An Investigation on Passengers’ Perceptions of Cybersecurity in the Airline Industry
Abstract
:1. Introduction
2. Methodology
2.1. Conceptualisation of Constructs
2.2. Questionnaire Design
2.3. Participants
2.4. Data Analysis
3. Empirical Results
3.1. Descriptive Analysis
3.2. Exploratory Factor Analysis
3.3. Difference Analysis
3.3.1. Gender and FFP
3.3.2. Occupation
3.3.3. Other Factors
3.4. Correlation Analysis
4. Discussion
4.1. Implication for Research
4.2. Implication for Practice
5. Conclusions, Limitations, and Future Work
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Appendix A
Constructs | Items and Coding | Questions |
---|---|---|
Personal Information1 (PI1) The meaning of personally identifiable information (PI1) | PI1.1 PI1.2 PI1.3 PI1.4 | While using airline services, I understand the meaning of personally identifiable information such as my name, address, phone number, credit card information, identity document, and airline travel history. I am comfortable sharing my personally identifiable information with the airline’s booking system. I believe that airlines only collect the personally identifiable information required for booking purposes. I understand the regulations that govern the collection and use of personally identifiable information by airline services. |
Personal Information2 (P12) Attention and protection of information protection (PI2) | PI2.1 PI2.2 PI2.3 PI2.4 PI2.5 PI2.6 PI2.7 | I am concerned about the privacy of personally identifiable information while using airline services. I feel uncomfortable when airlines use my personally identifiable information for marketing or promotional purposes. I feel uncomfortable with airlines sharing my personally identifiable information with third parties. I am concerned about a cybersecurity breach in the airline industry. I am concerned about cybercrime targeting the airline industry. I am concerned about the airline being hacked (by hackers). I am concerned about the cybersecurity of airlines during operations. |
Passengers’ Awareness of Airline Cybersecurity1 (PA1) —Self-judgment about the attention degree that airlines attach to cybersecurity | PA1.1 PA1.2 PA1.3 PA1.4 PA1.5 PA1.6 | I believe airlines view cybersecurity as a critical business issue that impacts their reputation and bottom line. I believe airlines have a strong culture of cybersecurity awareness and accountability. I believe that airlines have a clear and effective process for reporting and addressing cybersecurity incidents. I believe airlines communicate effectively with customers about potential cybersecurity risks. I believe airlines prioritise cybersecurity training for their employees. I believe that airlines stay up to date on the latest cybersecurity threats and technologies. I believe that airlines take customer feedback and complaints about cybersecurity seriously. |
Passengers’ Awareness of Airline Cybersecurity2—Expectations for Airline network Services (PA2) | PA2.1 PA2.2 PA2.3 | I would like airlines to provide stronger encryption and firewalls to improve the security of the wireless network service. I hope the airline can enhance its ability to resist hackers and prevent my devices from being hacked. I hope airlines can increase the security of their websites and avoid the spread of network viruses. |
