my

smartphone. -.598 .072

Q12: I know how to setup my smartphone for advanced

protection. -.562 -.112

Q13: I know how to update software or applications on

my smartphone. -.528 -.185

Q14: My friends discuss security issues related to their

smartphones. -.582 -.013

Q15: My friends would think that I should take security

measures on my smartphone. -.527 -.125

Q16: It is likely that the majority of smartphone users

comply with the smartphone security recommendations. -.606 -.036

Q17: Information from mass media (TV, newspapers,

internet) suggests that I should comply with the -.659 .090

Q18: I know my smartphone could be vulnerable to

security breaches if I don't adhere to protection -.457 -.420

Q19: It is extremely likely that cyber threats will infect my

smartphone. -.235 -.479

Page 105: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

88

Variable Skewness Kurtosis

Q20: Threats to the security of my smartphone are

harmful. -.583 .032

Q21: The likelihood of an information security

violation occurring at my smartphone is high. -.312 -.239

Q22: I have the necessary skills to protect my

smartphone from information security violations. -.731 .466

Q23: I have the expertise to implement preventative

measures to stop people from getting my confidential -.384 -.004

Q24: For me, taking information security precautions

is easy. -.483 -.215

Q25: I intend to follow the information security

guidelines on how to use a smartphone safely. -.887 .948

Q26: I intend to use antivirus/anti-spyware software

on my smartphone. -.667 .593

Q27: I intend to protect my smartphone from cyber

threats. -.562 .273

Q28: I intend to follow the security news and find out

how to prevent cyber threats. -.613 .487

Q29: I always use complicated passwords protection on

my smartphone. -.690 .055

Q30: I always logout/sign out after finishing using

applications (such as ebanking, email or facebook). -.597 -.229

Q32: I always use antivirus software -.554 .098

Q32: I always update software or applications on my

smartphone. -.605 .176

Q33: I always follow safety guide in using a

smartphone safely and appropriately. -.445 .191

Page 106: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

89

5.4 Testing the Goodness of Fit of the Model

5.4.1 Goodness of Fit of the Measurement Model

The measurement model from Figure 5.3 was assessed using multiple goodness-of-fit

indices in order to indicate the hypothesized model fit in the theoretical model. The

goodness-of-fit measures from Table 5.5 show the Chi-Square as 892.988, with

331degrees of freedom (df), making the relative Chi-Square (Chi-Square/df) equals to

2.698 which is less than 3.0 (Kline, 1998, & Ullman, 2001). In addition, the Normed

Fit Index (NFI) is .920 which exceeds .90 (Byrne, 1994), the Goodness of Fit Index

(GFI) is .915 which exceeds .90 (Byrne, 1994), the Comparative Fit Index (CFI) is .948

which exceeds .90 (Byrne, 1994), the Root Mean Square Residual (RMS) is .037 which

is less than .05 (Steiger, 1990), and the Root Mean Square Error of Approximation

(RMSEA) is .049 which is less than .06 (Hu & Bentler, 1999). Thus, the measurement

model is regarded as acceptable fit with the empirical data and could be used in the

Structural Equation Modeling (SEM) analysis in the next part.

Page 107: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

90

Chi-Square = 892.988, df = 331, p = .000, Relative Chi-square = 2.698

Figure 5.3: Test of Fitness of the Measurement Model

Page 108: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

91

Table 5.5: Goodness of Fit Statistics of the Measurement Model

Index Criteria

Level Goodness of Fit Statistics

Relative Chi-square ≤ 3.00 Chi-square/df = 2.666

Normed Fit Index ≥ .90 NFI = .922

Goodness of Fit Index ≥ .90 GFI = .917

Comparative Fit Index ≥ .90 CFI = .950

Root Mean Square Residual ≤ .05 RMR = .037

Root Mean Square Error of Approximation ≤ .06 RMSEA = .049

Note: See more details in Appendix E

5.4.2 Goodness of Fit of the Structural Equation Modeling

The Structural Equation Modeling from Figure 5.4 was also assessed using multiple

goodness-of-fit indices in order to indicate the hypothesized model fit in the theoretical

model. The goodness-of-fit measures from Table 5.6 show the Chi-Square as 735.054,

with 291degrees of freedom (df), making the relative Chi-Square (Chi-Square/df)

equals to 2.526 which is less than 3.0 (Kline, 1998, Ullman, 2001). In addition, the

Normed Fit Index (NFI) is .927 which exceeds .90 (Byrne, 1994), the Goodness of Fit

Index (GFI) is .927 which exceeds .90 (Byrne, 1994), the Comparative Fit Index (CFI)

is .954 which exceeds .90 (Byrne, 1994), the Root Mean Square Residual (RMS) is .036

which is less than .05 (Steiger, 1990), and the Root Mean Square Error of

Approximation (RMSEA) is .046 which is less than .06 (Hu & Bentler, 1999). Thus,

the Structural Equation Modeling is regarded as acceptable fit the empirical data and

could be used for further analysis.

Page 109: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

92

Chi-Square = 735.054, df = 291, p = .000, Relative Chi-square = 2.526

Figure 5.4: Test of Fitness of the Structural Equation Model

Table 5.6: Goodness of Fit Statistics for Structural Equation Modeling

Index Criteria

Level Goodness of Fit Statistics

Relative Chi-square (Chi-square/df) ≤ 3.00 Chi-square/df = 2.526

Normed Fit Index (NFI) ≥ .90 NFI = .927

Goodness of Fit Index (GFI) ≥ .90 GFI = .927

Comparative Fit Index (CFI) ≥ .90 CFI = .954

Root Mean Square Residual (RMS) ≤ .05 RMR = .036

Root Mean Square Adjusted

(RMSEA)

≤ .06 RMSEA = .046

Page 110: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

93

5.5 The Result PMT Model of Thai Smartphone Users

5.5.1 Results of Testing Hypotheses and the Final Model

Table 5.7 shows the Statistical results from the AMOS program, as shown in Table 5.7,

indicates the p-values of relationships among constructs of the hypothesized. The p-values

that were below .05 are indicated as with asterisk (*) symbols which mean that the

relationships between the two constructs are significant.

Table 5.7: Relationships among Variable of the Hypothesized Model

Relationship p-value

From To

Perceived Severity Threat Appraisal .577

Perceived Vulnerability Threat Appraisal *

Social Influence Threat Appraisal *

Social Influence Coping Appraisal *

Response Effectiveness Coping Appraisal .306

Self-efficacy Coping Appraisal *

Threat Appraisal Protection Motivation .541

Threat Appraisal Protection Behaviour *

Coping Appraisal Protection Motivation *

Coping Appraisal Protection Behaviour *

Protection Motivation Protection Behaviour *

* Statistically significance at .05 level

Page 111: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

94

A summary of the testing of hypotheses Ha – Hk is shown in Table 5.8.

Table 5.8: Summary of the Testing Hypothesis Ha – Hk

Tested Hypothesis Result

Ha: Perceived Severity positively affects Threat Appraisal Rejected

Hb: Perceived Vulnerability positively affects Threat Appraisal Accepted

Hc: Social Influence positively affects Threat Appraisal Accepted

Hd: Social Influence positively affects Coping Appraisal Accepted

He: Response Effectiveness positively affects Coping Appraisal Rejected

Hf: Self-efficacy positively affects Coping Appraisal Accepted

Hg: Threat Appraisal positively affects Protection Motivation Rejected

Hh: Threat Appraisal positively affects Protection Behaviour Accepted

Hi: Coping Appraisal positively affects Protection Motivation Accepted

Hj: Coping Appraisal positively affects Protection Behaviour Accepted

Hk: Protection Motivation positively affects Protection Behaviour Accepted

The result model can be drawn as shown in Figure 5.5.

* Statistically Significant at .05 level

Figure 5.5: Result Model

Threat Appraisal

Perceived Severity

Protection Behaviour

Protection Motivation

Perceived Vulnerabilit

y

Self-efficacy

Social

Influence

.34*

.28*

.24*

.69*

.02

.72*

.23*

Response Effectiveness

.03

.14

R2 = .28

R2 =.87

R2 =.53 R2 =.67

.09*

.60*

Coping Appraisal

Page 112: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

95

5.5.2 Direct and Indirect Effects among PMT Constructs

Figure above shows the significant relationships with solid arrow lines and non-

significant relationship with dotted arrow lines. Only the significant relationship lines

are used to calculate the direct effects and indirect effects between the exogenous

variables and endogenous variables of the model which is shown in Table 5.9.

Table 5.9: Direct and Indirect Effects among Variables of the Model

Variables

Threat

Appraisal

Coping

Appraisal

Protection

Motivation

Protection

Behaviour

T

E IE

D

E

T

E IE

D

E

T

E IE

D

E

T

E IE

D

E

Perceived

Vulnerability .34 - .34 - - - - - - .03 .03 -

Social Influence .28 - .28 .24 - .24 .17 .17 - .21 .21 -

Self-efficacy - - - .69 - .69 .50 .50 - .53 .53 -

Threat Appraisal - - - - - - - - - .09 - .09

Coping Appraisal - - - - - - .72 - .72 .77 .17 .60

Protection

Motivation - - - - - - - - - .23 - .23

R2 .28 .87 .53 .67

Note: TE = Total Effect, DE = Direct Effect, and IE = Indirect Effect IE from Perceived Vulnerability to Protection Behaviour is .34*.09 = .03 IE from Social Influence to Protection Motivation is .24*.72 = .17 IE from Social Influence to Protection Behaviour is .28*.09+.24*.72*.23+.24*.60 = .21 IE from Self-efficacy to Protection Motivation is .69*.72= .50 IE from Self-efficacy to Protection Behaviour is .69*.72*.23+.69*.60 = .53 IE from Coping Appraisal to Protection Behaviour is .72*.23 = .17

Page 113: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

96

Results of the above table can be explained as follows:

1) Perceived Vulnerability directly affects Threat Appraisal with a Beta

Coefficient () value of .34 and accounted for 28% of variances in the Threat Appraisal.

It also indirectly affects Protection Behaviour (through Threat Appraisal) with a value

of .03, and accounted for 67% of variances in Protection Behaviour. Thus, the total

effect that Perceived Vulnerability had on Protection Behaviour is equal to .03.

2) Social Influence directly affects Threat Appraisal with value of .28 and

accounted for 28% variance in the Threat Appraisal; directly affects Coping Appraisal,

with a value of .24 and accounted for 87% of the variances in the Coping Appraisal.

Social Influence indirectly affects Protection Motivation through Threat appraisal with

a value of .17 and accounted for 53% of variances in the Protection Behaviour, and it

also indirectly affects Protection Behaviour through Coping Appraisal and Protection

Motivation with a value of .21 and accounted for 67% of the variances in the

Protection Motivation. Thus, the total effect of Social Influence had on Protection

Behaviour is equal to .21.

3) Self-efficacy directly affected Coping Appraisal, with a value of .69 and

accounted for 87% of the variances in the Coping Appraisal. It also indirectly affects

Protection Motivation (through Coping Appraisal) with a value of .50 and accounted

for 53% of the variances in the Protection Motivation. In addition, Self-efficacy also

indirectly affects Protection Behaviour (though Coping Appraisal and Protection

Motivation) with a value of .53 and accounted for 67% of the variances in the

Protection Motivation. Thus, the total effect that Social Influence had on Protection

Behaviour is equal to .53.

4) Threat Appraisal directly affects Protection Behaviour with a value of .09

and accounted for 67% of the variances in the Protection Motivation. Thus, the total

effect of Threat Appraisal had on Protection Behaviour equals to .09.

5) Coping Appraisal directly affected Protection Motivation, with a value

of .72 and accounted for 53% of the variances in the Protection Motivation. It also

directly affects Protection Behaviour with a value of .60 and accounted for 67% of

the variances in the Protection Motivation, and indirectly affects Protection Behaviour

(through protection motivation) with a value of .17 and accounted for 67% of the

Page 114: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

97

variances in the Protection Motivation. Thus, the total effect of Coping Appraisal had

on Protection Behaviour is equal to .77.

6) Protection Motivation directly affects Protection Behaviour, with a value

of .86 and accounted for 73% of the variances in the Protection Behaviour. Thus, the

total effect of Protection Motivation had on Protection Behaviour is equal to .23.

5.6 Conclusion

This chapter analyzed the theoretical PMT model with the Structural Equation

Modeling (SEM) technique. The result showed the statistical significant relationships

of factors in the PMT model and the level of direct and indirect impacts of these factors

on the protection behaviours of Thai smartphone users. The next chapter will

summarize all the work, and answers to the questions in this research.

Page 115: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

98

CHAPTER 6

SUMMARY AND ANSWERS TO RESEARCH QUESTIONS

The research process and results found from the previous chapters are summarized in

this chapter including the objectives of this study, the methodologies used for gathering

and analyzing the data, and the found results. This chapter also provides the answers

for the research questions.

6.1 Recap of Objectives and Methodology

This study was designed to gain insights into smartphone threats, security, and users’

behaviours. Such knowledge may be used in the promotion and initiation of changes

and developments in improved smartphones usages in Thailand. The main purpose of

this study is to investigate the cyber threats and security in Thailand, security handlings,

awareness and behaviours of smartphone users in Thailand. To reach this purpose, the

objectives of this study were set as follows: (1) to investigate cyber threats on

smartphones and their trends; (2) to investigate cybersecurity handlings by smartphone

users in Thailand; (3) to investigate behaviours of Thai smartphone users and their

perceptions on the PMT’s constructs; and (4) to analyze the causal relationship between

constructs of the proposed PMT model.

This study used a mixed-method approach, consisting of both qualitative study and

quantitative study, for collection and analysis of the data. For the qualitative part,

content analysis was performed by reviewing related documents and literatures and

analyzing. The key issues were then drawn and categorized into themes. In the

quantitative part, the Protection Motivation Theories (PMT) and related studies were

reviewed to create the theoretical model as well as used as a tool for gathering

quantitative data for this study. The questionnaire consisted of 33 questions with

answers indicated in 1-to-5 Likert’s scale. Prior to data collection, the questionnaire

was tested for its validity and reliability.

Page 116: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

99

This study used cluster sampling technique for data collection by dividing the sources

into six regions in Thailand. A large populated province was selected as representative

of each region. Similarly, the smartphone users at more populated areas, such as,

shopping malls, schools, and/or public/private offices, were randomly invited to

participate in this study.

Based on Yamane (1973) and the basic assumption for Structural Equation Modeling

(SEM), a total of 720 samples were used in this study of which approximately 120

samples were collected from each region. These data were then analyzed with

descriptive statistics to explain the demographic features of the samples. The t-test and

ANOVA techniques were used to compare means of Constructs between different

categories of samples. In the last part, the SEM was used for analyzing the theoretical

model with the empirical data, and the significant relationships of the model were

indicated. Finally, the degrees of direct and indirect effects of exogenous and

endogenous constructs towards the dependent variable, the Protection Behaviour, were

then calculated.

6.2 Summary of the Results

6.2.1 Answer for Research Question #1.1

This part answers research question #1.1 which states that “What are the types of

cyber threats that smartphone users are confronting?”

Smartphone threats can be caused by attackers and/or by users.

6.2.1.1 Cyber Threats Caused by Attackers

This type of cyber threats includes malware attacks, wireless network attacks, Denial

of Service attacks, and break-in attacks. Details are shown in Table 6.1.

Page 117: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

100

Table 6.1: Summary of Threats Caused by Attackers

Cyber Threat

by Attacker Description

Malware Attack Changing or distributing private information in smartphone,

random code execution, or abuse costly services and function.

Wireless Network

Attack

Corrupting smartphones, blocking, or modifying information

on the wireless network.

Denial of Service

Attack

Attacking to base station, wireless network, web server, or to

intervene smartphones by using radio interference.

Break-in Attack Attacking to gain partial or full control over the target smartphones.

Source: Rewritten from Jeon et al (2010: 315)

6.2.1.2 Cyber Threats Caused by Unawareness of Users

Threats from user unawareness can be caused by cybercriminals, such as, malfunctions,

phishing, phone thefts/loses, and platform alterations. Details are shown in Table 6.2.

Table 6.2: Cyber Threats and Effects Caused from User’s Unawareness

Cyber Threats from

User’s Unawareness Descriptions

Disable or

Malfunction

Unintentionally disabled or malfunction of the applications

by mistakes or misappropriate configurations.

Phishing Unintentionally exposed privacy information by accessing

phishing sites, messenger phishing, or by SMS phishing.

Phone Loss/Stolen Phone lost or stolen.

Platform Alteration Intentionally alter the smartphone platform, such as jail

breaking or rooting.

Source: Rewritten from Jeon et al. (2010: 315)

Page 118: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

101

6.2.2 Answer for Research Question #1.2

This part answers research question #1.2 which is “What are statistics of malware

attacks on smartphones and trends in the future?”

Results show the top three mobile malware attacks during August 2013 – July 2014.

The largest number of malware attacks was Trojan SMS. This malware keeps sending

text to premium-rate SMS numbers continuously which was accounted for 57.08% of

all attacks. The second largest attack was RiskTool. This malware conceals files in the

mobile devices, hides applications, or terminates active processes. This malware was

accounted for 21.52% of all attacks. Lastly, the third largest attack was AdWare which

was accounted for 7.37% of all attacks. This malware automatically downloads

unwanted information or advertising materials when mobile device is online. Details

are shown in Figure 6.1.

Figure 6.1: Mobile Malware Attack During August 2013 – July 2014

Malwares have increased in volumes and their levels of sophistication. The Kaspersky

Lap survey results in 2015 showed that there were 2,961,727 malicious installation

packages worldwide. About 884,774 of them were new malicious mobile programs,

which was three times of the year 2014, and 7,030 were mobile banking Trojans. There

are also increasing in the number of malicious attachments which are not easy to delete.

This includes ransomware, programs that display aggressive advertisements, and

cybercriminals that actively use phishing pages to conceal legitimate applications.

Trojan SMS 57.08%

RiskTool21.52%

AdWare 7.37%

Others14.03%

Page 119: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

102

6.2.3 Answer for Research Question #2.1

This part answers research question #2.1 which states, “Which organizations handle

cybersecurity in Thailand?”

Mobile devices can be secured from threats and this depends on the cyber threat

surveillance and response team, a secured mobile telecommunication network, and the

behaviour of mobile device owners themselves.

Cyber threat surveillance and response teams consist of groups of experts that handle

computer security incidents. These teams are commonly recognized as the Computer

Security Incident Response Team (CSIRT) or the Computer Emergency Response

Team (CERT).

In Thailand, the Thailand Computer Emergency Response Team (ThaiCERT) is

responsible for providing incident response to computer security threats. ThaiCERT

has conducted various activities to strengthen the integrity of important internal

processes and infrastructure, and safeguard cybersecurity for government agencies

and the general public. This team gives necessary supports and advices for solutions

to such threats, follows up and disseminates news and updates on computer security,

including mobile security, to public.

Therefore, all sectors should engage and collaborate in order to address these problems.

To make national incident response successful, key organizations such as the Bank of

Thailand, Securities and Exchange Commission, Office of Insurance Commission,

and telecommunication operators should engage and collaborate to establish sector-

based CSIRT that could be responsible for their respective domains.

6.2.4 Answer for Research Question #2.2

This part answers research question #2.2 which states, “What should telecommunication

network operators in Thailand do to handle cybersecurity for smartphones?”

The ITU X.805 standard provides a conceptual model for cyber risk assessment and

mitigation. It consists of a set of principles, including three layers, three planes, and

eight dimensions, together with five attacks and threats. As the operator core network

Page 120: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

103

handles flow from all mobile communication, it is imperative that operator network is

properly safeguarded, thus to improve the security of the mobile core network from the

risks related to confidentiality, integrity and availability, the telecommunication

network operator should implement proper standard and design guideline, one of which

is the ITU X.805 that was proposed by Khera, V., Fung C.C., & Chaisiri, S. in IAIT

(2013).

6.2.5 Answer for Research Question #3.1

This section answers research question #3.1 which states, “What are demographic of

smartphone users in Thailand?”

The demographic results show that, for gender, the numbers of female samples were a

little higher than males. Statistic result shows that, from a total of 720 samples, 52.2%

were female and 47.8% were male. About education, the result shows that most samples

had degree below bachelor level (45.1%), as well as, at the bachelor level (44.6%),

while the only 10.3% had master degree or above. When considering their

employments, majority were employees. Statistic result shows that 24.4% of them were

company employees and 9.7% worked for government. However, around one third of

them were entrepreneurs (20.6%) as well as students (22.5%). Lastly, for salary,

majority of sample earned less than 15,000 Baht per month (43.2%), followed with

15,001 - 30,000 Baht per month (25.4%). The rests occupied around one third of all

sample including: 11.1% had salary between 30,001 - 40,000 Baht per month,12.8%

had salary between 40,001 - 50,000 Baht per month, and 7.5% had salary more than

50,001 Baht per month. Detail is shown in Figure 6.2.

Page 121: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

104

Figure 6.2: Summary of the Demographic of this Study

6.2.6 Answer for Research Question #3.2

This section answers research question #3.2 which states, “What are the general

behaviours of Thai people in using smartphones?”

