Analisis Perilaku Kesadaran Privasi Data Pengguna Sistem Informasi Akademik dengan Pendekatan Technology Threat Avoidance Theory


  • Yusrizal Hamdi * Mail Universitas Islam Negeri Raden Fatah Palembang, Palembang, Indonesia
  • Catur Eri Gunawan Universitas Islam Negeri Raden Fatah Palembang, Palembang, Indonesia
  • Imamulhakim Syahid Putra Universitas Islam Negeri Raden Fatah Palembang, Palembang, Indonesia
  • (*) Corresponding Author
Keywords: Analysis; Awareness Behavior; Data Privacy; SIMAK; TTAT

Abstract

The implementation of the Sistem Informasi Akademik (SIMAK) has raised concerns regarding data security, particularly the privacy of personal data, academic grades, and Kartu Rencana Studi (KRS) information. Threats to user data privacy often originate from internal actors, posing risks to the confidentiality, integrity, and availability of information. This study aims to explore the factors influencing SIMAK users’ privacy awareness behavior in response to such threats, using the Technology Threat Avoidance Theory (TTAT) as a theoretical framework. A quantitative research approach was employed, with data collected through questionnaires distributed to 393 respondents, comprising active SIMAK users from both student and faculty groups. The collected data were analyzed using the Covariance-Based Structural Equation Modeling (CB-SEM) method with the SmartPLS 4 software. The results reveal that perceptions of vulnerability and severity, as well as their interaction, positively influence threat perception. This perceived threat significantly enhances the motivation to avoid risks. However, the interaction between threat perception and safeguard effectiveness shows a negative impact. On the other hand, self-efficacy positively contributes to avoidance motivation, which in turn influences users’ awareness behavior in protecting data privacy. These findings emphasize the importance of enhancing individual awareness and capability in maintaining information security within academic information systems.

Downloads

Download data is not yet available.

References

Arachchilage, N. A. G., & Love, S. (2014). Security awareness of computer users: A phishing threat avoidance perspective. Computers in Human Behavior, 38, 304–312. https://doi.org/https://doi.org/10.1016/j.chb.2014.05.046

Butler, R. (2020). A systematic literature review of the factors affecting smartphone user threat avoidance behaviour. Information and Computer Security, 28(4), 555–574. https://doi.org/10.1108/ICS-01-2020-0016/FULL/XML

Carpenter, D., Young, D. K., Barrett, P., & McLeod, A. J. (2019). Refining technology threat avoidance theory. Communications of the Association for Information Systems, 44(1), 380–407. https://doi.org/10.17705/1CAIS.04422

Djatsa, F. (2020). Threat Perceptions, Avoidance Motivation and Security Behaviors Correlations. Journal of Information Security, 11(1), 19–45. https://doi.org/10.4236/JIS.2020.111002

Gillam, A. R., & Foster, W. T. (2020). Factors affecting risky cybersecurity behaviors by U.S. workers: An exploratory study. Computers in Human Behavior, 108, 106319. https://doi.org/10.1016/J.CHB.2020.106319

Liang, H., & Xue, Y. (2010). Understanding security behaviors in personal computer usage: A threat avoidance perspective. Journal of the Association for Information Systems, Journal of the Association for Information Systems , 11(7), 394–413. https://doi.org/10.17705/1jais.00232

Machali, I. (2021). Metode Penelitian Kuantitatif Panduan Praktis Merencanakan, Melaksanakan dan Analisis dalam Penelitian Kuantitatif (A. Q. Habib, Ed.). Yogyakarta: Fakultas Ilmu Tarbiyah dan Keguruan.

Mark, M. S., Borda, O., Stroman, J., Member, C., & Wilson, T. C. (2021). An Analysis of Factors Influencing Phising Threat Avoidance Behaviour: A Quantitative Study.

Raharjo, B. (2021). Keamanan Sistem Informasi (M. C. Wibowo, Ed.). Semarang: Yayasan Prima Agus Teknik.

Ramayani, Y., Oktarina, T., (2022). Analisa Manajemen Resiko Keamanan Pada Sistem Informasi Akademik (Simak) Uin Raden Fatah Palembang Menggunakan Metode Failure Mode And Effect Analysis (FMEA). Jurnal Inovtek, 7(2), 289–296. https://doi.org/http://dx.doi.org/10.35314/isi.v7i2.2631

Razzaq, A., Aditya, M., Widya, A., Kuncoro Putri, O., Musthofa, D. L., & Widodo, P. (2022). Serangan Hacking Tools sebagai Ancaman Siber dalam Sistem Pertahanan Negara (Studi Kasus: Predator). Global Political Studies Journal, 6. https://doi.org/10.34010/gpsjournal.v6i1

Rifai, A., Meliyani, A., Chyntia, P., & Sakti, I. A. (2023). Penerapan Metode Technology Threat Avoidance Theory Terhadap Tingkat Kesadaran Data Privasi Pengguna Media Sosial. Journal of Information System Research (JOSH), 4(3), 1026–1032. https://doi.org/10.47065/josh.v4i3.3081

Saidi, K., & Prayudi, Y. (2021). Analisis Indikator Utama Dalam Information Security-Personality Threat Terhadap Phishing Attack Menggunakan Metode Technology Threat Avoidance Theory (TTAT). Justindo. https://doi.org/http://dx.doi.org/10.32528/justindo.v6i1.3801

Siregar, Z. M. E., Parlaungan, A., Supriadi, Y. N., Ende, & Pristiyono. (2021). Structural Equation Modeling Konsep dan Implementasinya pada Kajian Ilmu Manajemen dengan Menggunakan AMOS. Yogyakarta: Deepublish.

Sugiyono. (2019). Metode Penelitian Kuantitatif (Setiyawami, Ed.). Bandung: Alfabeta.

Sylvester, F. L. (2022). Mobile Device Users’ Susceptibility to Phishing Attacks. International Journal of Computer Science and Information Technology, 14(1), 1–18. https://doi.org/10.5121/ijcsit.2022.14101

Tang, Z., Miller, A. S., Zhou, Z., & Warkentin, M. (2021). Does government social media promote users’ information security behavior towards COVID-19 scams? Cultivation effects and protective motivations. Government Information Quarterly, 38(2), 101572. https://doi.org/10.1016/J.GIQ.2021.101572

Verkijika, S. F. (2019). “If you know what to do, will you take action to avoid mobile phishing attacks”: Self-efficacy, anticipated regret, and gender. Computers in Human Behavior, 101, 286–296. https://doi.org/10.1016/J.CHB.2019.07.034

Waluyo, M., & Rachman, M. (2020). Mudah Cepat Tepat Dalam Aplikasi Structural Equation Modeling (N. A. Rahma, Ed.). Malang: Literasi Nusantara.


Bila bermanfaat silahkan share artikel ini

Berikan Komentar Anda terhadap artikel Analisis Perilaku Kesadaran Privasi Data Pengguna Sistem Informasi Akademik dengan Pendekatan Technology Threat Avoidance Theory

Dimensions Badge
Article History
Published: 2025-06-29
Abstract View: 357 times
PDF Download: 147 times
Section
Articles