FAMILY MEMBER'S AWARENESS OF CYBER-SECURITY CONCEPTS AND ITS CORRELATION WITH THE PRECAUTIONARY PROCEDURES TAKEN AGAINST CYBER-ATTACKS DURING THE CORONAVIRUS PANDEMIC

This research aimed to explore the correlation between family members' awareness of cybersecurity concepts and the precautionary procedures taken against cyberattacks during the Coronavirus pandemic. A descriptive-analytical method was used. Also, a questionnaire was conducted to assess the correlation between family members' awareness of cybersecurity concepts and the precautionary procedure taken against cyberattacks during the Corona pandemic. The study sample consisted of 215 family members, males, females, employed and non-employed, students of different ages and educational levels. The results revealed a significant correlation between family member's awareness of cybersecurity concepts and the precautionary procedures taken against cyberattacks during the Corona pandemic. Besides, a significant difference (p ≤ 0.05) in the family member's awareness level of the cybersecurity concepts, with some demographic variables (gender, employment status, age, education level, and average family income). Also, there was a significant difference (p ≤ 0.05) in the preventive procedures taken by family members to protect themselves from cyberattacks with the study variables (gender, employment status, age, education level, and average family income).


INTRODUCTION
The unprecedented increase in internet usage during the Coronavirus pandemic has never been witnessed before. Most family members have been using the internet a lot more to perform their jobs, attend educational classes, or for social purposes like reaching out to their acquaintances and friends. Studies published by the Ministry of Communication and the National Communication Institution (2020) have shown a significant increase in internet consumption among citizens reaching (89%) during the pandemic. Results indicated that there had been an increase of (376%) in educational sites, (131%) in internet sites, and (151%) increase in the usage of social media platforms such as Facebook. This explains why "personal internet users are increasingly exposed to security threats while using their home PC systems" [1]. "These personal internet users are becoming more vulnerable to security threats due to the use of information communication technologies" [1][2][3]. "In our technology and the information-infused world, cyberspace is an integral part of modern-day society. In both personal and professional contexts, cyber-space is a highly effective tool in, and enabler of, most people's daily digitally transposed activities". There is no pretension whatever that empowering proliferation of devices and information. Today the technology is far more available compare to yesterday and less than tomorrow [4][5] [6].
The ease usage of technology with the elevated demand for online connectivity (in education, tourism, retail, and even autonomous vehicles) has developed internet usage opportunities globally. Several uses include utilizing search engines to find desired content, reading digital newspapers, surfing the web, using social media, assisting recommender systems in decision support tools, e t c . However, the internet consumption bolster by information technology improvements increases dramatically [5], the information technology has elevated intensely in the past decade, with huge global internet consumption rates through individuals and organizations, ranging from academic and government to industrial sectors [6][7] [8].
Governments can also adopt numerous means to spread cybersecurity awareness among family members by adopting effective means of communication with them; such as creating websites or pages on the internet, text messages, short films on YouTube, interactive games, television programs, educational advertisements using various advertising media platforms, holding conferences, courses and lectures in universities and schools, distributing brochures [9] [10]. Including a description of the forms and types of crimes and dangers, and the concept of cybersecurity and its role in protecting family members and society from such attacks, and the procedures that individuals must follow to protect themselves and their families, and urges them to inform them of cybercrimes and not cover up the perpetrators by not reporting them [9][10] [11].
Therefore, the researcher points out the importance of cybersecurity awareness between family members represented in the culture and etiquette of dealing with these technologies to achieve optimal results. It should also be their first defense line to protect themselves from cyberattacks, leaking their personal information and data, including the precautionary measures to protect all devices such as computers, mobile phones, and any smart device appliance from any possible cyberthreat.
The Norton Foundation for Studies indicated that crimes and cyberattacks in (2016) included (48%) of the total world population compared to (69%) in (2020), an increase of (21%), as a result of the steady rise in internet use in light of the Corona pandemic. "Kids and teens have embraced the digital world with great intensity, spending as many as eight hours a day online by some estimates" [12][13] [14] [15]. This emphasizes the urgent need for a qualitative shift in the mindset and thinking of technology users among family members to encourage them to take the procedural and precautionary measures necessary to secure their information and sensitive personal data from electronic attacks. It was discovered that (33%) of cybercrimes were aimed at businesses, while (77%) were directed at individuals [16] [17].
Accordingly, the current research aims to study the awareness of cybersecurity concepts among family members to spread the culture of cybersecurity among community members to curb the increase in cybercrimes during the pandemic. Based on the related studies, we can consider these hypotheses for out study: 1. There are statistically significant differences between the awareness level of family members of cybersecurity concepts and the precautionary measures they take towards protecting cyberattacks during the pandemic.
2. There are statistically significant differences at (p ≤ 0.05) in the level of awareness between family members of cybersecurity concepts due to personal variables (gender, employment status, age, educational level, and average household income).