1) Overall General Behaviours of Smartphone Users - The result shows that the

largest number of users preferred to use AIS as their service provider (46.5%), the

second group preferred DTACT (30.4%), and followed by TrueMove (22.4%). For the

phone’s operating system, the results show more than half of the users preferred to use

Android (53.1%), followed with iOS (36.0%) and Windows phone (3.6%).

Interestingly, 5.6% of them didn’t know what operating system they were using. The

result also shows that around one quarter of all samples (26.1%) had lost their phones

before, and 68.8% of them whose phones were infected by virus or malware. As there

are many free public Wi-Fi services available in many places such as restaurants or

shopping mall, many people preferred to connect their smartphone through these free

internet access services. The results show that more than half of the users preferred to

use these services and among them, 46.3% used free public Wi-Fi sometime while

14.3% always connected their phones to the free public Wi-Fi. The users also used

smartphone to pay bills, buy goods, or transfer money. This statement complies with the

research results which show that 41.8% of all users used their smartphones for financial

purposes, among this 11.4% used it on a daily basis. Detail is shown in Figure 6.3.

-

20.0

40.0

60.047.8

52.2

20.0 21.1 21.0

20.0

17.9

45.1 44.6

10.3

22.5 20.6 19.7

2.2

24.4

10.6

43.2

25.4

12.8 11.1

7.5

Gender Age Education Employment Monthly Income

Page 122: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

105

Figure 6.3: Summary of the Behaviours of Thai Smartphone Users by Region

2) General Behaviours of Smartphone Users by Region - When considering

general behaviours of smartphone users by region, the results are as follows: For phone

service provider, the survey results show that users in most regions preferred to use

AIS, except Northern Eastern where DTAC was preferred. For operating system, the

result shows that Android was the most popular operating system in most regions except

Northern where iOS was more preferred. When focusing on the phone loss, the result

shows that Bangkok & Metropolitan had the highest percentage of phone loss (37.5%),

followed by Central Region (29.2%) and Southern (26.1%) respectively. About virus

infection, Bangkok & Metropolitan had the highest percentage of people who

experienced virus infection on their phones (40.0%), followed by Central Region

(37.5%) and Southern (31.3%) respectively. For free public Wi-Fi, Bangkok &

Metropolitan had the highest percentage of using free public Wi-Fi (75.0%), followed

by Central Region (71.7%) and Northern (64.2%) respectively. For using smartphone

to transfer money, Bangkok & Metropolitan had the highest percentage in using this

service (65.8%), followed by Northern (42.5%), Southern (41.8%) and Central Region

(41.7%) respectively.

-

10.0

20.0

30.0

40.0

50.0

60.0

70.0

80.0

22.4 30.4

46.5

36.0

53.1

3.6

73.9

26.1

68.8

31.3 39.4

46.3

14.3

58.2

30.4

11.4

Service Providers Operating System Phone Lost Virus Infected Use Public Wifi Transfer Money

Page 123: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

106

Detail is shown in Table 6.3 and Figure 6.4.

Table 6.3: Summary of General Behaviours of Smartphone Users by Region

Upcountry

BKK &

Metro

Northern North

Eastern

Eastern Central

Region

Southern

Service Provider AIS AIS DTACT AIS AIS AIS

Operating

System Android iOS Android Android Android Android

Phone Loss (1)

37.5%

(4)

24.2%

(6)

20.0%

(5)

21.7%

(2)

(29.2%)

(3)

(26.1%)

Virus/Malware

Infection

(1)

40.0%

(4)

28.3%

(5)

24.2%

(6)

20.0%

(2)

(37.5%)

(3)

(31.3%)

Free Public Wi-Fi

Usage

(1)

75.0%

(3)

64.2%

(5)

46.7%

(6)

37.5%

(2)

71.7%

(4)

60.6%

Money Transfer

via Phone

(1)

65.8%

(2)

42.5%

(5)

32.0%

(6)

25.0%

(4)

41.7%

(3)

41.8%

Figure 6.4: Behaviours of Smartphone Users by Region

0.0%

10.0%

20.0%

30.0%

40.0%

50.0%

60.0%

70.0%

80.0%

Phone Loss Virus Infection Use Public Wifi Transfer Money

37.5%40.0%

75.0%

65.8%

24.2% 28.3%

64.2%

42.5%

20.0%24.2%

46.7%

32.0%

21.7%20.0%

37.5%

25.0%

29.2%

37.5%

71.7%

41.7%

26.1%

31.3%

60.6%

41.8%

BKK & Metro. North North East East Central South

Page 124: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

107

It is also observed that behaviours of smartphone users in Bangkok & Metropolitan were

significantly different from people in other regions (at .05 statistically significant level).

3) General Behaviours of Smartphone Users by Age - As regard to phone

service providers, it was show that most smartphone users at all age ranges preferred to

use AIS, followed with DTACT and Truemove. For operating system, the results show

that smartphone users at all ages preferred Android to iOS. However, interestingly,

20.2% of people of ages 51 – 60 did not know what operating system they were using.

When considering phone loss, the results show that people ages 18 – 22 years old had

the highest percentage (34.0%), followed by 23 – 30 years old (28.9%), and 31 – 40

years old (25.2%). For Virus Infection, people age 18 -22 had the highest percentage of

virus infection (42.4%),followed by people ages 23 – 30 years old (35.5%) and ages 31

– 40 years old (33.1%). When focusing on using free public Wi-Fi, the result shows

that more than 50% of people in age ranges 18 – 22, 2 – 30, 31 – 40, and 41 – 50 years

old preferred to use free public Wi-Fi while around 30% of people ages 51 – 60 had

used free public Wi-Fi. For transferring money, the result shows that more than 50% of

people in age range 23 – 30 and 31 – 40 years old preferred to transfer money through

their smartphone. While around 10% of people ages 51 – 60 used the service.

Details are shown in Table 6.4 and Figure 6.5.

Table 6.4: Summary of General Behaviours of Smartphone Users by Age

Age (Years Old)

18 – 22 23 – 30 31 - 40 41 - 50 51 - 60

Service Provider AIS AIS AIS AIS AIS

Operating System Android Android Android Android Android

Phone Loss (1)

34.0%

(2)

28.9%

(3)

25.2%

(4)

25.0%

(5)

16.3% Virus Infection (1)

42.4%

(2)

35.5%

(3)

33.1%

(4)

27.1%

(5)

16.3% Free Public Wi-Fi (2)

73.6%

(1)

74.3%

(3)

67.5%

(4)

52.8%

(5)

30.2% Transfer Money (3)

45.8%

(2)

54.6%

(1)

57.6%

(4)

36.1%

(5)

10.1%

Page 125: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

108

Figure 6.5: Behaviours of Smartphone Users By Age

6.2.7 Answer for Research Question #3.3

This section answers research question #3.3 which states, “What are the protection

behaviour of Thai smartphone users?”

6.2.7.1 Means of Constructs of the Protection Behaviour Model

For the overall mean of the model’s constructs, the first largest mean was Perceived

Severity (3.58) and second largest was Protection Behaviour (3.62) while Threat

Appraisal and Social Influence were the two lowest with the mean values of 3.40 and 3.34.

To conclude, based on all nine constructs, Thai smartphone users had low ability to

evaluate the smartphone threats. Additionally, little social pressure such as

recommendations from friends or news, affect smartphone users in protecting

themselves from cyber threats. Details are shown in Table 6.5 and Figure 6.6.

0.0%

10.0%

20.0%

30.0%

40.0%

50.0%

60.0%

70.0%

80.0%

Phone Loss Virus Infection Use Public Wifi Transfer Money

34.0%

42.4%

73.6%

45.8%

28.9%

35.5%

74.3%

54.6%

25.2%

33.1%

67.5%

57.6%

25.0%27.1%

52.8%

36.1%

16.3% 16.3%

30.2%

10.1%

18 - 22 Yr. Old 23 - 30 Yr. Old 31 - 40 Yr. Old 41 - 50 Yr. Old 51 - 60 Yr.Old

Page 126: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

109

Table 6.5: Summary of Overall Means of the Model’s Constructs

Constructs Mean Order Level

Perceived Severity 3.85 1 High

Protection Behaviour 3.62 2 High

Perceived Vulnerability 3.58 3 High

Self-efficacy 3.57 4 High

Response Effectiveness 3.55 5 High

Protection Motivation 3.53 6 High

Coping Appraisal 3.48 7 High

Threat Appraisal 3.40 8 Neutral

Social Influence 3.34 9 Neutral

Figure 6.6: Overall Means of Model’s Constructs

6.2.7.2 Means of Constructs by Gender

When comparing the means of Constructs by gender, the result shows that male had

higher mean in Response Effectiveness (3.64) than female (3.58) at .05 statistically

significant level. Detail is shown in Figure 6.7.

3

3.1

3.2

3.3

3.4

3.5

3.6

3.7

3.8

3.9 3.85

3.623.58 3.57 3.55 3.53

3.48

3.403.34

Page 127: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

110

Figure 6.7: Mean Difference of Construct by Gender

Conclusively, female had lower ability in responding to the recommended practices to

avoid cyber threats on their smartphones than male.

6.2.7.3 Means of Constructs by Age

When focus on age, it was obvious that samples of ages 51 – 60 had lower mean in

Social Influence (3.04), Self-efficacy (3.11), Coping Appraisal (3.16), and Protection

Behaviour (3.15) than any other groups. Detail is shown in Figure 6.8.

Figure 6.8: Mean Differences of Constructs by Age

3.54

3.56

3.58

3.60

3.62

3.64

Male Female

3.64

3.58

Response Effectiveness by Gender

3.00

3.10

3.20

3.30

3.40

3.50

18-22 Yr. Old 23–30 Yr. Old 31–40 Yr. Old 41–50 Yr. Old 51–60 Yrs Old

3.383.41 3.41 3.40

3.04

3.67 3.73 3.64 3.53

3.11

3.61 3.59 3.53 3.46

3.16

3.64 3.63 3.59 3.60

3.15

SocInflu SelEffi CopAppr ProMoti

Means by Age

Page 128: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

111

Moreover, for Protection Behaviour, the result shows that sample of ages 51 – 60 had

lower mean (3.46) than people of age 23 – 30 (3.71) and ages 41 – 50 (3.69) at .05

statistically significance level. Detail is shown in Figure 6.9.

Figure 6.9: Mean Differences of Protection Behaviour by Age

Lastly, samples of ages 41 – 50 also had lower mean in Self-efficacy (3.53) than

samples of ages 23 – 30 (3.73). All were at .05 statistically significance level. Detail is

shown in Figure 6.10.

Figure 6.10: Mean Differences of Self-efficacy by Age

In conclusion, people of ages 51 – 60 had lower affected from social influences, lower

ability to perform the recommended practices, low ability to evaluate their abilities in

coping with smartphone threats, and lower motivation to protect themselves from

smartphones than other age groups. For protection behaviour, people of ages 51 – 60

had lower protecting behaviour than ages 23 – 30 and 41 – 50. Yet, people of ages 41 – 50

had lower ability to perform the recommended practices to protect their phone from

cyber threats than people of ages 23 – 30.

3.30

3.40

3.50

3.60

3.70

3.80

23 - 30 Yr.Old 41 - 50 Yr.Old 51 - 60 Yr.Old

3.713.69

3.46

Protection Behaviour by Age

3.40

3.50

3.60

3.70

3.80

23 - 30 Yr. Old. 41 - 50 Yr. Old

3.73

3.53

Self-efficacy by Age

Page 129: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

112

6.2.7.4 Means of Constructs by Region

When comparing model’s constructs between smartphone users who lived in BKK &

Metropolitan and those who lived in Upcountry, the result indicates that smartphone

users in BKK & Metropolitan area had lower mean in Perceived Vulnerability (3.29),

Threat Appraisal (3.21), and Coping Appraisal (3.26) than people who lived in

Upcountry (with mean of 3.64, 3.44, and 3.52) at .05 statistically significant level.

Detail is shown in Figure 6.11.

* Up Country consists of all regions of Thailand except BKK & Metropolitan

Figure 6.11: Mean Difference of Constructs by Region

Obviously, it is clear that smartphone users in Bangkok & Metropolitan area had lower

abilities in perceiving vulnerabilities to cyber threats, lower abilities in evaluating the

consequences from cyber threats, and lower ability to assess their coping ability with

cyber threats than people from upcountry.

2.80

3.00

3.20

3.40

3.60

3.80

Perceived Vulnerability Threat Appraisal Coping Appraisal

3.293.21 3.26

3.64

3.443.52

BKK & Metro Up Country

Means by Region

Page 130: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

113

6.2.7.5 Means of Constructs by Virus Infection

When focusing on phones’ virus infections, the result shows that the people who

experienced with phones’ virus or malware had higher mean in Perceived Vulnerability

(with a mean of 3.68), in Threat Appraisal (3.53), and in Protection Motivation (3.61)

than people who were not (with means 3.53, 3.34, and 3.49 respectively) at .05

statistically significance level. Detail is shown in Figure 6.12.

Figure 6.12: Mean Difference of Constructs by Malware Infection

To conclude, people who have never experienced with phones’ virus or malware

infections had lower ability in perceiving their own vulnerabilities to smartphone

threats, lower ability in evaluating the smartphone threats, and less motivation in

protecting their smartphones from threats than the other.

6.2.7.6 Means of Constructs by Using Free Public Wi-Fi

For using free public Wi-Fi, the result shows that people who used public Wi-Fi had

higher mean in Self-efficacy (3.67), in Coping Appraisal (3.53), and in Protection

Motivation (3.60), and in Protection Behaviour (3.69) than people who do not(with

mean of 3.37, 3.40, 3.42, and 3.51 respectively). All were at .05 statistically

significance level. Detail is shown in Figure 6.13.

3.00

3.20

3.40

3.60

3.80

Yes No

3.68

3.533.53

3.34

3.61

3.49

Means by Virus Infection

PerVuln ThrAppr ProMoti

Page 131: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

114

Figure 6.13: Mean Difference of Constructs by Using Public Wi-Fi

Assuredly, people who did not use free public Wi-Fi had lower capacity to perform the

recommended practices, less capacity to assess their abilities in coping with threat, less

motivation in protecting their smartphones from threats, and lastly, less protection

behaviours than the other group.

6.2.7.7 Means of Constructs by Using Money Transfer Services via

Smartphones.

People who paid the bills or transfer money via their smartphones had higher mean in

most of the constructs, namely Perceived Vulnerability, Social Influence, Response

Effectiveness, Self-efficacy, Coping Appraisal, Protection Motivation, and Protection

Behaviour, than those who did not with mean of 3.65, 3.46, 3.64, 3.75, 3.59, 3.71, and

3.72. All were at .05 statistically significant level. Among these, the first largest mean

differences were in construct Self-efficacy and Protection Motivation with the mean

differences of .35 and .31 respectively. Detail is shown in Figure 6.14.

3.20

3.30

3.40

3.50

3.60

3.70

Yes No

3.67

3.37

3.53

3.40

3.60

3.42

3.69

3.51

Mean by Using Free Public Wifi

SelEffi CopAppr ProMoti ProBeha

Page 132: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

115

Figure 6.14: Mean Difference of Constructs by Transferring Money via Phone

A summary of the comparison of model’s constructs by demographic and general

behaviour of smartphone users is shown in Table 6.6.

Table 6.6: Summary of Mean Comparisons of the Model’s Constructs

PerVuln SocInflu SelfEffec ResEffi ThrApp CopApp ProMoti ProBeh

Gender Male >

Female

Age 18-50>

51-60

18-50>

51-60

18-50>

51-60

18-50>

51-60

23-30>

51-60

23-30>

41-50

41-50>

51-60

Region Upcount

> BKK

& Metro

Upcount

> BKK

& Metro

Upcount

> BKK

& Metro

Virus

Inflected

Yes>No Yes>No Yes>No

Public

Wi-Fi

Yes>No Yes>No Yes>No Yes>No

Transfer

Money

Yes>No Yes>No Yes>No Yes>No Yes>No Yes>No

* All at .05 statistically significant difference

2.80

3.00

3.20

3.40

3.60

3.80

Yes No

3.653.52

3.46

3.24

3.643.51

3.75

3.40

3.59

3.40

3.71

3.40

3.72

3.55

Means by Transferring Money via Phone

PerVuln SocInfe ResEffe SelEffi CopAppr ProMoti ProBeha

Page 133: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

116

6.2.8 Answer for Research Question #4.1

This section answers research question #4.1 which states that “What is the protection

behaviour model of Thai smartphone users?”

After testing the theoretical protection behaviour model with empirical data, the result

shows that paths from Perceived Severity had no effect to Threat Appraisal and from

Response Effectiveness had no effect to Coping Appraisal (both at .05 statistically

significant level) and was removed from the result model. Thus, the protection

behaviour model of Thai smartphone users consisted of only seven constructs as shown

in Figure 6.15. ***

* Statistically significant at .05 level.

Figure 6.15: The Result Model of This Study

Threat Appraisal

Protection Behaviour

Protection Motivation

Social

Influence

.34*

.28*

.24*

.69*

.72*

.23*

R2 = .28

R2 =.87

R2 =.53 R2 =.67

.09*

.60*

Coping Appraisal

Perceived Vulnerability

Self-efficacy

Page 134: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

117

6.2.9 Answer for Research Question #4.2

This section answers research question #4.2 which states that “What are degrees of

direct and indirect effects between constructs of protection behaviour model of Thai

smartphone users?”

The effects among constructs of the protection behaviour model of Thai smartphone

users are deliberated as follows:

1) Constructs that affected Protection Behaviour consisted of:

1.1) Coping Appraisal (assessment of ability in coping with damage resulting

from the danger) had a total effect on Protection Behaviour (behaviour

in protecting their smartphones from cyber threats) with a coefficient

of .77 (.60 for direct effect and .17 for indirect effects).

1.2) Self-efficacy (extent in performing the recommended behaviour

successfully) indirect affected Protection Behaviour with a coefficient of .53.

1.3) Protection Motivation (intention to perform the recommended behaviour)

directly affected Protection Behaviour with a coefficient of .23.

1.4) Social Influence (social pressure to perform or not perform a given

behaviour) indirectly affected Protection Behaviour with a coefficient of .21.

1.5) Threat Appraisal (assessment of the level of cyber danger on smartphone

posed by the threat) directly affected Protection Behaviour with a

coefficient of .09.

1.6) Perceived Vulnerability (probability that the smartphone may be attacked

by cyber threats) indirectly affected Protection Behaviour with a coefficient

of .03.

2) Constructs that affected Coping Appraisal - Self-efficacy and Social

Influence directly affected the Coping Appraisal (assessment of ability in coping with

damage resulting from the danger) with coefficients of .69 and .24 respectively.

3) Constructs that affected Protection Motivation - Coping Appraisal directly

affected Protection Motivation with a coefficient of .72. In the meantime, Self-efficacy

and Social Influence were indirectly affected Protection Motivation with coefficients

of .50 and .17 respectively.

Page 135: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

118

4) Constructs that affected Threat Appraisal - Perceived Vulnerability and Social

Influence directly affected Threat Appraisal with coefficients of .34 and .28 respectively.

The total effects of each construct on the Protection Behaviour, as calculated in

Chapter 4, are summarized in Figure 6.16 and Table 6.7.

Figure 6.16: Total Effects on Protection Behaviour Constructs

Table 6.7: Total Effects on Protection Behaviour Construct

Construct Protection Behaviour Level

Perceived Vulnerability .03 6

Social Influence .21 4

Self-efficacy .53 2

Threat Appraisal .09 5

Coping Appraisal .77 1

Protection Motivation .23 3

6.3 Conclusion

This chapter presents the design concept of this study, methodologies, and the results.

The next chapter will compare the results against the related literatures mentioned in

Chapter 2. Recommendations for increasing cybersecurity for smartphone users and

suggestions for future studies will also be provided in the next chapter.

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.03

0.21

0.53

0.09

0.77

0.23

Page 136: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

119

CHAPTER 7

DISCUSSION, CONCLUSION, AND RECOMMENDATION

This chapter presents the overview and summary of this study, methodologies, and the

results. Recommendations for increasing cybersecurity for smartphone users and

suggestions for future studies are also concluded this chapter.

7.1 Discussion and Conclusion

Mobile devices can be secured from threats. It depends on the cyber threat surveillance

and response team, the secured mobile telecommunication network, and the behaviour

of mobile device owners themselves. Each item is discussed as follows:

7.1.1 Smartphone Threats and Trend

Section 2.2.1 of Chapter 2 shows that there were two types of threats that can occur on

smartphone: threats can be caused by cyber attackers, such as, malware attack, wireless

network attack, denial of service attack, and break-in-attack. Other type of threats can

be caused from unawareness of users, such as, unintentionally disable or malfunction

of the applications by mistake, unintentionally expose their private information by

accessing phishing sites, phone lost or stolen by theft, or alter smartphone platform

intentionally (Jeon, W. et al, 2010: 315).

