PENGUKURAN KEAMANAN PENGGUNA ANDROID MENGGUNAKAN EXPECTACY BASED MODEL DAN ALTERNATIVE THREAT BASED MODEL

  • Dio Febrillian Tanjung Universitas Multimedia Nusantara
  • Wella Wella Universitas Multimedia Nusantara
Keywords: Android, Alternative Threat based Model, Behavior, Expectacy based Model, Smartphones

Abstract

Saat ini, 132,7 juta smartphone digunakan di Indonesia, menunjukkan bahwa smartphones merupakan perangkat penting bagi masyarakat Indonesia. Jumlah pengguna yang terus meningkat setiap tahunnya, dan popularitas smartphone dengan sistem operasi Android menunjukkan bahwa pengguna Android juga rentan terhadap ancaman. Setelah melihat kerentanan ini, dianggap penting untuk melacak tindakan pengguna untuk meningkatkan kesadaran pengguna akan tindakan yang salah. Metode yang digunakan dalam penelitian ini adalah Expectacy Based Model dan Alternative Threat Based Model. Model pertama memiliki variabel dependen perilaku dan variabel independen seperti susceptibility, severity, susceptibility x severity, efficacy, cost, trust, dan user shopiscation. Model kedua memiliki variabel dependen perilaku dan variabel independen seperti malware, data leakage, data theft, biaya sosial, kepercayaan, dan pengguna perdagangan. Analisis akan dilakukan menggunakan tools SPSS.

Downloads

Download data is not yet available.