RESEARCH METHODOLOGY
The research follows the descriptive-analytical method.

RESEARCH TOOLS
A questionnaire was used to assess thje level of cybersecurity awareness among family members and the relationship between that level of awareness and the precautionary measures taken to protect against cybercrime during the pandemic. The questionnaire contains two sections; the first one was to identify the research study sample variables (gender, age, educational level, average household income). Simultaneously, the second section was set to measure family members' awareness level with cybersecurity concepts and its correlation with the precautionary measures taken towards protection from cyberattacks during the pandemic.

RESEARCH LIMITATIONS
Objective limitations: The awareness level of family members of cybersecurity concepts and its correlation with the precautionary measures taken towards protecting from cyberattacks and social engineering during the pandemic.
Human limitations: The research study sample consisted of (215) family members, employed and nonemployed, males and females, students of different ages, educational levels, and lastly, different household incomes.

RESEARCH PROCEDURES
The researcher followed the descriptive-analytical method that studied the discussed phenomenon as it is in real life. Besides, accurately describing and clarifying its characteristics by collecting information, analyzing and interpreting it to reach conclusions that contributed to understanding the essence. This was achieved by analyzing the phenomenon or problem to make concrete generalizations from which the analysis would enhance knowledge and understanding of the phenomenon.

QUESTIONNAIRE CONTENT VALIDITY
This refers to the questionnaire's ability to collect the requisite data and generate the desired results.

APPARENT CONTENT VALIDITY
The method of apparent content validity was used to ensure the questionnaire's validity and suitability for research purposes. This is done by presenting it to a team of six specialized academic arbitrators from King Abdul-Aziz's faculty members, and Taibah's University majored in information technology and cybersecurity. Who also have excellent knowledge and interest in the subject of this research. They were asked to assess and provide feedback regarding the validity and coherence of the questionnaire and its suitability to measure what it was set for and make the necessary amendments, whether by deleting, adding, or reformulating. The questionnaire has been amended and modified adhering to the arbitrators with the below adjustments: First section amendments: questions number (13 & 21) have been removed, rephrased questions number (2, 10 17, 24 & 29), and merged questions number (9 with 13).
Results were scored as: Responses for the first section were scored as the following: (1) for questions to which the answer is "no", and (2) for questions to which the answer is "yes" for questions of a positive nature. In contrast, the score (2) is given to the answer "no", and the score (1) to answers "yes" to questions of a negative nature.
While the responses for the second section were scored as the following: (1) for questions to which the answer is "rarely", (2) for questions to which the answer is "sometimes", and (3) for questions to which the answer is "always" for questions of a positive nature. In contrast, the score of (3) is given to the answer "rarely", (2) for the answer "sometimes", and (1) for the answer "always" to questions of a negative nature.
The internal content validity method was applied to each section's total scores and the total score of the whole questionnaire to validate it.

INTERNAL CONTENT VALIDITY
Internal content validity means how each statement/question of the questionnaire is consistent and coherent with the section to which they belong. Accordingly, to validate the questionnaire, the correlation coefficients were calculated between each statement/question's scores and the section's total score to which they belong. The following results validate the internal content of the study tool: The first section of the study tool consisted of (21) statements/questions. To ensure the internal content validity of these statements and how they presented the section of which they belong, the correlation coefficients between each statement/question and the section's total scores were calculated as shown in  (1) that all statements/questions on the first section are correlated statistically at a level of significance of (0.05) with the total score of the section, with the exception for statement numbers (4, 5, 6 & 21). Correlation coefficients for the rest of the statements ranged between (0.309 and 0.513), indicating the existence of internal content validity and consistency between the statements/questions of the first section, which validate the data collected from the study sample in this regard.

