This is an outdated version published on 30-09-2024. Read the most recent version.

Impacts of Cybersecurity Threats on Construction Stakeholders in Malaysia Amidst Industrial Revolution 4.0

Authors

  • Ramli Isa Studies of Quantity Surveying, College of Built Environment, Universiti Teknologi MARA, 40450 Shah Alam, Selangor
  • Har Einur Azrin Baharuddin Studies of Quantity Surveying, College of Built Environment, Universiti Teknologi MARA, 40450 Shah Alam, Selangor
  • Airul Faizal Othman Public Works Department (PWD), Kuala Lumpur, 50350, Malaysia

DOI:

https://doi.org/10.24191/bej.v21iSpecial%20Issue.2445

Keywords:

Industrial Revolution 4.0 (IR 4.0), Cybersecurity, Threats , Stakeholders, Construction

Abstract

Cybersecurity is one of the elements of IR 4.0 which is created to provide security and protect digital information which includes construction industry from expose to cybersecurity threat. Cyberthreats happen to any digital device and working in digitalisation environment, files will be shared online, everyone can access those files if it does not provide a security password to open it. There are ways to overcome and minimise cybersecurity threats which need to be explored to avoid threats. Thus, the aim is to explore the impacts of the cybersecurity threats among stakeholders in construction in IR 4.0. The objectives are to identify the potential threats of cybersecurity on construction stakeholders in Malaysia, followed by recommendation ways to improve the implementation of cybersecurity usage among stakeholders and minimise threats incidents for safety purposes for construction stakeholders’ company. The data obtained using quantitative method where the random sampling survey conducted through distribution of questionnaire to stakeholders in construction. Findings show that, cybersecurity systems in construction are not very deep because currently the construction sector is not a major contributor in cyber security intrusions and threats. Stakeholders in construction implement cybersecurity measures such as use of anti-virus, regular software update etc., which most of these are related to their task where all work is now completed using digitalised gadget. In terms of ways to improve the implementation of cybersecurity usage among stakeholders and minimise threats incidents, it can be concluded that individual approach is the most effective way medium to overcome this problem.

References

Al Zaidy, A. (2014). What are Cyber-Threats, Cyber-Attacks and how to defend our Systems. https://doi.org/10.13140/RG.2.2.30414.59208

Borky, J. M., & Bradley, T. H. (2019). Protecting Information with Cybersecurity. In Effective Model-Based Systems Engineering (pp. 345–404). Springer International Publishing. https://doi.org/10.1007/978-3-319-95669-5_10

De Bruijn, H., & Janssen, M. (2017). Building Cybersecurity Awareness: The need for evidence-based framing strategies. Government Information Quarterly, 34(1), 1–7. https://doi.org/10.1016/j.giq.2017.02.007

Farhat, V., Mccarthy, B., Raysman And R., & Canale, J. (2017). Cyber Attacks: Prevention and Proactive Responses", Practical Law, pp. 1-12, 2011. Retrived from: http://us.practicallaw.com/3-511-5848.

Jaafar, M. A., Husni, H., & Yusof, Y. (2018). IR 4.0 Readiness: Big Data Sources, Issues and Challenges. Journal of Social Science and Humanities, 1(3), 2600–9056. https://doi.org/10.26666/rmp.jssh.2018.3.5

Li, Y., & Liu, Q. (2021). A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments. Energy Reports, 7, 8176–8186. https://doi.org/10.1016/j.egyr.2021.08.126

Maalem Lahcen, R. A., Caulkins, B., Mohapatra, R., & Kumar, M. (2020). Review and insight on the behavioral aspects of cybersecurity. In Cybersecurity (Vol. 3, Issue 1). Springer Science and Business Media B.V. https://doi.org/10.1186/s42400-020-00050-w

Mantha, B. R. K., & De Soto, B. G. (2019). Cyber security challenges and vulnerability assessment in the construction industry. 29–37. https://doi.org/10.3311/ccc2019-005

National Cyber Security Centre. (2016). Common Cyber Attacks: reducing the impact. Retrieved from: https://www.ncsc.gov.uk/guidance/white-papers/common-cyber-attacks-reducing-impact

National Security Council. (2020). Malaysia Cyber Security Strategy 2020-2024. Retrieved from: https://asset.mkn.gov.my/wp-content/uploads/2020/10/MalaysiaCyberSecurityStrategy2020-2024.pdf

Parsola, J. (2022). Cybersecurity Risk Assessment and Management for Organizational Security. NeuroQuantology, 20(5), 5330. https://doi.org/10.48047/nq.2022.20.5.nq22815

Rossouw von Solms, & Johan Van Niekerk. (2013). From information security to cyber security. Computers & Security, 38, 97–102. https://doi.org/10.1016/j.cose.2013.04.004

Seemma, P. S., Nandhini, S., & Sowmiya, M. (2018). Overview of Cyber Security. IJARCCE, 7 (11), 125–128. https://doi.org/10.17148/ijarcce.2018.71127

WaterISAC, & Security Information Centre. (2016). 10 Basic Cybersecurity Measures: Best Practices to Reduce Exploitable Weaknesses and Attacks. https://www.waterisac.org

Downloads

Published

30-09-2024 — Updated on 30-09-2024

Versions

How to Cite

Isa, R., Baharuddin, H. E. A., & Othman, A. F. (2024). Impacts of Cybersecurity Threats on Construction Stakeholders in Malaysia Amidst Industrial Revolution 4.0. Built Environment Journal, 21(Special Issue). https://doi.org/10.24191/bej.v21iSpecial Issue.2445