Skip to Main Content
Skip Nav Destination
Purpose

Government employees must comply with policies on information security regulations, online security practices, social networking usage, internet addiction, online cyberthreats and other related habits. These activities are considered cybersecurity behaviors. Government social media (GSM) accounts are increasingly used to educate employees about cybersecurity risks. To support the effectiveness of cybersecurity practices in government organizations, the purpose of this study is to investigate the impacts of GSM and organizational policy compliance on employees’ cybersecurity awareness, motivation and behaviors.

Design/methodology/approach

Data were obtained by administering a questionnaire survey to public personnel in Vietnam. A total of 330 valid responses were obtained, and the research hypotheses were tested using partial least squares–structural equation modeling.

Findings

First, cybersecurity awareness enhances information protection motivation and employee protective behavior. Second, GSM has positive impacts on cybersecurity knowledge and information protection motivation. Third, there is a strong positive association between information protection motivation and employee protective behavior. Finally, while organizational compliance significantly increases cybersecurity awareness, its impact on employee protective behavior is ind irect.

Originality/value

This research enhances the literature on the behavioral dimension of cybersecurity. The primary objective of this study is to assess the influence of cybersecurity awareness on protective behaviors rather than intents and attitudes alone. Furthermore, this research integrates protection motivation theory and cultivation theory to provide a more thorough assessment of cybersecurity awareness and protective behavior. By investigating the impact of GSM on the level of cybersecurity awareness among employees within government organizations, this study provides valuable insights into the efficacy of recent governmental initiatives aimed at fostering cybersecurity.

Information and communication technologies (ICT) have become deeply integrated within national infrastructures and nearly all aspects of daily life (Li et al., 2022). The unprecedented penetration of ICT has helped organizations gain competitive advantages through improvements in system accessibility, communication speed and efficiency and reduced operating costs (Hasan et al., 2021). The adoption of digital finance has been more influenced by its potential benefits than by its perceived risks (Jain and Raman, 2023). Nonetheless, digital advancements can pose serious cybersecurity threats to organizations because of their dynamic features, complex multifunctionality and interconnectedness (Fosch-Villaronga and Mahler, 2021; Li et al., 2019). Cyberattacks on businesses of all sizes and industries are increasing in frequency, volume and sophistication (Lu and Xu, 2019). Cyberattacks can cause severe damage to organizations by intentionally or unintentionally exposing confidential information (Ou et al., 2022). However, there are significant gaps in our understanding of the variations in cybersecurity awareness, knowledge and behavior among employees.

The best way to reduce the threat of cyberattacks is to increase individual awareness. The term “cybersecurity awareness” refers to the extent to which individuals understand the significance of information security and their obligations to implement adequate levels of information security control to safeguard an organization's data and networks (Shaw et al., 2009). Most individuals do not fully understand which instruments are required for protection against cyber risks (Zwilling et al., 2022). In addition, as the world becomes increasingly digitally interconnected, the most effective strategy for enhancing cybersecurity awareness is to improve the know-how of both citizens and employees in the business and public administration sectors (Zwilling et al., 2022). To do so, organizations must establish policy compliance. Organizational policy compliance refers to the extent to which individuals conform to the prescribed rules, regulations, standards and guidelines of an organization. Organizational policies generally encompass a broad spectrum of domains, including but not limited to code of conduct, information security, data privacy, safety standards and human resources practices. Adherence to organizational policies guarantees uniformity, equity and legality in the activities and conduct of employees or members of the organization (AlKalbani et al., 2017; Bauer et al., 2017). However, empirical studies of the relationships between organizational policy compliance with cybersecurity awareness and employee protective behavior have yielded conflicting findings (Lee et al., 2004; Lee and Larsen, 2009; Li et al., 2019). Investigating these relationships in the public sector of an emerging market, such as Vietnam, has the potential to add new insights.

Moreover, the role of protection motivation is significant in influencing employee behaviors pertaining to compliance with information security policies. Particularly, information protection motivation is the degree of employees’ motivation to implement preventive measures against cyberattacks (Ma, 2022; Posey et al., 2015; Vrhovec and Mihelič, 2021). This motivation is the result of threat appraisal and coping appraisal processes and operates as an intervening variable similar to other motives that induce, sustain and direct employees’ activities (Martens et al., 2019). According to the protection motivation theory (PMT), employees will take measures to protect themselves against cybersecurity risks when they see a threat and believe they possess the necessary abilities to handle the potential danger. However, individuals frequently have an insufficient awareness or understanding of how to safeguard themselves against cyberattacks (Klein and Zwilling, 2023). Employee protective behaviors are the steps that employees take to correctly address cybersecurity concerns (Li et al., 2019; Tang et al., 2021).

An organization’s information security system is affected by many factors at the individual and organizational levels. Behavioral factors have recently been the focus of attention because employees directly control the accessibility, confidentiality and integrity of information (Ma, 2022). More than 70% of security breaches are because of employee negligence or inadequate compliance with organizational cybersecurity protocols (Alshaikh et al., 2021). In some cases, employees are not sufficiently aware of the variety of attacks that are constantly altering the corporate security landscape (Zwilling et al., 2022). For example, opening an email with an unfamiliar file extension or providing illegal access to others has the potential to expose the entire organization to cybersecurity breaches. In addition, employees tend to overlook mandatory security measures when completing tasks (Ifinedo, 2012), especially when managing multiple tasks simultaneously and facing stringent deadlines (Chowdhury et al., 2019). Thus, given the important role of employees in cybersecurity, the government and organizations should examine and prioritize practices that effectively enhance employees’ awareness and protective behaviors.

Social media encompasses apps and social network platforms that are part of Web 2.0 technology. These platforms enable the development, diffusion and transmission of knowledge across communities of users (Del Vecchio et al., 2020). The growing popularity of social media influencers has led to the widespread adoption of influencer marketing in business strategies (Vrontis et al., 2021). Government social media (GSM) accounts enhance the dissemination of official information and provide new platforms that are accessible and beneficial to the general public (Islm et al., 2021). Specifically, GSM is the online presence established and overseen by a governmental department or organization across various social media platforms (Tang et al., 2021). Governments can use GSM to quickly provide information to citizens, keep them aware of the status of threats, prevent the spread of false data and provide assistance to victims of disasters (Guo et al., 2021).

Specifically, studies of GSM have primarily focused on citizens' reasons for interacting with GSM and categorizing emergency messaging strategies (Tang et al., 2021). The impact of GSM on citizens during acute outbreaks of disease, such as COVID-19 or measles, has also been explored. However, there is a notable gap in understanding the impact of GSM on persistent issues spanning decades, such as cybersecurity attacks. A comprehensive understanding of these effects from a behavioral perspective will help GSM operators formulate effective engagement strategies and craft valuable messages. Likewise, governments can use social media accounts to increase awareness of cybersecurity threats, but the effectiveness of these efforts has not been established. Importantly, limited research has been conducted on the expansion of cultivation theory within the framework of GSM.

To address the above gaps, this study integrates PMT and cultivation theory to examine the effects of individual factors (awareness and motivation), organizational factors (cybersecurity policy) and GSM on employees’ protective behaviors related to cybersecurity. The following research questions are addressed:

RQ1.

How do organizational policies affect employees’ cybersecurity awareness and behaviors?

RQ2.

How does government social media influence employees’ cybersecurity awareness and protective behaviors?

RQ3.

How does employees’ cybersecurity awareness affect their protective behaviors?

The broad expansion of internet accessibility has significantly increased the complexity and frequency of cyberattacks, with extensive adverse consequences in multiple sectors, including businesses, industries and political administrations. In the face of these growing dangers, governments around the world have taken specific actions to strengthen the security of networks, especially those that are crucial for national defense. In Vietnam, cyberattacks mainly target key information infrastructures of central authorities and large financial corporations. Enhancing the legal structure that regulates network information security can help safeguard critical national defense information. A crucial component of this undertaking is evaluating the capacity and operational knowledge of network overseers, as efficiently protecting against cyberattacks requires proficient staff. Furthermore, the proper management of network information security depends on a comprehensive regulatory framework to reduce risks and effectively address cyberthreats. The Cybersecurity Law of Vietnam, which was implemented on January 1, 2019, highlights the government's dedication to maintaining societal order and safety in cyberspace. This legislation clearly outlines the duties and obligations of pertinent authorities, companies and individuals. However, additional studies of guidelines and organizational policy compliance are needed to guarantee the safety and security of employees as they navigate the digital realm, specifically in relation to internet usage and online transactions. In Vietnam, social media platforms are widely used by government organizations and officials, and the predominant platforms for GSM are Facebook, Zalo, Viber, YouTube, TikTok and Instagram.

