Penerapan Metode Technology Threat Avoidance Theory Terhadap Tingkat Kesadaran Data Privasi Pengguna Media Sosial
Abstract
Theft of credential data by entering a username and password on the login page until the account is open. The authentication process in applications and the web is used to identify ownership of user data, this is because there is a vulnerability to attacks in the use of unsafe usernames and passwords. There are several security issues, one of the most common being passwords. Most systems use passwords to verify user identity. However, these passwords come with major security issues as users tend to use ones that are easy to guess, use the same password across multiple accounts, write it down and store it on their devices. Hackers have many options using which to steal passwords or hack user accounts such as credential stuffing, phishing, password.spraying, bruce force, prior data breach / reused passwords, password reset, keystroke logging and local discovery. To overcome security attacks, Multi-Factor Authentication (MFA) techniques provide higher security guarantees. Public awareness to protect identity information is fundamental, identity theft can go through various channels and ways and this needs to be emphasized. Self-efficacy (security awareness), behavioral intention, avoidance motivation and avoidance behavior are factors that influence the object. This factor analysis aims to determine the level of awareness and behavior patterns of social media users. Factor analysis used the MANOVA method as data analysis and the TTAT model. Based on the results of the MANOVA tests of between – subjects effects, the factor of favorance motivation (r = 0.499 and Sig. 0.000) and behavioral intention (r = 0.427 and Sig. 0.000). There is a link between these factors, so users must avoid data theft through security measures using multi-factor authentication (MFA).
Downloads
References
C. Mutia Annur, “Jumlah Pengguna Internet di Indonesia (2018-2022),” databoks.katadata.co.id, 2022. https://databoks.katadata.co.id/datapublish/2022/03/23/ada-2047-juta-pengguna-internet-di-indonesia-awal-2022.
R. Nafi’ah, “Pelanggaran Data Dan Pencurian Identitas Pada E-Commerce,” Cyber Secur. dan Forensik Digit., vol. 3, no. 1, pp. 7–13, 2020, doi: 10.14421/csecurity.2020.3.1.1980.
R. Mahmud, “Pencurian Identitas Kategori & Kasus,” Cyber Secur. dan Forensik Digit., vol. 2, no. 1, pp. 38–42, 2019, doi: 10.14421/csecurity.2019.2.1.1421.
S. Widup and V. Communications, “2020 Verizon Data Breach Investigations Report,” 2020, doi: 10.13140/RG.2.2.21300.48008.
S. S. Gupta, A. Thakral, and T. Choudhury, “Social Media Security Analysis of Threats and Security Measures,” 2018 Int. Conf. Adv. Comput. Commun. Eng., no. June, pp. 01–06, 2018, doi: 10.1109/iccomm.2018.8430168.
H. Liang and Y. Xue, “Avoidance of information technology threats: A theoretical perspective,” MIS Q. Manag. Inf. Syst., vol. 33, no. 1, pp. 71–90, 2009, doi: 10.2307/20650279.
F. A. Aloul, “The Need for Effective Information Security Awareness,” J. Adv. Inf. Technol., vol. 3, no. 3, pp. 116–123, 2012, doi: 10.4304/jait.3.3.176-183.
B. A. Sara D. Boysen, “ANALYZING THREAT PERCEPTIONS IN THE CONTEXT OF FITNESS DATA: REFINING THE THREAT CALCULUS IN TECHNOLOGY THREAT AVOIDANCE THEORY,” 2018.
D. K. Young, P. Barrett, A. J. Mcleod, and D. Carpenter, “Refining Technology Threat Avoidance Theory Refining Technology Threat Avoidance Theory,” 2019, doi: 10.17705/1CAIS.04422.
K. Thomas et al., “Protecting accounts from credential stuffing with password breach alerting,” Proc. 28th USENIX Secur. Symp., pp. 1555–1571, 2019.
K. C. Wang and M. K. Reiter, “Detecting stuffing of a user’s credentials at her own accounts,” Proc. 29th USENIX Secur. Symp., pp. 2201–2218, 2020.
H. Liang and Y. Xue, “Understanding security behaviors in personal computer usage: A threat avoidance perspective,” J. Assoc. Inf. Syst., vol. 11, no. 7, pp. 394–413, 2010, doi: 10.17705/1jais.00232.
I. A. Afandi, A. Kusyanti, and N. H. Wardani, “Analisis Hubungan Kesadaran Keamanan , Privasi Informasi , Perilaku Keamanan Pada Para Pengguna Media Sosial Line,” J. Pengemb. Teknol. Inf. dan Ilmu Komput., vol. 1, no. 9, pp. 783–792, 2017.
K. Saidi and Y. Prayudi, “Analisis Indikator Utama Dalam Information Security - Personality Threat Terhadap Phishing Attack Menggunakan Metode Technology Threat Avoidance Theory ( TTAT ),” Justindo, vol. 6, no. 1, pp. 21–30, 2021.
H. Unimus, “ANOVA dan MANOVA,” in ANOVA dan MANOVA, 2022, p. 1.
M. M. Dr. Ratna Wijayanti Daniar Paramita, S.E., Cf. Noviansyah Rizal, S.E., M.M., Ak, CA, and M. M. Riza Bahtiar Sulistyan, S.E., METODE PENELITIAN KUANTITATIF, 3rd ed. Lumajang, Jawa Timur: WIDYA GAMA PRESS STIE WIDYA GAMA LUMAJANG, 2021.
I. Ghozali, Aplikasi Analisis Multivariate dengan Program IBM SPSS 25. Semarang: Badan Penerbit Universitas Diponegoro, 2018.
S. Arikunto, Prosedur Penelitian Suatu Pendekatan Praktik. Jakarta: PT. Rineka Cipta, 2010.
S. Raharjo, “Panduan Analisis Faktor dan Interpretasi dengan SPSS Lengkap," SPSS Indonesia,” https://www.spssindonesia.com, 2018. https://www.spssindonesia.com/2018/12/analisis-faktor-dan-interpretasi-spss.html (accessed Jun. 20, 2022).
N. A. G. Arachchilage and S. Love, “Security awareness of computer users: A phishing threat avoidance perspective,” Comput. Human Behav., vol. 38, pp. 304–312, 2014, doi: 10.1016/j.chb.2014.05.046.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Penerapan Metode Technology Threat Avoidance Theory Terhadap Tingkat Kesadaran Data Privasi Pengguna Media Sosial
Pages: 1026-1032
Copyright (c) 2023 Achmad Rifai, Ade Meliyani, Putri Chyntia, Ichtiar Akbar Sakti

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).






















