The performed analysis of the factor theoretical model of the hybrid threat cybersecurity for the entire research group (N = 964) within the study is followed by the detection of differences in the perception of individual defined pillars of this hybrid threat between respondents from the Slovak and Czech Republics. It would certainly be interesting to observe such differences between other groups, too (gender, age, degree, and form of study), but analysing these groups would make the study too extensive. The authors will focus on the analysis of these other groups and the differences in the perception of the individual-defined pillars of hybrid threat cybersecurity in further planned studies.
Analysis of Differences in Perception of the Pillars of Cybersecurity between Students of the Slovakia and Czech Republic
Based on the theoretical factor model (
Figure 2), the researchers in the next round created partial models, especially for respondents from Slovakia (
N = 580) and especially for respondents from the Czech Republic (
N = 384). Based on
Table 9, it can be stated that both partial models of cybersecurity in the sense of the defined criteria show high agreement with the data obtained using the author’s research instrument and are therefore applicable for drawing correct conclusions.
The differences themselves in the perception of the individual-defined pillars of Cybersecurity in terms of the theoretical factor model (
Figure 2) between Slovak (
SK) and Czech (
CZ) respondents can be observed from two points of view. The first is the assigning of importance to the individual items of the research instrument; the second is the assigning of the degree of risk of the individual items of the research instrument. More detailed differences in perception within the individual pillars of cybersecurity are shown in
Table 10,
Table 11,
Table 12,
Table 13 and
Table 14, and in the analysis, we focus only on the most important ones.
Table 10 presents the results of the statistical analysis of data obtained from the Slovak and Czech Republics in the sense of the partial models of the first defined pillar
CYBSPY (
Figure 2). The first conclusion is that both
SK and
CZ respondents consider inappropriate cybersecurity policies (
CSPYQ5) as the most significant problem with a high degree of risk assigned (0.709 for
SK, 0.701 for
CZ). At the same time, both groups of respondents assigned a low degree of risk (0.361 for
SK, 0.346 for
CZ) to the problem that the cybersecurity solution is solved through outsourcing (
CSPYQ3). For respondents from Slovakia, the second most important problem in the field of Cyber spying is that of the insufficient training of employees in the field of cybersecurity (
CSPYQ7), and they assigned it a high degree of risk (0.667,
p < 0.000), while for respondents from the Czech Republic, this issue is ranked in sixth place of importance with a medium level of risk (0.543,
p < 0.000). For the respondents of the
CZ group, the second most important problem is the question of a comprehensive and systemic solution to cybersecurity (
CSPYQ4), with a high degree of risk (0.645,
p < 0.000), while for the respondents of the
SK group, this problem is fourth in order but with an equally high degree of risk (0.638,
p < 0.000). Third place in order of importance for
SK respondents is the problem of insufficient screening of employees (
CSPYQ6), with a high degree of risk, while for
CZ respondents this same place of importance belongs to the problem of insufficient allocation of funds to the issue of cybersecurity (
CSPYQ1), with a high degree of risk (0.640,
p< 0.000). A graphic depiction of the differences in the perception of the risk of individual items of the cyber spying (
CYBSPY) pillar of the hybrid cybersecurity threat between the
SK and
CZ respondents, including the entire research file, is shown in
Figure 3.
An analysis of the differences of the second defined pillar of the hybrid threat cybersecurity in terms of the theoretical model (
Figure 2), namely the pillar disrupting or reducing IT infrastructure resilience (
DISRIT), between
SK respondents and
CZ respondents is presented in
Table 11. In this case, too, we focus only on the most significant differences between the assessed groups, either from the point of view of the level of risk or the order of importance of the individual items of the research instrument.
Table 11.
Estimates of the parameters of the pillar disrupting or reducing IT infrastructure resilience for respondents from the Slovak and Czech Republics.
Table 11.
Estimates of the parameters of the pillar disrupting or reducing IT infrastructure resilience for respondents from the Slovak and Czech Republics.
