Literature DB >> 32382604

Data modeling positive security behavior implementation among smart device users in Indonesia: A partial least squares structural equation modeling approach (PLS-SEM).

Achmad Nizar Hidayanto1, Bayu Anggorojati1, Zaenal Abidin2, Kongkiti Phusavat3.   

Abstract

The article presents raw inferential statistical data related to understanding the positive security behaviors of smart device users in Indonesia, which was used to determine whether the studied variables were direct or mediating factors. The factors explored include government efforts, technology provider support, privacy concerns, trust, perceived behavioral control, attitudes, and subjective norms. The theory of planned behavior was adopted to develop the proposed model for implementing positive security behaviors. Structured questionnaires were distributed via an online survey to consumers currently using a smartphone or using a smartphone and some other smart device. Furthermore, the respondents were from 19 provinces in Indonesia. The quantitative research method was used to analyze the data. Reliability and validity were confirmed. Structural equation modeling (SEM) using the Smart PLS software version 3 was used to present data. SEM path analysis identified estimates of the relationships of the primary constructs in the data. The outcomes obtained from this dataset demonstrate a direct influence between government efforts, privacy, and perceived behavioral control and performing positive security behaviors. Other variables had positive and significant influences on implementing positive security behaviors, indicating their roles as mediation variables. This data is useful for reference and consideration in the improvement of smart device users' security behaviors. This data can also provide valuable insights to countries with characteristics that are similar to those of Indonesia.
© 2020 The Author(s).

Entities:  

Keywords:  End-user; Indonesia; positive security behavior; smart devices; structural equation modeling

Year:  2020        PMID: 32382604      PMCID: PMC7200857          DOI: 10.1016/j.dib.2020.105588

Source DB:  PubMed          Journal:  Data Brief        ISSN: 2352-3409


Specifications Table

Value of the Data

The data is useful for all stakeholders, such as technology providers, academicians, especially the government of Indonesia, in terms of improving security awareness efforts among smart device users. The data presents how government efforts, technology provider support, trust, privacy concerns, attitudes, subjective norms, and perceived behavioral control impact smart device users’ positive security behaviors. This information is useful because it can serve as a reference and be considered in the development of measures to improve smart device users’ security behaviors. This data can be used to develop a measurement tool to determine the positive security behaviors related to the use of smart devices in another context. This data can provide useful insights for countries with characteristics that are like those of Indonesia.

Data Description

The facts and statistics presented in this paper were collected via primary data collection through an online survey, which can be accessed at the following link: s.id/privasiperangkatpintar (in Bahasa). The questionnaire in English is provided as a Supplementary File. The researchers developed the survey instrument using research constructs based on previous studies, as shown in Table 1.
Table 1

Research variables of the survey.

VariableIndicatorReference
Stakeholder involvement
- Government efforts1. Existing regulations protect against the misuse of personal information.[1,2]
2. Existing regulations govern how personal information is collected and used.
3. Regulations control the use of sanctions for violations or misuse of personal data.
4. The government has provided training to increase security awareness.
5. The existing program has educated users about the responsibilities of smart device users.
6. The existing program has educated users about the consequences of using smart devices.
- Technology provider support1. The privacy policy statement is clear and understandable.[3,4]
2. Existing privacy policies make me more aware of my rights.
3. Providers use reliable technology to protect my privacy.
4. Providers give flexibility for me as the user to manage the mechanism for securing my data.
User concerns
- Privacy concerns1. I feel disturbed when the provider asks for personal information.[5], [6], [7]
2. I think about considering privacy before giving personal data.
3. I object to providing personal data.
4. Providers collect too much of my personal information.
5. Providers should work harder to secure users’ personal information.
- Trust in technology1. I feel comfortable that the provider protects the data well.[1]
2. I can count on the provider not to misuse users’ permissions.
3. I can depend on the provider to comply with all government regulations related to protecting user data.
Theory of Planned Behavior
- Perceived behavioral control1. I have control over the personal information released by smart devices.[8]
2. I have control over anyone who can gain access to personal information.
3. I have control over how device providers use my personal information.
4. I am sure I can control my personal information.
- Attitudes1. Applying security measures to smart devices is a good thing.[8]
2. Taking security measures on smart devices is important.
- Subjective norms1. Esteemed colleagues believe that I must maintain my personal information.[8]
2. My family believes that I must be careful about exposing my personal information.
3. Influential community leaders believe that I must be careful about exposing my personal information.
- Positive security behavior1. Reading the privacy policy statement carefully before using the device is important.[1]
2. I know where to report an incident related to smart devices' security.
3. I know of privacy issues related to the use of smart devices that I have.
4. I know how to control the personal information given to smart devices.
5. I can control the protection of my personal information on all smart devices that I have.
Research variables of the survey. The wording of the questionnaire was initially developed in English and then translated into the local language (Bahasa). The survey was divided into two parts. Part A addressed demographic information, including respondents’ age, gender, educational qualifications, and smart device ownership. Part B included questions covering the different constructs in the proposed research model using a five-point Likert scale ranging from (1) “strongly disagree” to (5) “strongly agree.” The online communication channel, namely WhatsApp, was used to distribute the questionnaire. After eliminating invalid responses, that is, 18 respondents filled incomplete questionnaires; data from 314 respondents were analyzed. The demographic characteristics of the respondents are shown in Table 2.
Table 2

Demographic characteristics (N = 314).