Self-cognition and Response to Cybersecurity Threats (SC) Self-cognition and self-response | SC1.1 SC1.2 SC1.3 SC1.4 SC1.5 SC1.6 SC1.7 SC1.8 SC1.9 SC1.10 | I understand the potential consequences of a cybersecurity breach when using airline network services. I feel like I have a high chance of being exposed to cybersecurity threats. I trust airlines can protect my personal information when using their network services. I regularly take steps (such as changing passwords regularly) to protect my personal information when using airline network services. I would consider using airlines even after a cybersecurity breach in the airline industry. Not only passengers ourselves but airlines should require their third-party vendors to adhere to strict cybersecurity standards. I am willing to report suspicious activity or potential cybersecurity threats when using airline network services. I am willing to pay extra fees to ensure that airlines have strong cybersecurity measures in place. I believe that airlines should conduct regular vulnerability testing to identify potential cybersecurity threats. I believe that multi-factor authentication can be better to avoid cybersecurity threats. |
Category | Variable | Frequency | Percentage (%) |
---|---|---|---|
Gender | Male | 244 | 51.9 |
Female | 226 | 48.1 | |
Age | 18–25 | 98 | 20.9 |
26–30 | 163 | 34.7 | |
31–40 | 114 | 24.3 | |
41–50 | 57 | 12.1 | |
51–60 | 30 | 6.4 | |
>60 | 8 | 1.7 | |
Income (Monthly RMB) | <=3000 | 72 | 15.3 |
3001–5000 | 135 | 28.7 | |
5001–10,000 | 163 | 34.7 | |
10,001–15,000 | 56 | 11.9 | |
15,001–20,000 | 33 | 7 | |
>20,000 | 11 | 2.3 | |
Education | Senior high or lower | 109 | 23.2 |
Certificate/Diploma | 125 | 26.6 | |
Bachelor | 173 | 36.8 | |
Master or higher | 63 | 13.4 | |
Occupation | Student | 2 | 0.4 |
Business | 41 | 8.7 | |
Owner | 99 | 21.1 | |
Government sector | 30 | 6.4 | |
Private sector | 292 | 62.1 | |
Retired | 6 | 1.3 | |
Travel Frequency (a year) | |||
Travel Frequency (a year) | 0 | 1 | 0.2 |
1–4 | 276 | 58.7 | |
5–7 | 125 | 26.6 | |
8–10 | 60 | 12.8 | |
More than ten | 8 | 1.7 | |
Frequent Flyer Program (FFP) | Yes | 92 | 19.6 |
No | 378 | 80.4 | |
Main Purpose | Business trip | 118 | 25.1 |
Holiday | 181 | 38.5 | |
Visit friends and family | 75 | 16 | |
Study | 76 | 16.2 | |
Other | 20 | 4.3 | |
Class of Cabin | First class | 10 | 2.1 |
Business class | 18 | 3.8 | |
Premier economy | 173 | 36.8 | |
Economy class | 269 | 57.2 | |
Airlines | Three major airlines (Air China, China Eastern Airlines, and China Southern Airlines) | 248 | 52.8 |
Regional Airlines | 138 | 29.4 | |
Low-Cost Airlines | 75 | 16 | |
Others | 9 | 1.9 | |
Book Route | Airline’s official website or APP | 122 | 26 |
Third party apps (such as Ctrip) | 265 | 56.4 | |
Offline booking | 72 | 15.3 | |
Others | 11 | 2.3 | |
Whether you have used the Internet service provided by the airline? | Yes | 371 | 78.9 |
No | 99 | 21.1 | |
Have you heard of cybercrime or cybersecurity? | Yes | 395 | 84 |
No | 68 | 14.5 | |
Not sure | 7 | 1.5 | |
Have you been victim of cybercrime in the past? | Yes | 17 | 3.6 |
No | 453 | 96.4 | |
How well do you understand cybercrime/cybersecurity? | Not well at all | 7 | 1.5 |
Slightly well | 21 | 4.5 | |
Moderately well | 73 | 15.5 | |
Very well | 223 | 47.4 | |
Extremely well | 146 | 31.1 |
Construct | Item | Loadings (>0.5) | Cronbach’s Alpha (>0.7) | Composite Reliability (>0.7) | Average Variance Extracted (>0.5) |
---|---|---|---|---|---|
Personal Information1 (PI1) | PI1.1 | 0.784 | 0.83 | 0.85 | 0.59 |
PI1.2 | 0.77 | ||||
PI1.3 | 0.752 | ||||
PI1.4 | 0.768 | ||||
Personal Information2 (P12) | PI2.1 | 0.763 | 0.82 | 0.92 | 0.62 |
PI2.2 | 0.791 | ||||
PI2.3 | 0.771 | ||||
PI2.4 | 0.768 | ||||
PI2.5 | 0.815 | ||||
PI2.6 | 0.8 | ||||
PI2.7 | 0.8 | ||||
Passengers’ Awareness of Airline Cybersecurity1 | PA1.1 | 0.757 | 0.9 | 0.91 | 0.58 |
(PA1) | PA1.2 | 0.729 | |||
PA1.3 | 0.762 | ||||
PA1.4 | 0.776 | ||||
PA1.5 | 0.744 | ||||
PA1.6 | 0.768 | ||||
PA1.7 | 0.782 | ||||
Passengers’ Awareness of Airline Cybersecurity2 | PA2.1 | 0.837 | 0.85 | 0.86 | 0.68 |