Relationship | Slovak Republic | Czech Republic |
---|
Est. | Std. Est. | t | p | Est. | Std. Est. | t | p |
---|
DRITQ1 | <--- | DISRIT | 1.000 | 0.786 | 16.237 | <0.000 * | 1.000 | 0.596 | 10.264 | <0.000 * |
DRITQ2 | <--- | DISRIT | 0.787 | 0.694 | 16.035 | <0.000 * | 1.196 | 0.627 | 10.508 | <0.000 * |
DRITQ3 | <--- | DISRIT | 0.688 | 0.619 | 14.263 | <0.000 * | 1.335 | 0.683 | 11.355 | <0.000 * |
DRITQ4 | <--- | DISRIT | 0.751 | 0.577 | 12.812 | <0.000 * | 1.027 | 0.518 | 9.065 | <0.000 * |
DRITQ5 | <--- | DISRIT | 0.749 | 0.673 | 14.234 | <0.000 * | 1.328 | 0.701 | 11.433 | <0.000 * |
DRITQ6 | <--- | DISRIT | 0.654 | 0.584 | 13.498 | <0.000 * | 0.924 | 0.473 | 8.536 | <0.000 * |
DRITQ7 | <--- | DISRIT | 0.822 | 0.686 | 15.870 | <0.000 * | 1.000 | 0.525 | 7.960 | <0.000 * |
DRITQ8 | <--- | DISRIT | 0.745 | 0.639 | 14.817 | <0.000 * | 1.172 | 0.559 | 10.060 | <0.000 * |
DRITQ9 | <--- | DISRIT | 0.893 | 0.703 | 16.153 | <0.000 * | 0.981 | 0.482 | 8.244 | <0.000 * |
DRITQ10 | <--- | DISRIT | 0.908 | 0.733 | 16.949 | <0.000 * | 1.064 | 0.531 | 9.274 | <0.000 * |
DRITQ11 | <--- | DISRIT | 0.792 | 0.670 | 15.506 | <0.000 * | 0.920 | 0.509 | 8.460 | <0.000 * |
DRITQ12 | <--- | DISRIT | 0.856 | 0.698 | 16.054 | <0.000 * | 0.805 | 0.438 | 7.880 | <0.000 * |
For respondents from the
SK group, the most significant problem of the pillar
DISRIT with a high degree of risk is the one that relates to the risk of critical information infrastructure being attacked by cyber-attacks (
DRITQ1), with a standardised regression weight value of 0.786 (
p < 0.000). This same issue is in fourth place in terms of importance for the
CZ respondents, and they assigned it a medium level of risk (0.596,
p < 0.000). In contrast, for
CZ respondents, the most important security issue is related to unsystematically implemented security testing, with a high degree of risk (0.701,
p < 0.000), while for the
SK respondents, this issue is only in seventh place, though it is assigned an equally high degree of risk (0.673,
p < 0.000). The second most significant threat of the
DISRIT pillar for respondents from the
SK group is that of fragmentation of the systems of communication means of public administration (
DRITQ10), with an assigned high level of risk (0.732,
p < 0.000), while the
CZ respondents assigned this issue a medium level of risk (0.531,
p < 0.000) and ranked it sixth in the order of importance. The second most important problem for the group of
CZ respondents is the issue of not including strategic industries in critical infrastructure, with a high degree of risk (0.683,
p < 0.000), while this problem is also perceived by SK respondents with an equally high degree of risk (0.619,
p < 0.000), though it is in tenth place in terms of order. The third most important issue of the
DISRIT pillar for
SK respondents is that of using outdated information infrastructure systems (
DRITQ9), with a high degree of risk (0.703,
p < 0.000). The
CZ respondents put this issue in eleventh place in terms of importance, with a medium level of risk (0.482,
p < 0.000). In order of importance, the
CZ respondents put the issue of a lack of funds for selected areas of cybersecurity (
DRITQ2) in third place, with a high degree of risk assigned (0.627,
p < 0.000). A graphic depiction of differences in risk perception of individual items of the pillar disrupting or reducing IT infrastructure resilience of (
DISRIT), hybrid threat Cybersecurity, between
SK and
CZ respondents, including a display of the entire research file, is shown in
Figure 4.
The third pillar of cybersecurity (
Figure 2), defined as cyberterrorism (
CYBTER), is analysed from the viewpoint of both the order of importance and the degree of assigned risk by respondents from the Slovak and Czech Republics, including the differences between the analysed groups in
Table 12.
Table 12.
The parameters estimation of the cyberterrorism pillar for the CZ and SK respondents.
Table 12.
The parameters estimation of the cyberterrorism pillar for the CZ and SK respondents.