MeasureItemCount%
GenderMale14847.1
Female16552.5
Prefer not answered10.4
Age<20103
21–309631
31–4015650
41–50217
51–60289
>6031
EducationHigh school or below206.4
Associate and bachelor's degree14345.5
Master's degree or higher15148.1
OccupationStudent103
Employed27687.9
Unemployed189.1
Ownership of smart devices besides a smartphoneYes10633.8
Demographic characteristics (N = 314). The graph in Fig. 1 shows the kinds of smart devices owned by the respondents. Among the 106 respondents with a smart device besides a smartphone, 78 respondents (around 73.6%) owned a smart TV. Furthermore, the chart in Fig. 2 reveals that about 7.7% of the 106 respondents had more than one type of smart device.
Fig. 1

The types of smart devices owned by the respondents.

Fig. 2

Ownership of smartphones and other types of smart devices.

The types of smart devices owned by the respondents. Ownership of smartphones and other types of smart devices.

Experimental Design, Materials, and Methods

The presented data were collected based on quantitative research methods. A survey method was chosen as the preferred technique because it provides many benefits, including allowing the collection of standardized data, which enabled researchers to meet the aim of the research [9,10], namely, understanding the factors that influence smart device users’ positive security behaviors. Current smart device users and smartphone users, who were assumed to be potential adopters of other smart devices in some regions in Indonesia, were selected as respondents. The researchers proposed a model to test the data. The model consists of constructs: government efforts, technology provider support, trust, and privacy, as well as attitudes, subjective norms, and perceived behavioral control, could directly influence positive security behavior or serve as mediation variables to influence positive security behavior. The quality of the measurement model was determined based on its validity and reliability by considering the following values: Cronbach's alpha (> 0.60), composite reliability (>0.70), average variance extracted (AVE)(> 0.50), and loading factor (0.70) [11]. The measurement accuracy data can be seen in Table 3.
Table 3

Measurement Model.

construct ResearchPLS code itemCronbach's alphaComposite reliabilityAverage variance extracted (AVE)Factor loadingsP-values
Government efforts (GE)GE10.8790.9080.6220.7700.000
GE20.8240.000
GE30.8470.000
GE40.7650.000
GE50.7700.000
GE60.7500.000
Technology provider support (TS)TS10.8350.8900.6690.8180.000
TS20.8330.000
TS30.8380.000
TS40.7810.000
Trust (TT)TT10.8990.9360.8310.8640.000
TT20.9510.000
TT30.9170.000
Privacy (PC)PC10.8350.8820.6000.7100.000
PC20.8080.000
PC30.7980.000
PC40.8210.000
PC50.7310.000
Attitudes (ATT)ATT10.8710.9390.8860.9470.000
ATT20.9360.000
Subjective norms (SN)SN10.7970.8800.7100.8610.000
SN20.8940.000
SN30.7680.000
Perceived behavioral control (PBC)PBC10.9290.9500.8250.8900.000
PBC20.9200.000
PBC30.9290.000
PBC40.8930.000
Positive security behavior (PSB)PSB20.8600.9050.7040.7750.000
PSB30.8280.000
PSB40.8860.000
PSB50.8630.000
Measurement Model. The proposed research model was used to empirically analyze the data using the partial least squares structural equation modeling (PLS-SEM) technique, and SmartPLS version 3 software was used to code the data and run the statistical analysis. PLS-SEM is known to be reliable in sample distribution and small sample size. The structural model can be seen in Fig. 3.
Fig. 3

Measurement and structural model analysis.

Measurement and structural model analysis. The structural model was examined by testing the hypothesized relationships. Moreover, the bootstrapping method was used on 5,000 subsamples to assess the significance and path coefficients, as suggested by Hair et al. [12]. The output model analysis data is displayed in Table 4.
Table 4

Outcomes of structural equation modeling analysis.