CONTENT VALIDITY OF THE STATEMENTS/QUESTIONS OF THE SECOND SECTION
The second section of the study tool consisted of (38) statements/questions and to ensure the content validity of these statements/questions and how they presented the section to which they belong. The correlation coefficients between each statement/question and the section's total scores were calculated as shown in Table (2).  (2) that all statements/questions on the second section are correlated statistically at a level of significance of (0.05) with the total score of the section, with the exception for statement number (35), which has been excluded. Correlation coefficients for the rest of the statements ranged between (0.136 and 0.592), indicating the existence of internal content validity and consistency between the statements/questions of the second section, which validate the data collected from the study sample in this regard.

CONSTRUCTIVE VALIDITY
Constructive validity is one of the validity study tools, and it is defined as "the degree to which a test measures what it claims, or purports to be measuring." Table (3) showed the results of the constructive validity of each section of the questionnaire.

STUDY TOOL STABILITY
The study tools' stability has been achieved by applying both (Cronbach's Alpha) and (Split -Half) formulas. Table (4) showed the stability of the study tool for both methods. It is evident from Table (4) that (Cronbach's Alpha) coefficient value for the first section's statements/questions representing the level of awareness of family members of cybersecurity concepts is (0.605), while the value of the (split-half) coefficient is (0.550). Whereas the second section representing the precautionary measures taken towards the protection from cyberattacks and social engineering (Cronbach's Alpha) coefficient value is (0.819) and of a (0.828) for the (split-half) coefficient value, indicating the validation of the data collected from the study sample in this regard.

STATISTICAL METHODS USED
The Social Statistical Package (SPSS ver. 21) was used for data processing with the necessary statistical methods to fulfill the study's aims. These methods were as follows: Frequencies and Percentages: used to analyze personal and business data of the study sample. Mean: used in substantive response extraction, strength discriminatory clauses. As well as to find means for computational research samples.
Standard Deviation: to identify the extent of the deviation of the responses of the study sample for each paragraph/statement from its mean. The more its value approaches zero, the reactions are concentrated, and their dispersion decreases.
Cronbach's Alpha and Split Half: to measure the stability of the study tool and data reliability. Pearson Correlation Coefficient: to measure the internal content validity of the study, and to verify the correlation between family members awareness level of the concepts of cybersecurity and the precautions they take to protect themselves from cyberattacks & social engineering.
One Sample T-test: to verify the existence of statistically significant differences in the mean of the average responses of the study sample for each statement/question of the questionnaire, and the total score for each section.
T-test for two independent samples: to verify the existence of statistically significant differences in the responses of the study sample due to personal variables.
One-way ANOVA: to verify the existence of statistically significant differences in the responses of the study sample due to personal variables.

RESULTS AND DISCUSSION
The study sample consisted of (215) family members, residents of Makkah Al-Mukarramah region (Jeddah -Makkah Al-Mukarramah -Taif), where the study relied on the simple random sampling (SRS) method. At the same time, the questionnaire was conducted online. Table (5) showed the characteristics of the study sample according to initial data: Table (5) showed the research study sample's distribution according to the study variables, which included (gender, employment status, age, educational level, and average household income). The majority of the study sample were females, with only (22.3%) males. Most of the study sample are employed with a percentage of (74.4%) and only (9.8%) were students. And as for the age variable, it is noted that (14.4%) their ages ranged between (20-30) years, (30.2%) their ages ranged between (31-40) years, (31.2%) their ages ranged between (41-50) years, (15.8%) their ages ranged between (51-60) years, and only (7.9%) are over (60) years old.
As for the educational level, it is noted that most of the study sample with a percentage of (49.8%) had a postgraduate degree, followed by a very slight difference for college degree holders where their percentage reached (47%). The percentage for secondary education or its equivalent among the study sample decreased to (28%). And as for the average household income (50.2%), their household income exceeds (10,000) SR, followed by (30.2%) for households with an income ranging between (7000:10,000) SR, and (16.7%) their household income goes between (3000:7000) SR. In comparison (28%) their household income is less than (3000) SR.
First hypothesis: "There are statistically significant differences between family members' awareness level of cybersecurity concepts and the precautionary measures taken towards the protection from cyberattacks during the Corona pandemic." To test this hypothesis's validity, the researcher used the Pearson correlation coefficient formula to disclose a statistically significant correlation between family members' awareness level of cybersecurity concepts and the precautionary measures they take to protect themselves from cyberattacks and social engineering. This is evident from the following table: Table 6.  Table (6) showed a correlation between family members' awareness of cybersecurity concepts and the precautionary measures they take to protect themselves from cyberattacks, as the values were statistically significant at a significance level (0.001). This indicates the validity of the hypothesis with an apparent correlation between the two halves of the study. According to the researcher's point of view, those results affirm the need to increase the level of awareness and knowledge of cybersecurity between families and individuals; this will prompt the government to raise their citizen's level of understanding by sharing the cybersecurity tips, broaden their knowledge of the concept and its efficient role in protecting individuals and institutions, using social media platforms which have proven itself to be the most efficient way of communication nowadays.