Smartphone threats are on the rise. Section 2.2.2 of Chapter 2 shows an increasing

number of new malicious mobile programs, which was three times of the year 2014

(The McAfee Mobile Threat Report 2016 by Snell & Bruce). Among these were mobile

banking Trojans, malicious attachments, ransomware, aggressive advertising malware,

and phishing web pages (Snell & Bruce, 2016). Moreover, it also shows that the largest

number of malware attack was Trojan SMS, followed by RiskTool and AdWare.

(Kaspersky Lab and Interpol Joint Report, October 2014 (August 2013 – July 2014).

Page 137: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

120

7.1.2 Computer Security Incident Response Team

Section 2.3.1 of Chapter 2 shows that Thai government, as well as other countries, aim

to cope with cyber threats by setting up ThaiCERT (Thailand Computer Emergency

Response Team), a national Computer Security Incident Response Team (CSIRT), in

the year 2000. ThaiCERT is responsible for providing incident response to computer

security threats. ThaiCERT has conducted various activities to strengthen the

integrity of important internal processes and infrastructure, and safeguard

cybersecurity for government agencies and the general public. ThaiCERT consists of

groups of experts that surveillance cyber threats that can endanger computers and/or

mobile devices, gives necessary supports and advices for solutions to such threats,

follows up and disseminates news and updates on computer security, including

mobile security, to the public. ThaiCERT supports collaboration among

organizations to increase efficiency in ability in handling cyber threat. This gives the

opportunities to business sectors in improving their cybersecurity. However, being

supported by the government, ThaiCERT services are limited to governmental

agencies. Thus, to make cyber threat incident response successfully, private sectors

should be involved as well as the public sectors.

Currently, as subsidized by Thai government, ThaiCERT officially gives services to

constituencies that mostly are government agencies. As collaboration among trusted

organizations can speed up response to cyber threats, and efficiency (Cichonski, 2012),

ThaiCERT has been trying to expand collaboration with its member constituencies.

Nonetheless, as being subsidized by the Thai government, ThaiCERT limits its

membership to Thai government agencies only. Therefore, to increase capacity in

cybersecurity, ThaiCERT membership should cover the private sectors as well.

7.1.3 Secured Telecommunication Network for Smartphone

Section 2.3.2 shows the framework of ITU X.805 which consists of three layers, three

planes, and eight dimensions, together with five attacks and threats. According to Khera

V., Fung C.C., Chaisiri S. (2013), the ITU X.805 provides high security standard and

designed guidelines which can improve the security of the mobile core network from the

Page 138: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

121

risks related to confidentiality, integrity and availability. Thus, Thai telecommunication

network operators, such as, AIS, DTAC or Truemove, should apply standards and

guidelines to safeguard their telecommunication networks.

Moreover, to speed up response to cyber threats efficiently, the telecommunication

network operators should collaborate closely among themselves (Cichonski, 2012).

Thus, organizing a sector-based Computer Security Incident Response Team (CSIRT)

for telecommunication network operators and regulator should affectively increase

cybersecurity, especially for Thai smartphone users.

7.1.4 Protection Behaviour Model of Thai Smartphone Users

The analysis result of chapter 5 shows that from a total of eight factors, six of them had

significant effects on Protection Behaviour of Thai smartphone users. Among these

factors were (1) Perceived Vulnerability; (2) Social Influence; (3) Self-efficacy;

(4) Threat Appraisal; (5) Coping Appraisal; and (6) Protection Motivation, with two

factors being removed. Since Perceived Severity and Response Effectiveness had no

significant effects and they were therefore removed from the model.

Figure 7.1: The Result Model

Source: Redrawn from Section 5.5.1 of Chapter 5

Threat Appraisal

Protection Behaviour

Protection Motivation

Social

Influence

.34*

.28*

.24*

.69*

.72*

.23*

R2 = .28

R2 =.87

R2 =.53 R2 =.67

.09*

.60*

Coping Appraisal

Perceived Vulnerability

Self-efficacy

Page 139: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

122

According to the result model, Threat Appraisal and Coping Appraisal had significant

effects on Protection Motivation. The result also shows that Perceived Vulnerability had

significant effect on Threat Appraisal while Perceived Severity had not. Similarly, Self-

efficacy had significant effect on Coping Appraisal while Response effectiveness had not.

Thus, the result model is partially consistent with the cognitive process of protection

motivation theory (Rogers, R.W., 1983).

The result model is also partially consistent with the Variance Theory View of TTAT

proposed by Liang & Xue (2009). As it is clear that Social Influence of the result model

had significant effect on both Threat Appraisal and Coping Appraisal, Perceived

Vulnerability had significant effect on Threat Appraisal, Self-efficacy had significant

effect on Coping Appraisal, Threat Appraisal and Coping Appraisal both had

significant effects on Protection Motivation, and Protection Motivation had significant

effect on Protection Behaviour.

In addition, the result model is also in line with the study of Srisawang, Thongmak &

Ngarmyarn (2015), the authors of “Factors Affecting Computer Protection Behaviour,”

which is also based on PMT model. It is confirmed that Social Influence of the result

model had significant effect on both Threat Appraisal and Coping Appraisal. Moreover,

Threat Appraisal and Coping Appraisal had significant effects on both Protection

Motivation and Protection Behaviour.

7.1.5 Factors’ Impact Values on Protection Behaviour

When considering the impact values of factors on Protection Behaviour, result from

section 5.5.2 of Chapter 5 shows that four constructs were significant and had high

impacts in the model, they are: (1) Coping Appraisal with impact value of .77; (2) Self-

efficacy with impact value of .53; (3) Protection Motivation with impact value of .23;

and (4) Social Influence with impact value of .21. In addition, two factors that were

significant but had little impacts on Protection Behaviour and they are Perceived

Vulnerability with impact value of .09 and Threat Appraisal with impact value of .03.

Page 140: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

123

When focusing on Coping Appraisal and Threat Appraisal, it is observed that Coping

Appraisal affected Protection Behaviour with an impact value of .77 and affected

Protection Motivation with an impact value of .72, while Threat Appraisal affected

Protection Behaviour with an impact value of .23 and it had no affected on Protection

Motivation. This result was consistent with the study by Srisawang, Thongmak &

Ngarmyarn (2015) as that Coping Appraisal had greater impact on both Protection

Motivation and Protection Behaviour than what Threat Appraisal had. The remaining

factors, Social Influence, Threat Appraisal, and Perceived Vulnerability, also affected

Protection Behaviour with the impact values of .21, .09, and .03 respectively. However,

although Perceived Vulnerability was significant but it had very low impact on

Protection Behaviour, thus it is withdrawn from consideration.

Accordingly, it is noted that protection motivation or intention to perform the

recommended behaviour (Boer & Seydel, 1996) can raise level of protection behaviour

of smartphone users or behaviour in performing the recommendation (Boer & Seydel,

1996). Both protection motivation and protection behaviour are driven by threat appraisal;

assessment of the level of danger posed by the threat (Woon et al, 2005); and coping

appraisal, assessment of one’s ability to cope with and avert the potential loss or damage

resulting from the danger (Woon et al, 2005). However, based on the impact value

mentioned above, effort should be focused on factors with high impact values,

including ability in perform coping appraisal, efficacy of smartphone users, social

influence on smartphone users, and ability in performing threat appraisal.

7.1.6 Groups with Low Protection Motivation and Behaviour

7.1.6.1 Groups with Low Protection Motivation

Protection motivation is individuals’ intentions to perform the recommended behaviour

(Boer & Seydel, 1996), such as, intention to follow the information security guidelines

or news on how to use a smartphone safely, intention to use antivirus/anti-spyware

software on their phones, or intention to protect their phones from cyber threats.

Protection motivation affected protection behaviour of smartphone users with an impact

value of .23. The result in Section 4.3 of Chapter 4 shows that the following groups had

Page 141: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

124

low protection motivations, they were (1) smartphone users age 51 – 60 years old, (2)

smartphone uses whose phones were never infected by virus/malware, (3) smartphone

users who never connected their phones to the internet via free public Wi-Fi, and (4)

smartphone users who never used their phones to transfer money. All these groups were

vulnerable to cyber threat and needed to be inspired to concern more on the dangerous

of cyber threat.

7.1.6.2 Groups with Low Protection Behaviour

Protection behaviour is individuals’ performing the recommended behaviours. (Boer &

Seydel, 1996), such as using complicated passwords protection on their phones, performing

log-out or sign-out the applications after finishing using (ie. ebanking, email or social

media applications), using antivirus software, updating software or applications on

smartphone, or following safety guide in using a smartphone safely and appropriately.

The result from Section 4.3 of Chapter 4 of this study shows the groups with low

protection behaviours, they are: (1) smartphone users age between 51 – 60 years old;

(2) smartphone users who never used the free public Wi-Fi; and (3) smartphone users

who never used their phones to transfer the money. Thus, these groups were vulnerable

and had high risk to cyber threat.

7.1.7 Increasing Protection Behaviour of Smartphone Users

As mentioned in Section 2.2.2 of Chapter 2 that the number of new malicious mobile

phone programs are increasing (McAfee Mobile Threat Report 2016), especially

mobile banking Trojans, malicious attachments, ransomware, aggressive advertising

malware, and phishing web pages (Snell & Bruce, 2016), so it is essential to raise

protection behaviours of Thai smartphone users. As stated in Section 7.1.5, factors that

should be focused on are coping appraisal, self-efficacy of smartphone users, social

influence on smartphone users, and threat appraisal abilities of smartphone users.

Page 142: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

125

7.1.7.1 Increase Coping Appraisal

According to the result from Section 5.5.2 of Chapter 5, coping appraisal can increase

protection motivation with the impact value of .72 and protection behaviour with the

impact value of .77. This can be done by increasing individual’s ability to assess their

necessary skills in coping with or averting the potential loss or damage on their phones

resulting from various threats (Woon et al., 2005), such as their abilities in appraising

the information security violations or their expertise in implementing preventative

measures to stop people from getting their confidential information. As the result from

Section 4.3 of Chapter 4 shows that individuals ages 51 – 60 years old, individuals who

live in Bangkok and metropolitan, and individuals who never connected their phones

to internet via public Wi-Fi had lower self-efficacy that other groups, thus, efforts of

increasing coping appraisal ability must be focused on these groups.

7.1.7.2 Increase Self-efficacy

Self-efficacy is the extent of a person in performing the recommended

behaviour successfully (Boer & Seydel, 1996). The result from Section 5.5.2 of Chapter

5 shows that self-efficacy of smartphone users can increase both protection motivation

with impact value of .50 and protection behaviour with impact value of .53. Examples

of self-efficacy of smartphone users including ability to setup their phones for advanced

protection, update software or applications in their phone, use complicate password for

logging in their phones or applications, or use virus protection software in their phones.

Result from Section 4.3 of Chapter 4 shows the groups of smartphone users with low

self-efficacy, need to be focused on including smartphone users of ages 41 – 60,

smartphone users who had no experiences with phones’ virus/malware infections, who

never connected their phones to free public Wi-Fi, and who never transferred money

through their phones.

Page 143: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

126

7.1.7.3 Increase Social Influence

Social influence is the social pressure perceived by smartphone users to perform or not

perform a given behaviour (Ajzen, 1991). Social influence can increase smartphone

users’ protection motivation with impact value of .17 and protection behaviour with

impact value of .21. Social pressure perceived by smartphone users can be increased by

providing more information direct to people on how to protect the smartphones from

cyber threats through effective mass media, such as TV, newspapers, and social

network. The information can educate smartphone users, as well as, bring pressure to

them to become aware of severity of the consequences of cyber threats, then, comply

with the smartphone security recommendations and take appropriate security measures.

According to the result from Section 4.3 of Chapter 4, the effort should be focused on

the groups with low mean value in social influence, including smartphone users of ages

51 – 60 years old and group of people who have never used their phones to transfer

money.

7.1.7.4 Increasing Threat Appraisal

Threat appraisal can increase protection behaviour of smartphone users with impact

value of .09. Increasing individuals’ threat appraisal or ability of smartphone users in

performing assessment of danger level on their phones posed by the threats (Woon et al,

2005), including abilities to assess vulnerabilities to security breaches on their phones,

chances of their phones to be affected by cyber threats, or chances that information

security violation will occur on their phones. Based on result from Section 4.3 of

Chapter 4, people live in Bangkok and metropolitan, who have never experienced

phone virus infection, or who have never used their phone to transfer money have lower

ability in assessing cyber threats than other groups that efforts needed to be focused on.

Page 144: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

127

7.2 Recommendations

Recommendations for increasing cybersecurity of smartphone users are summarized in

Table 7.2 below.

Table 7.1: Summary of the Recommendations

Item Detail

1. Cybersecurity at national level. ThaiCERT (Thailand Cyber Emergency Response Team), a

department under ETDA (Electronic Transactions

Development Agency), is Thailand national CSIRT

(Computer Security Incident Response Team) level that

acts responsively and handles computer security

incidents.

1.1 Private sector should be

allowed to be member of

ThaiCERT.

At present, memberships of ThaiCERT are for governmental

agencies only. However, if private agencies are allowed to

become members of ThaiCERT, the security incident

handling will be more affective.

1.2 All private agencies with

related business should form

sector based CSIRT to increase

efficiency of cybersecurity as a

whole.

Sector-based CSIRT (sector-based CERT) is the group of

related business with mutual purpose in securing their

computer networks from cyber threats. However, there are

not many sector based CSIRTs in Thailand at present. Thus,

to increase the efficiency of cybersecurity, all related

business agencies should form sector based CSIRTs and

performed close collaboration with ThaiCERT.

2. Cybersecurity at mobile

operator level.

Telecommunication network operator who provides services

for smartphone users.

2.1 Telecommunication operators

should adopt the ITU X.850

standard on their telecommunication

network to increase their network

security.

The ITU X.850 standard is the security architecture for

systems providing end-to-end communications recommended

by the ITU (International Telecommunication Union).

Applying the ITU X.850 standard can improve the security

of the mobile core network from the risks related to

confidentiality, integrity and availability. Thus, Thai mobile

Page 145: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

128

Item Detail

operators should apply the high security standard and

designed guidelines based on the ITU X.805 to safeguard

their telecommunication networks from cyber threats.

2.2 Telecommunication operators

should form up a sector based

CSIRT to increase the efficacy

of cybersecurity.

Thai mobile operators, including mobile regulator,

should form up a sector based CSIRT and collaborate

closely with ThaiCERT in order to secure their

computer networks from cyber threats, and this will

lead to increased efficiency of cybersecurity for all

smartphone users.

3. Cybersecurity at phone user

level.

Cybersecurity at this level focuses on motivation and

behaviour of smartphone users in preventing their phones

from cyber threats.

3.1 Increase coping appraisal

ability of smartphone users.

Increase individuals’ assessment abilities of their skills in

dealing or averting the potential damages on their phones

resulting from cyber threats (Woon et al, 2005), such as

the abilities in appraising the information security

violations or abilities in implementing preventative

measures to secure confidential information. The groups

of smartphone users that should be focused on are adults age

51 – 60 years old, people who live in Bangkok and

metropolitan area, and people who never used public Wi-Fi.

3.2 Increase individual’s ability

in assessing cyber threat.

Increase ability of smartphone users in performing

assessment of danger level on their phones posed by cyber

threats (Woon et al, 2005). For example, increase their

abilities to assess vulnerabilities to security breaches on

their phones, to assess chance that their phones may be

affected by threats, or assess chance that information

security violation may occur on their phones. Based on

the result from Section 4.3 of Chapter 4, people live in

Bangkok and metropolitan, who have never experienced

Page 146: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

129

Item Detail

with phone virus infection, or who have never used their

phone to transfer money had lower ability in assessing

cyber threats than other groups that efforts needed to be

focused on.

3.3 Increase self-efficacy of

smartphone users.

To increase individuals’ abilities in performing the

recommended behaviour successfully, for example, the

ability to setup advanced protection on the phone, ability

to update applications, and the ability to use complicate

password. Smartphone users can be self-educated

through eBooks, website, social network, booklets or

events. In addition, they can increase their efficacies

through mobile applications or simulation software

(examples are shown in Appendix F). The groups of

smartphone users that should be concerned including

adults age between 41 – 60 years old, people who had no

experience with virus/malware infections, people who

have never connected their phones to free public Wi-Fi,

and who have never transferred money via phones.

3.4 Increase social impact on

phone users.

To increase social impact on smartphone users by

providing more security information on how to protect

their phones from cyber threats through medias, such as,

TV, radio, newspapers. According to the result in Sector

4.3 of Chapter 4, effort should focus on the groups with

low social influence, including adult age between 51 – 60

years old and people who have never transferred money

via their phones.

Page 147: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

130

7.3 Suggestions for Future Studies

Further research should focus on applying the proposed model with empirical

data of each group of smartphone users. This further study can be done by gathering

larger sample size allowing for an assessment of a wider category. This will then allow

analysis of separate models for each category, and compare the models to indicate the

differences.

The proposed model and tool of this study were created for analyzing protection

behaviours of smartphone users. However, further research can be done by applying

this model to perform more deep-down study on other areas of internet users, such as,

tablet users, laptop users, or Internet of Things (IOTs) user with minor adjustment.

The proposed model was designed to analyze cause and effect of smartphone

users’ protection behaviours. Further study can adapt the concepts and variables of this

study to create algorithm that can be applied to proactively monitor phone usages to

give a risk scoring and take mitigation action when appropriate automatically to reduce

the risk.

It is hopeful that adoption of the recommendations from this research study will provide

strategic directions for the education and raising of awareness among smartphone users so

as to strengthen their protection against potential threats in Thailand.

Page 148: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

131

BIBLIOGRAPHY

Ajzen, I. (1991). The Theory of Planned Behaviour. Organizational Behaviour and

Human Decision Processes (50:2), pp. 179-211.

Anderson, C. L. & Agarwal, R. (2010). Practicing safe computing: a multi-method

empirical examination of home computer user security behavioural intentions.

MIS Quarterly, 34.

Ary, D., Jacobs, L. D., &Razazvieh, A. (1996). Introduction to research in education. 5th

ed. Fort Worth, Texas: Harcourt Brace College Publishers. pp. 377.

Baskerville, R. (1991a). Risk Analysis: An Interpretive Feasibility Tool in Justifying

Information Systems Security. European Journal of Information Systems (1:2).

pp. 121-130.

Baskerville, R. (1991b). Risk Analysis as a Source of Professional Knowledge.

Computer & Security (10:8). pp. 749-764.

Boer, H.& Seydel, E.R. (1996). Protection Motivation Theory. In: Predicting Health

Behaviour: Research and Practice with Social Cognition Models. Open

University Press, Buckingham, pp. 95-120.

Brown, S.A. &Venkatesh, V. (2005). Model of adoption of technology in households:

A baseline model test and extension incorporating household life cycle.

MISQuarterly (29:3), pp. 399-426.

Bulmer, M.G. (1979). Principles of Statistics. Dover Publications, Ind., New York.

Bulgurcu, B., Cavusoglu, H., &Benbasat, I. (2010). Information Security Policy

Compliance: An Empirical Study of Rationality-Based Beliefs and Information

Security Awareness. MIS Quarterly, 334(3), 523-548.

Byrne, B. M. (1994). Structural equation modeling with EQS and EQS/Windows.

Thousand Oaks, CA: Sage Publications.

Chai, S. et al. (2009). Internet and Online Information Privacy: An Exploratory Study

of Preteens and Early Teens. IEEE Transactions on Professional

Communication, 52(2), 167-182.

Page 149: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

132

Choobineh, J. et al. (2007). Management of Information Security: Challenges and

Research Directions. Communications of the Association for Information

Systems, vol. 20, pp. 958-971.

Chouhan, S., Gaikwad, R. B., Sharma, N. (2013). A Study on 4G Network and Its

Security. International Journal of Computer Architecture and Mobility, vol. 1,

no. 9.

Cichonski, P. et al. (2012). Recommendations of the National Institute of Standards and

Technology. Special Publication 800-61 Revision 2. National Institute of

Standard and Technology (NIST). U.S. Department of Commerce.

Crossler, R. E., (2010). Protection Motivation Theory: Understanding Determinants to

Backing Up Personal Data. The University of Texas – Pan American, the 43rd

Hawaii International Conference on System Sciences – 2010.

Digital Advertising Association Thailand. (2015). Thailand Mobile Landscape.

Retrieved from http://www.daat.in.th/index.php/daat-mobile- 2015/

Dimitriadis, C. K. (2007). Improving Mobile Core Network Security with Honeynets.

IEEE Security & Privacy, 5(4) 40-47.

English Oxford Living Dictionary. (2016). Retrieved from

https://en.oxforddictionaries.com/definition/smartphone

Fung, C.C., Khera, V., Depickere, A., Tantatsanawong, P. and Boonbrahm, P. (2008).

Raising information security awareness in digital ecosystem with games - a

pilot study in Thailand. In: 2nd IEEE International Conference on Digital

Ecosystems and Technologies, DEST, Phitsanulok, Thailand pp. 375-380.