References

[1] G. Gufran, I. M.-J. (Jurnal I. S. dan, and undefined 2020, “Pemanfaatan e-modul berbasis smartphone sebagai media literasi masyakarat,” ejournal.mandalanursa.orgG Gufran, I MatayaJISIP (Jurnal Ilmu Sosial dan Pendidikan), 2020•ejournal.mandalanursa.org, 2020, Accessed: Jul. 12, 2024. [Online]. Available: https://ejournal.mandalanursa.org/index.php/JISIP/article/view/1060
[2] D. Pranitasari, A. S.-J. A. D. Manajemen, and undefined 2021, “Analisis Kepuasan Pelanggan Elektronik Shopee menggunakan Metode E-Service Quality dan Kartesius,” ejournal.stei.ac.id, 2021, Accessed: Jul. 12, 2024. [Online]. Available: https://ejournal.stei.ac.id/index.php/JAM/article/view/438
[3] J. Hasan, “Mempertimbangkan Pendekatan Prinsiplisme dalam Entrepreneurship1,” books.google.comJ HasanRefleksi 30 Tahun HIDESI, 2021•books.google.com2, 2021, Accessed: Jul. 12, 2024. [Online]. Available: https://books.google.com/books?hl=en&lr=&id=n-BCEAAAQBAJ&oi=fnd&pg=PA205&dq=%5B8%5D%09Hasan,+J.+(2021).+Mempertimbangkan+Pendekatan+Prinsiplisme+dalam+Entrepreneurship1.+Refleksi+30+Tahun+HIDESI,+205.&ots=BWzJcvT-A-&sig=O07DMnj4Tcem6x3V0JZZ5Qez9nM
[4] N. Zaidan et al., Kewirausahaan Era Digital. 2023. Accessed: Jul. 12, 2024. [Online]. Available: https://books.google.com/books?hl=en&lr=&id=iWHZEAAAQBAJ&oi=fnd&pg=PA1&dq=%5B9%5D%09Zaidan,+N.,+Salsabila,+A.,+Fahri,+B.+A.,+Sinaga,+J.+F.,+Syahputra,+R.+A.,+Wadeng,+T.,+...+%26+Al+Azhari,+M.+R.+(2023).+Kewirausahaan+Era+Digital.+Indonesia+Emas+Group.&ots=zSE1iMmsqR&sig=nQPYAqR_AEPU00KrcldeB1VVu3s
[5] Y. Sudaryo, N. Efi, and M. Yosep, Digital Marketing dan Fintech di Indonesia. 2020. Accessed: Jul. 12, 2024. [Online]. Available: https://books.google.com/books?hl=en&lr=&id=kpD5DwAAQBAJ&oi=fnd&pg=PA1&dq=%5B10%5D%09Yoyo+Sudaryo,+S.+E.,+MM,+M.,+Efi,+N.+A.+S.,+Yosep,+M.+A.,+SE,+M.,+Nurdiansyah,+B.,+%26+ST,+I.+(2020).+Digital+Marketing+dan+Fintech+di+Indonesia.+Penerbit+Andi.&ots=ETwWTNcTWc&sig=xx1rYO0mxgQsZYRbfBVW6HAPPU0
[6] M. Alawida and A. Omolara, “A deeper look into cybersecurity issues in the wake of Covid-19: A survey,” ElsevierM Alawida, AE Omolara, OI Abiodun, M Al-RajabJournal of King Saud University-Computer and Information Sciences, 2022•Elsevier, 2022, Accessed: Jul. 12, 2024. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S1319157822002762
[7] H. Ardianto, “Motif Perempuan Bermain Game Online Pubg Mobile (Studi Pada Kalangan Mahasiswi Fakultas Ilmu Komunikasi Universitas Islam Riau),” 2022, Accessed: Jul. 12, 2024. [Online]. Available: http://repository.uir.ac.id/id/eprint/15224
[8] L. Knapova, A. Kruzikova, L. Dedkova, and D. Smahel, “Who Is Smart with Their Smartphones? Determinants of Smartphone Security Behavior,” Cyberpsychol Behav Soc Netw, vol. 24, no. 9, pp. 584–592, Sep. 2021, doi: 10.1089/CYBER.2020.0599.
[9] P. Shah and A. Agarwal, “Cybersecurity behaviour of smartphone users in India: an empirical analysis,” Information and Computer Security, vol. 28, no. 2, pp. 293–318, Jun. 2020, doi: 10.1108/ICS-04-2019-0041/FULL/HTML.
[10] A. Aleroud, E. Abu-Shanab, … A. A.-A.-J. of I., and undefined 2020, “An examination of susceptibility to spear phishing cyber attacks in non-English speaking communities,” ElsevierA Aleroud, E Abu-Shanab, A Al-Aiad, Y AlshboulJournal of Information Security and Applications, 2020•Elsevier, 2020, Accessed: Nov. 15, 2024. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S2214212620307791
[11] F. L. Sylvester, “Mobile device users’ susceptibility to phishing attacks,” International Journal of Computer Science and Information Technology (IJCSIT), vol. 14, no. 1, 2022, Accessed: Nov. 26, 2024. [Online]. Available: https://www.researchgate.net/publication/358996746_Mobile_device_users’_susceptibility_to_phishing_attacks
[12] N. F. Amin, S. Garancang, ; Kamaluddin Abunawas, N. Penulis, : Nur, and F. Amin, “Konsep umum populasi dan sampel dalam penelitian,” journal.unismuh.ac.idNF Amin, S Garancang, K AbunawasPilar, 2023•journal.unismuh.ac.id, vol. 14, no. 1, 2023, Accessed: Jul. 12, 2024. [Online]. Available: https://journal.unismuh.ac.id/index.php/pilar/article/view/10624
[13] M. del C. V. Martínez, J.-M. Montero, P. A. M. Cervantes, and P. A. M. Cervantes, “Recent Advances and Applications in Partial Least Squares Structural Equation Modeling (PLS-SEM),” Recent Advances and Applications in Partial Least Squares Structural Equation Modeling (PLS-SEM), p. 494, Dec. 2023, doi: 10.3390/BOOKS978-3-0365-9593-1.
[14] M. Irwansyah, B. W.-J. C. Mandalika, and undefined 2023, “ANALISIS HUBUNGAN ANTARA PROGRAM BEHAVIOR BASED SAFETY (BBS) DAN TINGKAT KEPATUHAN TERHADAP PERILAKU KESELAMATAN KERJA,” ojs.cahayamandalika.comM Irwansyah, B WidanarkoJurnal Cahaya Mandalika ISSN 2721-4796 (online), 2023•ojs.cahayamandalika.com, 2023, Accessed: Nov. 26, 2024. [Online]. Available: https://ojs.cahayamandalika.com/index.php/jcm/article/view/2553
[15] B. Yusuf, “PENGARUH LAYANAN FINANCIAL TECHNOLOGY BERBASIS METODE PEMBAYARAN PAYLATER TERHADAP PERILAKU IMPLUSIVE BUYING,” 2022, Accessed: Nov. 15, 2024. [Online]. Available: http://digilib.unila.ac.id/id/eprint/67838
Published
2025-02-04
How to Cite
[1]
D. Tanjung and W. Wella, “PENGUKURAN KEAMANAN PENGGUNA ANDROID MENGGUNAKAN EXPECTACY BASED MODEL DAN ALTERNATIVE THREAT BASED MODEL”, IDEALIS, vol. 8, no. 1, pp. 150-159, Feb. 2025.