Impacts of Cybersecurity Threats on Construction Stakeholders in Malaysia Amidst Industrial Revolution 4.0
DOI:
https://doi.org/10.24191/bej.v21iSpecial%20Issue.2445Keywords:
Industrial Revolution 4.0 (IR 4.0), Cybersecurity, Threats , Stakeholders, ConstructionAbstract
Cybersecurity is one of the elements of IR 4.0 which is created to provide security and protect digital information which includes construction industry from expose to cybersecurity threat. Cyberthreats happen to any digital device and working in digitalisation environment, files will be shared online, everyone can access those files if it does not provide a security password to open it. There are ways to overcome and minimise cybersecurity threats which need to be explored to avoid threats. Thus, the aim is to explore the impacts of the cybersecurity threats among stakeholders in construction in IR 4.0. The objectives are to identify the potential threats of cybersecurity on construction stakeholders in Malaysia, followed by recommendation ways to improve the implementation of cybersecurity usage among stakeholders and minimise threats incidents for safety purposes for construction stakeholders’ company. The data obtained using quantitative method where the random sampling survey conducted through distribution of questionnaire to stakeholders in construction. Findings show that, cybersecurity systems in construction are not very deep because currently the construction sector is not a major contributor in cyber security intrusions and threats. Stakeholders in construction implement cybersecurity measures such as use of anti-virus, regular software update etc., which most of these are related to their task where all work is now completed using digitalised gadget. In terms of ways to improve the implementation of cybersecurity usage among stakeholders and minimise threats incidents, it can be concluded that individual approach is the most effective way medium to overcome this problem.
References
Al Zaidy, A. (2014). What are Cyber-Threats, Cyber-Attacks and how to defend our Systems. https://doi.org/10.13140/RG.2.2.30414.59208
Borky, J. M., & Bradley, T. H. (2019). Protecting Information with Cybersecurity. In Effective Model-Based Systems Engineering (pp. 345–404). Springer International Publishing. https://doi.org/10.1007/978-3-319-95669-5_10
De Bruijn, H., & Janssen, M. (2017). Building Cybersecurity Awareness: The need for evidence-based framing strategies. Government Information Quarterly, 34(1), 1–7. https://doi.org/10.1016/j.giq.2017.02.007
Farhat, V., Mccarthy, B., Raysman And R., & Canale, J. (2017). Cyber Attacks: Prevention and Proactive Responses", Practical Law, pp. 1-12, 2011. Retrived from: http://us.practicallaw.com/3-511-5848.
Jaafar, M. A., Husni, H., & Yusof, Y. (2018). IR 4.0 Readiness: Big Data Sources, Issues and Challenges. Journal of Social Science and Humanities, 1(3), 2600–9056. https://doi.org/10.26666/rmp.jssh.2018.3.5
Li, Y., & Liu, Q. (2021). A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments. Energy Reports, 7, 8176–8186. https://doi.org/10.1016/j.egyr.2021.08.126
Maalem Lahcen, R. A., Caulkins, B., Mohapatra, R., & Kumar, M. (2020). Review and insight on the behavioral aspects of cybersecurity. In Cybersecurity (Vol. 3, Issue 1). Springer Science and Business Media B.V. https://doi.org/10.1186/s42400-020-00050-w
Mantha, B. R. K., & De Soto, B. G. (2019). Cyber security challenges and vulnerability assessment in the construction industry. 29–37. https://doi.org/10.3311/ccc2019-005
National Cyber Security Centre. (2016). Common Cyber Attacks: reducing the impact. Retrieved from: https://www.ncsc.gov.uk/guidance/white-papers/common-cyber-attacks-reducing-impact
National Security Council. (2020). Malaysia Cyber Security Strategy 2020-2024. Retrieved from: https://asset.mkn.gov.my/wp-content/uploads/2020/10/MalaysiaCyberSecurityStrategy2020-2024.pdf
Parsola, J. (2022). Cybersecurity Risk Assessment and Management for Organizational Security. NeuroQuantology, 20(5), 5330. https://doi.org/10.48047/nq.2022.20.5.nq22815
Rossouw von Solms, & Johan Van Niekerk. (2013). From information security to cyber security. Computers & Security, 38, 97–102. https://doi.org/10.1016/j.cose.2013.04.004
Seemma, P. S., Nandhini, S., & Sowmiya, M. (2018). Overview of Cyber Security. IJARCCE, 7 (11), 125–128. https://doi.org/10.17148/ijarcce.2018.71127
WaterISAC, & Security Information Centre. (2016). 10 Basic Cybersecurity Measures: Best Practices to Reduce Exploitable Weaknesses and Attacks. https://www.waterisac.org
Downloads
Published
Versions
- 30-09-2024 (3)
- 30-09-2024 (2)
- 30-09-2024 (1)
How to Cite
Issue
Section
License
Copyright (c) 2024 Har Einur Azrin Baharuddin, Ramli Isa, Airul Faizal Othman
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
CC BY-NC-ND 4.0 DEED
Attribution-NonCommercial-NoDerivs 4.0 International