This study contributes significantly to the literature on cybersecurity in Vietnam, especially behavioral aspects, by measuring the effects of cybersecurity awareness on actual protective behaviors rather than merely behavioral intentions, attitudes and likelihood. In addition, by integrating four components of the PMT and cultivation theory into the assessment of cybersecurity awareness, this study provides comprehensive measurements of the awareness of both threats and available countermeasures. Moreover, the influence of GSM on cybersecurity awareness among organizational insiders is investigated to provide insights into the effectiveness of recent government efforts to promote cybersecurity. Finally, by considering the information security context of the public sector, this research provides a foundation for the top management of public organizations to make strategic decisions about the governance, use and operation of computer systems and networks.

The remainder of the study is structured as follows. Section 2 reviews the literature and presents the theoretical framework, variable definitions, proposed hypotheses and the research model. Section 3 outlines the methodology for addressing the research questions, while Section 4 provides the results and discussion. Section 5 concludes with theoretical contributions, research implications and limitations.

The PMT is a widely acknowledged theoretical framework for evaluating behaviors intended to mitigate the adverse consequences of perceived threats (Li et al., 2022). This theory explains that attitude change is contingent on the level of protective motivation generated from the cognitive appraisal process, which includes perceived severity, perceived vulnerability, self-efficacy and response efficacy (Maddux and Rogers, 1983). Perceived severity refers to the perceived magnitude, danger and consequences of a manifest threat such as computer viruses, unauthorized access or internet hacking (Hina et al., 2019; Li et al., 2022). Perceived vulnerability reflects an individual's perception of the likelihood of a threat occurring or of being exposed to a threat (Hina et al., 2019; Li et al., 2019; Wong et al., 2022). Self-efficacy pertains to an individual's judgment of the capabilities and skills required to execute recommended protective behaviors for coping with threats, such as eliminating spyware from electronic devices or handling virus-infected files (Hina et al., 2019; Li et al., 2022). Response efficacy relates to the perceived effectiveness of countermeasures against cyberattacks that an employee can implement to prevent a potential threat (Hina et al., 2019; Li et al., 2019; Wong et al., 2022).

The PMT was originally developed in the health domain (Floyd et al., 2000) but has since been extended to other fields, including computer and information security (Boss et al., 2015). The PMT has been used to explain general users’ predominant information security behaviors (van Bavel et al., 2019). It has also been used to analyze individual information security practices in various settings, such as households (Martens et al., 2019), higher education organizations (Hina et al., 2019; Hina and Dominic, 2020) and business organizations (Li et al., 2019). The PMT is especially advantageous in the organizational context, where employees and end-users require additional encouragement to safeguard their valuable data assets (Li et al., 2022). Here, we use the PMT to investigate the determinants of protective behaviors among public servants in governmental organizations, an understudied segment.

Cultivation theory is a communication theory that describes how mass media coverage shapes the public’s opinions of social phenomena (Gerbner and Gross, 1976). Cultivation theory posits that a persistently high frequency of media consumption will increase the alignment of an individual’s perceptions of social realities with media depictions (Tang et al., 2021). Cultivation is a continual and dynamic process that includes two forms: mainstreaming and resonance (Hermann et al., 2020). Mainstreaming refers to the convergence of different views as a result of content exposure, while resonance occurs when media content is highly relevant to real-life experiences (Hermann et al., 2020). The cultivation approach originally focused on television but can be applied to any dominant medium, especially social media, that strengthens perceptions and attitudes by providing an accessible, engaging and shared symbolic environment (Intravia et al., 2017). GSM has attracted attention as a means of cultivation (Tang et al., 2021). Compared to conventional government Web portals, social media is a more efficient means of distributing information and fostering two-way interaction (Guo et al., 2021).

Both the PMT and cultivation theory are suitable for this study. This study expands the scope of these theories to examine civil servants’ assessment of cybersecurity awareness and protective behavior.

2.3.1 Cybersecurity awareness, information protection motivation and employee protective behavior.

Although research on cybersecurity awareness is growing, there is no single construct; researchers have considered several dimensions of cybersecurity awareness (Hanus et al., 2018). Defining cybersecurity awareness is a prerequisite for increasing cybersecurity awareness (Zwilling et al., 2022). Several prior studies have used the PMT to conceptualize cybersecurity awareness but have not explicitly defined the construct (Lee and Larsen, 2009; Vance et al., 2012). In this study, we adopt a threat perspective and consider cybersecurity awareness a second-order construct comprising four components: perceived severity, perceived vulnerability, self-efficacy and response efficacy. Thus, cybersecurity awareness is the state where employees are conscious of the occurrence and nature of cybersecurity threats, the potential effects of cybersecurity threats on organizational security (perceived severity and perceived vulnerability), their own capabilities and the expected measures for preventing such threats (self-efficacy and response efficacy).

According to the PMT, the level of elicited protection motivation is contingent on appraisals of perceived severity, perceived vulnerability, self-efficacy and response efficacy (Maddux and Rogers, 1983). If a threat is perceived as non-severe or improbable, if no viable action can be implemented to mitigate it or if the individual doubts their ability to cope with the situation, then protection motivation will not be aroused, and behavioral intentions will not change. Therefore, cybersecurity awareness should have a direct influence on the motivation for protective action:

H1.

Cybersecurity awareness has a positive impact on information protection motivation.

According to the PMT, employees who are more aware of cyberthreats are more likely to learn how to secure their devices, leading to stronger cyber-protective behavior (Klein and Zwilling, 2023). Examples of protective behaviors include regularly changing passwords, adhering to organizational standards, exercising caution before clicking on links from unknown sources, backing up data, patching software and deploying cybersecurity defense tools (Posey et al., 2015; Tang et al., 2021). By contrast, risky behaviors include activities such as disclosing personal passwords, downloading unlawful content, violating copyright regulations and neglecting suggested software updates (Zwilling et al., 2022). Previous research has shown direct effects of cybersecurity awareness on the prevention of information system misuse (D’Arcy et al., 2009) and compliance with cybersecurity policy (Bulgurcu et al., 2010). High cybersecurity awareness significantly increases employees’ knowledge of security threats and system vulnerabilities and, in turn, their vigilance against potential cyberattacks, thus ensuring that the information, systems and networks they engage with are protected (Corallo et al., 2022). The greater the perceived severity and perceived vulnerability of a potential threat to their organization’s cyber assets, the greater the likelihood that employees will adopt protective behaviors and vice versa (Martens et al., 2019). Likewise, if an employee has strong confidence in a coping mechanism’s effectiveness and their ability to execute that protective measure, then they will be more inclined to act (Li et al., 2022; Tang et al., 2021). Thus, we propose the following:

H2.

Cybersecurity awareness has a positive impact on employee protective behavior.

2.3.2 Information protection motivation and employee protective behavior

Some scholars have reframed information protection motivation as an attitude, while others omit information protection motivation and directly examine the predictive value of (intention toward) protective behavior (Wu, 2020). Few studies have examined the link between protection motivation and actual behaviors. While the primary aim of the PMT is to assess protection motivation, it can be extended to evaluate actual protective behaviors (Ma, 2022). As the ultimate goal of cybersecurity research is to enhance security practices instead of merely intentions, assessing actual behaviors is valuable. In addition, a meta-analysis of the PMT showed that protection motivation is the strongest predictor of behavioral changes (Boss et al., 2015). Thus, we extend the PMT by integrating employee protective behavior and hypothesize the following:

H3.

Information protection motivation has a positive impact on employee protective behavior.

2.3.3 Government social media and cybersecurity awareness

According to cultivation theory, media consumption can shape an individual’s perceptions and opinions (Hermann et al., 2020). GSM participation encompasses the interactive engagement of GSM followers through behaviors such as viewing, commenting and exchanging cybersecurity-related messages inside the GSM network (Tang et al., 2021). GSM participation can be seen as a form of media consumption because it contributes to enhancing people’s situational awareness of a cyber crisis (Guo et al., 2021). Individuals who actively engage with GSM messages regarding cybersecurity are more likely to develop heightened cybersecurity awareness (Tang et al., 2021). More precisely, the government's regular dissemination of cybercrime-related news frequently results in elevated levels of perceived threat among the public. This is because individuals tend to believe that events shown in the media have the potential to impact them or their loved ones (Intravia et al., 2017; Shah et al., 2020). Moreover, participation in GSM equips individuals with timely information and guidance to respond effectively to potential threats (Farooq et al., 2020), providing a foundation for evaluating the efficacy of protective responses (Tu et al., 2015). In addition, this advanced preparedness will increase individuals’ confidence in their ability to protect themselves from threats (Tang et al., 2021). Thus, we propose the following:

H4.