Gasser, M. (1988). Building a Secure Computer System. Van Nostrand Reinhold.

p. 3. ISBN 0-442-23022-2. Retrieved from

http://cs2.ist.unomaha.edu/~stanw/gasserbook.pdf

George, D., & Mallery, M. (2010). SPSS for Windows Step by Step: A Simple Guide

and Reference, 17.0 update (10a ed.) Boston: Pearson.

Harmantzis, F., Malek, M. (2004). Security Risk Analysis and Evaluation. IEEE

International Conference on Communications, vol. 4 1897–1901.

Hong, J. et al. (2015). Social Cybersecurity: Applying Social Psychology to Cybersecurity.

Human Computer Interaction Institute, Carnegie Mellon University.

Page 150: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

133

Hu, L. T., & Bentler, P. M. (1995). Evaluating model fit. In R. H. Hoyle (Ed.), Structural

equation modeling: Concepts, issues, and applications (pp. 76-99). Thousand

Oaks, CA: Sage.

Ifinedo, P. (2011). Understanding information systems security policy compliance: An

integration of the theory of planned behaviour and the protection motivation

theory. Computers & Security, Science Direct, 31(1), 83-95.

ITU-T Recommendation X.805. (2003). Security Architect for Systems Providing

End-to-End Communication.

Janz, N. K. & Becker, M. H. (1984). The Health Belief Model: A Decade Later, Health

Education Quarterly (11:1), pp. 1-45.

Jeon, W. et al. (2011). A Practical Analysis of Smartphone Security. School of

Information and Communication Engineering. Sungkyunkwan University,

Korea. Department of Cyber Investigation Police, Howon University, Korea.

Johnston, A. C. & Warkentin, M. (2010).Fear Appeals and Information Security

Behaviours: An Empirical Study.MIS Quarterly, 34(3).

Kaspersky Lab. (2014). Mobile Cyber Threat. Kaspersky Lab & INTERPOL Joint.

Report. Retrieved from https://media.kaspersky.com/pdf/Kaspersky-Lab-KSN-

Report-mobile-cyberthreats-web.pdf

Khera V., Fung C.C., Chaisiri S. (2013). A Review of Security Risks in the Mobile

Telecommunication Packet Core Network. Advances in Information

Technology. IAIT. Communications in Computer and Information Science, vol

409. Springer, Cham

Kissel, R. (2013). Glossary of Key Information Security Terms. NISTIR 7298 Revision

2. Computer Security Division Information Technology Laboratory.

Kline, R. B. (2011). Principles and Practice of Structural Equation Modeling. 5th ed.,

pp. 3–427). New York: The Guilford Press.

Liang, H. &Xue, Y. (2009). Avoidance of Information Technology Threats: A Theoretical

Perspective. MIS Quarterly, 2009, 33(1), pp. 71 - 90.

Maddux, J. E. & Rogers, R. W. (1983). Protection motivation and self-efficacy: A

revised theory of fear appeals and attitude change. Journal of Experimental

Social Psychology. 19 (5): 469–479.

Page 151: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

134

National Statistical Office of Thailand. (2014(. Retrieved from http://www.nso.go.th

Nokia. (2017). NetGuardEndPoint and IoT Solution. Retrieved from

https://networks.nokia.com/solutions/endpoint-security

PC Mag. (2015). Definition of Computer Security. Encyclopedia. Ziff Davis, PCMag.

Retrieved from https://www.pcmag.com/encyclopedia/term/40169/computer-

security on 6 September 2016.

PWC. (2013). BIS Cyber Security Breaches Survey 2013 Results. Retrieved from

https://www.pwc.com/us/en/cybersecurity/broader-perspectives/cyber-breach-

crisis.html

Prentice-Dunn, S., and McClendon, B. T. Reducing Skin Cancer Risk: An Intervention

Based on Protection Motivation Theory. Journal of Health Psychology (6:3),

2001, pp. 321-328.

Rippetoe, P. and Rogers, R. W. (1987). Effects of components of protection motivation

theory on adaptive and maladaptive coping with a health threat. Journal of

Personality and Social Psychology, 52, 596–604.

Rogers, R.W. (1975). A Protection Motivation Theory of Fear Appeals and Attitude

Change. Journal of Psychology, 91, pp. 93-114.

Rogers, R.W. (1983). Cognitive and Physiological Process in Fear Appeals and

Attitude Change: A Revised Theory of Protection Motivation. in Social

Psychophysiology: A Source Book, R. Petty (ed.), New York: Guilford Press,

pp.153-176.

Rosenstock, I. M. (1974). The Health Belief Model and Preventive Health Behaviour.

Health education Monographs (2), pp. 354-386.

Rouse, M. (2015). Social Engineering Definition. TechTarget. Retrieved from

http://searchsecurity.techtarget.com/definition/social-engineering on 6

September 2015.

Ruggiero, P.& Foote, J. (2011). Cyber Threats to Mobile Phones. Carnegie Mellon

produced for US-CERT.

Shirey, R. (2000). Internet Security Glossary. Network Working Group. Internet

Engineering Task Force. RFC 2828. pp. 170.

Steiger, J. H. (1990). Structural model evaluation and modification: An interval

estimation approach. Multivariate Behavioural Research, 25, 173-180.

Page 152: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

135

Tate, N. (2013) Reliance Spells End of Road for ICT amateurs. May 07, 2013. The

Australian. Retrieved from

http://www.theaustralian.com.au/business/technology/reliance-spells-end-of-

road-for-ict-amateurs/news-story/6f84ad403b8721100f5957a472a945eb

Tu, Z.L. & Yuan, Y.F. (2012). Understanding User Behaviour in Coping with Security

Threats of Mobile Device Loss and Theft. 45th Hawaii International Conference

on System Sciences. 978-0-7695-4525-7/12.

Ullman, J. B. (2001). Structural equation modeling. In B. G. Tabachnick& L. S. Fidell

(2001). Using Multivariate Statistics (4th ed& pp 653- 771). Needham Heights,

MA: Allyn & Bacon.

Veedvil. (2015). Statistics of Mobile Users and Number of Smartphone in Thailand.

Veedvil Tech, News and Info, Retrieved from

http://www.veedvil.com/news/mobile-users-and-smartphone-in-thailand-2015/

Xenakis, C. (2008). Security Measures and Weaknesses of the GPRS Security

Architecture. International Journal of Network Security, vol .6, no. 2, 158–169.

Page 153: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

136

APPENDIX A

QUESTIONNAIRE (THAI)

Page 154: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

137

ตอนท� 1 สอบถามขอมลท�วไปเก�ยวกบผใชโทรศพทมอถอ(Smartphone)

ทาเคร�องหมาย ลงในชอง � ท�ตรงกบความเปนจรง

1. เพศ

1) ชาย 2) หญง

2. อาย

1) 18 – 20ป 2) 21 – 30 ป 3) 31 – 40 ป

4) 41 – 50 ป 5) 51 – 60 ป

3. การศกษา

1) ต�ากวาปรญญาตร 2) ปรญญาตร 3) ปรญญาโท หรอสงกวา

4. อาชพ

1) นกเรยน//นกศกษา 2) เจาของกจการ/ประกอบธรกจสวนตว

3) ขาราชการ พนกงานราชการ หรอลกจางของรฐ 4) พนกงานรฐวสาหกจ

5) พนกงานบรษทเอกชน 6) ไมมอาชพ/แมบาน

5. รายไดตอเดอน

1) ไมเกน 15,000 บาท 2) 15,001 – 30,000 บาท 3) 30,001 – 40,000 บาท

4) 40,001 – 50,000 บาท 5) 50,001 บาท ข�นไป

6. ปจจบนทานพกอาศยอยในภาคใดของประเทศ

1) กรงเทพและปรมณฑล 2) ภาคเหนอ 3) ภาคตะวนออกเฉยงเหนอ

4) ภาคตะวนออก 5) ภาคกลาง 6) ภาคใต

7. ทานใชบรการเครอขายโทรศพทมอถอของผใหบรการใดมากท�สด

1) True Move 2) DTAC 3) AIS

4) ไมทราบ 5) อ�นๆ (ระบ) ........................................................

8. โทรศพทมอถอของทานใชระบบปฏบตการใด

1) iOS / iPhone 2) Android 3) Windows Mobile

4) Symbian 5) ไมทราบ/ไมรจก 6) อ�นๆ (ระบ) ..............................

9. ทานเคยทาโทรศพทมอถอของทานหายหรอถกขโมยหรอไม

1) ไมเคย 2) เคย

10. โทรศพทมอถอของทานเคยตดไวรสหรอไม

1) ไมเคย 2) เคย

Page 155: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

138

11. ทานเคยเช�อมตอโทรศพทมอถอของทานกบ Wi-Fi สาธารณะหรอไม

1) ไมเคยทา 2) ทาเปนบางคร� ง 3) ทาเปนประจา

12. ทานเคยใชโทรศพทมอถอในการซ�อสนคา ชาระคาบรการ หรอโอนเงนหรอไม

1) ไมเคยทา 2) ทาเปนบางคร� ง 3) ทาเปนประจา

สวนท� 2การรบร และพฤตกรรมของผใชโทรศพทมอถอ

ทาเคร�องหมาย ลงในชองชองวางท�ทานเลอก

(1= ไมเหนดวยอยางย�ง 2= ไมเหนดวย 3= เฉยๆ 4 =เหนดวย 5=เหนดวยอยางย�ง)

การรบรในความรนแรง:การรบรความรนแรงท�เกด

จากภยคกคามบนโทรศพทมอถอของฉน

(1) (2) (3) (4) (5)

1 ภยคกคามทางโทรศพทมอถอเปนภยท�

อนตราย สามารถสงผลเสยหายท�รายแรง

ตามมา )เชนการถกขโมยขอมลสาคญ

ภาพถาย หรอรหสผานตางๆ(

2 ฉนใหความสาคญกบความปลอดภยของ

ขอมล และความเส�ยงท�อาจจะเกดข�นกบ

โทรศพทมอถอของฉน

3 ปญหาดานความปลอดภยบนโทรศพทมอถอ

สามารถสรางความเสยหายเปนมลคาสง เชน

การถกขโมยขอมล (ภาพถายหรอรหส)

การรบรจดเปราะบาง:ความเปนไปไดท�โทรศพท

มอถอของฉนจะถกเจาะระบบถกละเมด/

(1) (2) (3) (4) (5)

4 โทรศพทมอถอของฉนมโอกาสท�จะตดไวรส

ไดโดยงาย

5 ฉนมโอกาสท�จะถกขโมยตวตนไดงาย

(identity theft) เชน ถกโจรปลอมตวเปนตว

เราเพ�อใชบตรเครดต หรอบตรประชาชนไป

ใชประโยชนในทางมชอบ

Page 156: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

139

6 ฉนมโอกาสท�จะถกขโมยขอมลสาคญใน

โทรศพทมอถอของฉนไดงาย

การตอบโตอยางมประสทธภาพ:ประสทธภาพของ

พฤตกรรมตามคาแนะนาในการหลเล�ยงผลเสยหาย

ท�จะตามมา

(1) (2) (3) (4) (5)

7 การใชรหสผาน(password)ท�ยากและซบซอน

เชน ใชรหสผานความยาว 8 ตวอกษรข�นไป

และ/หรอใชสญลกษณเชน %&$ จะสามารถ

เพ�มการรกษาความปลอดภยใหแก

โทรศพทมอถอ

8 การอพเดทโปรแกรมหรอแอพพลเคช�นเปน

ประจาจะชวยรกษาความปลอดภยใหกบ

โทรศพทมอถอ

9 การใชโปรแกรมปองกนไวรสสามารถชวย

รกษาความปลอดภยใหแกโทรศพทมอถอ

ความสามารถสวนบคคล:ขดความสามารถของ

ตนเองในการปฏบตตามพฤตกรรมท�แนะนาอยาง

สมฤทธผล

(1) (2) (3) (4) (5)

10 ฉนสามารถต�งรหสผาน (password) ท�ยาก

และซบซอน เชน ใชรหสผานความยาว 8

ตวอกษรข�นไป และ /หรอใชสญลกษณเชน

%&$ บนโทรศพทมอถอดวยตวฉนเอง

11 ฉนสามารถตดต�งโปรแกรมปองกนไวรสบน

โทรศพทมอถอของฉนดวยตวฉนเอง

12 ฉนสามารถต�งคาโทรศพทมอถอใหม

ความสามารถในการปองกนข�นสงดวยตวฉน

เอง )เชน การส�งใหมการลบขอมลอตโนมต

เม�อโทรศพทมอถอถกขโมย (

Page 157: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

140

13 ฉนสามารถอพเดทแอพพลเคช�นบน

โทรศพทมอถอใหมความทนสมยอยเสมอ

ดวยตวฉนเอง

ความกดดนจากสงคม:ความกดดนจากสงคมรอบ

ดานท�สงผลใหเกดพฤตกรรมท�ควรปฏบต หรอท�ไม

ควรปฏบต

(1) (2) (3) (4) (5)

14 เพ�อนๆ มการพดคยกนบอยๆ เก�ยวกบวธ

ปองกนโทรศพทมอถอใหมความปลอดภย

15 เพ�อนๆ แนะนาใหฉนมการรกษาความ

ปลอดภยโทรศพทมอถอ เชน แนะนาใหใช

รหสผานท�ยาก ใชโปรแกรมฆาไวรส

16 ผใชโทรศพทมอถอสวนใหญปฏบตตาม

คาแนะนาในการรกษาความปลอดภย

โทรศพทมอถออยางเครงครด

17 ส�อโทรทศน หนงสอพมพ หรออนเตอรเนต

แนะนาใหฉนมการรกษาความปลอดภย

โทรศพทมอถอของฉน

การประเมนภยคกคาม:ความสามารถในการ

ประเมนระดบภยอนตรายท�สามารถเกดข�นไดบน

โทรศพทมอถอของฉน

(1) (2) (3) (4) (5)

18 โทรศพทมอถอของฉนงายตอการถกเจาะ

ระบบ /ถกโจมตหากฉนไมระวงปองกน

19 เปนไปไดท�โทรศพทมอถอของฉนมโอกาสจะ

ตดไวรส หรอถกขโมยขอมล

20 ภยคกคามท�โจมตโทรศพทมอถอเปนส�งท�ม

อนตรายรายแรงมาก

21 เปนไปไดอยางย�งท�ขอมลสาคญบน

โทรศพทมอถอของฉนจะถกขโมย

Page 158: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

141

การประเมนความสามารถ:การประเมนความสามารถ

ในการรบมอกบภยคกคามเพ�อปองกนความ

เสยหายท�จะเกดข�น

(1) (2) (3) (4) (5)

22 ฉนมความสามารถในการปองกน

โทรศพทมอถอของฉนจากการถกเจาะระบบ

การขโมยขอมลสาคญ หรอขโมยรหสผาน

อเมล /เฟสบค

23 ฉนมความสามารถในการปองกนไมใหแฮก

เกอรเขามาเจาะระบบ หรอขโมยขอมลสาคญ

จากโทรศพทมอถอของฉน

24 การระมดระวงปองกนขอมลสาคญใน

โทรศพทมอถอของฉนเปนเร�องท�ไมยาก

แรงจงใจในพฤตกรรม:ความต�งใจในการปฏบต

ตามพฤตกรรมท�ไดรบการแนะนา

(1) (2) (3) (4) (5)

25 ฉนมความต�งใจท�จะปฏบตตามข�นตอนใน

การใชโทรศพทมอถออยางปลอดภย

26 ฉนมความต�งใจท�จะใชโปรแกรมปองกน

ไวรสและสปายแวรบนโทรศพทมอถอของฉน

27 ฉนมความต�งใจท�จะปองกนโทรศพทมอถอ

ของฉนจากภยคกคาม )เชน ปองกนการเจาะ

ระบบ การขโมยรหส หรอขอมลสาคญ(

28 ฉนมความต�งใจท�จะตดตามขาวสาร และหา

วธปองกนโทรศพทมอถอของฉนจากภย

คกคาม

พฤตกรรมในการระวงปองกน:การปฏบตตาม

พฤตกรรมท�แนะนา

(1) (2) (3) (4) (5)

29 ปจจบน ฉนใชรหสผาน (password) ท�ยากและ

ซบซอนบนโทรศพทมอถอของฉน )เชน ใช

รหสผานความยาว 8 ตวอกษรข�นไป และ/

หรอใชสญลกษณเชน %&$)

Page 159: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

142

30 ฉนลอคเอาท (logout) ทกคร� งท�ฉนเลกใช

แอพพลเคช�นสาคญ )เชน เฟสบค ทวตเตอร

หรออแบงค /ธนาคารออนไลน(

31 ปจจบน ฉนใชโปรแกรมปองกนไวรสบน

โทรศพทมอถอของฉนตลอดเวลา

32 ฉนมการอพเดทแอพพลเคช�นบนมอถอของฉน

ใหทนสมยอยเสมอ )เชน อพเดทระบบปฏบตการ

หรอโปรแกรมฆาไวรส เปนตน(

33 ฉนปฏบตตามข�นตอนการรกษาความ

ปลอดภยใหแกโทรศพทมอถออยางเครงครด

Page 160: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

143

APPENDIX B

QUESTIONNAIRE (ENGLISH)

Page 161: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

144

Part 1: Demographic and general behaviour of smartphone user

Mark a sign in the space for each question.

1. Gender

1) Male 2) Female

2. Age

1) 18 - 20 2) 21 - 30 3) 31 – 40 4) 41 – 50 5) 51 - 60

3. Education

1) Below bachelor degree 2) Bachelor degree 3) Master degree or above

4. Occupation

1) Student 2) Entrepreneur 3) Government employee

4) State enterprise employee 5) Private company employee

6) No employment

5. Monthly income

1) 15,000 Bht. or lower 2) 15,001 – 30,000 Bht. 3) 30,001 – 40,000 Bht.

4) 40,001 – 50,000 Bht. 5) 50,001 Bht.or above

6. Current residence

1) Bangkok and metropolitan 2) Northern 3) North Eastern

4) Eastern 5) Central Region 6) Southern

7. Which smartphone service are you using?

1) True Move 2) DTAC 3) AIS 4) Don’t Know

5) Others (specify) ………………

8. What is the operating system of your smartphone?

1) iOS 2) Android 3) Windows Mobile

4) Symbian 5) Don’t know 6) Others (specify) ………………

9. Have your smartphone ever lost or stolen?

1) No 2) Yes

10. Have your smartphone ever infected with virus?

1) Never 2) Yes 3) Don’t know

11. Have you ever connected your smartphone to public Wi-Fi?

1) Never 2) Sometimes 3) Always

Page 162: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

145

12. Have you ever paid for products/services or transferred money through your

smartphone?

1) Never 2) Sometimes 3) Always

Part 2: Perception and behaviour of smartphone user

(1=Strongly Disagree, 2=Disagree, 3=Neutral, 4=Agree and 5= Strongly Agree)

Perceived Severity: Severity of consequences of cyber

threats on my smartphone.

(1) (2) (3) (4) (5)

1 Overall, I am aware of the potential security threats

and their negative consequences.

2 I understand the concerns regarding information

security and the risks they pose in general.

3 I have sufficient knowledge about the cost of

potential security problems.

Perceived Vulnerability: Probability that my

smartphone may be attacked by cyber threats.

(1) (2) (3) (4) (5)

4 I think that my chance of getting virus on my

smartphone is high.

5 I think that the chance that my identity can be stolen

is high.

6 I think that the chance that my important data can be

stolen is high.

Response Effectiveness: Effectiveness of the

recommended behaviour in avoiding the negative

consequence.

(1) (2) (3) (4) (5)

7 Using complicated password would secure my

smartphone.

8 Software or applications updates can increase the

security of my smartphone.

9 Using virus protection software can increase the

security of my smartphone.

Page 163: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

146

Self-efficacy: The extent that a person can perform the

recommended behaviour successfully.

(1) (2) (3) (4) (5)

10 I know how to use complicate password on my

smartphone.

11 I can install virus protection software on my

smartphone.

12 I know how to setup my smartphone for advanced

protection.

13 I know how to update software or applications on

my smartphone.

Social Influence: Perceived social pressure to perform or

not perform a given behaviour.

(1) (2) (3) (4) (5)

14 My friends discuss security issues related to their

smartphones.

15 My friends would think that I should take security

measures on my smartphone.

16 It is likely that the majority of smartphone users

comply with the smartphone security

recommendations.

17 Information from mass media (TV, newspapers,

internet) suggests that I should comply with the

smartphone security recommendations.

Threat Appraisal: My assessment of the level of danger

on my smartphone posed by the threat.

(1) (2) (3) (4) (5)

18 I know my smartphone could be vulnerable to security

breaches if I don't adhere to protection measures.

19 It is extremely likely that cyber threats will infect my

smartphone.

20 Threats to the security of my smartphone are harmful.

21 The likelihood of an information security violation

occurring at my smartphone is high.

Page 164: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

147

Coping Appraisal: Assessment of my ability to cope with

and avert the potential loss or damage resulting from the

danger.

(1) (2) (3) (4) (5)

22 I have the necessary skills to protect my smartphone

from information security violations.

