JOURNAL OF INFORMATION SYSTEM RESEARCH (JOSH)
Vol 4 No 3 (2023): April 2023

Penerapan Metode Technology Threat Avoidance Theory Terhadap Tingkat Kesadaran Data Privasi Pengguna Media Sosial

Achmad Rifai (Universitas Nusa Mandiri, Jakarta)
Ade Meliyani (Universitas Nusa Mandiri, Jakarta)
Putri Chyntia (Universitas Nusa Mandiri, Jakarta)
Ichtiar Akbar Sakti (Universitas Nusa Mandiri, Jakarta)



Article Info

Publish Date
30 Apr 2023

Abstract

Theft of credential data by entering a username and password on the login page until the account is open. The authentication process in applications and the web is used to identify ownership of user data, this is because there is a vulnerability to attacks in the use of unsafe usernames and passwords. There are several security issues, one of the most common being passwords. Most systems use passwords to verify user identity. However, these passwords come with major security issues as users tend to use ones that are easy to guess, use the same password across multiple accounts, write it down and store it on their devices. Hackers have many options using which to steal passwords or hack user accounts such as credential stuffing, phishing, password.spraying, bruce force, prior data breach / reused passwords, password reset, keystroke logging and local discovery. To overcome security attacks, Multi-Factor Authentication (MFA) techniques provide higher security guarantees. Public awareness to protect identity information is fundamental, identity theft can go through various channels and ways and this needs to be emphasized. Self-efficacy (security awareness), behavioral intention, avoidance motivation and avoidance behavior are factors that influence the object. This factor analysis aims to determine the level of awareness and behavior patterns of social media users. Factor analysis used the MANOVA method as data analysis and the TTAT model. Based on the results of the MANOVA tests of between – subjects effects, the factor of favorance motivation (r = 0.499 and Sig. 0.000) and behavioral intention (r = 0.427 and Sig. 0.000). There is a link between these factors, so users must avoid data theft through security measures using multi-factor authentication (MFA).

Copyrights © 2023






Journal Info

Abbrev

josh

Publisher

Subject

Computer Science & IT Decision Sciences, Operations Research & Management

Description

Artikel yang dimuat melalui proses Blind Review oleh Jurnal JOSH, dengan mempertimbangkan antara lain: terpenuhinya persyaratan baku publikasi jurnal, metodologi riset yang digunakan, dan signifikansi kontribusi hasil riset terhadap pengembangan keilmuan bidang teknologi dan informasi. Fokus Journal ...