Perceptions of cybersecurity challenges and the need for effective measures
DOI:
https://doi.org/10.71159/icemit2523RKeywords:
cybersecurity, age gap, CroatiaAbstract
This paper examines individual perceptions of cybersecurity risks, levels of awareness, and trust in protective measures, with particular attention to generational differences. A sample of 384 respondents from diverse demographics in Croatia completed a structured questionnaire. Descriptive and inferential (ANOVA) analyses were conducted to identify patterns in perceptions across age groups, employment status, and digital experience. The findings reveal a significant age gap, with younger respondents displaying more proactive attitudes but also greater scepticism towards institutional safeguards. The results underscore the urgent need for tailored educational interventions, institutional policy support, and cross-generational mentoring to build a resilient cybersecurity culture.
References
Al-Hawawreh, M., Aljuhani, A., & Jararweh, Y. (2023). Chatgpt for cybersecurity: practical applications, challenges, and future directions. Cluster Computing, 26(6), 3421-3436. https://doi.org/10.1007/s10586-023-04124-5
Anwar, M., He, W., Ash, I., Yuan, X., Li, L., & Xu, L. (2017). Gender difference and employees' cybersecurity behaviors. Computers in Human Behavior, 69, 437-443. http://dx.doi.org/10.1016/j.chb.2016.12.040
Chaudhary, H., Detroja, A., Prajapati, P., & Shah, P. (2020, December). A review of various challenges in cybersecurity using artificial intelligence. In 2020 3rd international conference on intelligent sustainable systems (ICISS) (pp. 829-836). IEEE. https://doi.org/10.1109/ICISS49785.2020.9316003
Dhungana, R. K., Gurung Dr, L., & Poudyal, H. (2023). Cybersecurity Challenges and Awareness of the Multi-Generational Learners in Nepal. Journal of Cybersecurity Education, Research and Practice, 2023(2), 5. https://doi.org/10.32727/8.2023.17
Gerdenitsch, C., Wurhofer, D., & Tscheligi, M. (2023). Working conditions and cybersecurity: Time pressure, autonomy and threat appraisal shaping employees’ security behavior. Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 17(4). https://doi.org/10.5817/CP2023-4-7
Gomez, M. A., & Shandler, R. (2024). Trust at risk: The effect of proximity to cyberattacks. Journal of Global Security Studies, 9(2), ogae002. https://doi.org/10.1093/jogss/ogae002
Okoye, C. C., Nwankwo, E. E., Usman, F. O., Mhlongo, N. Z., Odeyemi, O., & Ike, C. U. (2024). Securing financial data storage: A review of cybersecurity challenges and solutions. International Journal of Science and Research Archive, 11(1), 1968-1983. https://doi.org/10.30574/ijsra.2024.11.1.0267
Ricci, J., Breitinger, F., & Baggili, I. (2019). Survey results on adults and cybersecurity education. Education and Information Technologies, 24(1), 231-249. http://dx.doi.org/10.1007/s10639-018-9765-8
Stanfield, M. (2024). Mobile Technologies at Risk: A Literature Review on the Evolving Challenges and Solutions in Mobile Technology Security. Buletin Stiintific, 29(1). https://doi.org/10.2478/bsaft-2024-0016
Downloads
Published
How to Cite
Conference Proceedings Volume
Section
License
Copyright (c) 2025 International Scientific Conference on Economics, Management and Information Technologies

This work is licensed under a Creative Commons Attribution 4.0 International License.