23 I have the expertise to implement preventative

measures to stop people from getting my

confidential information.

24 For me, taking information security precautions is

easy.

Protection Motivation: My intention to perform the

recommended behaviour.

(1) (2) (3) (4) (5)

25 I intend to follow the information security

guidelines on how to use a smartphone safely.

26 I intend to use antivirus/anti-spyware software on

my smartphone.

27 I intend to protect my smartphone from cyber

threats.

28 I intend to follow the security news and find out

how to prevent cyber threats.

Protection Behaviour: Performing the recommended

behaviour.

(1) (2) (3) (4) (5)

29 I always use complicated passwords protection on my

smartphone.

30 I always logout/sign out after finishing using

applications (such as ebanking, email or facebook).

31 I always use antivirus software

32 I always update software or applications on my

smartphone.

33 I always follow safety guide in using a smartphone

safely and appropriately.

Page 165: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

148

APPENDIX C

MEAN DIFFERENCE TEST

Page 166: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

149

1. Gender

Independent Samples t-test

Equality of Variances

t-test for Equality of Means

F Sig. t df

Sig. (2-

tailed)

Mean Diff.

Std. Error Diff.

Perceived Severity

- Equal variances assumed

.325 .569 .359 718 .719 .02020 .05622

- Equal variances not assumed

.360 716.363 .719 .02020 .05612

Perceived Vulnerability

- Equal variances assumed

.058 .810 -.172 718 .863 -.01066 .06189

- Equal variances not assumed

-.172 714.499 .863 -.01066 .06183

Social Influence

- Equal variances assumed

1.464 .227 -1.556 718 .120 -.09888 .06355

- Equal variances not assumed

-1.553 704.882 .121 -.09888 .06369

Response Effectiveness

- Equal variances assumed

5.829 .016 2.395 718 .017 .13945 .05823

- Equal variances not assumed

2.411 715.304 .016 .13945 .05785

Self-efficacy

- Equal variances assumed

1.859 .173 1.740 718 .082 .10876 .06252

- Equal variances not assumed

1.746 717.969 .081 .10876 .06230

Page 167: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

150

Independent Samples t-test

Equality of Variances

t-test for Equality of Means

F Sig. t df

Sig. (2-

tailed)

Mean Diff.

Std. Error Diff.

Threat Appraisal

- Equal variances assumed

.579 .447 1.695 718 .090 .10448 .06163

- Equal variances not assumed

1.691 703.247 .091 .10448 .06178

Coping Appraisal

- Equal variances assumed

3.089 .079 1.302 718 .193 .07498 .05760

- Equal variances not assumed

1.308 717.785 .191 .07498 .05733

Behavioural Motivation

- Equal variances assumed

.051 .821 .493 718 .622 .02881 .05845

- Equal variances not assumed

.494 715.535 .622 .02881 .05838

Protection Behaviour

- Equal variances assumed

3.812 .051 .555 718 .579 .03097 .05579

- Equal variances not assumed

.558 717.366 .577 .03097 .05550

Page 168: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

151

2. Age

Variable Mean and S.D. Different Test

S.D. F p

Perceived Severity

18 – 22 Years Old 3.69 .760 2.280 .059

23 – 30 Years Old 3.87 .714

31 – 40 Years Old 3.92 .788

41 – 50 Years Old 3.85 .672

51 – 60 Years Old 3.93 .816

Perceived Vulnerability

18 – 22 Years Old 3.44 .814 2.168 .071

23 – 30 Years Old 3.61 .795

31 – 40 Years Old 3.69 .877

41 – 50 Years Old 3.64 .762

51 – 60 Years Old 3.50 .882

Social Influence

18 – 22 Years Old 3.38 .839 4.893 .001

23 – 30 Years Old 3.41 .769

31 – 40 Years Old 3.41 .826

41 – 50 Years Old 3.40 .775

51 – 60 Years Old 3.04 1.010

Response Effectiveness

18 – 22 Years Old 3.47 .820 1.893 .110

23 – 30 Years Old 3.68 .748

31 – 40 Years Old 3.60 .771

41 – 50 Years Old 3.57 .743

51 – 60 Years Old 3.48 .827

Self-efficacy

18 – 22 Years Old 3.67 .750 12.423 .000

23 – 30 Years Old 3.73 .712

31 – 40 Years Old 3.64 .849

41 – 50 Years Old 3.53 .776

51 – 60 Years Old 3.11 .978

X

Page 169: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

152

Variable Mean and S.D. Different Test

S.D. F p

Threat Appraisal

18 – 22 Years Old 3.51 .722 2.227 .065

23 – 30 Years Old 3.42 .783

31 – 40 Years Old 3.37 .875

41 – 50 Years Old 3.46 .783

51 – 60 Years Old 3.23 .951

Coping Appraisal

18 – 22 Years Old 3.61 .660 7.789 .000

23 – 30 Years Old 3.59 .770

31 – 40 Years Old 3.53 .777

41 – 50 Years Old 3.46 .765

51 – 60 Years Old 3.16 .814

Behavioural Motivation

18 – 22 Years Old 3.64 .665 9.888 .000

23 – 30 Years Old 3.63 .738

31 – 40 Years Old 3.59 .802

41 – 50 Years Old 3.60 .743

51 – 60 Years Old 3.15 .869

Protection Behaviour

18 – 22 Years Old 3.62 .658 2.517 .040

23 – 30 Years Old 3.71 .745

31 – 40 Years Old 3.61 .772

41 – 50 Years Old 3.69 .695

51 – 60 Years Old 3.46 .847

Post Hoc Test for Age

Variable n Age

18 - 22 23 – 30 31 – 40 41 – 50 Perceived Severity

720 3.85

Age 18 - 22 144 3.69 -

Age 23 – 30 152 3.87 -.18* (.041)

X

X

Page 170: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

153

Variable n Age

18 - 22 23 – 30 31 – 40 41 – 50 Age 31 – 40 151 3.92 -.23* (.010) -.05 (.580)

Age 41 – 50 144 3.85 -.16 (.067) .02 (.851) .07 (.463)

Age 51 – 60 129 3.93 -.24* (.010) -.06 (.526) -.01 (.917) -.08 (.419)

Perceived Vulnerability

720 3.58

Age 18 - 22 144 3.44 -

Age 23 – 30 152 3.61 -.17 (.090)

Age 31 – 40 151 3.69 -.25* (.012) -.08 (.405)

Age 41 – 50 144 3.64 -.20* (.044) -.03 (.726) .05 (.638)

Age 51 – 60 129 3.50 -.06 (.606) .11 (.261) .19 (.055) .14 (.148)

Social Influence

720 3.34

Age 18 - 22 144 3.38 -

Age 23 – 30 152 3.41 -.03 (.688)

Age 31 – 40 151 3.41 -.03 (.743) .00 (.941)

Age 41 – 50 144 3.40 -.02 (.793) .01 (.891) .01 (.949)

Age 51 – 60 129 3.04 .34* (.001) .37* (.000) .37* (.000) .36* (.000)

Response Effectiveness

720 3.57

Age 18 - 22 144 3.47 -

Age 23 – 30 152 3.68 -.21* (.020)

Age 31 – 40 151 3.60 -.13 (.145) .08 (.377)

Age 41 – 50 144 3.57 -.10 (.280) .11 (.216) .03 (.716)

Age 51 – 60 129 3.48 -.01 (.951) .20* (.028) .12 (.176) .09 (.323)

Self-efficacy 720 3.55

Age 18 - 22 144 3.67 -

Age 23 – 30 152 3.73 -.05 (.585)

Age 31 – 40 151 3.64 .03 (.742) .09 (375)

Age 41 – 50 144 3.53 .14 (.143) .20* (.042) .11 (.249)

Age 51 – 60 129 3.11 .56* (.000) .62* (.000) .53* (.000) .42* (.000)

X

Page 171: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

154

Variable n Age

18 - 22 23 – 30 31 – 40 41 – 50 Threat Appraisal

720 3.40

Age 18 - 22 144 3.51 -

Age 23 – 30 152 3.42 .09 (.371)

Age 31 – 40 151 3.37 .14 (.142) .05 (.560)

Age 41 – 50 144 3.46 .05 (.604) -.04 (.711) -.09 (.345)

Age 51 – 60 129 3.23 .28* (.006) .19 (.054) .14 (.171) .23* (.024)

Coping Appraisal

720 3.48

Age 18 - 22 144 3.61 -

Age 23 – 30 152 3.59 .02 (.850)

Age 31 – 40 151 3.53 .08 (.358) .06 (.459)

Age 41 – 50 144 3.46 .15 (.088) .13 (.123) .07 (.418)

Age 51 – 60 129 3.16 .45* (.000) .43* (.000) .37* (.000) .30* (.001)

Behavioural Motivation

720 3.53

Age 18 - 22 144 3.64 -

Age 23 – 30 152 3.63 .01 (.827)

Age 31 – 40 151 3.59 .05 (.517) .04 (.663)

Age 41 – 50 144 3.60 .04 (.590) .03 (.743) -.01 (.919)

Age 51 – 60 129 3.15 .49* (.000) .48* (.000) .44* (.000) .45* (.000)

Protection Behaviour

720 3.62

Age 18 - 22 144 3.62 -

Age 23 – 30 152 3.71 -.09 (.277)

Age 31 – 40 151 3.61 .01 (.889) .10 (.215)

Age 41 – 50 144 3.69 -.07 (.395) .02 (.822) -.08 (.317)

Age 51 – 60 129 3.46 .16 (.072) .25* (.004) .15 (.092) .23* (.009)

* Statistically Significant at .05 level

X

Page 172: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

155

3. Education

Variable Mean and S.D. Different Test

S.D. F p

Perceived Severity

Below Bachelor Degree 3.79 .798 2.924 .054

Bachelor Degree 3.93 .665

Master Degree or Above 3.79 .881

Perceived Vulnerability

Below Bachelor Degree 3.47 .861 5.712 .003

Bachelor Degree 3.69 .744

Master Degree or Above 3.55 .974

Social Influence

Below Bachelor Degree 3.24 .952 4.645 .010

Bachelor Degree 3.44 .729

Master Degree or Above 3.32 .843

Response Effectiveness

Below Bachelor Degree 3.49 .824 3.783 .023

Bachelor Degree 3.65 .703

Master Degree or Above 3.52 .893

Self-efficacy

Below Bachelor Degree 3.45 .915 5.047 .007

Bachelor Degree 3.66 .713

Master Degree or Above 3.49 .948

Threat Appraisal

Below Bachelor Degree 3.40 .857 .003 .997

Bachelor Degree 3.40 .782

Master Degree or Above 3.40 .893

Coping Appraisal

Below Bachelor Degree 3.46 .769 5.008 .007

Bachelor Degree 3.55 .712

Master Degree or Above 3.24 .972

Behavioural Motivation

Below Bachelor Degree 3.45 .843 4.188 .016

Bachelor Degree 3.62 .721

X

Page 173: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

156

Variable Mean and S.D. Different Test

S.D. F p

Master Degree or Above 3.50 .734

Protection Behaviour

Below Bachelor Degree 3.52 .807 5.625 .004

Bachelor Degree 3.71 .668

Master Degree or Above 3.68 .755

Post Hoc Test for Education

Variable n

Degree Below

Bachelor Degree Bachelor Degree

Perceived Severity 720 3.85

Below Bachelor Degree 325 3.79

Bachelor Degree 321 3.93 -.14* (.021)

Master Degree or Above 74 3.79 .00 (.983) .14 (.165)

Perceived Vulnerability 720 3.58

Below Bachelor Degree 325 3.47

Bachelor Degree 321 3.69 -.22* (.001)

Master Degree or Above 74 3.55 -.08 (.502) .14 (.168)

Social Influence 720 3.34

Below Bachelor Degree 325 3.24

Bachelor Degree 321 3.44 -.20* (.002)

Master Degree or Above 74 3.32 -.08 (.456) .12 (.266)

Response Effectiveness 720 3.57

Below Bachelor Degree 325 3.49

Bachelor Degree 321 3.65 -.16* (.007)

Master Degree or Above 74 3.52 -.03 (.733) .13 (.191)

Self-efficacy 720 3.55

Below Bachelor Degree 325 3.45

Bachelor Degree 321 3.66 -.21* (.002)

Master Degree or Above 74 3.49 -.04 (.743) .17 (.117)

X

X

Page 174: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

157

Variable n

Degree Below

Bachelor Degree Bachelor Degree

Thread Appraisal

Below Bachelor Degree 325 3.40

Bachelor Degree 321 3.40 .00 (.938)

Master Degree or Above 74 3.40 .00 (.973) .00 (.989)

Coping Appraisal 720 3.48

Below Bachelor Degree 325 3.46

Bachelor Degree 321 3.55 -.09 (.152)

Master Degree or Above 74 3.24 .22* (.025) .31* (.002)

Behavioural Motivation 720 3.53

Below Bachelor Degree 325 3.45

Bachelor Degree 321 3.62 -.17* (.004)

Master Degree or Above 74 3.50 -.05 (.588) .12 (.226)

Protection Behaviour 720 3.62

Below Bachelor Degree 325 3.52

Bachelor Degree 321 3.71 -.19* (.001)

Master Degree or Above 74 3.68 -.16 (.088) .03 (.771)

* Statistically Significant at .05 level

X

Page 175: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

158

4. Occupation

Variable Mean and S.D. Different Test

S.D. F p

Perceived Severity

Student 3.67 .766 6.890 .000

Entrepreneur 3.86 .740

Government employee 4.15 .604

State enterprise employee 3.67 .966

Private company employee 3.79 .761

None/housekeeper 3.83 .793

Perceived Vulnerability

Student 3.48 .787 5.003 .000

Entrepreneur 3.57 .840

Government employee 3.88 .653

State enterprise employee 3.48 .911

Private company employee 3.48 .953

None/housekeeper 3.50 .751

Social Influence

Student 3.35 .775 .422 .834

Entrepreneur 3.27 .954

Government employee 3.40 .797

State enterprise employee 3.38 .890

Private company employee 3.34 .825

None/housekeeper 3.28 .969

Response Effectiveness

Student 3.53 .794 .644 .666

Entrepreneur 3.63 .738

Government employee 3.60 .801

State enterprise employee 3.60 1.020

Private company employee 3.49 .794

None/housekeeper 3.59 .740

Self-efficacy

Student 3.64 .708 1.273 .274

X

Page 176: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

159

Variable Mean and S.D. Different Test

S.D. F p

Entrepreneur 3.64 .708

Government employee 3.64 .708

State enterprise employee 3.64 .708

Private company employee 3.64 .708

None/housekeeper 3.64 .708

Threat Appraisal

Student 3.43 .701 .286 .921

Entrepreneur 3.43 .846

Government employee 3.40 .842

State enterprise employee 3.50 .658

Private company employee 3.37 .908

None/housekeeper 3.33 .864

Coping Appraisal

Student 3.54 .681 .618 .686

Entrepreneur 3.50 .732

Government employee 3.41 .889

State enterprise employee 3.33 1.033

Private company employee 3.46 .791

None/housekeeper 3.50 .700

Behavioural Motivation

Student 3.53 .661 1.231 .293

Entrepreneur 3.42 .851

Government employee 3.60 .767

State enterprise employee 3.36 .814

Private company employee 3.59 .795

None/housekeeper 3.50 .872

Protection Behaviour

Student 3.58 .672 1.985 .079

Entrepreneur 3.56 .801

Government employee 3.79 .684

State enterprise employee 3.55 .895

X

Page 177: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

160

Variable Mean and S.D. Different Test

S.D. F p

Private company employee 3.62 .744

None/housekeeper 3.55 .851

Post Hoc for Occupation

Variable n Occupation

Student Entrep. Gov.Emp. StateEnt PrivEmp Perceived Severity

720 3.85

Student 162 3.67 Entrepreneur 148 3.86 -.19* (.024) Gov. Employee

142 4.15 -.48* (.000) -.29* (.001)

State Enterprise

16 3.67 .00 (.966) .19 (.308) .48* (.014)

Private Emp. 176 3.79 -.12 (.147) .07 (.374) .36* (.000) -.12 (.517) None/ Housekeeper

76 3.83 -.16 (.134) .03 (.730) .32* (.002) -.16 (.424) -.04 (.713)

Perceived Vulnerability

720 3.58

Student 162 3.48 - Entrepreneur 148 3.57 -.09 (.355) Gov. Employee

142 3.88 -.40* (.000) -.31* (.001)

State Enterprise

16 3.48 .00 (.991) .09 (.681) .40 (.065)

Private Emp. 176 3.48 .00 (.945) .09 (.312) .40* (.000) .00 (.986) None/ Housekeeper

76 3.50 -.02 (.840) .07 (.584) .38* (.001) -.02 (.911) -.02 (.796)

Social Influence

720 3.34

Student 162 3.35 Entrepreneur 148 3.27 .08 (.384) Gov. Employee

142 3.40 -.05 (.649) -.13 (.198)

State Enterprise

16 3.38 -.03 (.929) -.11 (.642) .02 (.913)

Private Emp. 176 3.34 .01 (.868) -.07 (.468) .06 (.533) .04 (.874) None/ Housekeeper

76 3.28 .07 (.526) -.01 (.938) .12 (.323) .10 (.685) .06 (.610)

Response Effectiveness

720 3.57

Student 162 3.53 Entrepreneur 148 3.63 -.10 (.273) Gov. Employee

142 3.60 -.07 (.449) .03 (.784)

State Enterprise

16 3.60 -.07 (.736) .03 (.889) .00 (.997)

Private Emp. 176 3.49 .04 (.634) .14 (.113) .11 (.218) .11 (.592) None/ Housekeeper

76 3.59 -.06 (.629) .04 (.683) .01 (889) .01 (.939) -.10 (.386)

X

X

Page 178: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

161

Variable n Occupation

Student Entrep. Gov.Emp. StateEnt PrivEmp Self-efficacy 720 3.55 Student 162 3.64 Entrepreneur 148 3.44 .20* (.038) Gov. Employee

142 3.56 .08 (.384) -.12 (.248)

State Enterprise

16 3.31 .33 (.134) .13 (.551) .25 (.267)

Private Emp. 176 3.59 .05 (.576) -.15 (.117) -.03 (.729) -.28 (.204) None/ Housekeeper

76 3.49 .15 (.203) -.05 (.678) .07 (.587) -.18 (.433) .10 (.397)

Threat Appraisal

720 3.40

Student 162 3.43 Entrepreneur 148 3.43 .00 (.987) Gov. Employee

142 3.40 .03 (.746) .03 (.763)

State Enterprise

16 3.50 -.07 (.749) -.07 (.745) -.10 (.646)

Private Emp. 176 3.37 .06 (.478) .06 (.499) .03 (.723) .13 (.538) None/ Housekeeper

76 3.33 .10 (.394) .10 (.408) .07 (.567) .17 (.462) .04 (.764)

Coping Appraisal

720 3.48

Student 162 3.54 Entrepreneur 148 3.50 .04 (.605) Gov. Employee

142 3.41 .13 (.130) .09 (.326)

State Enterprise

16 3.33 .21 (.301) .17 (.419) .08 (.713)

Private Emp. 176 3.46 .08 (.325) .04 (.664) -.05 (.553) -.13 (.530) None/ Housekeeper

76 3.50 .04 (.658) .00 (.984) -.09 (.428) -.17 (.446) -.04 (.739)

Behavioural Motivation

720 3.53

Student 162 3.53 Entrepreneur 148 3.42 .11 (.194) Gov. Employee

142 3.60 -.07 (.449) -.18* (.046)

State Enterprise

16 3.36 .17 (.405) .06 (.789) .24 (.274)

Private Emp. 176 3.59 -.06 (.499) -.17* (.047) .01 (.905) -.23 (.264) None/ Housekeeper

76 3.50 .03 (.759) -.08 (.456) .10 (.362) -.14 (.523) .09 (.398)

Protection Behaviour

720 3.62

Student 162 3.58 Entrepreneur 148 3.56 .02 (816) Gov. Employee

142 3.79 -.21* (.013) -.23* (.008)

State Enterprise

16 3.55 .03 (.877) .01 (.957) .24 (.215)

Private Emp. 176 3.62 -.04 (.616) -.06 (467) .17* (.040) -.07 (.715) None/ Housekeeper

76 3.55 .03 (.764)

.01 (.914) .24* (.021) .00 (.997) .07 (.482)

