INTRODUCTION
- Problem Statement and Motivation
 - Objectives
 - Project Scope and Direction
 - Impact, Significance, and Contribution
 - Report Organization
 
2 Therefore, exploring the personality traits and cyber hygiene behaviors among university students should be encouraged and carried out. Besides that, explore the personality traits and cyber hygiene behavior among university students is significant. They can play an important role in protecting and maintaining their devices and networks if college students understand basic cyber hygiene practices.
Different personality traits can have big differences on either good or bad cyber hygiene behaviour. The purpose of this project is to explore personality traits and cyber hygiene behaviors among university students. The main result of this project is to test the different types of personality traits of each student and different types of cyber hygiene behavior and knowledge.
A study to investigate personality traits and cyber hygiene behaviors among university students can provide students with a good understanding of following cyber security best practices. In addition, this study will also show the relationship between their personality and their cyber hygiene behavior.
LITERATURE REVIEW
An exploratory study of cyber hygiene behaviours and knowledge
Correlating Human Traits and Cybersecurity Behaviour Intentions
Taking Risks with Cybersecurity: Using Knowledge and Personal Characteristics to
Towards Determining the Effect of Age and Educational Level on Cyber- Hygiene
Literature Review Summary Table
SYSTEM MODEL
Chapter Description
Design Specification
- Agreeableness
 - Conscientiousness
 - Neuroticism
 - Openness
 - Extraversion
 
Research Design
Data Collection Method
- Primary Data
 - Secondary Data
 
Sampling Design
Questionnaire Design
- Adaptation of Questionnaire from Published Research
 
Measuring Scale
- Nominal Scale
 - Ordinal Scale
 - Likert Scale
 
Sample Item of Questionnaire
Data Analysis
- Scale Measurement (survey reliability)
 
Conclusion
RESULTS
Result and Analyzes for Total 100 Respondents
- Descriptive Analysis
 - Reliability Test
 - Pearson Correlation
 - Multiple Linear Regression
 
The R-value between due diligence with software security is 0.444 while the R-value between due diligence with email security is 0.447. From the result, the R-value between neuroticism and software security is 0.254 and the p-value is 0.011. The R-value between neuroticism with email security is 0.329, while the R-value between neuroticism with data management practices is 0.342.
The R-value between extraversion and software security is 0.400, and the R-value between extraversion and email security is 0.494. In addition, the significant p value of openness obtained is 0.001, which means it is lower than the significant level of 0.05. In addition, a significant conscientiousness p value of 0.048 is obtained, which means it is lower than the significant level of 0.05.
This is because the result shows that the β value of pleasantness is -0.144 which is the smallest value. However, the significant value of extraversion is 0.101 which represents that it is greater than the significant level of 0.05. Based on the table above, the β value of pleasantness is 0.089 and the significant value of pleasantness is 0.506 which is greater than the significant level of 0.05.
This is because the β value of neuroticism is 0.075 which is the fourth highest in the result. 42 significant value of openness obtained p value which is 0.050 which means that it is equal to the significant level of 0.05. Unfortunately, the significant value of conscientiousness is 0.201 which represents that it is greater than the significant level of 0.05.
Based on the table above, the β value of neuroticism is 0.126 and the characteristic value of neuroticism is 0.141, which is more than the significant level of 0.05. This is because the β value of acceptance is 0.046, which is the fourth highest value in the result. In addition, the characteristic value of extraversion is 0.910, which means it is higher than the significant level of 0.05.
Result and Analyzes for Total 150 Respondents
- Descriptive Analysis
 - Reliability Test
 - Pearson Correlation
 - Multiple Linear Regression
 
CONCLUSION
Introduction
This chapter discusses the final result of this research paper, discussion of hypothesis testing, limitations and recommendations. Furthermore, Chapter 5 will focus on the limitations of this study and recommendations for future research. The main purpose of this research paper is to identify different types of personality traits of a college student on cyber hygiene behavior.
Discussion of Hypothesis Test
- Hypothesis for agreeableness as independent variable, software security,
 - Hypothesis for openness as independent variable, software security, email
 - Hypothesis for extraversion as independent variable, software security,
 