Relationship | Slovak Republic | Czech Republic |
---|
Est. | Std. Est. | t | p | Est. | Std. Est. | t | p |
---|
CTQ1 | <--- | CYBTER | 1.000 | 0.685 | 15.197 | <0.000 * | 1.000 | 0.360 | 5.254 | <0.000 * |
CTQ2 | <--- | CYBTER | 0.875 | 0.612 | 14.986 | <0.000 * | 1.688 | 0.593 | 7.435 | <0.000 * |
CTQ3 | <--- | CYBTER | 1.096 | 0.717 | 17.640 | <0.000 * | 1.357 | 0.455 | 5.637 | <0.000 * |
CTQ4 | <--- | CYBTER | 1.091 | 0.765 | 16.479 | <0.000 * | 1.740 | 0.632 | 6.715 | <0.000 * |
CTQ5 | <--- | CYBTER | 1.115 | 0.721 | 15.536 | <0.000 * | 1.334 | 0.478 | 5.671 | <0.000 * |
CTQ6 | <--- | CYBTER | 1.140 | 0.732 | 16.265 | <0.000 * | 1.638 | 0.622 | 6.373 | <0.000 * |
CTQ7 | <--- | CYBTER | 0.915 | 0.643 | 13.547 | <0.000 * | 1.814 | 0.595 | 7.087 | <0.000 * |
Based on the results presented in
Table 12, it can be concluded that both analysed groups (
SK,
CZ) marked the same items of the research instrument in terms of the order of importance of the individual threats of the
CYBTER pillar as well as in terms of the degree of risk. For both groups, the issue of obtaining sensitive information of an intelligence nature for the purpose of using it in a kinetic terrorist attack (
CTQ4) is in first place, with an assigned high level of risk, and the issue of managing sympathisers by third parties, primarily by inciting their activity against possible targets, planning terrorist operations, providing feedback, etc. (
CTQ6) is in second place, with an equally high level of risk. For the
SK group of respondents, the third most important issue is the spread of propaganda and materials to support followers of radicalisation and their recruitment (
CTQ5), with a high level of risk assigned (0.721,
p < 0.000), while for the
CZ respondents, this issue is in fifth place with a medium level of risk (0.478,
p < 0.000). The third most significant problem for the
CZ respondents is the question on the low preparedness of the security forces for a specific digital environment and operating in it (
CTQ7), with a medium level of risk, while this problem for the
SK group is in sixth place but with a high level of risk (0.643,
p < 0.000). It can be seen in
Table 12 that the respondents from the
SK group assigned a high level of risk to all items of the research instrument, while those from the
CZ group marked only two items as high risk (
CTQ4,
CTQ6) and assigned a medium level of risk to the remaining five. Thus, even here, differences are evident in the perception of the degree of risk between the analysed groups. A graphic depiction of the differences in the perception of the risk of individual items of the cyberterrorism (
CYBTER) pillar of the hybrid threat cybersecurity between the
SK and
CZ respondents, including the display of the entire research file, is shown in
Figure 5.
The analysis of the differences in respondents’ views on the degree of risk of the fourth defined pillar of the hybrid threat cybersecurity (
Figure 2), that of the pillar disrupting or reducing eGovernment security (
DISREG), is presented in
Table 13.
Table 13.
Estimates of the parameters of the pillar disrupting or reducing eGovernment security for respondents from the Slovak and Czech Republics.
Table 13.
Estimates of the parameters of the pillar disrupting or reducing eGovernment security for respondents from the Slovak and Czech Republics.