PathHypothesisPath Coefficient(β)T-statisticsP-valuesSupported?
Government efforts > Positive security behaviorH1 (+)0.1392.3210.020Yes
Government efforts > AttitudesH2 (+)-0.0901.6710.095No
Government efforts > Perceived behavioral controlH3 (+)0.1512.4830.004Yes
Technology provider support > Positive security behaviorH4 (+)0.1321.8760.061No
Technology provider support > AttitudesH5 (+)0.1021.6980.090No
Technology provider support > Perceived behavioral controlH6 (+)0.1462.3200.020Yes
Technology provider support > TrustH7 (+)0.3185.3000.000Yes
Trust > Positive security behaviorH8 (+)0.0681.3270.184No
Trust > AttitudesH9 (+)0.1483.0000.003Yes
Trust > Perceived behavioral controlH10 (+)0.2554.0840.000Yes
Privacy > Positive security behaviorH11 (+)0.1222.5600.011Yes
Privacy > AttitudesH12 (+)0.4237.7620.000Yes
Privacy > Perceived behavioral controlH13 (+)-0.0871.5880.112No
Attitudes > Perceived behavioral controlH14 (+)0.1662.8760.004Yes
Subjective norms > AttitudesH15 (+)0.2153.3720.001Yes
Subjective norms > Perceived behavioral controlH16 (+)0.1272.1070.035Yes
Attitudes > Positive security behaviorH17 (+)-0.1412.9600.003No
Subjective norms > Positive security behaviorH18 (+)0.0410.8120.417No
Perceived behavioral control > Positive security behaviorH19 (+)0.53711.4870.000Yes
Outcomes of structural equation modeling analysis.

Ethical considerations

The researchers ensured that respondents were well informed about the background and the aim of this research. Respondents were also assured of the confidentiality of the data they submitted in the survey.

Academic, practical, and policy implications of this data article

The data presented in this article offers implications for the academic field. Some variables directly influenced users’ performance of positive security behaviors, while other variables had positive and significant values, indicating their roles as mediation variables. For example, among the constructs of the theory of planned behavior, the data indicates that only perceived behavioral control directly influenced positive security behavior, given the strong relationship between them (β = 0.537). Meanwhile, subjective norms influenced attitudes (β = 0.215) and perceived behavioral control (β = 0.127) in a positive and significant way, and attitudes influenced perceived behavioral control with a path coefficient of β = 0.166. Therefore, among academics in the security awareness field, this finding can enhance understanding of how mediation variables can lead users actually to perform positive security behaviors. The data also indicates that government efforts directly influenced positive security behavior in a positive and significant way, as indicated by a path coefficient of β=0.139. Based on Fig. 3, R2 demonstrates that the research model explains 47.9% of the variance in performing positive security behavior. Furthermore, the data indicates that government efforts influenced perceived behavioral control in a positive and significant way with a path coefficient of β = 0.151. The present findings also note there are more people use more than one smart device in addition to their smartphone. Regarding practical implications, the data presented in this article can help policymakers who are developing security policies enhance users’ positive security behaviors. Overall, insights from this dataset can be used to create new strategies and guide the revision of existing policies.
SubjectComputer science (general)
Specific subject areaInformation system
Type of dataTable
Chart
Figure
How data were acquiredThe researchers developed a questionnaire that included demographic data and research questions related to the variables being investigated, which were factors, such as government efforts, technology provider support, trust, and privacy, as well as attitudes, subjective norms, and perceived behavioral control. The data was acquired by distributing the questionnaire as an online survey to individuals who use a smartphone and individuals who use a smartphone and some other smart device in some regions in Indonesia.
Data formatRaw
Analyzed
Descriptive and Statistical Data
Parameters for data collectionThe sample consisted of a smartphone user and user of the smartphone and another smart device (s). The questionnaire was distributed as an online survey to users in several regions in Indonesia.
Description of data collectionThe researchers disseminated the survey link to the online communication channel using WhatsApp. Recipients who were willing to participate in the study filled out the online survey. The original questionnaire in Bahasa is provided in link: s.id/privasiperangkatpintar. The questionnaire in English is provided as a Supplementary File.
Data source locationRespondent Locations: 19 provinces (in alphabetical order): Bali, Bangka Belitung, Banten, Bengkulu, Yogyakarta, Jakarta, Jambi, West Java, Central Java, East Java, East Kalimantan, Lampung, North Maluku, Central Sulawesi. North Sulawesi, Southeast Sulawesi, West Sumatera, South Sumatera, and North Sumatera Country: Indonesia
Data accessibilityRepository name: Mendeley Data
Data identification number: 10.17632/tnf63kt4jf.2
Direct URL to data:
https://data.mendeley.com/datasets/tnf63kt4jf/draft?a=6da985d2-e311-4a85-9002-677121795259
  2 in total

1.  Data to model the prognosticators of luxury consumption: A partial least squares-structural equation modelling approach (PLS-SEM).

Authors:  Eugine Tafadzwa Maziriri; Nkosiville Welcome Madinga
Journal:  Data Brief       Date:  2018-10-15

2.  Data to model the effect of awareness on the success of IT Governance implementation: A partial least squares structural equation modeling approach (PLS-SEM).

Authors:  Uky Yudatama; Achmad Nizar Hidayanto; Bobby A A Nazief; Kongkiti Phusavat
Journal:  Data Brief       Date:  2019-07-27
  2 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.