Skip to main content

Toward Understanding the Impact of Demographic Factors on Cybersecurity Awareness in the Moroccan Context

  • Conference paper
  • First Online:
Artificial Intelligence and Green Computing (ICAIGC 2023)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 806))

  • 94 Accesses

Abstract

The main aim of this study is to assess the level of cybersecurity awareness (CA) among employees in the public sector of Morocco and further examine the impact of various demographic factors on this awareness. To achieve this, a quantitative research method was employed, utilizing an online survey to collect and analyze data from 244 public sector employees. In the present study, three hypotheses were formulated and tested using different statistical methods to determine whether there are any relationships between CA in terms of knowledge and behavior and demographic factors (e.g., gender, age, and educational level). The results revealed a statistically significant correlation between gender and CA, while no significant impact of age or educational level on CA was observed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 179.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Nechba, Z.B., Boujibar, A., Abdelkamel, A.: Good governance and digitalization in morocco: state of the art. IJBTSR Int. J. Bus. Technol. Stud. Res. 4(1), 9 (2022)

    Google Scholar 

  2. Parsons, K., Calic, D., Pattinson, M., Butavicius, M., McCormac, A., Zwaans, T.: The human aspects of information security questionnaire (hais-q): two further validation studies. Comput. Secur. 66, 40–51 (2017)

    Article  Google Scholar 

  3. Alotaibi, M., Alfehaid, W.: Information security awareness: a review of methods, challenges and solutions. In: Proceedings of the ICITST-WorldCIS-WCST-WCICSS-2018, Cambridge, UK, pp. 10–13 (2018)

    Google Scholar 

  4. Hadlington, L.: Employees attitudes towards cyber security and risky online behaviours: an empirical assessment in the United Kingdom (2018)

    Google Scholar 

  5. Yan, Z., Robertson, T., Yan, R., Park, S.Y., Bordoff, S., Chen, Q., Sprissler, E.: Finding the weakest links in the weakest link: how well do undergraduate students make cybersecurity judgment? Comput. Hum. Behav. 84, 375–382 (2018)

    Article  Google Scholar 

  6. Gratian, M., Bandi, S., Cukier, M., Dykstra, J., Ginther, A.: Correlating human traits and cyber security behavior intentions. comput. Secur. 73, 345–358 (2018)

    Google Scholar 

  7. Aldawood, H., Skinner, G.: Reviewing cyber security social engineering training and awareness programs-pitfalls and ongoing issues. Fut. Int. 11(3), 73 (2019)

    Google Scholar 

  8. Sheng, S., Holbrook, M., Kumaraguru, P., Cranor, L.F., Downs, J.: Who falls for phish? A demographic analysis of phishing susceptibility and effectiveness of interventions. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 373–382 (2010)

    Google Scholar 

  9. Darwish, A., El Zarka, A., Aloul, F.: Towards understanding phishing victims’ profile. In: 2012 International Conference on Computer Systems and Industrial Informatics, pp. 1–5 (2012)

    Google Scholar 

  10. Farooq, A., Isoaho, J., Virtanen, S., Isoaho, J.: Information security awareness in educational institution: an analysis of students’ individual factors. In: 2015 IEEE Trustcom/BigDataSE/ISPA, vol. 1, pp. 352–359 (2015)

    Google Scholar 

  11. Whitty, M., Doodson, J., Creese, S., Hodges, D.: Individual differences in cyber security behaviors: an examination of who is sharing passwords. Cyberpsychol. Behav. Soc. Netw. 18(1), 3–7 (2015)

    Article  Google Scholar 

  12. Anwar, M., He, W., Ash, I., Yuan, X., Li, L., Xu, L.: Gender difference and employees’ cybersecurity behaviors. Comput. Hum. Behav. 69, 437–443 (2017)

    Article  Google Scholar 

  13. Ameen, N., Tarhini, A., Shah, M.H., Madichie, N.O.: Employees’ behavioural intention to smartphone security: a gender-based, cross-national study. Comput. Hum. Behav. 104, 106184 (2020)

    Google Scholar 

  14. Chua, H.N., Wong, S.F., Low, Y.C., Chang, Y.: Impact of employees’ demographic characteristics on the awareness and compliance of information security policy in organizations. Telematics Inform. 35(6), 1770–1780 (2018)

    Article  Google Scholar 

  15. Pratama, A.R., Firmansyah, F.M.: Until you have something to lose! loss aversion and two-factor authentication adoption. Appl. Comput. Inf. (ahead-of-print) (2021)

    Google Scholar 

  16. Bank, W.: Labor force, female www.data.worldbank.org/indicator/SL.TLF.TOTL.FE.ZS?locations=MA (2021)

Download references

Acknowledgements

The authors would like to thank all employees for their support and valuable contribution to our study.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohamed Zaoui .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zaoui, M., Sadqi, Y. (2023). Toward Understanding the Impact of Demographic Factors on Cybersecurity Awareness in the Moroccan Context. In: Idrissi, N., Hair, A., Lazaar, M., Saadi, Y., Erritali, M., El Kafhali, S. (eds) Artificial Intelligence and Green Computing. ICAIGC 2023. Lecture Notes in Networks and Systems, vol 806. Springer, Cham. https://doi.org/10.1007/978-3-031-46584-0_16

Download citation

Publish with us

Policies and ethics