Government social media has a positive impact on cybersecurity awareness.

For an individual to be motivated to take an action, they must understand the purpose of the action, recognize its significance and be aware of the expectations associated with it (Chen et al., 2018). GSM participation can shape an individual’s perceptions and opinions (Guo et al., 2021). Tang et al. (2021) found that engaging in GSM contributes positively to individuals’ motivation to adopt protective measures against cyber scams via perceived severity, perceived vulnerability, self-efficacy and response efficacy. Based on these arguments, the following is proposed:

H5.

Government social media has a positive impact on information protection motivation.

2.3.4 Organizational policy compliance, cybersecurity awareness and employee protective behavior

On the basis of the PMT framework, it can be inferred that individuals who possess greater awareness of cyberthreats are more likely to actively seek out information on securing their devices (Klein and Zwilling, 2023). This heightened awareness is likely to increase compliance with organizational policy. Organizational policy compliance is widely believed to significantly influence employees’ behaviors and enhance an organization’s information security level (Chen et al., 2018). A cybersecurity policy with an understandable rationale can influence protective behaviors (D’Arcy et al., 2009; Safa et al., 2015). However, several scholars argue that awareness of cybersecurity policy, not the content of the cybersecurity policy itself, significantly influences computer misuse intentions and abuse behaviors such as modifying, stealing or destroying software and data (Lee et al., 2004; Lee and Larsen, 2009). Indeed, raising employees’ awareness of security policies positively contributes to their beliefs about cybersecurity and their behavior in protecting information security (Li et al., 2019). Because previous results are contradictory, in this study, we reinvestigate the relationship between organizational policy compliance and employee protective behavior in the specific context of governmental organizations:

H6.

Organizational policy compliance has a positive impact on cybersecurity awareness.

H7.

Organizational policy compliance has a positive impact on employee protective behavior.

Figure 1 compiles the hypotheses into the research model.

Figure 1

Research model

All constructs were assessed using a seven-point Likert scale ranging from 1 (strongly disagree) to 7 (strongly agree). The measurement items on the questionnaire were adapted from previous studies with minor or major modifications. The first part of the survey collected demographic information such as gender, age, education level, working tenure and organizational size. The second section included the constructs and their corresponding measurement items. The indicators for organizational policy compliance and perceived severity were adapted from Hina et al. (2019). The measures for perceived vulnerability and response efficacy were drawn from previous studies (Hina et al., 2019; Li et al., 2019; Wong et al., 2022). Self-efficacy was measured using items adapted from Hina et al. (2019) and Li et al. (2022). The GSM items were adapted from Tang et al. (2021). Information protection motivation was evaluated using measurement scales from Ma (2022) and Posey et al. (2015). The measures of employees' protective behaviors were adapted from Bulgurcu et al. (2010) and Wong et al. (2022). Table A1 in the  Appendix describes the measurement of all variables.

Table A1

Measurement items

Construct (source)CodeMeasurement itemsModifications
Organizational policy compliance (Hina et al., 2019OPC1 My organization has established rules of behavior for computer use to comply with governmental regulations Major modification 
OPC2 My organization has specific guidelines for computer use to comply with governmental regulations Major modification 
OPC3 My organization has a policy that forbids employees from accessing certain online websites when their computers contain confidential documents to comply with governmental regulations Major modification 
OPC4 My organization has defined code(s) of conduct explaining the do’s and don’ts of information security to comply with governmental regulations Major modification 
Perceived severity (Hina et al., 2019PS1 Protecting my organization’s information is important Minor modification 
PS2 At work, having my confidential information accessed without my consent or knowledge can be a serious problem for me No change 
PS3 I understand that having someone successfully breach or damage my information resources at work is very dangerous No change 
PS4 Loss of data because of hackers is a serious problem for me Major modification 
PS5 Organizing staff training will be a critical first step to ensure information security Major modification 
PS6 Risks can be reduced as employees become more aware of the threats and consequences stemming from their negligence Major modification 
PS7 Through education, the provision of sufficient data and supporting information helps increase employees’ cybersecurity awareness Major modification 
Perceived vulnerability (Hina et al., 2019; Li et al., 2019; Wong et al., 2022PV1 I know that my organization could be vulnerable to security breaches if I do not adhere to its Information Security Policies No change 
PV2 I may fall victim to a malicious attack if I fail to comply with my organization’s Information Security Policies No change 
PV3 In terms of information security risks at work, my computing resources can be vulnerable No change 
PV4 I believe that every individual who is conscious and makes efforts to protect the organization's information will reduce the risk of illegal access Major modification 
PV5 Organizations should invest in using modern cybersecurity technologies Major modification 
PV6 Organizations need to inform employees about potential cybersecurity threats regularly Major modification 
PV7 It is likely that a potential information security violation will occur to my organization’s information systems Major modification 
Self-efficacy (Hina et al., 2019; Li et al., 2022SE1 I believe that I have the necessary skills to protect myself from information security violations No change 
SE2 I believe that I have developed the capability to prevent people from getting my confidential information No change 
SE3 I enable security measures (firewall, antivirus, etc.) on my work computing resources No change 
SE4 I believe that protecting myself from information security violations is within my control Major modification 
SE5 I feel confident in setting the Web browser to different security levels No change 
SE6 I feel confident in handling virus-infected files No change 
SE7 I feel confident in getting rid of spyware and malware from my computer No change 
Response efficacy (Hina et al., 2019; Li et al., 2019; Wong et al., 2022RE1 In my organization, efforts to ensure the safety of my confidential information are effective No change 
RE2 In my organization, the available security measures to protect my work information from security violations are effective No change 
RE3 The preventive measures available to me at my organization to deal with malicious content are effective No change 
RE4 Security measures at my organization prevent hackers from gaining access to sensitive personal or educational information No change 
RE5 Complying with the information security policies in my organization will keep security breaches down No change 
RE6 If I comply with information security policies, then the chance of information security breaches occurring will be reduced No change 
RE7 Careful compliance with information security policies helps to avoid security problems No change 
RE8 Organizations can improve information security by showing their employees how security negligence can impact the security posture of an organization Major modification 
RE9 Organizations should have a General Data Protection Regulation Minor modification 
RE10 Organizations should upgrade antivirus and firewall software Minor modification 
Government social media (Tang et al., 2021GSM1 I always read and listen to cybersecurity recommendations posted by the GSM Major modification 
GSM2 I always share cybersecurity recommendations posted by the GSM Major modification 
GSM3 I always communicate cybersecurity recommendations posted by the GSM Major modification 
Information protection motivation (Ma, 2022; Posey et al., 2015IPM1 I intend to protect my organization from its information security threats No change 
IPM2 My organization’s success level in preventing information security threats is very high Major modification 
IPM3 I am always willing to engage in activities that protect my organization’s information systems from security threats Major modification 
IPM4 I always expend effort to protect my organization from its information security threats Major modification 
IPM5 I intend to try my best to prevent information security threats from happening in my organization No change 
Employee protective behavior (Li et al., 2019EPB1 I keep the anti-virus software on my computer up-to-date No change 
EPB2 I watch for unusual computer behaviors/responses (e.g. computer slowing down or freezing up, pop-up windows, etc.) No change 
EPB3 I am always concerned about any malware that is reported through media channels Major modification 
Construct (source)CodeMeasurement itemsModifications
Organizational policy compliance (Hina et al., 2019OPC1 My organization has established rules of behavior for computer use to comply with governmental regulations Major modification 
OPC2 My organization has specific guidelines for computer use to comply with governmental regulations Major modification 
OPC3 My organization has a policy that forbids employees from accessing certain online websites when their computers contain confidential documents to comply with governmental regulations Major modification 
OPC4 My organization has defined code(s) of conduct explaining the do’s and don’ts of information security to comply with governmental regulations Major modification 
Perceived severity (Hina et al., 2019PS1 Protecting my organization’s information is important Minor modification 
PS2 At work, having my confidential information accessed without my consent or knowledge can be a serious problem for me No change 
PS3 I understand that having someone successfully breach or damage my information resources at work is very dangerous No change 
PS4 Loss of data because of hackers is a serious problem for me Major modification 
PS5 Organizing staff training will be a critical first step to ensure information security Major modification 
PS6 Risks can be reduced as employees become more aware of the threats and consequences stemming from their negligence Major modification 
PS7 Through education, the provision of sufficient data and supporting information helps increase employees’ cybersecurity awareness Major modification 
Perceived vulnerability (Hina et al., 2019; Li et al., 2019; Wong et al., 2022PV1 I know that my organization could be vulnerable to security breaches if I do not adhere to its Information Security Policies No change 
PV2 I may fall victim to a malicious attack if I fail to comply with my organization’s Information Security Policies No change 
PV3 In terms of information security risks at work, my computing resources can be vulnerable No change 
PV4 I believe that every individual who is conscious and makes efforts to protect the organization's information will reduce the risk of illegal access Major modification 
PV5 Organizations should invest in using modern cybersecurity technologies Major modification 
PV6 Organizations need to inform employees about potential cybersecurity threats regularly Major modification 
PV7 It is likely that a potential information security violation will occur to my organization’s information systems Major modification 
Self-efficacy (Hina et al., 2019; Li et al., 2022SE1 I believe that I have the necessary skills to protect myself from information security violations No change 
SE2 I believe that I have developed the capability to prevent people from getting my confidential information No change 
SE3 I enable security measures (firewall, antivirus, etc.) on my work computing resources No change 
SE4 I believe that protecting myself from information security violations is within my control Major modification 
SE5 I feel confident in setting the Web browser to different security levels No change 
SE6 I feel confident in handling virus-infected files No change 
SE7 I feel confident in getting rid of spyware and malware from my computer No change 
Response efficacy (Hina et al., 2019; Li et al., 2019; Wong et al., 2022RE1 In my organization, efforts to ensure the safety of my confidential information are effective No change 
RE2 In my organization, the available security measures to protect my work information from security violations are effective No change 
RE3 The preventive measures available to me at my organization to deal with malicious content are effective No change 
RE4 Security measures at my organization prevent hackers from gaining access to sensitive personal or educational information No change 
RE5 Complying with the information security policies in my organization will keep security breaches down No change 
RE6 If I comply with information security policies, then the chance of information security breaches occurring will be reduced No change 
RE7 Careful compliance with information security policies helps to avoid security problems No change 
RE8 Organizations can improve information security by showing their employees how security negligence can impact the security posture of an organization Major modification 
RE9 Organizations should have a General Data Protection Regulation Minor modification 
RE10 Organizations should upgrade antivirus and firewall software Minor modification 
Government social media (Tang et al., 2021GSM1 I always read and listen to cybersecurity recommendations posted by the GSM Major modification 
GSM2 I always share cybersecurity recommendations posted by the GSM Major modification 
GSM3 I always communicate cybersecurity recommendations posted by the GSM Major modification 
Information protection motivation (Ma, 2022; Posey et al., 2015IPM1 I intend to protect my organization from its information security threats No change 
IPM2 My organization’s success level in preventing information security threats is very high Major modification 
IPM3 I am always willing to engage in activities that protect my organization’s information systems from security threats Major modification 
IPM4 I always expend effort to protect my organization from its information security threats Major modification 
IPM5 I intend to try my best to prevent information security threats from happening in my organization No change 
Employee protective behavior (Li et al., 2019EPB1 I keep the anti-virus software on my computer up-to-date No change 
EPB2 I watch for unusual computer behaviors/responses (e.g. computer slowing down or freezing up, pop-up windows, etc.) No change 
EPB3 I am always concerned about any malware that is reported through media channels Major modification 
Source: Created by the authors