(PA2) | PA2.2 | 0.829 | |||
PA2.3 | 0.803 | ||||
Self-cognition and Response to Cybersecurity Threats | SC1.1 | 0.727 | 0.92 | 0.91 | 0.52 |
(SC) | SC1.2 | 0.725 | |||
SC1.3 | 0.714 | ||||
SC1.4 | 0.698 | ||||
SC1.5 | 0.729 | ||||
SC1.6 | 0.796 | ||||
SC1.7 | 0.732 | ||||
SC1.8 | 0.671 | ||||
SC1.9 | 0.654 | ||||
SC1.10 | 0.736 |
Constructs | PI1 | PI2 | PA1 | PA2 | SC |
---|---|---|---|---|---|
PI1 | 0.77 | ||||
PI2 | 0.30 | 0.79 | |||
PA1 | 0.25 | 0.24 | 0.76 | ||
PA2 | 0.29 | 0.17 | 0.22 | 0.82 | |
SC | 0.45 | −0.43 | 0.49 | 0.48 | 0.72 |
References
- Pereira, B.A.; Lohmann, G.; Houghton, L. Innovation and value creation in the context of aviation: A Systematic Literature Review. J. Air Transp. Manag. 2021, 94, 102076. [Google Scholar] [CrossRef]
- Scott, B.I.; Trimarchi, A. The Digital Aviation Industry: A Balancing Act Between Cybersecurity and European Consumer Protection. Air Space Law 2017, 42, 443–463. [Google Scholar]
- Filinovych, V.; Hu, Z. Aviation and the Cybersecurity Threats. In Proceedings of the International Conference on Business, Accounting, Management, Banking, Economic Security and Legal Regulation Research (BAMBEL 2021), Kyiv, Ukraine, 26–27 August 2021; pp. 120–126. [Google Scholar]
- Khan, S.K.; Shiwakoti, N.; Diro, A.; Molla, A.; Gondal, I.; Warren, M. Space cybersecurity challenges, mitigation techniques, anticipated readiness, and future directions. Int. J. Crit. Infrastruct. Prot. 2024, 47, 100724. [Google Scholar] [CrossRef]
- Posey, C.; Bennett, R.J.; Roberts, T.L. Understanding the mindset of the abusive insider: An examination of insiders’ causal reasoning following internal security changes. Comput. Secur. 2011, 30, 486–497. [Google Scholar] [CrossRef]
- He, W. A survey of security risks of mobile social media through blog mining and an extensive literature search. Inf. Manag. Comput. Secur. 2013, 21, 381–400. [Google Scholar] [CrossRef]
- Suo, D.; Siegel, J.E.; Sarma, S.E. Merging safety and cybersecurity analysis in product design. IET Intell. Transp. Syst. 2018, 12, 1103–1109. [Google Scholar] [CrossRef]
- Khan, S.K.; Shiwakoti, N.; Stasinopoulos, P.; Chen, Y.; Warren, M. The impact of perceived cyber-risks on automated vehicle acceptance: Insights from a survey of participants from the United States, the United Kingdom, New Zealand, and Australia. Transp. Policy 2024, 152, 87–101. [Google Scholar] [CrossRef]
- Tong, L.; Kwan, M. Ensuring cyber security in airlines to prevent data breach. Comput. Sci. IT Res. J. 2022, 3, 66–73. [Google Scholar] [CrossRef]
- Khan, S.K.; Shiwakoti, N.; Stasinopoulos, P.; Chen, Y. Cyber-attacks in the next-generation cars, mitigation techniques, anticipated readiness and future directions. Accid. Anal. Prev. 2020, 148, 105837. [Google Scholar] [CrossRef]
- Strohmeier, M.; Schäfer, M.; Pinheiro, R.; Lenders, V.; Martinovic, I. On perception and reality in wireless air traffic communication security. IEEE Trans. Intell. Transp. Syst. 2016, 18, 1338–1357. [Google Scholar] [CrossRef]
- Kagalwalla, N.; Churi, P.P. Cybersecurity in aviation: An intrinsic review. In Proceedings of the 2019 5th International Conference on Computing, Communication, Control and Automation (ICCUBEA), Pune, India, 19–21 September 2019; pp. 1–6. [Google Scholar]
- Alsaid, A.Y.; Gutub, A.A.-A.; AlKhodaidi, T. Cybercrime on Transportation Airline. J. Forensic Res. 2019, 10, 1–4. [Google Scholar]
- Cunningham, L.F.; Gerlach, J.; Harper, M.D. Assessing perceived risk of consumers in Internet airline reservations services. J. Air Transp. 2004, 9, 21. [Google Scholar]
- Klenka, M. Aviation cyber security: Legal aspects of cyber threats. J. Transp. Secur. 2021, 14, 177–195. [Google Scholar] [CrossRef]
