Analisis Perilaku Kesadaran Privasi Data Pengguna Sistem Informasi Akademik dengan Pendekatan Technology Threat Avoidance Theory
Abstract
The implementation of the Sistem Informasi Akademik (SIMAK) has raised concerns regarding data security, particularly the privacy of personal data, academic grades, and Kartu Rencana Studi (KRS) information. Threats to user data privacy often originate from internal actors, posing risks to the confidentiality, integrity, and availability of information. This study aims to explore the factors influencing SIMAK users’ privacy awareness behavior in response to such threats, using the Technology Threat Avoidance Theory (TTAT) as a theoretical framework. A quantitative research approach was employed, with data collected through questionnaires distributed to 393 respondents, comprising active SIMAK users from both student and faculty groups. The collected data were analyzed using the Covariance-Based Structural Equation Modeling (CB-SEM) method with the SmartPLS 4 software. The results reveal that perceptions of vulnerability and severity, as well as their interaction, positively influence threat perception. This perceived threat significantly enhances the motivation to avoid risks. However, the interaction between threat perception and safeguard effectiveness shows a negative impact. On the other hand, self-efficacy positively contributes to avoidance motivation, which in turn influences users’ awareness behavior in protecting data privacy. These findings emphasize the importance of enhancing individual awareness and capability in maintaining information security within academic information systems.
Downloads
References
Arachchilage, N. A. G., & Love, S. (2014). Security awareness of computer users: A phishing threat avoidance perspective. Computers in Human Behavior, 38, 304–312. https://doi.org/https://doi.org/10.1016/j.chb.2014.05.046
Butler, R. (2020). A systematic literature review of the factors affecting smartphone user threat avoidance behaviour. Information and Computer Security, 28(4), 555–574. https://doi.org/10.1108/ICS-01-2020-0016/FULL/XML
Carpenter, D., Young, D. K., Barrett, P., & McLeod, A. J. (2019). Refining technology threat avoidance theory. Communications of the Association for Information Systems, 44(1), 380–407. https://doi.org/10.17705/1CAIS.04422
Djatsa, F. (2020). Threat Perceptions, Avoidance Motivation and Security Behaviors Correlations. Journal of Information Security, 11(1), 19–45. https://doi.org/10.4236/JIS.2020.111002
Gillam, A. R., & Foster, W. T. (2020). Factors affecting risky cybersecurity behaviors by U.S. workers: An exploratory study. Computers in Human Behavior, 108, 106319. https://doi.org/10.1016/J.CHB.2020.106319
Liang, H., & Xue, Y. (2010). Understanding security behaviors in personal computer usage: A threat avoidance perspective. Journal of the Association for Information Systems, Journal of the Association for Information Systems , 11(7), 394–413. https://doi.org/10.17705/1jais.00232
Machali, I. (2021). Metode Penelitian Kuantitatif Panduan Praktis Merencanakan, Melaksanakan dan Analisis dalam Penelitian Kuantitatif (A. Q. Habib, Ed.). Yogyakarta: Fakultas Ilmu Tarbiyah dan Keguruan.
Mark, M. S., Borda, O., Stroman, J., Member, C., & Wilson, T. C. (2021). An Analysis of Factors Influencing Phising Threat Avoidance Behaviour: A Quantitative Study.
Raharjo, B. (2021). Keamanan Sistem Informasi (M. C. Wibowo, Ed.). Semarang: Yayasan Prima Agus Teknik.
Ramayani, Y., Oktarina, T., (2022). Analisa Manajemen Resiko Keamanan Pada Sistem Informasi Akademik (Simak) Uin Raden Fatah Palembang Menggunakan Metode Failure Mode And Effect Analysis (FMEA). Jurnal Inovtek, 7(2), 289–296. https://doi.org/http://dx.doi.org/10.35314/isi.v7i2.2631
Razzaq, A., Aditya, M., Widya, A., Kuncoro Putri, O., Musthofa, D. L., & Widodo, P. (2022). Serangan Hacking Tools sebagai Ancaman Siber dalam Sistem Pertahanan Negara (Studi Kasus: Predator). Global Political Studies Journal, 6. https://doi.org/10.34010/gpsjournal.v6i1
Rifai, A., Meliyani, A., Chyntia, P., & Sakti, I. A. (2023). Penerapan Metode Technology Threat Avoidance Theory Terhadap Tingkat Kesadaran Data Privasi Pengguna Media Sosial. Journal of Information System Research (JOSH), 4(3), 1026–1032. https://doi.org/10.47065/josh.v4i3.3081
Saidi, K., & Prayudi, Y. (2021). Analisis Indikator Utama Dalam Information Security-Personality Threat Terhadap Phishing Attack Menggunakan Metode Technology Threat Avoidance Theory (TTAT). Justindo. https://doi.org/http://dx.doi.org/10.32528/justindo.v6i1.3801
Siregar, Z. M. E., Parlaungan, A., Supriadi, Y. N., Ende, & Pristiyono. (2021). Structural Equation Modeling Konsep dan Implementasinya pada Kajian Ilmu Manajemen dengan Menggunakan AMOS. Yogyakarta: Deepublish.
Sugiyono. (2019). Metode Penelitian Kuantitatif (Setiyawami, Ed.). Bandung: Alfabeta.
Sylvester, F. L. (2022). Mobile Device Users’ Susceptibility to Phishing Attacks. International Journal of Computer Science and Information Technology, 14(1), 1–18. https://doi.org/10.5121/ijcsit.2022.14101
Tang, Z., Miller, A. S., Zhou, Z., & Warkentin, M. (2021). Does government social media promote users’ information security behavior towards COVID-19 scams? Cultivation effects and protective motivations. Government Information Quarterly, 38(2), 101572. https://doi.org/10.1016/J.GIQ.2021.101572
Verkijika, S. F. (2019). “If you know what to do, will you take action to avoid mobile phishing attacks”: Self-efficacy, anticipated regret, and gender. Computers in Human Behavior, 101, 286–296. https://doi.org/10.1016/J.CHB.2019.07.034
Waluyo, M., & Rachman, M. (2020). Mudah Cepat Tepat Dalam Aplikasi Structural Equation Modeling (N. A. Rahma, Ed.). Malang: Literasi Nusantara.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Analisis Perilaku Kesadaran Privasi Data Pengguna Sistem Informasi Akademik dengan Pendekatan Technology Threat Avoidance Theory
Pages: 24-33
Copyright (c) 2025 Yusrizal Hamdi, Catur Eri Gunawan, Imamulhakim Syahid put

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).