X

* Statistically Significant at .05 level

Page 179: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

162

5. Income

Variable Mean and S.D. Different Test

S.D. F p

Perceived Severity

Less than $500 3.81 .769 .824 .510

$500 - $1,000 3.90 .694

$1,000 -$1,333 3.93 .720

$1,334 - $1,667 3.80 .773

$1,668 or above 3.88 .872

Perceived Vulnerability

Less than $500 3.53 .787 .702 .591

$500 - $1,000 3.61 .867

$1,000 -$1,333 3.68 .862

$1,334 - $1,667 3.54 .885

$1,668 or above 3.62 .798

Social Influence

Less than $500 3.27 .845 .860 .488

$500 - $1,000 3.42 .918

$1,000 -$1,333 3.36 .781

$1,334 - $1,667 3.33 .783

$1,668 or above 3.36 .882

Response Effectiveness

Less than $500 3.50 .803 1.578 .178

$500 - $1,000 3.59 .725

$1,000 -$1,333 3.59 .838

$1,334 - $1,667 3.60 .825

$1,668 or above 3.78 .673

Self-efficacy

Less than $500 3.61 .788 1.811 .125

$500 - $1,000 3.48 .889

$1,000 -$1,333 3.42 .874

$1,334 - $1,667 3.50 .884

$1,668 or above 3.70 .799

X

Page 180: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

163

Variable Mean and S.D. Different Test

S.D. F p

Threat Appraisal

Less than $500 3.37 .804 .472 .757

$500 - $1,000 3.43 .853

$1,000 -$1,333 3.43 .804

$1,334 - $1,667 3.36 .821

$1,668 or above 3.50 .928

Coping Appraisal

Less than $500 3.49 .757 .330 .858

$500 - $1,000 3.49 .743

$1,000 -$1,333 3.43 .786

$1,334 - $1,667 3.41 .935

$1,668 or above 3.53 .684

Behavioural Motivation

Less than $500 3.54 .757 .299 .879

$500 - $1,000 3.52 .788

$1,000 -$1,333 3.49 .820

$1,334 - $1,667 3.50 .842

$1,668 or above 3.62 .782

Protection Behaviour

Less than $500 3.60 .723 .614 .652

$500 - $1,000 3.62 .794

$1,000 -$1,333 3.58 .784

$1,334 - $1,667 3.72 .773

$1,668 or above 3.69 .618

X

Page 181: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

164

Post Hoc Test for Income

Variable n Monthly Income

Less than

$500 $500 - $1,000

$1,000 -$1,333

$1,334 - $1,667

Perceived Severity

720 3.85

Less than $500 311 3.81 -

$500 - $1,000 183 3.90 -.09 (.178)

$1,000 -$1,333 92 3.93 -.12 (.166) -.03 (.759)

$1,334 - $1,667 80 3.80 .01 (.975) .10 (.335) .13 (.271)

$1,668 or above 54 3.88 -.07 (.532) .02 (.830) .05 (.673) -.08 (.586)

Perceived Vulnerability

720 3.58

Less than $500 311 3.53 -

$500 - $1,000 183 3.61 -.08 (.225)

$1,000 -$1,333 92 3.68 -.15 (.145) -.07 (.514)

$1,334 - $1,667 80 3.54 -.01 (.971) .07 (.524) .14 (.270)

$1,668 or above 54 3.62 -.09 (.464) -.01 (.907) .06 (.704) -.08 (.557)

Social

Influence 720 3.34

Less than $500 311 3.27 -

$500 - $1,000 183 3.42 -.14 (.072)

$1,000 -$1,333 92 3.36 -.09 (.378) .06 (.621)

$1,334 - $1,667 80 3.33 -.06 (.619) .09 (.432) .03 (.783)

$1,668 or above 54 3.36 -.09 (.493) .06 (.667) .00 (.984) -.03 (.836)

Response Effectiveness

720 3.57

Less than $500 311 3.50 -

$500 - $1,000 183 3.59 -.09 (.250)

$1,000 -$1,333 92 3.59 -.09 (.364) .00 (.997)

$1,334 - $1,667 80 3.60 -.10 (.342) -.01 (.929) -.01 (.941)

$1,668 or above 54 3.78 -.28* (.017) -.19 (.115) -.19 (.155) -.18 (.187)

Self-efficacy 720 3.55

Less than $500 311 3.61 -

$500 - $1,000 183 3.48 .13 (.088)

X

Page 182: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

165

Variable n Monthly Income

Less than

$500 $500 - $1,000

$1,000 -$1,333

$1,334 - $1,667

$1,000 -$1,333 92 3.42 .19 (.053) .06 (.577)

$1,334 - $1,667 80 3.50 .11 (.277) -.02 (.865) -.08 (.538)

$1,668 or above 54 3.70 -.09 (.492) -.22 (.093) -.28 (.053) -.20 (.177)

Threat Appraisal

720 3.40

Less than $500 311 3.37 -

$500 - $1,000 183 3.43 -.06 (.435)

$1,000 -$1,333 92 3.43 -.06 (.529) .00 (.987)

$1,334 - $1,667 80 3.36 .01 (.915) .07 (.521) .07 (.564)

$1,668 or above 54 3.50 -.13 (.261) -.07 (.548) -.07 (.596) -.14 (.309)

Coping Appraisal

720 3.48

Less than $500 311 3.49 -

$500 - $1,000 183 3.49 .00 (.946)

$1,000 -$1,333 92 3.43 .06 (.557) .06 (.552)

$1,334 - $1,667 80 3.41 .08 (.407) .08 (.411) .02 (.823)

$1,668 or above 54 3.53 -.04 (.712) -.04 (.756) -.10 (.469) -.12 (.369)

Behavioural Motivation

720 3.53

Less than $500 311 3.54 -

$500 - $1,000 183 3.52 .02 (.731)

$1,000 -$1,333 92 3.49 .05 (.585) .03 (.798)

$1,334 - $1,667 80 3.50 .04 (.632) .02 (.835) .01 (.975)

$1,668 or above 54 3.62 -.08 (.509) -.10 (.403) -.13 (.345) -.12 (.372)

Protection Behaviour

720 3.62

Less than $500 311 3.60 -

$500 - $1,000 183 3.62 -.02 (.742)

$1,000 -$1,333 92 3.58 .02 (.835) .04 (.665)

$1,334 - $1,667 80 3.72 -.12 (.184) -.10 (.311) -.14 (.211)

$1,668 or above 54 3.69 -.09 (.426) -.07 (.575) -.11 (.407) .03 (.781)

* Statistically Significant at .05 level

X

Page 183: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

166

6. Region

Variable Mean and S.D. Different Test

S.D. F p

Perceived Severity

BKK& Metro. 3.61 .871 4.521 .000

Northern 3.92 .654

North Eastern 3.79 .720

Eastern 3.86 .751

Central Region 3.90 .694

Southern 4.04 .756

Perceived Vulnerability

BKK& Metro. 3.29 .896 5.216 .000

Northern 3.70 .738

North Eastern 3.67 .752

Eastern 3.47 .863

Central Region 3.59 .763

Southern 3.74 .875

Social Influence

BKK& Metro. 3.23 .737 1.642 .147

Northern 3.44 .697

North Eastern 3.47 .903

Eastern 3.26 .926

Central Region 3.31 .749

Southern 3.29 1.039

Response Effectiveness

BKK& Metro. 3.38 .878 3.076 .009

Northern 3.65 .660

North Eastern 3.72 .657

Eastern 3.56 .769

Central Region 3.47 .759

Southern 3.62 .906

X

Page 184: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

167

Variable Mean and S.D. Different Test

S.D. F p

Self-efficacy

BKK& Metro. 3.46 .858 1.534 .177

Northern 3.62 .702

North Eastern 3.69 .786

Eastern 3.48 .806

Central Region 3.57 .853

Southern 3.48 .994

Threat Appraisal

BKK& Metro. 3.21 .834 3.327 .006

Northern 3.38 .823

North Eastern 3.62 .670

Eastern 3.43 .842

Central Region 3.33 .795

Southern 3.44 .935

Coping Appraisal

BKK& Metro. 3.26 .754 5.940 .000

Northern 3.54 .668

North Eastern 3.69 .746

Eastern 3.61 .674

Central Region 3.31 .829

Southern 3.45 .865

Behavioural Motivation

BKK& Metro. 3.46 .793 .298 .914

Northern 3.53 .685

North Eastern 3.54 .753

Eastern 3.56 .862

Central Region 3.53 .748

Southern 3.57 .853

Protection Behaviour

BKK& Metro. 3.55 .750 .832 .527

Northern 3.58 .648

X

Page 185: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

168

Variable Mean and S.D. Different Test

S.D. F p

North Eastern 3.67 .770

Eastern 3.57 .813

Central Region 3.68 .694

Southern 3.68 .798

Post Hoc Test for Region

Variable n

Region BKK& Metro.

Northern North

Eastern. Eastern

Central Region

Perceived Severity

720 3.85

BKK& Metro. 120 3.61 - Northern 120 3.92 -.31* (.001)

North Eastern 120 3.79 -.18 (.069) .13 (.157)

Eastern 120 3.86 -.25* (.011) .06 (.488) -.07 (.470)

Central Region

120 3.90 -.29* (.003) .02 (.795) -.11 (.248) -.04 (.665)

Southern 120 4.04 -.43* (.000) -.12 (.225) -.25* (.009) -.18 (.057) -.14 (.141)

Perceived

Vulnerability 720 3.58

BKK& Metro. 120 3.29 - Northern 120 3.70 -.41* (.000)

North Eastern 120 3.67 -.38* (.000) .03 (.772)

Eastern 120 3.47 -.18 (.103) .23* (.025) .20 (.052)

Central Region

120 3.59 -.30* (.005) .11 (.281) .08 (.430) -.12 (.247)

Southern 120 3.74 -.45* (.000) -.04 (.693) -.07 (.494) -.27* (.009) -.15 (.141)

Social Influence

720 3.34

BKK& Metro. 120 3.23 - Northern 120 3.44 -.21 (.051)

North Eastern 120 3.47 -.24 (.026) -.03 (.776)

Eastern 120 3.26 -.03 (.747) .18 (.103) .21 (.056)

Central Region

120 3.31 -.08 (.437) .13 (.240) .16 (.145) -.05 (.649)

Southern 120 3.29 -.06 (.544) .15 (178) .18 (.103) -.03 (.776) .02 (.864)

Response Effectiveness

720 3.57

BKK& Metro. 120 3.38 - Northern 120 3.65 -.27* (.007)

X

X

Page 186: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

169

Variable n

Region BKK& Metro.

Northern North

Eastern. Eastern

Central Region

North Eastern 120 3.72 -.34* (.001) -.07 (.472)

Eastern 120 3.56 -.18 (.064) .09 (.407) .16 (.122)

Central Region

120 3.47 -.09 (.361) .18 (.077) .25* (.013) .09 (.347)

Southern 120 3.62 -.24* (.018) .03 (.761) .10 (.306) -.06 (.599) -.15 (.143)

Self-efficacy 720 3.55

BKK& Metro. 120 3.46 - Northern 120 3.62 -.16 (.138)

North Eastern 120 3.69 -.23* (.030) -.07 (.488)

Eastern 120 3.48 -.02 (.862) .14 (.191) .21* (.045)

Central Region

120 3.57 -.11 (.299) .05 (.658) .12 (.256) -.09 (.386)

Southern 120 3.48 -.02 (.862) .14 (.191) .21* (.045) .00 (1.000) .09 (.386)

Threat Appraisal

720 3.40

BKK& Metro. 120 3.21 - Northern 120 3.38 -.17 (.107)

North Eastern 120 3.62 -.41* (.000) -.24* (.024)

Eastern 120 3.43 -.22* (.032) -.05 (.596) .19 (.084)

Central Region

120 3.33 -.12 (.263) .05 (.623) .29* (.006) .11 (.307)

Southern 120 3.44 -.23* (.032) -.06 (.555) .18 (.095) -.01 (.953) -.11 (.280) Coping Appraisal

720 3.48

BKK& Metro. 120 3.26 - Northern 120 3.54 -.28* (.005)

North Eastern 120 3.69 -.43* (.000) -.15 (.120)

Eastern 120 3.61 -.35* (.000) -.07 (.462) .08 (.412)

Central Region

120 3.31 -.05 (.610) .23* (.020) .38* (.000) .30* (.002)

Southern 120 3.45 -.19 (.054) .09 (.365) .24* (.014) .16 (.101) .14 (.157)

Behavioural Motivation

720 3.53

BKK& Metro. 120 3.46 - Northern 120 3.53 -.07 (.450)

North Eastern 120 3.54 -.08 (.384) -.01 (.908)

Eastern 120 3.56 -.10 (.324) -.03 (.818) -.02 (.908)

Central Region

120 3.53 -.07 (.470) .00 (.974) .01 (.882) .03 (.793)

Southern 120 3.57 -.11 (.278) -.04 (.742) -.03 (.831) -.01 (.921) -.04 (.718)

Protection Behaviour

720 3.62

BKK& Metro. 120 3.55 - Northern 120 3.58 -.03 (.746)

X

Page 187: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

170

Variable n

Region BKK& Metro.

Northern North

Eastern. Eastern

Central Region

North Eastern 120 3.67 -.12 (.188) -.09 (.321)

Eastern 120 3.57 -.02 (.779) .01 (.966) .10 (.301)

Central Region

120 3.68 -.13 (.181) -.10 (.311) .00 (.983) -.11 (.291)

Southern 120 3.68 -.13 (.155) -.10 (.271) -.01 (.914) -.11 (.253) .00 (.931)

* Statistically Significant at .05 level

X

Page 188: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

171

7. Network Service Provider

Variable Mean and S.D. Different Test

S.D. F p

Perceived Severity

TrueMove H 3.76 .750 1.252 .290

DTACT 3.87 .749

AIS 3.87 .756

Don’t know 4.20 .767

Perceived Vulnerability

TrueMove H 3.43 .826 4.181 .006

DTACT 3.62 .829

AIS 3.63 .799

Don’t know 2.73 1.817

Social Influence

TrueMove H 3.35 .810 2.781 .040

DTACT 3.35 .875

AIS 3.33 .835

Don’t know 2.25 1.714

Response Effectiveness

TrueMove H 3.58 .782 2.698 .045

DTACT 3.60 .761

AIS 3.55 .779

Don’t know 2.60 1.517

Self-efficacy

TrueMove H 3.63 .804 .692 .557

DTACT 3.53 .820

AIS 3.52 .864

Don’t know 3.60 1.181

Threat Appraisal

TrueMove H 3.36 .783 1.433 .232

DTACT 3.37 .814

AIS 3.45 .849

Don’t know 2.85 1.167

Coping Appraisal

TrueMove H 3.50 .701 .456 .713

DTACT 3.44 .794

AIS 3.49 .782

Don’t know 3.20 1.366

X

Page 189: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

172

Variable Mean and S.D. Different Test

S.D. F p

Behavioural Motivation

TrueMove H 3.59 .752 1.581 .193

DTACT 3.53 .799

AIS 3.51 .771

Don’t know 2.88 1.591

Protection Behaviour

TrueMove H 3.68 .667 1.393 .244

DTACT 3.54 .801

AIS 3.65 .748

Don’t know 3.45 .622

Post Hoc for Network Service Provider

Variable n Service Provider

TrueMove H DTACT Perceived Severity 720 3.85

TrueMove H 161 3.76 -

DTACT 219 3.87 -.11 (.161)

AIS 335 3.87 -.11 (.126) .00 (.988)

Don’t know 5 - - -

Perceived

Vulnerability 720 3.58

TrueMove H 161 3.43 -

DTACT 219 3.62 -.19* (.025)

AIS 335 3.63 -.20* (.001) -.01 (.885)

Don’t know 5 - - -

Social Influence 720 3.34

TrueMove H 161 3.35 -

DTACT 219 3.35 .00 (.988)

AIS 335 3.33 .02 (.774) .02 (.764)

Don’t know 5 - - -

Response Effectiveness 720 3.57

TrueMove H 161 3.58 -

X

X

Page 190: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

173

Variable n Service Provider

TrueMove H DTACT DTACT 219 3.60 -.02 (.849)

AIS 335 3.55 .03 (.734) .05 (.547)

Don’t know 5 - - -

Self-efficacy 720 3.55

TrueMove H 161 3.63 -

DTACT 219 3.53 .10 (.252)

AIS 335 3.52 .11 (.165) .01 (.871)

Don’t know 5 - - -

Threat Appraisal 720 3.40

TrueMove H 161 3.36 -

DTACT 219 3.37 -.01 (.924)

AIS 335 3.45 -.09 (.238) -.08 (.234)

Don’t know 5 - - -

Coping Appraisal 720 3.48

TrueMove H 161 3.50 -

DTACT 219 3.44 .06 (.454)

AIS 335 3.49 .01 (.876) -.05 (.470)

Don’t know 5 - - -

Behavioural

Motivation 720 3.53

TrueMove H 161 3.59 -

DTACT 219 3.53 .06 (.482)

AIS 335 3.51 .08 (.261) .02 (.687)

Don’t know 5 - - -

Protection Behaviour 720 3.62

TrueMove H 161 3.68 -

DTACT 219 3.54 .14 (.069)

AIS 335 3.65 .03 (.599) -.11 (.112)

Don’t know 5 - - -

* Statistically Significant at .05 level

X

Page 191: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

174

8. Phone Operating System

Variable Mean and S.D. Different Test

S.D. F p

Perceived Severity

iOS 3.87 .788 1.094 .358

Android 3.86 .695

Windows 3.60 .849

Don’t know 3.88 .886

Others 3.62 1.008

Perceived Vulnerability

iOS 3.58 .854 6.961 .000

Android 3.65 .772

Windows 3.62 .781

Don’t know 3.22 .950

Others 2.64 .907

Social Influence

iOS 3.43 .830 5.162 .000

Android 3.35 .796

Windows 3.07 1.031

Don’t know 2.88 1.098

Others 2.94 1.146

Response Effectiveness

iOS 3.59 .758 4.670 .001

Android 3.59 .761

Windows 3.82 .648

Don’t know 3.13 .908

Others 3.21 1.214

Self-efficacy

iOS 3.65 .787 6.472 .000

Android 3.56 .832

Windows 3.38 .931

X

Page 192: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

175

Variable Mean and S.D. Different Test

S.D. F p

Don’t know 2.95 1.002

Others 3.54 .602

Threat Appraisal

iOS 3.39 .842 2.772 .026

Android 3.44 .773

Windows 3.39 1.056

Don’t know 3.36 .966

Others 2.67 .898

Coping Appraisal

iOS 3.55 .760 3.083 .016

Android 3.48 .741

Windows 3.40 1.108

Don’t know 3.13 .772

Others 3.23 .896

Behavioural Motivation

iOS 3.61 .738 8.564 .000

Android 3.55 .752

Windows 3.52 .747

Don’t know 2.88 1.031

Others 3.22 .874

Protection Behaviour

iOS 3.73 .717 4.836 .001

Android 3.60 .713

Windows 3.58 .877

Don’t know 3.20 1.008

Others 3.50 .677

X

Page 193: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

176

Post Hoc for Phone Operating System

Variable n

Operating System

iOS Android Windows Don’t

know

Perceived

Severity 720 3.85

iOS 259 3.87 -

Android 382 3.86 .01 (.982)

Windows 26 3.60 .27 (.089) .26 (.086)

Don’t know 40 3.88 -.01 (.945) -.02 (.935) -.28 (.151)

Others 13 3.62 -25 (.242) .24 (.241) -.02 (.960) .26 (.280)

Perceived Vulnerability

720 3.58

iOS 259 3.58 -

Android 382 3.65 -.07 (.272)

Windows 26 3.62 -.04 (.811) .03 (.846)

Don’t know 40 3.22 .36* (.010) .43* (.002) .40 (.053)

Others 13 2.64 .94* (.000) 1.01* (.000) .98* (.000) .58* (.027)

Social Influence 720 3.34

iOS 259 3.43 -

Android 382 3.35 .08 (.206)

Windows 26 3.07 .36* (.035) .28 (.101)

Don’t know 40 2.88 .55* (.000) .47* (.001) .19 (.381)

Others 13 2.94 .49* (.041) .41 (.089) .13 (.663) -.06 (.821)

Response Effectiveness

720 3.57

iOS 259 3.59 -

Android 382 3.59 .00 (.978)

Windows 26 3.82 -.23 (.150) -.23 (.141)

Don’t know 40 3.13 .46* (.001) .46* (.000) .69* (.000)

Others 13 3.21 .38 (.081) .38 (.080) .61* (.020) -.08 (.772)

X

Page 194: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

177

Variable n

Operating System

iOS Android Windows Don’t

know

Self-efficacy 720 3.55

iOS 259 3.65 -

Android 382 3.56 .09 (.158)

Windows 26 3.38 .27 (.120) .18 (.308)

Don’t know 40 2.95 .70* (.000) .61* (.000) .43* (.037)

Others 13 3.54 .11 (.639) .02 (.941) -.16* (.026) -.59* (.026)

Threat

Appraisal 720 3.40

iOS 259 3.39 -

Android 382 3.44 -.05 (.458)

Windows 26 3.39 .00 (.971) .05 (.797)

Don’t know 40 3.36 .03 (.820) .08 (.554) .03 (.855)

Others 13 2.67 .72* (.002) .77* (.001) .72* (.010) .69* (.010)

Coping

Appraisal 720 3.48

iOS 259 3.55 -

Android 382 3.48 .07 (.255)

Windows 26 3.40 .15 (.336) .08 (.600)

Don’t know 40 3.13 .42* (.001) .35* (.006) .27 (.160)

Others 13 3.23 .32 (.145) .25 (.252) .17 (.523) -.10 (.666)

Behavioural Motivation

720 3.53

iOS 259 3.61 -

Android 382 3.55 .06 (.340)

Windows 26 3.52 .09 (.539) .03 (.807)

Don’t know 40 2.88 .73* (.000) .67* (.000) .64* (.001)

Others 13 3.22 .39 (.069) .33 (.119) .30 (.250) -.34 (.171)

X

Page 195: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

178

Variable n

Operating System

iOS Android Windows Don’t

know

Protection Behaviour

720 3.62

iOS 259 3.73 -

Android 382 3.60 .13* (.028)

Windows 26 3.58 .15 (.316) .02 (.884)

Don’t know 40 3.20 .53* (.000) .40* (.001) .38* (.043)

Others 13 3.50 .23 (.275) .10 (.636) .08 (.760) -.30 (.204)

* Statistically Significant at .05 level

X

Page 196: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

179

9. Phone Lost

Independent Samples t-test

Equality of Variances

t-test for Equality of Means

F Sig. t df

Sig. (2-

tailed)

Mean Diff.