- Rubio-Andrada, L.; CelemÃn-Pedroche, M.S. Passengers satisfaction with the technologies used in smart airports: An empirical study from a gender perspective. J. Air Transp. Manag. 2023, 107, 102347. [Google Scholar] [CrossRef]
- Milbredt, O.; Popa, A.; Doenitz, F.-C.; Hellmann, M. Aviation security automation: The current level of security automation and its impact. J. Airpt. Manag. 2022, 16, 184–208. [Google Scholar] [CrossRef]
- Xu, H.; Mahenthiran, S.J.I.; Security, C. Users’ perception of cybersecurity, trust and cloud computing providers’ performance. Inf. Comput. Secur. 2021, 29, 816–835. [Google Scholar] [CrossRef]
- Maddux, J.E.; Rogers, R.W.J.J.o.e.s.p. Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change. J. Exp. Soc. Psychol. 1983, 19, 469–479. [Google Scholar] [CrossRef]
- Janz, N.K.; Becker, M.H. The health belief model: A decade later. Health Educ. Q. 1984, 11, 1–47. [Google Scholar] [CrossRef]
- Fox, S.J. Flying challenges for the future: Aviation preparedness–in the face of cyber-terrorism. J. Transp. Secur. 2016, 9, 191–218. [Google Scholar] [CrossRef]
- Anwar, M.; He, W.; Ash, I.; Yuan, X.; Li, L.; Xu, L. Gender difference and employees’ cybersecurity behaviors. Comput. Hum. Behav. 2017, 69, 437–443. [Google Scholar] [CrossRef]
- Ng, B.-Y.; Kankanhalli, A.; Xu, Y.C. Studying users’ computer security behavior: A health belief perspective. Decis. Support Syst. 2009, 46, 815–825. [Google Scholar] [CrossRef]
- Vatka, M. Information Behaviour and Data Security: Health Belief Model Perspective. Master’s Thesis, Governance of Digitalization, Åbo Akademi University, Turku, Finland, 2019. [Google Scholar]
- Dodge, C.E.; Fisk, N.; Burruss, G.W.; Moule Jr, R.K.; Jaynes, C.M. What motivates users to adopt cybersecurity practices? A survey experiment assessing protection motivation theory. Criminol. Public Policy 2023, 22, 849–868. [Google Scholar] [CrossRef]
- Khan, N.F.; Ikram, N.; Murtaza, H.; Javed, M. Evaluating protection motivation based cybersecurity awareness training on Kirkpatrick’s Model. Comput. Secur. 2023, 125, 103049. [Google Scholar] [CrossRef]
- Lachal, J.; Revah-Levy, A.; Orri, M.; Moro, M.R. Metasynthesis: An original method to synthesize qualitative literature in psychiatry. Front. Psychiatry 2017, 8, 269. [Google Scholar] [CrossRef]
- Walsh, D.; Downe, S. Meta-synthesis method for qualitative research: A literature review. J. Adv. Nurs. 2005, 50, 204–211. [Google Scholar] [CrossRef] [PubMed]
- Weber, K.; Sparks, B. Consumer attributions and behavioral responses to service failures in strategic airline alliance settings. J. Air Transp. Manag. 2004, 10, 361–367. [Google Scholar] [CrossRef]
- Jebb, A.T.; Ng, V.; Tay, L. A review of key Likert scale development advances: 1995–2019. Front. Psychol. 2021, 12, 637547. [Google Scholar] [CrossRef]
- Li, L.; He, W.; Xu, L.; Ash, I.; Anwar, M.; Yuan, X. Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior. Int. J. Inf. Manag. 2019, 45, 13–24. [Google Scholar] [CrossRef]
- USQA. An Overview of China’s Recent Domestic and International Air Transport Policy. 2020. Available online: https://research.usq.edu.au/download/a5aa70e833558d726b061b238d91a5285e38d3e3d2d35e1abab5819b94a1338f/321582/Submitted%20Chapter.pdf (accessed on 3 March 2024).
- ITU. Global Cybersecurity Index. Available online: https://www.itu.int/en/ITU-D/Cybersecurity/Pages/global-cybersecurity-index.aspx (accessed on 23 June 2023).
- SEON. Global Cybercrime Report: Which Countries Are Most at Risk? 2022. Available online: https://resources.cdn.seon.io/uploads/2023/04/Cybersecurity_countries-min.pdf (accessed on 23 June 2023).
- Question Star. 2023. Available online: https://www.questionstar.com/ (accessed on 3 March 2024).
