CAUSAL FACTORS INFLUENCING THE PREVENTION CYBERCRIMES AMONG PERSONNEL IN THE ROYAL THAI POLICE
Main Article Content
Abstract
This research article aims to study the factors influencing the prevention of technology related crimes by personnel in the Royal Thai Police. It examines the causal relationship model of technology crime prevention among personnel in the Royal Thai Police with empirical data and explores the impact of factors influencing the prevention of technology-related crimes by personnel in the Royal Thai Police. This is a quantitative research study. The sample group consists of 500 personnel working in the Technology Crime Investigation Division of the Royal Thai Police, selected using proportional random sampling. The research tool is a questionnaire with a reliability value greater than 0.80. Data was collected using the questionnaire. The statistics used in the research and data analysis include mean, standard deviation, and structural equation modeling analysis.
The research results found that all variables influencing the prevention of technology-related crimes by personnel in the Royal Thai Police were at a agree level, with the variable “intention to use technology” having the highest mean. The causal relationship model of technology crime prevention by personnel in the Royal Thai Police showed that the measurement model confirmed the subcomponents of all seven variables and was consistent with empirical data. The structural model also aligned with the empirical data. The causal factors with the most significant influence on the prevention of technology-related crimes include the intention to use technology, perceived ease of use of technology, self-efficacy, subjective Norm, trust, and perceived usefulness of technology, respectively. These factors were statistically significant at the .01 level. The six variables together explained positive technology crime prevention (R2) at 0.89.
Article Details
References
ชฎาภรณ์ สิงห์แก้ว และคณะ. (2564). บทบาทภาครัฐในการป้องกันอาชญากรรมไซเบอร์เพื่อความมั่นคงทางเศรษฐกิจและสังคม. วารสารวิชาการมหาวิทยาลัยการจัดการและเทคโนโลยีอีสเทิร์น, 18(1), 539-552.
สำนักงานสถิติแห่งชาติ. (2567). สรุปผลที่สำคัญการสำรวจการมีการใช้เทคโนโลยีสารสนเทศและการสื่อสารในครัวเรือน พ.ศ. 2566. กรุงเทพมหานคร: สำนักงานสถิติแห่งชาติ.
Alanazi, M. et al. (2022). Exploring the factors that influence the cybersecurity behaviors of young adults. Computers in Human Behavior, 136(2022), 107376. https://doi.org/10.1016/j.chb.2022.107376.
Alifiardi, A. A. (2019). The influence of perceived usefulness, ease of use, trust, and risk towards Gojek actual usage with behavioral intention to use as intervening variable. Jurnal Ilmiah Mahasiswa FEB, 7(2), 1-21.
Alshurideh, M. T. et al. (2021). The moderation effect of gender on accepting electronic payment technology: a study on United Arab Emirates consumers. Review of International Business and Strategy, 31(3), 375-396.
Ayanwale, M. A. et al. (2023). A Structural equation approach and modelling of pre-service teachers' perspectives of cybersecurity education. Education and Information Technologies, 29(3), 3699-3727.
Best, J. W. & Kahn, J. V. (2014). Research in Education. (10th ed.). Harlow England: Pearson Education.
Choudhury, A. & Shamszare, H. (2023). Investigating the impact of user trust on the adoption and use of ChatGPT: Survey analysis. Journal of Medical Internet Research, 25(2023), e47184. https://doi.org/10.2196/47184.
Comrey, A. L. & Lee, H. B. (1992). A first course in factor analysis. Hillsdale, NJ: Lawrence Erlbaum.
Davis, F. D. et al. (1989). User acceptance of computer technology: A comparison of two theoretical models. Management Science, 35(8), 982-1003.
De Kimpe, L. et al. (2022). What we think we know about cybersecurity: an investigation of the relationship between perceived knowledge, internet trust, and protection motivation in a cybercrime context. Behaviour and Information Technology, 41(8), 1796-1808.
Eisinga, R. et al. (2012). The reliability of a two-item scale: Pearson, Cronbach or Spearman-Brown. International Journal of Public Health, 58(4), 637-642.
Hair, J. F. et al. (2019). Multivariate Data Analysis. (8th ed.). Hamphire: Cengage.
Hansen, J. M. et al. (2018). Risk, trust, and the interaction of perceived ease of use and behavioral control in predicting consumers’ use of social media for transactions. Computers in Human Behavior, 80(2018), 197-206.
Hassan, S. et al. (2024). Staying one step ahead: Exploring protection motivation theory to combat cyber-fraud among e-services users. Procedia Computer Science, 234(2024), 1364-137.
Melović, B. et al. (2021). Determinants of millennials’ behavior in online shopping-implications on consumers’ satisfaction and e-business development. Technology in Society, 65(2021), 101561.https://doi.org/10.1016/j.techsoc.2021.101561.
Shaw, N. & Sergueeva, K. (2019). The non-monetary benefits of mobile commerce: extending UTAUT2 with perceived value. International Journal of Information Management, 45(2019), 44-55.
Turner, R. C. & Carlson, L. (2003). Indexes of item-objective congruence for multidimensional items. International Journal of Testing, 3(2), 163-171.
Usman, O. et al. (2021). The effect of computer self-efficacy and subjective norm on the perceived usefulness, perceived ease of use and behavioural intention to use technology. IBIMA Business Review, 2020(2020), 753259. https://doi.org/10.5171/2020.753259.