The survey was initially written in English and subsequently translated into Vietnamese to facilitate its distribution to a wider range of participants. A pilot study of 30 respondents was performed to assess the appropriateness of the translation in the Vietnamese context. Based on the results, modifications were made to improve the clarity and readability of the questionnaire. From October 2022 to March 2023, data were collected by distributing the survey to public servants working at governmental organizations. We received invaluable support from local authorities to distribute the survey in their organizations.

The data were collected by applying nonprobability methods, specifically, a stratification approach. According to this approach, questionnaires were sent to 200 public personnel in each region of Ho Chi Minh City and Hanoi Capital. In addition, 150 surveys were disseminated in two adjacent provinces: Dong Nai Province and Binh Duong Province. In total, 700 questionnaires were distributed, and 564 were returned, of which 330 responses were valid.

Partial least squares–structural equation modeling (PLS–SEM) was used to analyze the data and evaluate the research model. PLS–SEM is a variance-based approach that assesses partial model structures by integrating principal component analysis and ordinary least squares regression (Hair et al., 2020). PLS–SEM is widely used in several disciplines, including research on cybersecurity behaviors (Alanazi et al., 2022; Wong et al., 2022). PLS–SEM aligns well with our research objectives for several reasons. First, it can test a theoretical framework from a predictive standpoint. Second, it provides support for the structural model, which is complex and encompasses numerous constructs, indicators, dependent components and model relationships. Finally, it enhances comprehension when exploring extensions of established theories (Hair et al., 2019).

The demographic profile and organizational characteristics of the respondents are shown in Table 1. Among the respondents, 26.67% are men, and 74.0% are women. The majority (71.21%) are 18–35 years old. Over 72% of the participants possess a bachelor’s degree or higher, 66.97% have more than five years of working experience and 52.42% work at large organizations with more than 100 employees.

Table 1

Characteristics of the respondents

Demographic itemsFrequency (n = 330)%
Gender 
Female 88 26.67 
Male 242 73.33 
Age 
18–35 years 235 71.21 
36–45 years 73 22.12 
Over 45 years 22 6.67 
Education level 
High school 90 27.27 
Undergraduate 185 56.06 
Postgraduate 55 16.67 
Working experience 
Less than 3 years 49 14.85 
3–5 years 60 18.18 
More than 5 years 221 66.97 
Organizational size 
Fewer than 50 employees 98 29.70 
51–100 employees 59 17.88 
More than 100 employees 173 52.42 
Demographic itemsFrequency (n = 330)%
Gender 
Female 88 26.67 
Male 242 73.33 
Age 
18–35 years 235 71.21 
36–45 years 73 22.12 
Over 45 years 22 6.67 
Education level 
High school 90 27.27 
Undergraduate 185 56.06 
Postgraduate 55 16.67 
Working experience 
Less than 3 years 49 14.85 
3–5 years 60 18.18 
More than 5 years 221 66.97 
Organizational size 
Fewer than 50 employees 98 29.70 
51–100 employees 59 17.88 
More than 100 employees 173 52.42 
Source: Created by the authors

The methodology used in this study raises the risk of common method bias (CMB) because the questionnaire instructions and social desirability may affect the respondents’ answers, leading to shared variation among indicators (Kock, 2015). Full collinearity variance inflation factors (FCVIFs) can effectively detect CMB, even in a model that satisfies the standard criteria for convergent and discriminant validity based on confirmatory factor analysis (Kock, 2015). If all FCVIFs obtained through a full collinearity test are 3.3 or less, then the model is considered free from CMB (Kock, 2015). As shown in Table 3, the FCVIFs for all latent constructs are below the 3.3 threshold, implying that the collected data are unaffected by CMB.

Table 3

HTMT ratio and Fornell–Larcker criterion

ConstructsEPBOPCGMSIPMPSPVRESE
HTMT ratio 
Employee protective behavior (EPB)         
Organizational policy compliance (OPC) 0.745        
Government social media (GSM) 0.855 0.849       
Information protection motivation (IPM) 0.864 0.761 0.799      
Perceived severity (PS) 0.667 0.594 0.601 0.728     
Perceived vulnerability (PV) 0.457 0.417 0.394 0.473 0.592    
Response efficacy (RE) 0.743 0.820 0.760 0.827 0.747 0.514   
Self-efficacy (SE) 0.724 0.684 0.719 0.688 0.531 0.488 0.813  
Fornell–Larcker criterion 
Employee protective behavior (EPB) 0.925        
Organizational policy compliance (OPC) 0.685 0.904       
Government social media (GSM) 0.775 0.773 0.912      
Information protection motivation (IPM) 0.805 0.713 0.737 0.908     
Perceived severity (PS) 0.615 0.550 0.549 0.682 0.828    
Perceived vulnerability (PV) 0.420 0.387 0.359 0.440 0.540 0.794   
Response efficacy (RE) 0.695 0.766 0.703 0.782 0.691 0.472 0.818  
Self-efficacy (SE) 0.671 0.640 0.663 0.650 0.501 0.457 0.775 0.863 
ConstructsEPBOPCGMSIPMPSPVRESE
HTMT ratio 
Employee protective behavior (EPB)         
Organizational policy compliance (OPC) 0.745        
Government social media (GSM) 0.855 0.849       
Information protection motivation (IPM) 0.864 0.761 0.799      
Perceived severity (PS) 0.667 0.594 0.601 0.728     
Perceived vulnerability (PV) 0.457 0.417 0.394 0.473 0.592    
Response efficacy (RE) 0.743 0.820 0.760 0.827 0.747 0.514   
Self-efficacy (SE) 0.724 0.684 0.719 0.688 0.531 0.488 0.813  
Fornell–Larcker criterion 
Employee protective behavior (EPB) 0.925        
Organizational policy compliance (OPC) 0.685 0.904       
Government social media (GSM) 0.775 0.773 0.912      
Information protection motivation (IPM) 0.805 0.713 0.737 0.908     
Perceived severity (PS) 0.615 0.550 0.549 0.682 0.828    
Perceived vulnerability (PV) 0.420 0.387 0.359 0.440 0.540 0.794   
Response efficacy (RE) 0.695 0.766 0.703 0.782 0.691 0.472 0.818  
Self-efficacy (SE) 0.671 0.640 0.663 0.650 0.501 0.457 0.775 0.863 
Source: Created by the authors

The construct measures’ validity and reliability test statistics are presented in Tables 2 and 3. Factor loadings exceeding 0.70 are recommended to ensure acceptable item reliability (Hair et al., 2020). As shown in Table 3, all indicators exhibit factor loadings exceeding this threshold except RE10, which has a factor loading of 0.662. Thus, RE10 was eliminated from the analysis.