- Fabrigar, L.R.; Wegener, D.T. Exploratory Factor Analysis; Oxford University Press: Oxford, UK, 2011. [Google Scholar]
- Pallant, J. SPSS Survival Manual: A Step by Step Guide to Data Analysis Using IBM SPSS; McGraw-Hill Education (UK): London, UK, 2020. [Google Scholar]
- Shrestha, N. Factor analysis as a tool for survey analysis. Am. J. Appl. Math. Stat. 2021, 9, 4–11. [Google Scholar] [CrossRef]
- Ab Hamid, M.; Sami, W.; Sidek, M.M. Discriminant validity assessment: Use of Fornell & Larcker criterion versus HTMT criterion. J. Phys. Conf. Ser. 2017, 890, 012163. [Google Scholar]
- Aljohni, W.; Elfadil, N.; Jarajreh, M.; Gasmelsied, M. Cybersecurity awareness level: The case of Saudi Arabia University students. Int. J. Adv. Comput. Sci. Appl. 2021, 12, 276–281. [Google Scholar] [CrossRef]
- Kim, L.H.; Qu, H.; Kim, D.J. A study of perceived risk and risk reduction of purchasing air-tickets online. J. Travel Tour. Mark. 2009, 26, 203–224. [Google Scholar] [CrossRef]
- Gustafsod, P.E. Gender Differences in risk perception: Theoretical and methodological erspectives. Risk Anal. 1998, 18, 805–811. [Google Scholar] [CrossRef]
- McGill, T.; Thompson, N. Gender differences in information security perceptions and behaviour. In Proceedings of the 29th Australasian Conference on Information Systems, Sydney, Australia, 3–5 December 2018. [Google Scholar]
- Khan, S.K.; Shiwakoti, N.; Stasinopoulos, P.; Warren, M. A multinational empirical study of perceived cyber barriers to automated vehicles deployment. Sci. Rep. 2023, 13, 1842. [Google Scholar] [CrossRef]
- Anwar, M.; He, W.; Yuan, X. Employment status and cybersecurity behaviors. In Proceedings of the 2016 International Conference on Behavioral, Economic and Socio-cultural Computing (BESC), Durham, NC, USA, 11–13 November 2016; pp. 1–2. [Google Scholar]
- Fatokun, F.B.; Hamid, S.; Norman, A.; Fatokun, J.O. The impact of age, gender, and educational level on the cybersecurity behaviors of tertiary institution students: An empirical investigation on Malaysian universities. J. Phys. Conf. Ser. 2019, 1339, 012098. [Google Scholar] [CrossRef]
- Hong, W.C.H.; Chi, C.; Liu, J.; Zhang, Y.; Lei, V.N.-L.; Xu, X. The influence of social education level on cybersecurity awareness and behaviour: A comparative study of university students and working graduates. Educ. Inf. Technol. 2023, 28, 439–470. [Google Scholar] [CrossRef]
- Hadlington, L. Human factors in cybersecurity; examining the link between Internet addiction, impulsivity, attitudes towards cybersecurity, and risky cybersecurity behaviours. Heliyon 2017, 3, e00346. [Google Scholar] [CrossRef] [PubMed]
- Khan, S.K.; Shiwakoti, N.; Stasinopoulos, P.; Chen, Y.; Warren, M. Exploratory factor analysis for cybersecurity regulation and consumer data in autonomous vehicle acceptance: Insights from four OECD countries. Transp. Res. Interdiscip. Perspect. 2024, 25, 101084. [Google Scholar]