Std. Error Diff.

Perceived Severity

- Equal variances assumed

.287 .592 -.584 718 .559 -.03733 .06392

- Equal variances not assumed

-.562 306.980 .574 -.03733 .06639

Perceived Vulnerability

- Equal variances assumed

.339 .561 -.814 718 .416 -.05728 .07035

- Equal variances not assumed

-.801 318.276 .424 -.05728 .07155

Social Influence

- Equal variances assumed

.128 .721 .745 718 .456 .05394 .07237

- Equal variances not assumed

.743 325.859 .458 .05394 .07264

Response Effectiveness

- Equal variances assumed

.875 .350 .111 718 .912 .00739 .06649

- Equal variances not assumed

.109 317.845 .913 .00739 .06767

Self-efficacy

- Equal variances assumed

.056 .814 -1.770 718 .077 -.12584 .07110

- Equal variances not assumed

-1.776 330.037 .077 -.12584 .07087

Threat Appraisal

Page 197: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

180

Independent Samples t-test

Equality of Variances

t-test for Equality of Means

F Sig. t df

Sig. (2-

tailed)

Mean Diff.

Std. Error Diff.

- Equal variances assumed

1.019 .313 -1.063 718 .288 -.07462 .07017

- Equal variances not assumed

-1.085 340.632 .279 -.07462 .06877

Coping Appraisal

- Equal variances assumed

.427 .514 .556 718 .578 .03649 .06557

- Equal variances not assumed

.547 317.859 .585 .03649 .06673

Behavioural Motivation

- Equal variances assumed

.832 .362 -.955 718 .340 -.06344 .06644

- Equal variances not assumed

-.982 345.742 .327 -.06344 .06462

Protection Behaviour

- Equal variances assumed

2.068 .151 -.167 718 .868 -.01057 .06345

- Equal variances not assumed

-.160 304.594 .873 -.01057 .06621

Page 198: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

181

10. Virus

Independent Samples t-test

Equality of Variances

t-test for Equality of Means

F Sig. t df

Sig. (2-

tailed)

Mean Diff.

Std. Error Diff.

Perceived Severity

- Equal variances assumed

2.864 .091 .676 718 .499 .04094 .06057

- Equal variances not assumed

.648 392.706 .517 .04094 .06317

Perceived Vulnerability

- Equal variances assumed

.840 .360 -2.292 718 .022 -.15232 .06645

- Equal variances not assumed

-2.321 446.792 .021 -.15232 .06562

Social Influence

- Equal variances assumed

.154 .695 -.387 718 .699 -.02657 .06860

- Equal variances not assumed

-.391 444.632 .696 -.02657 .06787

Response Effectiveness

- Equal variances assumed

.676 .411 .440 718 .660 .02774 .06300

- Equal variances not assumed

.437 426.470 .662 .02774 .06342

Self-efficacy

- Equal variances assumed

.105 .747 -1.021 718 .308 -.06889 .06747

- Equal variances not assumed

-1.023 435.441 .307 -.06889 .06734

Threat Appraisal

- Equal variances assumed

.246 .620 -2.767 718 .006 -.18313 .06619

- Equal variances not assumed

-2.767 433.605 .006 -.18313 .06617

Coping Appraisal

- Equal variances assumed

.503 .478 -.202 718 .840 -.01253 .06215

- Equal variances not assumed

-.199 418.870 .843 -.01253 .06303

Behavioural Motivation

Page 199: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

182

Independent Samples t-test

Equality of Variances

t-test for Equality of Means

F Sig. t df

Sig. (2-

tailed)

Mean Diff.

Std. Error Diff.

- Equal variances assumed

6.440 .011 -1.791 718 .074 -.11257 .06286

- Equal variances not assumed

-1.902 503.826 .058 -.11257 .05918

Protection Behaviour

- Equal variances assumed

.000 .988 -.348 718 .728 -.02091 .06013

- Equal variances not assumed

-.347 430.286 .729 -.02091 .06030

Page 200: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

183

11. Free Public Wi-Fi Connection

Variable Mean and S.D. Different Test

S.D. F p

Perceived Severity

Never 3.79 .767 2.260 .105

Sometimes 3.92 .698

Always 3.81 .868

Perceived Vulnerability

Never 3.51 .824 2.724 .066

Sometimes 3.66 .791

Always 3.52 .941

Social Influence

Never 3.31 .917 .441 .644

Sometimes 3.37 .801

Always 3.30 .835

Response Effectiveness

Never 3.54 .813 4.146 .016

Sometimes 3.64 .723

Always 3.40 .859

Self-efficacy

Never 3.37 .851 13.411 .000

Sometimes 3.71 .768

Always 3.51 .925

Threat Appraisal

Never 3.39 .856 .073 .930

Sometimes 3.41 .800

Always 3.39 .838

Coping Appraisal

Never 3.40 .783 3.183 .042

Sometimes 3.55 .740

Always 3.46 .830

Behavioural Motivation

Never 3.42 .843 6.742 .001

Sometimes 3.64 .694

X

Page 201: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

184

Variable Mean and S.D. Different Test

S.D. F p

Always 3.47 .838

Protection Behaviour

Never 3.51 .769 9.195 .000

Sometimes 3.75 .694

Always 3.51 .795

Post Hoc for Free Public Wi-Fi Connection

Variable n Public Wi-Fi Connection

Never Sometimes Perceived Severity 720 3.85

Never 284 3.79 -

Sometimes 333 3.92 -.13* (.044)

Always 103 3.81 -.02 (.886) .11 (.194)

Perceived

Vulnerability 720 3.58

Never 284 3.51 -

Sometimes 333 3.66 -.15* (.028)

Always 103 3.52 -.01 (.893) .14 (.149)

Social Influence 720 3.34

Never 284 3.31 -

Sometimes 333 3.37 -.06 (.406)

Always 103 3.30 .01 (.928) .07 (.492)

Response Effectiveness 720 3.57

Never 284 3.54 -

Sometimes 333 3.64 -.10 (.099)

Always 103 3.40 .14 (.120) .24* (.006)

Self-efficacy 720 3.55

Never 284 3.37 -

Sometimes 333 3.71 -.34* (.000)

Always 103 3.51 -.14 (.143) .20* (.028)

X

X

Page 202: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

185

Variable n Public Wi-Fi Connection

Never Sometimes Threat Appraisal 720 3.40

Never 284 3.39 -

Sometimes 333 3.41 -.02 (.710)

Always 103 3.39 .00 (.951) .02 (.839)

Coping Appraisal 720 3.48

Never 284 3.40 -

Sometimes 333 3.55 -.16* (.012)

Always 103 3.46 -.06 (.501) .09 (.268)

Behavioural

Motivation 720 3.53

Never 284 3.42 -

Sometimes 333 3.64 -.22* (.000)

Always 103 3.47 -.05 (.530) .17 (.054)

Protection Behaviour 720 3.62

Never 284 3.51 -

Sometimes 333 3.75 -.24* (.000)

Always 103 3.51 .00 (.975) .24* (.004)

* Statistically significant at .05 level

X

Page 203: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

186

12. Transferring Money via Phone

Variable Mean and S.D. Different Test

S.D. F p

Perceived Severity

Never 3.82 .742 1.344 .262

Sometimes 3.92 .757

Always 3.84 .791

Perceived Vulnerability

Never 3.52 .815 6.911 .001

Sometimes 3.74 .814

Always 3.41 .882

Social Influence

Never 3.24 .880 6.524 .002

Sometimes 3.50 .813

Always 3.37 .753

Response Effectiveness

Never 3.51 .787 7.600 .001

Sometimes 3.73 .756

Always 3.41 .770

Self-efficacy

Never 3.40 .838 16.952 .000

Sometimes 3.79 .766

Always 3.66 .873

Threat Appraisal

Never 3.36 .811 7.280 .001

Sometimes 3.56 .814

Always 3.19 .880

Coping Appraisal

Never 3.40 .765 6.476 .002

Sometimes 3.63 .754

Always 3.48 .806

Behavioural Motivation

Never 3.40 .783 14.283 .000

Sometimes 3.74 .744

X

Page 204: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

187

Variable Mean and S.D. Different Test

S.D. F p

Always 3.62 .763

Protection Behaviour

Never 3.55 .771 5.259 .005

Sometimes 3.75 .689

Always 3.62 .735

Post Hoc Test for Transferring Money via Phone

Variable n E-Payment

Never Sometimes Perceived Severity 720 3.85

Never 419 3.82 -

Sometimes 219 3.92 -.10 (.104)

Always 82 3.84 -.02 (.836) .08 (.392)

Perceived

Vulnerability 720 3.58

Never 419 3.52 -

Sometimes 219 3.74 -.22* (.001)

Always 82 3.41 .11 (.270) .33* (.002)

Social Influence 720 3.34

Never 419 3.24 -

Sometimes 219 3.50 -.26* (.000)

Always 82 3.37 -.13 (.209) .13 (.256)

Response Effectiveness 720 3.57

Never 419 3.51 -

Sometimes 219 3.73 -.22* (.001)

Always 82 3.41 .10 (.263) .32* (.001)

Self-efficacy 720 3.55

Never 419 3.40 -

Sometimes 219 3.79 -.39* (.000)

Always 82 3.66 -.26* (.009) .13 (.228)

Threat Appraisal 720 3.40

X

X

Page 205: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

188

Variable n E-Payment

Never Sometimes Never 419 3.36 -

Sometimes 219 3.56 -.20* (.003)

Always 82 3.19 .17 (.095) .37* (.001)

Coping Appraisal 720 3.48

Never 419 3.40 -

Sometimes 219 3.63 -.23* (.000)

Always 82 3.48 -.08 (.406) .15 (.124)

Behavioural

Motivation 720 3.53

Never 419 3.40 -

Sometimes 219 3.74 -.34* (.000)

Always 82 3.62 -.22* (.022) .12 (.222)

Protection Behaviour 720 3.62

Never 419 3.55 -

Sometimes 219 3.75 -.20* (.001)

Always 82 3.62 -.07 (.460) .13 (.162)

* Statistically significant at .05 level

X

Page 206: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

189

APPENDIX D

CONFIRMATORY FACTOR ANALYSIS

Page 207: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

190

Rotated Component Matrix

Component

1 2 3 4 5 6 7 8 9 q17 .796

q16 .792

q15 .774

q14 .756

q26 .788

q25 .787

q27 .699

q28 .693

q13 .741

q11 .720

q12 .699

q10 .654

q31 .767

q32 .718

q30 .648

q33 .643

q18 .832

q19 .828

q21 .772

q20 .639

q2 .856

q1 .794

Component

1 2 3 4 5 6 7 8 9 q3 .766

q5 .825

q6 .802

q4 .707

q8 .816

q9 .786

q7 .544

q22 .705

q23 .692

q24 .494

q29 .452

Page 208: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

191

APPENDIX E

STRUCTURAL EQUATION MODELING ANALYSIS

Page 209: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

192

1. Test Model Fitness for Measurement Model

Page 210: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

193

Notes for Group (Group number 1)

The model is recursive. Sample size = 729

Parameter Summary (Group number 1)

Weights Covariances Variances Means Intercepts Total

Fixed 38 0 0 0 0 38

Labeled 0 0 0 0 0 0

Unlabeled 20 46 38 0 0 104

Total 58 46 38 0 0 142

Assessment of normality (Group number 1)

Variable min max skew c.r. kurtosis c.r.

q32 1.000 5.000 -.604 -6.661 .149 .819

q28 1.000 5.000 -.637 -7.018 .498 2.747

q13 1.000 5.000 -.527 -5.807 -.211 -1.164

q17 1.000 5.000 -.648 -7.139 .058 .322

q14 1.000 5.000 -.585 -6.444 -.035 -.192

q15 1.000 5.000 -.516 -5.693 -.136 -.751

q16 1.000 5.000 -.601 -6.630 -.061 -.338

q7 1.000 5.000 -.664 -7.320 .001 .008

q8 1.000 5.000 -.424 -4.677 -.023 -.128

q9 1.000 5.000 -.479 -5.282 .141 .778

q29 1.000 5.000 -.693 -7.638 .045 .248

q30 1.000 5.000 -.601 -6.628 -.238 -1.313

q31 1.000 5.000 -.551 -6.069 .060 .329

q22 1.000 5.000 -.718 -7.917 .420 2.317

q23 1.000 5.000 -.390 -4.294 -.023 -.129

q25 1.000 5.000 -.904 -9.961 .946 5.215

q26 1.000 5.000 -.678 -7.472 .581 3.202

q27 1.000 5.000 -.561 -6.183 .232 1.280

q10 1.000 5.000 -.613 -6.752 -.101 -.559

q11 1.000 5.000 -.590 -6.501 .039 .216

q12 1.000 5.000 -.559 -6.166 -.126 -.697

q18 1.000 5.000 -.458 -5.049 -.421 -2.318

q19 1.000 5.000 -.251 -2.765 -.469 -2.587

q1 1.000 5.000 -.792 -8.728 .645 3.557

q2 1.000 5.000 -.840 -9.262 .736 4.057

q3 1.000 5.000 -.788 -8.685 .663 3.656

Page 211: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

194

Variable min max skew c.r. kurtosis c.r.

q4 1.000 5.000 -.591 -6.517 .070 .386

q5 1.000 5.000 -.724 -7.977 .177 .975

q6 1.000 5.000 -.559 -6.159 -.010 -.057

Multivariate 272.200 86.662

Regression Weights: (Group number 1 - Default model)

Estimate S.E. C.R. P Label

q6 <--- PerVul 1.000

q5 <--- PerVul .979 .049 19.873 ***

q4 <--- PerVul .853 .047 18.281 ***

q3 <--- PerSev 1.000

q2 <--- PerSev 1.043 .057 18.289 ***

q1 <--- PerSev 1.051 .058 18.044 ***

q19 <--- TheApp 1.000

q18 <--- TheApp .992 .058 17.012 ***

q12 <--- SelEff 1.000

q11 <--- SelEff .891 .041 21.509 ***

q10 <--- SelEff 1.018 .048 21.250 ***

q27 <--- BehMot 1.000

q26 <--- BehMot .926 .048 19.280 ***

q25 <--- BehMot .925 .049 19.052 ***

q23 <--- CopApp .841 .049 17.249 ***

q22 <--- CopApp 1.000

Page 212: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

195

Estimate S.E. C.R. P Label

q31 <--- ProBeh 1.000

q30 <--- ProBeh 1.112 .073 15.167 ***

q29 <--- ProBeh 1.349 .081 16.589 ***

q9 <--- ResEff 1.000

q8 <--- ResEff .943 .059 16.117 ***

q7 <--- ResEff 1.193 .090 13.279 ***

q16 <--- SocInf 1.000

q15 <--- SocInf 1.215 .058 21.081 ***

q14 <--- SocInf 1.165 .057 20.493 ***

q17 <--- SocInf .975 .045 21.897 ***

q13 <--- SelEff .834 .046 18.130 ***

q28 <--- BehMot .908 .047 19.163 ***

q32 <--- ProBeh 1.069 .053 20.169 ***

Standardized Direct Effects (Group number 1 - Default model)

SocInf ResEff ProBeh CopApp BehMot SelEff TheApp PerSev PerVul

q32 .000 .000 .663 .000 .000 .000 .000 .000 .000

q28 .000 .000 .000 .000 .740 .000 .000 .000 .000

q13 .000 .000 .000 .000 .000 .674 .000 .000 .000

q17 .703 .000 .000 .000 .000 .000 .000 .000 .000

q14 .837 .000 .000 .000 .000 .000 .000 .000 .000

q15 .879 .000 .000 .000 .000 .000 .000 .000 .000

q16 .708 .000 .000 .000 .000 .000 .000 .000 .000

q7 .000 .708 .000 .000 .000 .000 .000 .000 .000

q8 .000 .622 .000 .000 .000 .000 .000 .000 .000

q9 .000 .649 .000 .000 .000 .000 .000 .000 .000

q29 .000 .000 .781 .000 .000 .000 .000 .000 .000

q30 .000 .000 .593 .000 .000 .000 .000 .000 .000

q31 .000 .000 .627 .000 .000 .000 .000 .000 .000

q22 .000 .000 .000 .847 .000 .000 .000 .000 .000

q23 .000 .000 .000 .681 .000 .000 .000 .000 .000

q25 .000 .000 .000 .000 .753 .000 .000 .000 .000

q26 .000 .000 .000 .000 .761 .000 .000 .000 .000

q27 .000 .000 .000 .000 .772 .000 .000 .000 .000

q10 .000 .000 .000 .000 .000 .830 .000 .000 .000

q11 .000 .000 .000 .000 .000 .774 .000 .000 .000

q12 .000 .000 .000 .000 .000 .815 .000 .000 .000

q18 .000 .000 .000 .000 .000 .000 .851 .000 .000

q19 .000 .000 .000 .000 .000 .000 .870 .000 .000

q1 .000 .000 .000 .000 .000 .000 .000 .774 .000

Page 213: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

196

SocInf ResEff ProBeh CopApp BehMot SelEff TheApp PerSev PerVul

q2 .000 .000 .000 .000 .000 .000 .000 .799 .000

q3 .000 .000 .000 .000 .000 .000 .000 .732 .000

q4 .000 .000 .000 .000 .000 .000 .000 .000 .729

q5 .000 .000 .000 .000 .000 .000 .000 .000 .838

q6 .000 .000 .000 .000 .000 .000 .000 .000 .845

Standardized Indirect Effects (Group number 1 - Default model)

SocInf ResEff ProBeh CopApp BehMot SelEff TheApp PerSev PerVul

q32 .000 .000 .000 .000 .000 .000 .000 .000 .000

q28 .000 .000 .000 .000 .000 .000 .000 .000 .000

q13 .000 .000 .000 .000 .000 .000 .000 .000 .000

q17 .000 .000 .000 .000 .000 .000 .000 .000 .000

q14 .000 .000 .000 .000 .000 .000 .000 .000 .000

q15 .000 .000 .000 .000 .000 .000 .000 .000 .000

q16 .000 .000 .000 .000 .000 .000 .000 .000 .000

q7 .000 .000 .000 .000 .000 .000 .000 .000 .000

q8 .000 .000 .000 .000 .000 .000 .000 .000 .000

q9 .000 .000 .000 .000 .000 .000 .000 .000 .000

q29 .000 .000 .000 .000 .000 .000 .000 .000 .000

q30 .000 .000 .000 .000 .000 .000 .000 .000 .000

q31 .000 .000 .000 .000 .000 .000 .000 .000 .000

q22 .000 .000 .000 .000 .000 .000 .000 .000 .000

q23 .000 .000 .000 .000 .000 .000 .000 .000 .000

q25 .000 .000 .000 .000 .000 .000 .000 .000 .000

q26 .000 .000 .000 .000 .000 .000 .000 .000 .000

q27 .000 .000 .000 .000 .000 .000 .000 .000 .000

q10 .000 .000 .000 .000 .000 .000 .000 .000 .000

q11 .000 .000 .000 .000 .000 .000 .000 .000 .000

q12 .000 .000 .000 .000 .000 .000 .000 .000 .000

q18 .000 .000 .000 .000 .000 .000 .000 .000 .000

q19 .000 .000 .000 .000 .000 .000 .000 .000 .000

q1 .000 .000 .000 .000 .000 .000 .000 .000 .000

q2 .000 .000 .000 .000 .000 .000 .000 .000 .000

q3 .000 .000 .000 .000 .000 .000 .000 .000 .000

q4 .000 .000 .000 .000 .000 .000 .000 .000 .000

q5 .000 .000 .000 .000 .000 .000 .000 .000 .000

q6 .000 .000 .000 .000 .000 .000 .000 .000 .000

Page 214: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

197

Model Fit for Measurement Model

CMIN

Model NPAR CMIN DF P CMIN/DF

Default model 104 882.427 331 .000 2.666

Saturated model 435 .000 0

Independence model 29 11345.125 406 .000 27.944

RMR, GFI

Model RMR GFI AGFI PGFI

Default model .037 .917 .891 .698

Saturated model .000 1.000

Independence model .303 .249 .195 .232

Baseline Comparisons

Model NFI

Delta1 RFI

rho1 IFI

Delta2 TLI

rho2 CFI

Default model .922 .905 .950 .938 .950

Saturated model 1.000 1.000 1.000

Independence model .000 .000 .000 .000 .000

Parsimony-Adjusted Measures

Model PRATIO PNFI PCFI

Default model .815 .752 .774

Saturated model .000 .000 .000

Independence model 1.000 .000 .000

NCP

Model NCP LO 90 HI 90

Default model 551.427 467.137 643.373

Saturated model .000 .000 .000

Independence model 10939.125 10595.061 11289.543

FMIN

Model FMIN F0 LO 90 HI 90

Default model 1.212 .757 .642 .884

Saturated model .000 .000 .000 .000

Independence model 15.584 15.026 14.554 15.508

Page 215: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

198

RMSEA

Model RMSEA LO 90 HI 90 PCLOSE

Default model .048 .044 .052 .821

Independence model .192 .189 .195 .000

AIC

Model AIC BCC BIC CAIC

Default model 1090.427 1099.367 1567.961 1671.961

Saturated model 870.000 907.393 2867.378 3302.378

Independence model 11403.125 11405.617 11536.283 11565.283

ECVI

Model ECVI LO 90 HI 90 MECVI

Default model 1.498 1.382 1.624 1.510

Saturated model 1.195 1.195 1.195 1.246

Independence model 15.664 15.191 16.145 15.667

HOELTER

Model HOELTER

.05 HOELTER

.01

Default model 309 325

Independence model 30 31

Page 216: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

199

2. Test Model Fitness for Structural Equation Model

Parameter Summary (Group number 1)