Relationship | Slovak Republic | Czech Republic |
---|
Est. | Std. Est. | t | p | Est. | Std. Est. | t | p |
---|
GREGQ1 | <--- | DISREG | 1.000 | 0.759 | 18.936 | <0.000 * | 1.000 | 0.555 | 9.163 | <0.000 * |
GREGQ2 | <--- | DISREG | 1.112 | 0.829 | 21.007 | <0.000 * | 0.904 | 0.511 | 9.007 | <0.000 * |
GREGQ3 | <--- | DISREG | 1.044 | 0.727 | 17.877 | <0.000 * | 1.068 | 0.681 | 9.850 | <0.000 * |
GREGQ4 | <--- | DISREG | 0.909 | 0.732 | 18.063 | <0.000 * | 1.174 | 0.727 | 10.253 | <0.000 * |
GREGQ5 | <--- | DISREG | 0.978 | 0.758 | 17.394 | <0.000 * | 1.132 | 0.638 | 10.658 | <0.000 * |
GREGQ6 | <--- | DISREG | 0.916 | 0.686 | 15.202 | <0.000 * | 0.811 | 0.467 | 6.833 | <0.000 * |
The most significant problem perceived as a critical risk by the
SK respondents (0.829,
p < 0.000) is that of the underestimating of cyber threats in state or public administration (
GREGQ2), and at the same time, for this one question only, respondents indicated a critical degree of risk. This same problem has only a medium level of risk (0.511,
p < 0.000) for respondents from the
CZ group and in order of importance was in the penultimate, or fifth, place. For respondents from the Czech Republic, the most important form regarding the
DISREG pillar is the question that relates to the bad setting of the cybersecurity policy by the state (
GREGQ4), with a high degree of risk (0.727,
p < 0.000). Respondents from the
SK group assigned an equally high level of risk (0.732,
p < 0.000) to this problem, but for them, it is only in fourth place in terms of importance. The second most significant threat for
SK respondents is insufficient funding in the field of cybersecurity (
GERGQ1), with a high level of risk, while for the comparison group (
CZ) this problem is in fourth place with a medium level of risk (0.555,
p< 0.000). In contrast, for the groups of respondents from the Czech Republic, the issue of insufficient security of information systems intended for communication with citizens (
GREGQ3) is in second place, with a high degree of risk (0.671,
p < 0.000), and this same problem was put in fifth place by the SK respondents, but with the same high degree of risk (0.727,
p < 0.000). The problem relating to the low awareness and education of the population about cybersecurity (
GREGQ6) is in third place for both compared groups in terms of importance, with the same high degree of risk. As with the previously analysed pillar (
CYBTER), with this one (
DISREG), an interesting fact can be seen: while the respondents from the
SK group assigned a critical level of risk to one item and a high level of risk to the remaining five, the respondents from the
CZ group assigned a high level of risk to three items of the research instrument and a medium level of risk to four items. A graphic depiction of differences in risk perception of individual items of the pillar disrupting or reducing eGovernment security (
DISREG), hybrid threat cybersecurity, between respondents of the
SK and
CZ groups, including a display of the entire research file, is shown in
Figure 6.
The analysis of the last pillar of the hybrid threat cybersecurity in the sense of the theoretical model (
Figure 1), which we called enemy campaigns (
ENECAM), is presented for the compared groups in
Table 14.
Table 14.
Estimates of the parameters of enemy campaign pillar for respondents from the Slovak and Czech Republics.
Table 14.
Estimates of the parameters of enemy campaign pillar for respondents from the Slovak and Czech Republics.
Relationship | Slovak Republic | Czech Republic |
---|
Est. | Std. Est. | t | p | Est. | Std. Est. | t | p |
---|
ECQ1 | <--- | ENECAM | 1.000 | 0.648 | 15.551 | <0.000 * | 1.000 | 0.475 | 8.055 | <0.000 * |
ECQ2 | <--- | ENECAM | 0.990 | 0.645 | 15.339 | <0.000 * | 0.345 | 0.181 | 3.783 | <0.000 * |
ECQ3 | <--- | ENECAM | 1.036 | 0.684 | 14.244 | <0.000 * | 0.825 | 0.457 | 8.506 | <0.000 * |
ECQ4 | <--- | ENECAM | 0.983 | 0.651 | 13.698 | <0.000 * | 1.224 | 0.629 | 8.228 | <0.000 * |
ECQ5 | <--- | ENECAM | 0.840 | 0.542 | 11.708 | <0.000 * | 1.021 | 0.550 | 7.821 | <0.000 * |
The most important problem of the
ENECAM pillar for the
SK respondents is the question that relates to the ownership structure of individual Internet media, which can follow their own interests or the interests of other states (
ECQ3). This is proclaimed with a high level of risk (0.684,
p < 0.000), while this problem is in fourth place for the
CZ respondents, with a medium level of risk (0.457,
p < 0.000). For the
CZ respondents the most significant problem is that of insufficient screening of state/public administration employees who may work for the benefit of third parties (
ECQ4), with a high degree of risk (0.629,
p < 0.000), while for the
SK respondents, this issue ranks second and has an equally high degree of risk (0.651,
p < 0.000). The third most significant problem in terms of order of importance for the first compared group (
SK) is the one related to the effect of influence and disinformation campaigns on the Internet to shape residents’ moods (