- Herath, T.B.; Khanna, P.; Ahmed, M. Cybersecurity practices for social media users: A systematic literature review. J. Cybersecur. Priv. 2022, 2, 1–18. [Google Scholar] [CrossRef]
- Theofanos, M.; Stanton, B.; Furman, S.; Prettyman, S.S.; Garfinkel, S. Be prepared: How US government experts think about cybersecurity. In Proceedings of the Workshop on Usable Security (USEC), San Diego, CA, USA, 26 February 2017; Internet Society: Reston, VA, USA, 2017. [Google Scholar]
- McAlaney, J.; Benson, V. Cybersecurity as a social phenomenon. In Cyber Influence and Cognitive Threats; Elsevier: Cambridge, MA, USA, 2020; pp. 1–8. [Google Scholar]
- Khan, S.K.; Shiwakoti, N.; Stasinopoulos, P.; Warren, M. Driving a safer future: Exploring cross-country perspectives in automated vehicle adoption by considering cyber risks, liability, and data concerns. IET Intell. Transp. Syst. 2024, 18, 1999–2014. [Google Scholar] [CrossRef]
- Ramlo, S.; Nicholas, J.B. The human factor: Assessing individuals’ perceptions related to cybersecurity. Inf. Comput. Secur. 2021, 29, 350–364. [Google Scholar] [CrossRef]
- Salamah, F.B.; Palomino, M.A.; Papadaki, M.; Furnell, S. The importance of the job role in social media cybersecurity training. In Proceedings of the 2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Genoa, Italy, 6–10 June 2022; pp. 454–462. [Google Scholar]
- Menzel, D.; Hesterman, J. Airport security threats and strategic options for mitigation. J. Airpt. Manag. 2018, 12, 118–131. [Google Scholar] [CrossRef]
- Soomro, Z.A.; Shah, M.H.; Ahmed, J. Information security management needs more holistic approach: A literature review. Int. J. Inf. Manag. 2016, 36, 215–225. [Google Scholar] [CrossRef]
- Zwilling, M.; Klien, G.; Lesjak, D.; Wiechetek, Ł.; Cetin, F.; Basim, H.N. Cyber security awareness, knowledge and behavior: A comparative study. J. Comput. Inf. Syst. 2022, 62, 82–97. [Google Scholar] [CrossRef]
- Hurley, A.E.; Scandura, T.A.; Schriesheim, C.A.; Brannick, M.T.; Seers, A.; Vandenberg, R.J.; Williams, L. Exploratory and confirmatory factor analysis: Guidelines, issues, and alternatives. J. Organ. Behav. 1997, 18, 667–683. [Google Scholar] [CrossRef]
- Thompson, B. Exploratory and Confirmatory Factor Analysis: Understanding Concepts and Applications; American Psychological Association: Washington, DC, USA, 2004; Volume 10694. [Google Scholar]
Initial | Extraction | |
---|---|---|
PI1.1 | 1.000 | 0.670 |
PI1.2 | 1.000 | 0.658 |
PI1.3 | 1.000 | 0.632 |
PI1.4 | 1.000 | 0.679 |
PI2.1 | 1.000 | 0.634 |
PI2.2 | 1.000 | 0.684 |
PI2.3 | 1.000 | 0.651 |
PI2.4 | 1.000 | 0.633 |
PI2.5 | 1.000 | 0.704 |
PI2.6 | 1.000 | 0.705 |
PI2.7 | 1.000 | 0.683 |
PA1.1 | 1.000 | 0.615 |
PA1.2 | 1.000 | 0.609 |
PA1.3 | 1.000 | 0.619 |
PA1.4 | 1.000 | 0.649 |
PA1.5 | 1.000 | 0.641 |
PA1.6 | 1.000 | 0.637 |
PA1.7 | 1.000 | 0.656 |
PA2.1 | 1.000 | 0.769 |
PA2.2 | 1.000 | 0.784 |
PA2.3 | 1.000 | 0.757 |
SC1.1 | 1.000 | 0.636 |
SC1.2 | 1.000 | 0.605 |
SC1.3 | 1.000 | 0.584 |
SC1.4 | 1.000 | 0.573 |
SC1.5 | 1.000 | 0.657 |
SC1.6 | 1.000 | 0.563 |
SC1.7 | 1.000 | 0.624 |