The correlation between family members' awareness level of cybersecurity concepts and the precautionary measures taken towards the protection from cyberattacks and social engineering during the Corona pandemic
Second hypothesis: "There are statistically significant differences at the level of significance of (p ≤ 0.05) between family member's awareness level of cybersecurity concepts and the precautionary measures taken towards the protection from cyberattacks during the Corona pandemic, due to the study sample personal variables which included (gender, employment status, age, educational level, and average household income)".
To verify the validity of the hypothesis, the researchers conducted the following statistical analyzes: Student-t-test for two independent samples to verify the existence of statistically significant differences in the awareness level of family members of cybersecurity concepts of the study sample due to gender differences as shown in Table (7). It is evident from Table (7) that there are no significant differences in the awareness level of family members of cybersecurity concepts due to the gender variable, as "t" value was (1.563), which is greater than the level of significance which is at (5%). This indicates no significant difference in the awareness level of family members of cybersecurity concepts due to the gender variable.
The (ANOVA) test method has been used to analyze the single-sample variance of two independent samples to show the statistically significant differences in the awareness level of family members of cybersecurity concepts due to the employment status variable (employed, non-employed, student). Results are shown in Table ( It is evident from Table (8) that no significant differences in the awareness level of family members of cybersecurity concepts was found due to the employment status variable, as "F" value was greater than the level of significance at level (5%). This indicates no significant differences in the awareness level of family members of cybersecurity concepts due to the employment status variable.
The (ANOVA) test method has been used to analyze the single-sample variance of two independent samples to show the statistically significant differences in the awareness level of family members of cybersecurity concepts due to the age variable. The results are shown in Table ( It is evident from Table (9) that there are no significant differences in the awareness level of family members of cybersecurity concepts due to the age variable, as "F" value was (0.059), which is greater than the level of significance which is at (5%). This indicates no significant difference in the awareness level of family members of cybersecurity concepts due to the gender variable.
The (ANOVA) test method has been used to analyze the single-sample variance of two independent samples to show the statistically significant differences in the awareness level of family members of cybersecurity concepts due to the educational level variable. The results are shown in Table ( (10) that there is a significant difference in the awareness level of family members of cybersecurity concepts due to the educational level variable, as "F" value was (0.026), which is less than the level of significance at (5%). This indicates a significant difference in family members' awareness level of cybersecurity concepts due to gender.
The (ANOVA) test method has been used to analyze the single-sample variance of two independent samples to show the statistically significant differences in the awareness level of family members of cybersecurity concepts due to the average household income variable. The results are shown in Table ( It is evident from Table (11) that there is a significant difference in the awareness level of family members of cybersecurity concepts due to the average household income variable, as "F" value was (0.001), which is less than the level of significance at (5%). This indicates a significant difference in the awareness level of family members of cybersecurity concepts due to the average household income variable.

CONCLUSION
Based on the results obtained, it can be concluded that: 1-The concerned authorities' cooperation plays a crucial role in educating family members about new cybersecurity concepts, communication, and information technology. 2-Disseminating cybersecurity tips through the most effective means of communication to educate and train individuals to deal with cyberattacks in all of their forms and types. 3-Training family members on security measures, procedures and precautions that must be followed to protect themselves and their families from cyberattacks to reduce cyber-hacking risks due to the lack of awareness and knowledge of cybersecurity. 4-Specially designed educational awareness programs for high schoolers and college students to educate them about cybersecurity and use social media platforms safely. 5-Educating the youth and younger generations on how to deal with the strangers they face on the web through social media platforms or gaming applications. 6-Embed different cybersecurity concepts in the educational curriculums to suit all stages and grades. 7-Disseminating the method of reporting cyberattacks through all social media platforms to be easily reached by individuals.