ECQ1), with an assigned high degree of risk (0.648,
p < 0.000). While respondents from the
CZ group assigned a medium level of risk to this problem (0.475,
p < 0.000), like the SK group, put it in third place in terms of importance. An interesting difference between the opinions of the compared groups is the problem of the wide use of the social network environment due to their international aspect and different approach to freedom of speech, which enables them to be used to a greater extent to spread hate and disinformation campaigns (
ECQ2). While the respondents from the
SK group assigned a high level of risk to this problem (0.645,
p < 0.000), the respondents from the
CZ group assigned the “no risk” degree of risk (0.181,
p < 0.000) to this item of the research instrument (
ECQ2). Here it should be noted that within the entire research instrument, only this item (
ECQ2) is perceived as risk-free. In this case, too, it can be seen that the
SK respondents assign a higher level of risk to individual items of the research instrument than those from the
CZ group. A graphic depiction of the differences in the perception of the risk of individual items of the enemy campaigns (
ENECAM) pillar of the hybrid threat cybersecurity between the respondents of the
SK and
CZ groups, including the display of the entire research file, is shown in
Figure 7.
The differences in the perception of the relationships between the individual-defined pillars of the hybrid threat cybersecurity between the compared groups can also be analysed. We present a basic analysis of these relationships in
Table 15.
Both compared groups consider the link between the CYBSPY and DISRIT pillars to be the most important relationship. The correlation coefficient of this relationship for respondents from the SK group is at the level of 0.908 (p < 0.000), while this relationship in terms of Cohen’s scale can be considered almost perfect, and for respondents from the CZ group, the value of the correlation coefficient for the analysed relationship of the pillars of Cybersecurity is at the level 0.883 (p < 0.000), which means a very significant relationship. For the group of SK respondents, the relationship between the pillars of Cybersecurity CYBTER and DISREG reaches the value of the correlation coefficient of 0.862 (p < 0.000) and takes second place in the order of importance, while for the group of CZ respondents, the correlation coefficient is 0.762 (p < 0.000) and occupies the third place. For respondents from the SK group, a change of order also occurs in the third most significant relationship between the pillars of cybersecurity, namely the relationship between DISRIT and DISREG, with a correlation coefficient value of 0.882 (p < 0.000), while this relationship is in third place for respondents from the CZ group, with the correlation coefficient at 0.837 (p < 0.000) with the second level of significance. We see the most significant shift in the perception of the relationship between the CYBSPY and CYBTER pillars, where for the SK respondents this relationship is very significant (0.809, p < 0.000) and is in fifth place in terms of importance, and for the CZ respondents, this relationship is characterised as significant (0.531, p < 0.000) and fills the last place in terms of importance. In terms of the significance of the individual-defined pillars of cybersecurity for the individual compared groups, the respondents from the SK group consider the DISREG pillar, with 22.700% influence, as the biggest risk versus the CZ respondents, who consider the DISRIT pillar, with 24,274% influence, as the biggest problem. The DISRIT pillar is the second most important pillar for Slovak respondents with a share of 21.885%, while the second most important pillar for the Czech respondents is the CYBSPY pillar with a share of influence at the level of 22.637%. The third most important pillar of Cybersecurity as a hybrid threat for respondents of the SK group is the CYBTER pillar (19.447%), followed by the ENECAM pillar (17.995%) and the CYBSPY pillar (17.924%). If we rank the Cybersecurity pillars in the same way for the CZ respondents, third place in terms of the share of influence goes to the DISREG pillar (21.612%), followed by the ENECAM pillar (18.268%) and the CYBTER pillar (13.210%). Therefore, it is possible to state that there are significant differences between the compared groups of respondents (SK, CZ) both in the perception of the relationships between the individual-defined pillars of cybersecurity and in the perception of the risk of the individual pillars as a whole. This creates an interesting starting point, which must reflect the obtained results in education and the approach to cybersecurity in both of these countries. In conclusion, it needs to be noted that the respondents were students of police and military universities in Slovakia and the Czech Republic, and their preparation to battle against hybrid threats is crucial in terms of protecting countries from the danger of hybrid threats.