Table 2

Factor analysis with reliability and validity statistics

ConstructsItem no.Loadings (> 0.7)α (> 0.7)CR (> 0.7)AVE (> 0.5)FCVIF (< 3.3)
Employee protective behavior (EPB) EPB1 0.918 0.915 0.917 0.855 2.880 
EPB2 0.936 
EPB3 0.920 
Government social media (GSM) GSM1 0.911 0.899 0.899 0.831 3.255 
GSM2 0.919 
GSM3 0.905 
Information protection motivation (IPM) IPM1 0.895 0.947 0.947 0.825 1.106 
IPM2 0.892 
IPM3 0.903 
IPM4 0.932 
IPM5 0.920 
Organizational policy compliance (OPC) OPC1 0.893 0.926 0.927 0.818 2.182 
OPC2 0.933 
OPC3 0.872 
OPC4 0.919 
Cybersecurity awareness (second-order variable)     
Perceived severity (PS) PS1 0.845 0.924 0.926 0.686 1.838 
PS2 0.818 
PS3 0.802 
PS4 0.847 
PS5 0.811 
PS6 0.825 
PS7 0.850 
Perceived vulnerability (PV) PV1 0.796 0.903 0.906 0.631 1.484 
PV2 0.792 
PV3 0.815 
PV4 0.776 
PV5 0.785 
PV6 0.782 
PV7 0.814 
Response efficacy (RE) RE1 0.873 0.938 0.942 0.670 2.516 
RE2 0.865 
RE3 0.841 
RE4 0.828 
RE5 0.795 
RE6 0.805 
RE7 0.801 
RE8 0.841 
RE9 0.705 
RE10 Eliminated 
Self-efficacy (SE) SE1 0.847 0.943 0.944 0.745 2.475 
SE2 0.898 
SE3 0.824 
SE4 0.895 
SE5 0.908 
SE6 0.827 
SE7 0.836 
ConstructsItem no.Loadings (> 0.7)α (> 0.7)CR (> 0.7)AVE (> 0.5)FCVIF (< 3.3)
Employee protective behavior (EPB) EPB1 0.918 0.915 0.917 0.855 2.880 
EPB2 0.936 
EPB3 0.920 
Government social media (GSM) GSM1 0.911 0.899 0.899 0.831 3.255 
GSM2 0.919 
GSM3 0.905 
Information protection motivation (IPM) IPM1 0.895 0.947 0.947 0.825 1.106 
IPM2 0.892 
IPM3 0.903 
IPM4 0.932 
IPM5 0.920 
Organizational policy compliance (OPC) OPC1 0.893 0.926 0.927 0.818 2.182 
OPC2 0.933 
OPC3 0.872 
OPC4 0.919 
Cybersecurity awareness (second-order variable)     
Perceived severity (PS) PS1 0.845 0.924 0.926 0.686 1.838 
PS2 0.818 
PS3 0.802 
PS4 0.847 
PS5 0.811 
PS6 0.825 
PS7 0.850 
Perceived vulnerability (PV) PV1 0.796 0.903 0.906 0.631 1.484 
PV2 0.792 
PV3 0.815 
PV4 0.776 
PV5 0.785 
PV6 0.782 
PV7 0.814 
Response efficacy (RE) RE1 0.873 0.938 0.942 0.670 2.516 
RE2 0.865 
RE3 0.841 
RE4 0.828 
RE5 0.795 
RE6 0.805 
RE7 0.801 
RE8 0.841 
RE9 0.705 
RE10 Eliminated 
Self-efficacy (SE) SE1 0.847 0.943 0.944 0.745 2.475 
SE2 0.898 
SE3 0.824 
SE4 0.895 
SE5 0.908 
SE6 0.827 
SE7 0.836 
Source: Created by the authors

Internal consistency reliability can be assessed using both Cronbach's alpha (α) and composite reliability (CR); values greater than 0.70 are recommended for both reliability measures (Hair et al., 2020). Table 3 shows that all constructs have both α and CR values above 0.70, indicating satisfactory to good reliability.

An average variance extracted (AVE) value of 0.50 or greater signifies that the construct accounts for at least 50% of the variance in its items (Hair et al., 2020). In this study, all AVE values of the constructs are higher than 0.50, implying that the convergent validity test is satisfied.

Finally, discriminant validity was tested by using the heterotrait–monotrait (HTMT) ratio and Fornell–Larcker criterion (Hair et al., 2020). HTMT ratio compares the correlations of an item across constructs to its correlations with the same construct, and an upper boundary of 0.85 or 0.90 (Hair et al., 2019) is suggested to avoid discriminant validity issues. The Fornell–Larcker criterion is fulfilled when a factor’s squared AVE exceeds the square root of its inter-construct correlations (Fornell and Larcker, 1981). As shown in Table 4, all constructs meet the requirements for both the HTMT ratio and Fornell–Larcker criterion, implying acceptable levels of discriminant validity.

Table 4

Hypothesis testing results

Hypothesisβt-valuep-valueRemarks
H1 CSA → EPB 0.188 2.335 0.020 Supported 
H2 CSA → IPM 0.493 7.161 0.000 Supported 
H3 GSM → CSA 0.359 4.102 0.000 Supported 
H4 GSM → IPM 0.379 4.918 0.000 Supported 
H5 IPM → EPB 0.555 6.025 0.000 Supported 
H6 OPC → CSA 0.476 6.023 0.000 Supported 
H7 OPC → EPB 0.148 1.592 0.111 Not supported 
Hypothesisβt-valuep-valueRemarks
H1 CSA → EPB 0.188 2.335 0.020 Supported 
H2 CSA → IPM 0.493 7.161 0.000 Supported 
H3 GSM → CSA 0.359 4.102 0.000 Supported 
H4 GSM → IPM 0.379 4.918 0.000 Supported 
H5 IPM → EPB 0.555 6.025 0.000 Supported 
H6 OPC → CSA 0.476 6.023 0.000 Supported 
H7 OPC → EPB 0.148 1.592 0.111 Not supported 

Notes:

CSA = Cybersecurity awareness; EPB = Employee protective behavior; IPM = Information protection motivation; GSM = Government social media; OPC = Organizational policy compliance

Source: Created by the authors

As there is no standard goodness-of-fit statistic for PLS–SEM, the quality of the model is evaluated based on its capacity to predict the endogenous constructs (Hair et al., 2019). This evaluation is guided by the coefficient of determination (R2) and the effect size (f 2) (Hair et al., 2019).

R2 indicates the collective impact of the exogenous variables on the endogenous variables and ranges from 0 to 1, with 1 indicating absolute predictive accuracy (Hair et al., 2019). R2 values of 0.75, 0.50 and 0.25 are interpreted as indicating substantial, moderate and weak predictive accuracy, respectively (Hair et al., 2019). In our model, the R2 values of the three endogenous variables – cybersecurity awareness, information protection motivation and employee protective behavior – are 0.614, 0.654 and 0.682, respectively. These values indicate moderate to substantial predictive accuracy.

f 2 is used to evaluate the effect of removing a specific predictor construct on the R 2 of an endogenous variable (Hair et al., 2019). f 2 values of 0.02, 0.15 and 0.35 indicate small, medium and large effect sizes, respectively. The relationships investigated in this study have medium or large effect sizes, excluding the relationships between cybersecurity awareness and employee protective behavior and between organizational policy compliance and employee protective behavior, which have f2 values of 0.031 and 0.028, respectively.