SC1.8 | 1.000 | 0.560 |
SC1.9 | 1.000 | 0.561 |
SC1.10 | 1.000 | 0.613 |
Component | |||||
---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 | |
PI1.1 | 0.176 | −0.094 | 0.095 | 0.784 | 0.082 |
PI1.2 | 0.193 | −0.147 | 0.074 | 0.770 | 0.029 |
PI1.3 | 0.160 | −0.124 | 0.103 | 0.752 | 0.122 |
PI1.4 | 0.240 | −0.148 | 0.053 | 0.768 | 0.086 |
PI2.1 | −0.170 | 0.763 | −0.140 | −0.042 | −0.029 |
PI2.2 | −0.185 | 0.791 | −0.111 | −0.090 | −0.061 |
PI2.3 | −0.185 | 0.771 | −0.072 | −0.095 | −0.088 |
PI2.4 | −0.142 | 0.768 | −0.076 | −0.126 | −0.039 |
PI2.5 | −0.118 | 0.815 | −0.054 | −0.146 | −0.031 |
PI2.6 | −0.227 | 0.800 | −0.092 | −0.070 | 0.001 |
PI2.7 | −0.176 | 0.800 | −0.084 | −0.076 | −0.013 |
PA1.1 | 0.117 | −0.128 | 0.757 | 0.103 | 0.028 |
PA1.2 | 0.248 | −0.098 | 0.729 | 0.079 | 0.018 |
PA1.3 | 0.154 | −0.078 | 0.762 | 0.086 | 0.019 |
PA1.4 | 0.177 | −0.100 | 0.776 | 0.027 | 0.071 |
PA1.5 | 0.262 | −0.075 | 0.744 | 0.096 | 0.062 |
PA1.6 | 0.199 | −0.070 | 0.768 | −0.007 | 0.059 |
PA1.7 | 0.186 | −0.066 | 0.782 | 0.047 | 0.064 |
PA2.1 | 0.208 | −0.070 | 0.106 | 0.092 | 0.837 |
PA2.2 | 0.289 | −0.050 | 0.063 | 0.085 | 0.829 |
PA2.3 | 0.294 | −0.050 | 0.058 | 0.139 | 0.803 |
SC1.1 | 0.727 | −0.191 | 0.183 | 0.129 | 0.144 |
SC1.2 | 0.725 | −0.132 | 0.155 | 0.193 | 0.037 |
SC1.3 | 0.714 | −0.160 | 0.205 | 0.068 | 0.049 |
SC1.4 | 0.698 | −0.175 | 0.166 | 0.071 | 0.153 |
SC1.5 | 0.729 | −0.182 | 0.196 | 0.178 | 0.150 |
SC1.6 | 0.796 | −0.201 | 0.222 | 0.142 | 0.190 |
SC1.7 | 0.732 | −0.150 | 0.169 | 0.136 | 0.138 |
SC1.8 | 0.671 | −0.213 | 0.143 | 0.166 | 0.131 |
SC1.9 | 0.654 | −0.122 | 0.268 | 0.149 | 0.155 |
SC1.10 | 0.736 | −0.123 | 0.147 | 0.095 | 0.161 |
Levene’s Test for Equality of Variances (Sig.) | t-Test for Equality of Means Sig. (2-Tailed) | ||
---|---|---|---|
Gender | |||
PI1 | Equal variances assumed | <0.001 | <0.001 |
Equal variances not assumed | <0.001 | ||
PI2 | Equal variances assumed | 0.002 | <0.001 |
Equal variances not assumed | <0.001 | ||
PA1 | Equal variances assumed | <0.001 | <0.001 |
Equal variances not assumed | <0.001 | ||
PA2 | Equal variances assumed | <0.001 | <0.001 |
Equal variances not assumed | <0.001 | ||
SC | Equal variances assumed | <0.001 | <0.001 |
Equal variances not assumed | <0.001 | ||
FFP | |||
PI1 | Equal variances assumed | 0.124 | 0.997 |
Equal variances not assumed | 0.997 | ||
PI2 | Equal variances assumed | 0.179 | 0.870 |
Equal variances not assumed | 0.862 | ||
PA1 | Equal variances assumed | 0.448 | 0.518 |
Equal variances not assumed | 0.505 | ||
PA2 | Equal variances assumed | 0.326 | 0.277 |
Equal variances not assumed | 0.263 | ||
SC | Equal variances assumed | 0.683 | 0.300 |
Equal variances not assumed | 0.312 |
Gender | Male | Female | T | p |
---|---|---|---|---|
PI1 | 4.12 ± 0.71 | 3.80 ± 0.93 | 4.178 | <0.001 |
PI2 | 2.21 ± 0.61 | 2.42 ± 0.73 | −3.340 | <0.001 |
PA1 | 3.90 ± 0.71 | 3.51 ± 0.98 | 4.887 | <0.001 |
PA2 | 3.90 ± 0.90 | 3.35 ± 1.10 | 5.871 | <0.001 |
SC | 4.49 ± 0.57 | 3.57 ± 0.70 | 15.643 | <0.001 |