According to Pearson's correlation coefficient analysis, agreeableness has a significant relationship with software security, email security and data management practices. This is because all the p-values between acceptable software security, email security and data management practices are <0.001, which is lower than the significant level of 0.01 or 0.05. However, the result of multiple regression analysis shows that the significant value between acceptable software security, email security and data management practices is and 0.811, which is greater than the significant level of 0.05.
Therefore, pleasantness is not significant for software security, email security, and data management practices, even though the significant value is <0.001 in Pearson correlation analysis. A study of [8] related to the result of this study stating that friendliness is not important for software security, email security and data management practices. Aside from that, rigor has a significant relationship with software security, email security, and data management practices in the Pearson correlation coefficient analysis.
This is because all the p-values between software security due diligence, email security, and data management practices are <0.001, which is below the significant level of 0.01 or 0.05. In addition, according to Pearson's analysis of correlation coefficients, neuroticism has a significant relationship with software security, email security, and data management practices. This is because all the p-values between software security neuroticism, email security, and data management practices are <0.001, which is below the significant level of 0.01 or 0.05.
The correlation value between neuroticism with software security, email security and data management practices is which means that all are moderately correlated and positively significant. Beyond that, openness has a significant relationship with software security, email security, and data management practices. This is because all the p-values between openness with software security, email security and data management practices are <0.001, which is lower than the significant level of 0.01 or 0.05.
According to the result of multiple regression analysis shows the significant value between openness with software security, email security and data management practices is and 0.050 which is lower than and equal to the significant level of 0.05. So it can be concluded that openness is significant for software security, email security and data management practices as the significant value is lower than the significant level of 0.05. The correlation value between extraversion with software security, email security and data management practices is which means that all are moderately correlated and positively significant.
Recommendation for Future Study
Thus, the data set should be removed when a value is missing or an illogical response. Furthermore, there is a correlation value shown in the Pearson Correlation analysis which is less than 0.4, this value is from the variables of acceptability and data management practices. In other words, the strength of this correlation relationship is weak which means that there is minimal influence of the independent variable affecting the dependent variable.
Conclusion
Bachelor of Information Systems Engineering (honours) Business Information Systems Faculty of Information and Communication Technology (Kampar campus), UTAR. I am a final year undergraduate studying Bachelor of Information Systems (HONS) Business Information Systems at Universiti Tunku Abdul Rahman (UTAR) Kampar, Perak. If you have any questions about the content of the questionnaire, please contact Hew Chi Wei at ([email protected]).
I did the planning in the first week because next week is the Chinese New Year holiday. It is a bit challenging to collect data because the target sample size is 150 and I have to collect 150 respondents myself. My progress is going smoothly in this current situation, but I need to start the joint survey to collect 150 respondents as my target sample size.
The SPSS account is a free trial for a month and I may have to find another way to get a free trial after a month. Progress is a bit slow as I wanted to collect more of the completed questionnaire. I need to learn how to do data analysis by using SPSS software by myself through YouTube and Google as it is my first time using SPSS software.
The process is going smoothly for the moment, it's just waiting for the questionnaire to be completed by the respondents so I can continue to run the data. There are few analyzes to be tested with SPSS and there are some results I don't understand the meaning of. Therefore, I need help from the Internet so that I can gain a better understanding of the method for explaining the results analysis.
There are some meanings in the analysis results that I cannot understand, so I need to read several articles and online sources about the test to interpret the results correctly. The content of the presentation is too big to present all content in 15 minutes, so I need to summarize and highlight the important content to share with my supervisor and moderator. Note Supervisor/candidate(s) are required to deliver a soft copy of the full set of the originality report to the faculty/department.
Based on the above results, I hereby declare that I am satisfied with the originality of the Final Year Project Report submitted by my student(s) as mentioned above. Form title: Supervisor's comments on originality report generated by Turnitin for submission of final year project report (for undergraduate programs).