Weights Covariances Variances Means Intercepts Total

Fixed 40 0 0 0 0 40

Labeled 0 0 0 0 0 0

Unlabeled 27 22 36 0 0 85

Total 67 22 36 0 0 125

Page 217: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

200

Assessment of normality (Group number 1)

Variable min max skew c.r. kurtosis c.r.

q32 1.000 5.000 -.604 -6.661 .149 .819

q25 1.000 5.000 -.904 -9.961 .946 5.215

q13 1.000 5.000 -.527 -5.807 -.211 -1.164

q17 1.000 5.000 -.648 -7.139 .058 .322

q14 1.000 5.000 -.585 -6.444 -.035 -.192

q15 1.000 5.000 -.516 -5.693 -.136 -.751

q16 1.000 5.000 -.601 -6.630 -.061 -.338

q8 1.000 5.000 -.424 -4.677 -.023 -.128

q9 1.000 5.000 -.479 -5.282 .141 .778

q30 1.000 5.000 -.601 -6.628 -.238 -1.313

q31 1.000 5.000 -.551 -6.069 .060 .329

q22 1.000 5.000 -.718 -7.917 .420 2.317

q23 1.000 5.000 -.390 -4.294 -.023 -.129

q28 1.000 5.000 -.637 -7.018 .498 2.747

q27 1.000 5.000 -.561 -6.183 .232 1.280

q26 1.000 5.000 -.678 -7.472 .581 3.202

q10 1.000 5.000 -.613 -6.752 -.101 -.559

q11 1.000 5.000 -.590 -6.501 .039 .216

q12 1.000 5.000 -.559 -6.166 -.126 -.697

q18 1.000 5.000 -.458 -5.049 -.421 -2.318

q19 1.000 5.000 -.251 -2.765 -.469 -2.587

q1 1.000 5.000 -.792 -8.728 .645 3.557

q2 1.000 5.000 -.840 -9.262 .736 4.057

q3 1.000 5.000 -.788 -8.685 .663 3.656

q4 1.000 5.000 -.591 -6.517 .070 .386

q5 1.000 5.000 -.724 -7.977 .177 .975

q6 1.000 5.000 -.559 -6.159 -.010 -.057

Multivariate 234.346 79.946

Page 218: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

201

Regression Weights: (Group number 1 - Default model)

Estimate S.E. C.R. P Label

TheApp <--- PerSev .043 .060 .714 .475

TheApp <--- PerVul .359 .056 6.382 ***

TheApp <--- SocInf .289 .043 6.680 ***

CopApp <--- SocInf .178 .045 3.907 ***

CopApp <--- ResEff .054 .127 .429 .668

CopApp <--- SelEff .546 .057 9.543 ***

BehMot <--- TheApp .049 .027 1.812 .070

BehMot <--- CopApp .861 .061 14.210 ***

ProBeh <--- BehMot 1.021 .078 13.161 ***

q6 <--- PerVul 1.000

q5 <--- PerVul .992 .050 19.698 ***

q4 <--- PerVul .851 .047 18.209 ***

q3 <--- PerSev .951 .053 17.913 ***

q2 <--- PerSev .998 .053 18.837 ***

q1 <--- PerSev 1.000

q19 <--- TheApp 1.000

q18 <--- TheApp 1.000 .061 16.499 ***

q12 <--- SelEff 1.000

q11 <--- SelEff .899 .042 21.553 ***

q10 <--- SelEff .997 .048 20.945 ***

q26 <--- BehMot .928 .056 16.614 ***

Page 219: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

202

Estimate S.E. C.R. P Label

q27 <--- BehMot 1.000

q28 <--- BehMot .899 .055 16.465 ***

q23 <--- CopApp .857 .051 16.684 ***

q22 <--- CopApp 1.000

q31 <--- ProBeh .943 .063 14.852 ***

q30 <--- ProBeh 1.000

q9 <--- ResEff 1.000

q8 <--- ResEff .914 .062 14.708 ***

q16 <--- SocInf .827 .039 21.117 ***

q15 <--- SocInf 1.000

q14 <--- SocInf .961 .036 26.335 ***

q17 <--- SocInf .807 .039 20.905 ***

q13 <--- SelEff .834 .046 18.054 ***

q25 <--- BehMot .936 .062 14.981 ***

q32 <--- ProBeh .973 .064 15.083 ***

Standardized Direct Effects (Group number 1 - Default model)

SocInf ResEff SelEff PerSev PerVul CopApp TheApp BehMot ProBeh

CopApp .242 .080 .721 .000 .000 .000 .000 .000 .000

TheApp .287 .000 .000 .034 .335 .000 .000 .000 .000

BehMot .000 .000 .000 .000 .000 .861 .068 .000 .000

ProBeh .000 .000 .000 .000 .000 .000 .000 .857 .000

q32 .000 .000 .000 .000 .000 .000 .000 .000 .764

q25 .000 .000 .000 .000 .000 .000 .000 .666 .000

q13 .000 .000 .674 .000 .000 .000 .000 .000 .000

q17 .705 .000 .000 .000 .000 .000 .000 .000 .000

q14 .837 .000 .000 .000 .000 .000 .000 .000 .000

q15 .877 .000 .000 .000 .000 .000 .000 .000 .000

q16 .710 .000 .000 .000 .000 .000 .000 .000 .000

q8 .000 .936 .000 .000 .000 .000 .000 .000 .000

q9 .000 1.007 .000 .000 .000 .000 .000 .000 .000

q30 .000 .000 .000 .000 .000 .000 .000 .000 .676

q31 .000 .000 .000 .000 .000 .000 .000 .000 .749

q22 .000 .000 .000 .000 .000 .708 .000 .000 .000

q23 .000 .000 .000 .000 .000 .580 .000 .000 .000

q28 .000 .000 .000 .000 .000 .000 .000 .644 .000

q27 .000 .000 .000 .000 .000 .000 .000 .675 .000

q26 .000 .000 .000 .000 .000 .000 .000 .673 .000

q10 .000 .000 .812 .000 .000 .000 .000 .000 .000

q11 .000 .000 .781 .000 .000 .000 .000 .000 .000

Page 220: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

203

SocInf ResEff SelEff PerSev PerVul CopApp TheApp BehMot ProBeh

q12 .000 .000 .815 .000 .000 .000 .000 .000 .000

q18 .000 .000 .000 .000 .000 .000 .854 .000 .000

q19 .000 .000 .000 .000 .000 .000 .866 .000 .000

q1 .000 .000 .000 .773 .000 .000 .000 .000 .000

q2 .000 .000 .000 .802 .000 .000 .000 .000 .000

q3 .000 .000 .000 .730 .000 .000 .000 .000 .000

q4 .000 .000 .000 .000 .723 .000 .000 .000 .000

q5 .000 .000 .000 .000 .844 .000 .000 .000 .000

q6 .000 .000 .000 .000 .840 .000 .000 .000 .000

Standardized Indirect Effects (Group number 1 - Default model)

SocInf ResEff SelEff PerSev PerVul CopApp TheApp BehMot ProBeh

CopApp .000 .000 .000 .000 .000 .000 .000 .000 .000

TheApp .000 .000 .000 .000 .000 .000 .000 .000 .000

BehMot .228 .069 .621 .002 .023 .000 .000 .000 .000

ProBeh .195 .059 .532 .002 .019 .738 .058 .000 .000

q32 .149 .045 .407 .002 .015 .564 .044 .655 .000

q25 .152 .046 .414 .002 .015 .574 .045 .000 .000

q13 .000 .000 .000 .000 .000 .000 .000 .000 .000

q17 .000 .000 .000 .000 .000 .000 .000 .000 .000

q14 .000 .000 .000 .000 .000 .000 .000 .000 .000

q15 .000 .000 .000 .000 .000 .000 .000 .000 .000

q16 .000 .000 .000 .000 .000 .000 .000 .000 .000

q8 .000 .000 .000 .000 .000 .000 .000 .000 .000

q9 .000 .000 .000 .000 .000 .000 .000 .000 .000

q30 .132 .040 .360 .001 .013 .499 .039 .579 .000

q31 .146 .044 .399 .001 .015 .553 .043 .642 .000

q22 .171 .057 .510 .000 .000 .000 .000 .000 .000

q23 .140 .046 .418 .000 .000 .000 .000 .000 .000

q28 .147 .044 .400 .001 .015 .555 .044 .000 .000

q27 .154 .046 .419 .002 .015 .581 .046 .000 .000

q26 .154 .046 .418 .002 .015 .580 .046 .000 .000

q10 .000 .000 .000 .000 .000 .000 .000 .000 .000

q11 .000 .000 .000 .000 .000 .000 .000 .000 .000

q12 .000 .000 .000 .000 .000 .000 .000 .000 .000

q18 .245 .000 .000 .029 .286 .000 .000 .000 .000

q19 .249 .000 .000 .030 .291 .000 .000 .000 .000

q1 .000 .000 .000 .000 .000 .000 .000 .000 .000

q2 .000 .000 .000 .000 .000 .000 .000 .000 .000

q3 .000 .000 .000 .000 .000 .000 .000 .000 .000

Page 221: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

204

SocInf ResEff SelEff PerSev PerVul CopApp TheApp BehMot ProBeh

q4 .000 .000 .000 .000 .000 .000 .000 .000 .000

q5 .000 .000 .000 .000 .000 .000 .000 .000 .000

q6 .000 .000 .000 .000 .000 .000 .000 .000 .000

Regression Weights: (Group number 1 - Default model)

M.I. Par Change

CopApp <--- PerSev 4.474 .061

ProBeh <--- SocInf 19.397 .131

ProBeh <--- ResEff 7.909 .067

ProBeh <--- TheApp 4.294 .062

q32 <--- q13 6.403 .059

q32 <--- q12 4.240 .049

q32 <--- q18 4.139 -.048

q32 <--- q2 4.405 .059

q25 <--- SocInf 5.914 -.065

q25 <--- PerSev 8.421 .100

q25 <--- q13 9.351 .065

q25 <--- q17 8.648 -.065

q25 <--- q15 8.830 -.066

q25 <--- q9 4.671 -.051

q25 <--- q30 4.011 -.039

q25 <--- q31 10.233 -.074

q25 <--- q27 13.872 .087

q25 <--- q1 5.479 .057

q25 <--- q2 13.754 .093

q13 <--- q25 6.589 .087

q13 <--- q23 8.397 -.093

q17 <--- ResEff 6.081 .061

q17 <--- PerVul 4.283 .068

q17 <--- q9 6.863 .071

q17 <--- q5 4.503 .056

q14 <--- q26 7.263 -.072

q14 <--- q12 5.709 -.054

q15 <--- PerVul 5.761 -.069

q15 <--- q25 4.860 -.055

q15 <--- q22 4.091 -.050

q15 <--- q4 6.363 -.058

q15 <--- q5 4.140 -.047

q16 <--- SelEff 4.975 .071

q16 <--- q25 4.250 .059

Page 222: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

205

M.I. Par Change

q16 <--- q13 4.434 .052

q16 <--- q22 5.739 .068

q16 <--- q27 4.630 .058

q16 <--- q12 6.086 .061

q16 <--- q2 4.161 .060

q16 <--- q4 4.576 .057

q9 <--- q31 6.831 .071

q30 <--- SocInf 14.733 .157

q30 <--- ResEff 7.167 -.087

q30 <--- PerSev 16.213 -.211

q30 <--- q17 9.003 .101

q30 <--- q14 13.003 .121

q30 <--- q15 16.864 .139

q30 <--- q16 8.446 .096

q30 <--- q8 4.788 -.080

q30 <--- q9 4.608 -.077

q30 <--- q19 5.163 .075

q30 <--- q1 19.272 -.162

q30 <--- q2 9.669 -.119

q30 <--- q3 9.944 -.115

q31 <--- ResEff 14.142 .090

q31 <--- TheApp 6.969 .079

q31 <--- q25 4.385 -.057

q31 <--- q8 5.262 .061

q31 <--- q9 14.896 .101

q31 <--- q22 4.662 -.058

q31 <--- q18 8.543 .070

q31 <--- q19 4.692 .052

q22 <--- ResEff 4.623 -.050

q22 <--- PerSev 13.429 .137

q22 <--- q15 7.391 -.065

q22 <--- q9 4.357 -.053

q22 <--- q30 5.285 -.049

q22 <--- q31 8.088 -.071

q22 <--- q10 16.236 .093

q22 <--- q1 6.461 .067

q22 <--- q2 13.966 .102

q22 <--- q3 9.951 .082

q23 <--- SocInf 7.583 .093

q23 <--- PerSev 10.783 -.142

q23 <--- PerVul 8.182 -.103

Page 223: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

206

M.I. Par Change

q23 <--- TheApp 6.154 .084

q23 <--- q13 10.147 -.084

q23 <--- q17 4.983 .062

q23 <--- q14 4.089 .056

q23 <--- q15 12.117 .097

q23 <--- q31 5.955 .071

q23 <--- q27 4.271 .060

q23 <--- q10 8.488 -.078

q23 <--- q19 9.414 .084

q23 <--- q2 14.400 -.120

q23 <--- q4 7.927 -.081

q23 <--- q5 6.817 -.075

q23 <--- q6 7.346 -.077

q28 <--- q17 6.890 .065

q27 <--- SocInf 6.575 -.081

q27 <--- ResEff 5.715 -.061

q27 <--- q25 18.027 .123

q27 <--- q13 6.701 -.064

q27 <--- q17 16.850 -.107

q27 <--- q15 6.211 -.065

q27 <--- q9 8.710 -.082

q27 <--- q26 4.009 .059

q27 <--- q10 5.670 -.060

q27 <--- q11 4.398 -.056

q26 <--- ResEff 8.783 .061

q26 <--- q9 10.779 .074

q26 <--- q2 4.259 -.049

q10 <--- q32 5.134 -.062

q10 <--- q31 9.415 -.085

q10 <--- q22 12.791 .106

q10 <--- q28 5.025 -.067

q10 <--- q27 5.873 -.068

q10 <--- q19 5.480 -.062

q10 <--- q5 4.325 .057

q11 <--- TheApp 7.875 .084

q11 <--- q31 12.710 .091

q11 <--- q18 5.980 .058

q11 <--- q19 10.015 .076

q12 <--- q14 5.861 -.063

q12 <--- q3 6.250 -.071

q18 <--- q30 5.952 -.055

Page 224: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

207

M.I. Par Change

q18 <--- q4 4.654 .056

q19 <--- q30 9.773 .069

q19 <--- q23 7.498 .072

q19 <--- q11 4.198 .052

q2 <--- ResEff 4.125 -.046

q2 <--- PerVul 6.819 -.079

q2 <--- q9 5.231 -.057

q2 <--- q4 4.432 -.051

q2 <--- q5 8.186 -.069

q2 <--- q6 4.050 -.048

q3 <--- q5 7.026 .071

q4 <--- TheApp 5.809 .082

q4 <--- q13 4.555 .057

q4 <--- q16 4.047 .055

q4 <--- q31 5.471 .068

q4 <--- q28 4.201 .064

q4 <--- q11 4.657 .062

q4 <--- q18 9.880 .085

q6 <--- q13 6.071 -.058

q6 <--- q23 5.433 -.061

Page 225: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

208

Model Fit Summary for Structural Equation Model

CMIN

Model NPAR CMIN DF P CMIN/DF

Default model 85 795.971 293 .000 2.717

Saturated model 378 .000 0

Independence model 27 10309.979 351 .000 29.373

RMR, GFI

Model RMR GFI AGFI PGFI

Default model .040 .923 .900 .715

Saturated model .000 1.000

Independence model .296 .267 .211 .248

Baseline Comparisons

Model NFI

Delta1 RFI

rho1 IFI

Delta2 TLI

rho2 CFI

Default model .923 .908 .950 .939 .949

Saturated model 1.000 1.000 1.000

Independence model .000 .000 .000 .000 .000

Parsimony-Adjusted Measures

Model PRATIO PNFI PCFI

Default model .835 .770 .793

Saturated model .000 .000 .000

Independence model 1.000 .000 .000

NCP

Model NCP LO 90 HI 90

Default model 502.971 422.923 590.668

Saturated model .000 .000 .000

Independence model 9958.979 9630.988 10293.321

FMIN

Model FMIN F0 LO 90 HI 90

Default model 1.093 .691 .581 .811

Saturated model .000 .000 .000 .000

Independence model 14.162 13.680 13.229 14.139

Page 226: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

209

RMSEA

Model RMSEA LO 90 HI 90 PCLOSE

Default model .049 .045 .053 .715

Independence model .197 .194 .201 .000

AIC

Model AIC BCC BIC CAIC

Default model 965.971 972.771 1356.263 1441.263

Saturated model 756.000 786.240 2491.653 2869.653

Independence model 10363.979 10366.139 10487.954 10514.954

ECVI

Model ECVI LO 90 HI 90 MECVI

Default model 1.327 1.217 1.447 1.336

Saturated model 1.038 1.038 1.038 1.080

Independence model 14.236 13.786 14.695 14.239

HOELTER

Model HOELTER

.05 HOELTER

.01

Default model 306 323

Independence model 28 30

Page 227: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

210

APPENDIX F

EXAMPLES OF INCREASING SELF-EFFICACY AND SOCIAL

INFLUENCE FOR SMARTPHONE USERS (DEVELOPED BY

CANDIDATE IN RELATED PROJECTS)

Page 228: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

211

The followings are examples for increasing smartphone users’ self-efficacies for

smartphone users:

1. Educating Smartphone Users through Booklet and Handbook

Figure F1: Booklet about Cybersecurity

Source: NBTC

Page 229: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

212

Figure F2: Handbook for Increasing Cybersecurity

Source: NBTC

Page 230: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

213

2. Infographic for Raising Cybersecurity Awareness

Providing information on how to configure smartphone to the highest safe mode via

infographic poster. The following infographic, as shown in Figure 3, was created to

raised cyber threat awareness to public.

Figure F3: Infographic for Configuring the Phone to the Highest Safe Mode

Source: NBTC

Page 231: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

214

3. Educate Smartphone Users via Activity Booth

Organizing activity booth for educating people on how to protect their phones from

threats. The following photos, as shown in Figure 4, show activities booth organized at

many universities to raise cyber threat awareness.

Figure F4: Activity Booth for Dispersing Cybersecurity Information to Public

Source: NBTC

Page 232: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

215

4. Educating Smartphone Users via Software Application

Providing people with software for educating about cyber threat and security. The

followings are some useful examples:

4.1) Phone Security Checker “1-Secure.” This mobile application, as shown

in Figure 5 and 6, is useful for checking user existing configuration and maps it to a

risk profile. The software will make a recommendation on how to lower users’ risk

profiles through configuration changes and on-screen guideline.

Figure F5: Front End of 1-Secure Application for Android Phone

Source: NBTC

Page 233: A Study of Cybersecurity for Telecommunication Services ... · CHAPTER 2 CYBER THREAT, CYBERSECURITY AND PMT MODEL 12 2.1 Concepts of Cyber Threat and Cyber Security 12 2.2 Cyber

216

Figure F6: Menu of 1-Secure Application

Source: NBTC

4.2) Using Simulation for Increasing Cybersecurity Awareness. The initial

pilot study, by Fung, C.C., Khera, V., Depickere, A. and Tantatsanawong P. (2007),

was to test the participants cybersecurity learning effectiveness by comparing

traditional class-room approach versus using simulation software, the result shows

significant increase of awareness in the group exposed to simulation compared to

traditional class-room learning environment.