1 > REPLACE THIS LINE WITH YOUR MANUSCRIPT ID NUMBER (DOUBLE-CLICK HERE TO EDIT) < DEFINING THE BEAUTY OF CYBER HYGIENE: A RETROSPECTIVE LOOK *Amily Fikry, Muhammad Iskandar Hamzah, Zuhal Hussein, Azreen Joanna Abdul and Khairul Azmi Abu Bakar Member, IEEE AbstractThe Internet's widespread influence, especially during the COVID-19 pandemic, has led to a surge in remote work and increased online activities, simultaneously amplifying the risk of cyberattacks. In response to this global shift, cyber hygiene emerges as a crucial asset in preventing cybercrimes at individual and organizational levels. This paper provides a comprehensive definition of cyber hygiene, emphasizing its role in promoting online health through ingrained practices, knowledge, behavior, and attitudes. Distinguishing cyber hygiene from cybersecurity, it situates the former as an integral facet within the broader cybersecurity framework. The study categorizes cyber hygiene into two primary dimensions: data privacy, protection, and prevention, and online safety measures. It highlights the benefits of adopting robust cyber hygiene practices, including safeguarding personal information, preventing cyberattacks, protecting digital assets, and fostering a positive online reputation. The research underscores the manifold advantages of prioritizing cyber hygiene. Central to the argument is the pivotal role of cyber hygiene in mitigating the escalating risks associated with increased Internet reliance. It emphasizes the transformative impact of seamlessly integrating cyber hygiene into daily routines, advocating its incorporation into individual and organizational cybersecurity practices. The recommendations stress the critical role of cyber hygiene in minimizing system compromises, building trust in collaborative engineering environments, and safeguarding invaluable information. In navigating an era defined by heightened connectivity, understanding and actively implementing resilient cyber hygiene practices stand as imperative measures for fortifying the security of our digital landscape. KeywordCyber Hygiene, Cybersecurity, Malaysia, Review The authors would like to acknowledge Universiti Teknologi MARA (UiTM) for the financial support through the Geran Penyelidikan MyRA, Project File No: 600-RMC 5/3/GPM (117/2022). The authors would also like to express appreciation to the Islamic Digital Marketing Research Group, faculty and all team members for their excellent support of ensuring the completion of this research. (Corresponding Author: Amily Fikry) Amily Fikry, Faculty of Business and Management, Universiti Teknologi MARA, Puncak Alam, Selangor, Malaysia. Email: amily@uitm.edu.my. Muhammad Iskandar Hamzah, Universiti Teknologi MARA, Puncak Alam, Selangor, Malaysia. Azreen Joanna Abdul, Faculty of Business and Management, Universiti Teknologi MARA, Puncak Alam, Selangor, Malaysia. Zuhal Hussein, Faculty of Business and Management, Universiti Teknologi MARA, Kelantan, Malaysia. Khairul Azmi Abu Bakar, Center for Cyber Security, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia 43600, Bangi, Selangor, Malaysia. I. INTRODUCTION HE availability of the Internet enables connectivity across borders for individuals and businesses, especially during the enforcement of strict lockdown and social distancing measures during the COVID-19 pandemic. The COVID-19 pandemic has drove an inevitable surge in the use of the Internet and a shift towards a new normal of work or specifically, the remote work policy, which have propelled the growing research interest on the field of cyber hygiene. Following the pandemic, the increase in the Internet traffic has led to various implications, including the transition to remote work for employees, online learning for students, the increasing reliance on food and non-food delivery services and other service providers via mobile applications, higher demand for entertainment video and game contents hosted on digital streaming platforms, and forced interpersonal interactions in the virtual space [1]. The massive Internet consumption inevitably increases the risk of cyberattack; after all, human behavior is the main source of vulnerability in information system [2]. For instance, employees who work from home are likely to use a personal computer (shared with other users) or public or shared Wi-Fi and devices [3]. The substantial reliance on the Internet during this period has prompted the increasing adoption of network like virtual private network (VPN) and information and communication technology at all levels, especially at the organizational level [3]. With the increasing consumption of the Internet, the aspect of cyber hygiene at both individual and organizational levels has become a critical concern [4]. The concept of personal hygiene in the public health domain derives the term “cyber hygiene” [5]. To date, there has been no conclusive definition of cyber hygiene [6]. European Union Agency for Network and Information Security (ENISA) described cyber hygiene as personal hygiene involving simple daily routines, practices, and regular checkups in the efforts of maintaining good online health condition. Various terms of cyber hygiene have been used interchangeably in research related to cybersecurity [7]. Furthermore, most prior studies focused on cybersecurity behavior and risk factors associated with cyber hygiene and overlooked the definition and elements of cyber hygiene. It is pivotal to holistically explore cyber hygiene, particularly on what cyber hygiene is and how it is measured, in order to attain cyber resilience [8]. Issues of cyber hygiene affect numerous organizations globally. The Wall Street Journal later studied 70 iOS applications in February and found that some of these T This article has been accepted for publication in IEEE Engineering Management Review. This is the author's version which has not been fully edited and content may change prior to final publication. Citation information: DOI 10.1109/EMR.2024.3361023 © 2024 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See https://www.ieee.org/publications/rights/index.html for more information. Authorized licensed use limited to: UNIVERSITI TEKNOLOGI MARA. Downloaded on February 03,2024 at 03:39:11 UTC from IEEE Xplore. Restrictions apply.