FFP | FFP | No FFP | T | p |
PI1 | 3.96 ± 0.92 | 3.96 ± 0.82 | −0.004 | 0.997 |
PI2 | 2.32 ± 0.62 | 2.31 ± 0.69 | 0.164 | 0.870 |
PA1 | 3.66 ± 0.84 | 3.73 ± 0.88 | −0.647 | 0.518 |
PA2 | 3.74 ± 0.99 | 3.61 ± 1.04 | 1.088 | 0.277 |
SC | 4.12 ± 0.81 | 4.03 ± 0.78 | 1.038 | 0.300 |
ANOVA | ||
---|---|---|
F | p | |
PI1 | 1.022 | 0.404 |
PI2 | 2.964 | 0.012 |
PA1 | 0.781 | 0.564 |
PA2 | 0.953 | 0.446 |
SC | 2.209 | 0.052 |
Sig. | Student | Business | Owner | Government-Sector | Private Sector |
---|---|---|---|---|---|
Student | |||||
Business | 0.001 | ||||
Owner | 0.002 | 0.353 | |||
Government Sector | 0.004 | 0.302 | 0.718 | ||
Private Sector | 0.004 | 0.045 | 0.162 | 0.648 | |
Retired | 0.003 | 0.848 | 0.543 | 0.459 | 0.310 |
F | p | ||
---|---|---|---|
Age | PI1 | 0.229 | 0.950 |
PI2 | 0.645 | 0.665 | |
PA1 | 1.066 | 0.378 | |
PA2 | 1.755 | 0.121 | |
SC | 0.391 | 0.855 | |
Income | PI1 | 1.185 | 0.316 |
PI2 | 0.237 | 0.946 | |
PA1 | 2.185 | 0.055 | |
PA2 | 0.358 | 0.877 | |
SC | 0.943 | 0.453 | |
Education Level | PI1 | 0.581 | 0.627 |
PI2 | 0.037 | 0.990 | |
PA1 | 1.142 | 0.332 | |
PA2 | 0.993 | 0.396 | |
SC | 1.216 | 0.303 | |
Consumption Level | PI1 | 1.077 | 0.358 |
PI2 | 0.407 | 0.748 | |
PA1 | 0.736 | 0.531 | |
PA2 | 0.356 | 0.785 | |
SC | 0.833 | 0.476 | |
Airline Choices | PI1 | 2.587 | 0.052 |
PI2 | 0.317 | 0.813 | |
PA1 | 0.332 | 0.802 | |
PA2 | 1.058 | 0.367 | |
SC | 1.090 | 0.353 | |
Ticket Route | PI1 | 0.683 | 0.563 |
PI2 | 1.668 | 0.173 | |
PA1 | 1.281 | 0.280 | |
PA2 | 0.416 | 0.742 | |
PI | 1.846 | 0.138 | |
Travel Frequency | PI1 | 0.112 | 0.978 |
PI2 | 0.458 | 0.766 | |
PA1 | 0.264 | 0.901 | |
PA2 | 0.530 | 0.714 | |
SC | 0.411 | 0.801 |
PI1 | PI2 | PA1 | PA2 | SC | |
---|---|---|---|---|---|
PI1 | 1 | ||||
PI2 | −0.308 ** | 1 | |||
PA1 | 0.250 ** | −0.249 ** | 1 | ||
PA2 | 0.295 ** | −0.176 ** | 0.227 ** | 1 | |
SC | 0.453 ** | −0.435 ** | 0.499 ** | 0.487 ** | 1 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Khan, S.K.; Shiwakoti, N.; Wang, J.; Xu, H.; Xiang, C.; Zhou, X.; Jiang, H. An Investigation on Passengers’ Perceptions of Cybersecurity in the Airline Industry. Future Transp. 2025, 5, 5. https://doi.org/10.3390/futuretransp5010005
Khan SK, Shiwakoti N, Wang J, Xu H, Xiang C, Zhou X, Jiang H. An Investigation on Passengers’ Perceptions of Cybersecurity in the Airline Industry. Future Transportation. 2025; 5(1):5. https://doi.org/10.3390/futuretransp5010005
Chicago/Turabian StyleKhan, Shah Khalid, Nirajan Shiwakoti, Juntong Wang, Haotian Xu, Chenghao Xiang, Xiao Zhou, and Hongwei Jiang. 2025. "An Investigation on Passengers’ Perceptions of Cybersecurity in the Airline Industry" Future Transportation 5, no. 1: 5. https://doi.org/10.3390/futuretransp5010005
APA StyleKhan, S. K., Shiwakoti, N., Wang, J., Xu, H., Xiang, C., Zhou, X., & Jiang, H. (2025). An Investigation on Passengers’ Perceptions of Cybersecurity in the Airline Industry. Future Transportation, 5(1), 5. https://doi.org/10.3390/futuretransp5010005