The hypothesis testing results are presented in Table 4. A hypothesis is accepted when the p-value is ≤ 0.05 or the corresponding t-value is >1.96; otherwise, it is rejected. All hypotheses are supported, except H7. Cybersecurity awareness positively affects information protection motivation and employee protective behavior (β = 0.501, β = 0.175 and p < 0.05), supporting H1 and H2. GSM positively influences cybersecurity awareness and information protection motivation (β = 0.375, β = 0.365 and p < 0.05); thus, H3 and H4 are accepted. The correlation between information protection motivation and employee protective behavior is significantly positive (β = 0.562 and p = 0.000), supporting H5. Organizational policy compliance strongly enhances cybersecurity awareness (β = 448 and p < 0.05), confirming H6. However, H7, which posits a positive impact of organizational policy compliance on employee protective behavior, is rejected because its p-value of 0.109 and t-value of 1.604 do not meet the recommended thresholds.

Indirect effects were evaluated to assess three potential mediating relationships: information protection motivation as a mediator of the relationship between cybersecurity awareness and employee protective behavior; cybersecurity awareness as a mediator of the relationship between GSM and information protection motivation; and cybersecurity awareness as a mediator of the relationship between organizational policy compliance and employee protective behavior. As shown in Table 5, the direct and indirect effects in the first two relationships are significantly positive (β > 0 and p < 0.05). For the third relationship, the direct effect is not supported, but the indirect effect is significantly positive (β = 0.079 and p = 0.05). For the first two relationships, the indirect and direct effects have the same direction, indicating complementary mediation. By contrast, cybersecurity awareness fully mediates the relationship between organizational policy compliance and employee protective behavior.

Table 5

Mediating effects

HypothesisTypeβt-valuep-valueRemarks
H1 CSA → EPB Direct 0.188 2.335 0.020 Supported 
 CSA → IPM → EPB Indirect 0.274 4.947 0.000 Complementary (partial mediation) 
H4 GSM → IPM Direct 0.379 4.918 0.000 Supported 
 GSM → CSA → IPM Indirect 0.177 3.487 0.000 Complementary (partial mediation) 
H7 OPC → EPB Direct 0.148 1.592 0.111 Not supported 
 OPC → CSA → EPB Indirect 0.068 1.806 0.071 Indirect only (full mediation) 
HypothesisTypeβt-valuep-valueRemarks
H1 CSA → EPB Direct 0.188 2.335 0.020 Supported 
 CSA → IPM → EPB Indirect 0.274 4.947 0.000 Complementary (partial mediation) 
H4 GSM → IPM Direct 0.379 4.918 0.000 Supported 
 GSM → CSA → IPM Indirect 0.177 3.487 0.000 Complementary (partial mediation) 
H7 OPC → EPB Direct 0.148 1.592 0.111 Not supported 
 OPC → CSA → EPB Indirect 0.068 1.806 0.071 Indirect only (full mediation) 
Source: Created by the authors

This study examines how GSM and organizational policy compliance affect employees' cybersecurity awareness, motivation and behaviors. Our findings substantiate six of the seven proposed hypotheses. Specifically, cybersecurity awareness is found to positively impact information protection motivation and to directly positively influence employee protective behavior, consistent with a previous study (Tang et al., 2021). Wong et al. (2022) also observed that cybersecurity awareness significantly improves employees’ proficiency in handling cybersecurity tasks in response to perceived threats, and awareness has been shown to directly impact cyber-misuse prevention and cybersecurity policy compliance (Bulgurcu et al., 2010; D’Arcy et al., 2009). In addition, a significant positive correlation is observed between information protection motivation and employee protective behavior. This result aligns with the research of Ma (2022), who concluded that protection motivation is a robust predictor of behavior. Information protection motivation also partially mediates the relationship between cybersecurity awareness and employee protective behavior.

GSM has a positive influence on cybersecurity awareness, consistent with prior suggestions that GSM is the primary source of crisis-related information (Intravia et al., 2017; Shah et al., 2020; Tang et al., 2021). Active engagement with GSM not only leads individuals to believe that cyberattack-related media events can affect them but also equips them with the knowledge and preparedness needed to respond effectively, thereby enhancing cybersecurity awareness. Cybersecurity awareness also partially mediates the relationship between GSM and information protection motivation. This observation aligns with the findings of Tang et al. (2021), who claim that social media information consumption motivates users to take preventive actions. By demonstrating a direct impact of GSM on information protection motivation, this study provides a novel perspective, as prior research has predominantly investigated the influence of GSM on motivation and behaviors by measuring variables such as fear of victimization.

Last but not least, organizational policy compliance substantially boosts cybersecurity awareness. However, there is no direct impact of organizational policy compliance on employee protective behavior; instead, this relationship is fully mediated by cybersecurity awareness. Hina et al. (2019) suggested that to enhance security behavior and actions, organizations must go beyond distributing organizational cybersecurity policies and ensuring familiarity with their content; employees must fully perceive the severity of a security breach and the organization's vulnerability to it. The mediating role of cybersecurity awareness underscores the importance of not only formulating a cybersecurity policy but also implementing processes to disseminate and instill it in the minds of employees to enhance protective behaviors.

First, the present study provides a comprehensive analysis of the literature on cybersecurity awareness, motivation and behavior. This study extends the PMT and cultivation theory by incorporating employee protective behavior as a crucial factor and examining the connection between this concept and information protection motivation. Assessing real actions is an essential component of cybersecurity research, as the main objective is to enhance security practices rather than just intentions. This study demonstrates that cybersecurity awareness and information protection motivation both significantly influence employee protective behavior.

Second, this study integrates four cognitive factors (perceived severity, perceived vulnerability, self-efficacy and response efficacy) to create the second-order construct of cybersecurity awareness. This multidimensional construct reflects the complexity of cybersecurity awareness while simplifying the model and reducing the number of hypotheses, allowing us to focus on what truly matters and uncover meaningful insights.

Third, our conceptual framework incorporates the effects of cultivation through GSM to investigate the antecedents of cybersecurity awareness. The literature primarily focuses on understanding why individuals engage with GSM during crises and on categorizing the emergency messaging strategies used by GSM (Tang et al., 2021). These studies neglect the impact of GSM on individuals' awareness of and motivation toward perennially urgent issues such as cybersecurity policy, particularly when individuals enthusiastically engage with cybersecurity content shared on GSM. Our results confirm that GSM positively affects both cybersecurity awareness and information protection motivation.

Finally, there is no consensus in the literature on the effectiveness of cybersecurity policies, particularly their impact on protective behaviors. Therefore, we investigate the direct influence of organizational cybersecurity compliance on protective behavior and its indirect effect through cybersecurity awareness. Our findings indicate that organizational policy compliance does not have a direct impact on employee protective behavior; instead, its influence is mediated by cybersecurity awareness.

This research provides a robust foundation for senior management of public organizations to formulate strategic solutions addressing deficiencies in the governance, utilization and operation of computer systems and networks. Empirical studies have predominantly focused on the private sector, and the applicability and transferability of the findings to public organizations remain unclear. Public organizations are progressively embracing digitalization to enhance the flow and storage of operational data. However, current organizational policies for managing and using computer systems are insufficient to support these digitalization efforts, increasing the risk of information insecurity.

Organizational policy noncompliance occurs in the public sector when public officials, despite having a fundamental understanding of cybersecurity, fail to comply with agency standards. Cyberspace policy noncompliance, such as using unverified data from USB drives or accessing online resources without permission, can compromise network security and threaten privileged government computer system data. By adopting robust international standards-based laws, government organizations can strengthen their cyber defenses and encourage employee compliance. This will safeguard vital assets and boost government credibility.

Organizational policy compliance also affects employees’ cybersecurity behavior. This study finds that following the law indirectly increases employees' cybersecurity awareness and willingness to take precautions. Organizations must go beyond policies to improve compliance and cybersecurity. They should invest more in training, cybersecurity newsletters and alarm alerts. These activities are essential for effective policy dissemination and employee comprehension of cybersecurity threats and best practices. Organizations can foster a cybersecurity-savvy and regulatory-compliant culture by engaging employees through many channels, which will improve the overall security stance of the organization.

Considering the significant impacts of GSM on cybersecurity awareness and information protection motivation, government organizations should maintain an active role in disseminating cybersecurity information quickly and concisely through their GSM channels. Specifically, government-operated social media platforms play a significant role in enhancing recent governmental endeavors focused on advancing cybersecurity. Through these platforms, governments can swiftly disseminate crucial information regarding emerging cyber threats, best practices for online safety and updates on cybersecurity policies and regulations. Similarly, governments may effectively use the extensive reach and convenient accessibility of social media platforms to interact directly with citizens, thereby cultivating a collective feeling of accountability and empowerment in the protection of digital assets. Furthermore, social media platforms play a crucial role in facilitating instantaneous communication, allowing governments to rapidly disseminate alerts and updates. This, in turn, aids individuals in being watchful against the ever-changing landscape of cyber dangers. Moreover, these platforms offer opportunities for interactive communication, enabling individuals to seek advice, exchange knowledge and engage in cooperative endeavors aimed at enhancing cybersecurity resilience. GSM serves to both expand the scope of cybersecurity awareness programs and cultivate a more knowledgeable and involved populace, which is essential for improving the overall cybersecurity posture.

This study uses a quantitative survey and PLS–SEM to examines the influence of GSM and organizational policy compliance on behavioral aspects of cybersecurity. Additionally, this study extends the PMT and cultivation theory by introducing employee protective behavior as a dependent variable and constructing a conceptual framework that integrates cultivation effects with GSM. The results offer novel insights into the complex interplay among GSM, cybersecurity awareness, information protection motivation and employee protective behavior. Specifically, cybersecurity awareness positively impacts both information protection motivation and employee protective behavior. Moreover, GSM positively affects cybersecurity awareness and information protection motivation, with cybersecurity playing a partial mediating role in the relationship between GSM and information protection motivation. Furthermore, a significant positive correlation exists between information protection motivation and employee protective behavior, and information protection motivation partially mediates the relationship between cybersecurity awareness and employee protective behavior. Finally, organizational policy compliance significantly enhances cybersecurity awareness. However, organizational policy compliance does not directly impact employee protective behavior; instead, this relationship is fully mediated by cybersecurity awareness.

While this study provides new insights into theory and practice, it has certain limitations. First, measuring employee protective behavior using a self-report quantitative questionnaire may lack validity. Self-reports may not be reliable predictors of employees' actual behavior, as their perceptions of security behavior might not align with their real security practices. Longitudinal research would enable more accurate records of actual behavior records but require more time and effort. Second, control variables such as gender, job title and organizational size are not considered, and it would be valuable to explore how these factors influence the established relationships. Third, investigating additional variables at the individual, organizational and social levels would provide a more comprehensive view of the antecedents of employees’ protective behaviors.

Funding: This research is funded by International University, VNUHCMC, Vietnam; SV2022-P M-03.

Alanazi
,
M.
,
Freeman
,
M.
and
Tootell
,
H.
(
2022
), “
Exploring the factors that influence the cybersecurity behaviors of young adults
”,
Computers in Human Behavior
, Vol.
136
, pp.
1
-
14
, doi: .
AlKalbani
,
A.
,
Deng
,
H.
,
Kam
,
B.
and
Zhang
,
X.
(
2017
), “
Information security compliance in organizations: an institutional perspective
”,
Data and Information Management
, Vol.
1
No.
2
, pp.
104
-
114
, doi: .
Alshaikh
,
M.
,
Maynard
,
S.B.
and
Ahmad
,
A.
(
2021
), “
Applying social marketing to evaluate current security education training and awareness programs in organisations
”,
Computers & Security
, Vol.
100
, pp.
1
-
19
, doi: .
Bauer
,
S.
,
Bernroider
,
E.W.N.
and
Chudzikowski
,
K.
(
2017
), “
Prevention is better than cure! Designing information security awareness programs to overcome users’ non-compliance with information security policies in banks
”,
Computers & Security
, Vol.
68
, pp.
145
-
159
, doi: .
Boss
,
S.
,
Galletta
,
D.
,
Lowry
,
P.B.
and
Moody
,
G.D.
(
2015
), “
What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective behaviors in users
”,
MIS Quarterly
, Vol.
39
No.
4
, pp.
837
-
864
, doi: .
Bulgurcu
,
B.
,
Cavusoglu
,
H.
and
Benbasat
,
I.
(
2010
), “
Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness
”,
MIS Quarterly
, Vol.
34
No.
3
, pp.
523
-
548
.
Chen
,
X.
,
Chen
,
L.
and
Wu
,
D.
(
2018
), “
Factors that influence employees’ security policy compliance: an awareness-motivation-capability perspective
”,
Journal of Computer Information Systems
, Vol.
58
No.
4
, pp.
312
-
324
, doi: .
Chowdhury
,
N.H.
,
Adam
,
M.T.P.
and
Skinner
,
G.
(
2019
), “
The impact of time pressure on cybersecurity behaviour: a systematic literature review
”,
Behaviour & Information Technology
, Vol.
38
No.
12
, pp.
1290
-
1308
, doi: .
Corallo
,
A.
,
Lazoi
,
M.
,
Lezzi
,
M.
and
Luperto
,
A.
(
2022
), “
Cybersecurity awareness in the context of the industrial internet of things: a systematic literature review
”,
Computers in Industry
, Vol.
137
, pp.
1
-
16
, doi: .
D’Arcy
,
J.
,
Hovav
,
A.
and
Galletta
,
D.
(
2009
), “
User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach
”,
Information Systems Research
, Vol.
20
No.
1
, pp.
79
-
98
, doi: .
Del Vecchio
,
P.
,
Mele
,
G.
,
Passiante
,
G.
,
Vrontis
,
D.
and
Fanuli
,
C.
(
2020
), “
Detecting customers knowledge from social media big data: toward an integrated methodological framework based on netnography and business analytics
”,
Journal of Knowledge Management
, Vol.
24
No.
4
, pp.
799
-
821
, doi: .
Farooq
,
A.
,
Laato
,
S.
and
Najmul Islam
,
A.K.M.
(
2020
), “
Impact of online information on self-isolation intention during the COVID-19 pandemic: cross-sectional study
”,
Journal of Medical Internet Research
, Vol.
22
No.
5
, doi: .
Floyd
,
D.
,
Prentice-Dunn
,
S.
and
Rogers
,
R.
(
2000
), “
A Meta-Analysis of research on protection motivation theory
”,
Journal of Applied Social Psychology
, Vol.
30
No.
2
, pp.
407
-
429
, doi: .
Fornell
,
C.
and
Larcker
,
D.F.
(
1981
), “
Structural equation models with unobservable variables and measurement error: algebra and statistics
”,
Journal of Marketing Research
, Vol.
18
No.
3
, pp.
382
-
388
, doi: .
Fosch-Villaronga
,
E.
and
Mahler
,
T.
(
2021
), “
Cybersecurity, safety and robots: strengthening the link between cybersecurity and safety in the context of care robots
”,
Computer Law & Security Review
, Vol.
41
, pp.
1
-
13
, doi: .
Gerbner
,
G.
and
Gross
,
L.
(
1976
), “
Living with television: the violence profile
”,
Journal of Communication
, Vol.
26
No.
2
, pp.
172
-
199
, doi: .
Guo
,
J.
,
Liu
,
N.
,
Wu
,
Y.
and
Zhang
,
C.
(
2021
), “
Why do citizens participate on government social media accounts during crises? A civic voluntarism perspective
”,
Information & Management
, Vol.
58
No.
1
, pp.
1
-
12
, doi: .
Hair
,
J.F.
, Jr.
,
Howard
,
M.C.
and
Nitzl
,
C.
(
2020
), “
Assessing measurement model quality in PLS-SEM using confirmatory composite analysis
”,
Journal of Business Research
, Vol.
109
, pp.
101
-
110
, doi: .
Hair
,
J.F.
,
Risher
,
J.J.
,
Sarstedt
,
M.
and
Ringle
,
C.M.
(
2019
), “
When to use and how to report the results of PLS-SEM
”,
European Business Review
, Vol.
31
No.
1
, pp.
2
-
24
, doi: .
Hanus
,
B.
,
Windsor
,
J.C.
and
Wu
,
Y.
(
2018
), “
Definition and multidimensionality of security awareness: close encounters of the second order
”,
ACM SIGMIS DATABASE: The Database for Advances in Information Systems
, Vol.
49
No.
1
, pp.
103
-
133
Hasan
,
S.
,
Ali
,
M.
,
Kurnia
,
S.
and
Thurasamy
,
R.
(
2021
), “
Evaluating the cyber security readiness of organizations and its influence on performance
”,
Journal of Information Security and Applications
, Vol.
58
, pp.
1
-
16
, doi: .
Hermann
,
E.
,
Eisend
,
M.
and
Bayón
,
T.
(
2020
), “
Facebook and the cultivation of ethnic diversity perceptions and attitudes
”,
Internet Research
, Vol.
30
No.
4
, pp.
1123
-
1141
, doi: .
Hina
,
S.
and
Dominic
,
P.D.D.
(
2020
), “
Information security policies’ compliance: a perspective for higher education institutions
”,
Journal of Computer Information Systems, Online First
, Vol.
60
No.
3
, doi: .
Hina
,
S.
,
Panneer Selvam
,
D.D.D.
and
Lowry
,
P.B.
(
2019
), “
Institutional governance and protection motivation: theoretical insights into shaping employees’ security compliance behavior in higher education institutions in the developing world
”,
Computers & Security
, Vol.
87
, pp.
1-15
, doi: .
Ifinedo
,
P.
(
2012
), “
Understanding information systems security policy compliance: an integration of the theory of planned behavior and the protection motivation theory
”,
Computers & Security
, Vol.
31
No.
1
, pp.
83
-
95
, doi: .
Intravia
,
J.
,
Wolff
,
K.T.
,
Paez
,
R.
and
Gibbs
,
B.R.
(
2017
), “
Investigating the relationship between social media consumption and fear of crime: a partial analysis of mostly young adults
”,
Computers in Human Behavior
, Vol.
77
, pp.
158
-
168
, doi: .
Islm
,
T.
,
Meng
,
H.
,
Pitafi
,
A.H.
,
Ullah Zafar
,
A.
,
Sheikh
,
Z.
,
Shujaat Mubarik
,
M.
and
Liang
,
X.
(
2021
), “
Why DO citizens engage in government social media accounts during COVID-19 pandemic? A comparative study
”,
Telematics and Informatics
, Vol.
62
, p.
101619
, doi: .
Jain
,
N.
and
Raman
,
T.V.
(
2023
), “
The interplay of perceived risk, perceive benefit and generation cohort in digital finance adoption
”,
EuroMed Journal of Business
, Vol.
18
No.
3
, pp.
359
-
379
, doi: .
Klein
,
G.
and
Zwilling
,
M.
(
2023
), “
The weakest link: employee Cyber-Defense behaviors while working from home
”,
Journal of Computer Information Systems, pp
, Vol.
64
No.
3
, pp.
1
-
15
, doi: .
Kock
,
N.
(
2015
), “
Common method bias in PLS-SEM: a full collinearity assessment approach
”,
International Journal of e-Collaboration
, Vol.
11
No.
4
, pp.
1
-
10
, doi: .
Lee
,
Y.
and
Larsen
,
K.R.
(
2009
), “
Threat or coping appraisal: determinants of SMB executives′ decision to adopt anti-malware software
”,
European Journal of Information Systems
, Vol.
18
No.
2
, pp.
177
-
187
, doi: .
Lee
,
S.M.
,
Lee
,
S.G.
and
Yoo
,
S.
(
2004
), “
An integrative model of computer abuse based on social control and general deterrence theories
”,
Information & Management
, Vol.
41
No.
6
, pp.
707
-
718
, doi: .
Li
,
L.
,
Xu
,
L.
and
He
,
W.
(
2022
), “
The effects of antecedents and mediating factors on cybersecurity protection behavior
”,
Computers in Human Behavior Reports
, Vol.
5
, pp.
1
-
14
, doi: .
Li
,
L.
,
He
,
W.
,
Xu
,
L.
,
Ash
,
I.
,
Anwar
,
M.
and
Yuan
,
X.
(
2019
), “
Investigating the impact of cybersecurity policy awareness on employees ’ cybersecurity behavior
”,
International Journal of Information Management
, Vol.
45
, pp.
13
-
24
, doi: .
Lu
,
Y.
and
Xu
,
L.D.
(
2019
), “
Internet of things (IoT) cybersecurity research: a review of current research topics
”,
IEEE Internet of Things Journal
, Vol.
6
No.
2
, pp.
2103
-
2115
, doi: .
Ma
,
X.
(
2022
), “
Is professionals’ information security behaviors in Chinese IT organizations for information security protection
”,
Information Processing & Management
, Vol.
59
No.
1
, doi:
Maddux
,
J.E.
and
Rogers
,
R.W.
(
1983
), “
Protection motivation and Self-Efficacy: a revised theory of fear appeals and attitude change
”,
Journal of Experimental Social Psychology
, Vol.
19
No.
5
, pp.
469
-
479
, doi: .
Martens
,
M.
,
De Wolf
,
R.
and
De Marez
,
L.
(
2019
), “
Investigating and comparing the predictors of the intention towards taking security measures against malware, scams and cybercrime in general
”,
Computers in Human Behavior
, Vol.
92
, pp.
139
-
150
, doi: .
Ou
,
C.X.
,
Zhang
,
X.
,
Angelopoulos
,
S.
,
Davison
,
R.M.
and
Janse
,
N.
(
2022
), “
Security breaches and organization response strategy: exploring consumers’ threat and coping appraisals
”,
International Journal of Information Management
, Vol.
65
, pp.
1
-
17
, doi: .
Posey
,
C.
,
Roberts
,
T.L.
and
Lowry
,
P.B.
(
2015
), “
The impact of organizational commitment on insiders motivation to protect organizational information assets
”,
Journal of Management Information Systems
, Vol.
32
No.
4
, pp.
179
-
214
, doi: .
Safa
,
N.S.
,
Sookhak
,
M.
,
Von Solms
,
R.
,
Furnell
,
S.
,
Ghani
,
N.A.
and
Herawan
,
T.
(
2015
), “
Information security conscious care behaviour formation in organizations
”,
Computers & Security
, Vol.
53
, pp.
65
-
78
, doi: .
Shah
,
Z.
,
Chu
,
J.
,
Ghani
,
U.
,
Qaisar
,
S.
and
Hassan
,
Z.
(
2020
), “
Media and altruistic behaviors: the mediating role of fear of victimization in cultivation theory perspective
”,
International Journal of Disaster Risk Reduction
, Vol.
42
, pp.
1
-
8
, doi: .
Shaw
,
R.S.
,
Chen
,
C.C.
,
Harris
,
A.L.
and
Huang
,
H.-J.
(
2009
), “
The impact of information richness on information security awareness training effectiveness
”,
Computers & Education
, Vol.
52
No.
1
, pp.
92
-
100
, doi: .
Tang
,
Z.
,
Miller
,
A.S.
,
Zhou
,
Z.
and
Warkentin
,
M.
(
2021
), “
Does government social media promote users’ information security behavior towards COVID-19 scams? Cultivation effects and protective motivations
”,
Government Information Quarterly
, Vol.
38
No.
2
, pp.
1
-
11
, doi: .
Tu
,
Z.
,
Turel
,
O.
,
Yuan
,
Y.
and
Archer
,
N.
(
2015
), “
Learning to cope with information security risks regarding mobile device loss or theft: an empirical examination
”,
Information and Management
, Vol.
52
No.
4
, pp.
506
-
517
, doi: .
van Bavel
,
R.
,
Rodríguez-Priego
,
N.
,
Vila
,
J.
and
Briggs
,
P.
(
2019
), “
Using protection motivation theory in the design of nudges to improve online security behavior
”,
International Journal of Human-Computer Studies
, Vol.
123
, pp.
29
-
39
, doi: .
Vance
,
A.
,
Siponen
,
M.
and
Pahnila
,
S.
(
2012
), “
Motivating is security compliance: insights from habit and protection motivation theory
”,
Information & Management
, Vol.
49
Nos
3/4
, pp.
190
-
198
, doi: .
Vrhovec
,
S.
and
Mihelič
,
A.
(
2021
), “
Redefining threat appraisals of organizational insiders and exploring the moderating role of fear in cyberattack protection motivation
”,
Computers & Security
, Vol.
106
, pp.
1
-
22
, doi: .
Vrontis
,
D.
,
Makrides
,
A.
,
Christofi
,
M.
and
Thrassou
,
A.
(
2021
), “
Social media influencer marketing: a systematic review, integrative framework and future research agenda
”,
International Journal of Consumer Studies
, Vol.
45
No.
4
, pp.
617
-
644
, doi: .
Wong
,
L.W.
,
Lee
,
V.H.
,
Tan
,
G.W.H.
,
Ooi
,
K.B.
and
Sohal
,
A.
(
2022
), “
The role of cybersecurity and policy awareness in shifting employee compliance attitudes: building supply chain capabilities
”,
International Journal of Information Management
, Vol.
66
, pp.
1
-
15
, doi: .
Wu
,
D.
(
2020
), “
Empirical study of knowledge withholding in cyberspace: integrating protection motivation theory and theory of reasoned behavior
”,
Computers in Human Behavior
, Vol.
105
, pp.
1
-
14
, doi: .
Zwilling
,
M.
,
Klien
,
G.
,
Lesjak
,
D.
,
Wiechetek
,
Ł.
,
Cetin
,
F.
and
Basim
,
H.N.
(
2022
), “
Cyber security awareness, knowledge and behavior: a comparative study
”,
Journal of Computer Information Systems
, Vol.
62
No.
1
, pp.
82
-
97
, doi: .
Licensed re-use rights only

or Create an Account

Close Modal
Close Modal