Analisis Perilaku Mahasiswa dari Ancaman Keamanan Komputer

Authors

  • Akmal Hidayat Universitas Negeri Makassar Author
  • Mufti Fathur Rahman Universitas Negeri Makassar Author
  • Miftahul Jannah Awaliyah Universitas Negeri Makassar Author
  • Ahmad Abdillah Fathur Rachman Universitas Negeri Makassar Author
  • Andi Muh Achyar AM Universitas Negeri Makassar Author

DOI:

https://doi.org/10.61220/voice.v1i1.20235

Keywords:

Ancaman, Keamanan Komputer, Perilaku

Abstract

Mahasiswa sebagai pengguna aktif komputer di lingkungan akademik berisiko terhadap berbagai ancaman keamanan komputer, namun tidak semua memiliki kesadaran dan perilaku protektif yang memadai. Penelitian ini bertujuan untuk menganalisis perilaku mahasiswa JTIK di Universitas Negeri Makassar dalam menghadapi ancaman terhadap keamanan komputer. Metode yang digunakan adalah survei dengan kuesioner yang disebarkan kepada 43 mahasiswa dan dianalisis secara deskriptif. Hasil menunjukkan bahwa mayoritas mahasiswa memiliki kesadaran tinggi terhadap pentingnya keamanan komputer dan mampu mengenali ancaman seperti phishing. Namun, sebagian responden masih menunjukkan perilaku berisiko seperti membagikan kata sandi dan mengklik tautan mencurigakan. Meskipun pengetahuan mereka cukup baik, implementasi keamanan tidak selalu konsisten dalam praktik. Penelitian ini menyimpulkan bahwa diperlukan upaya pendidikan dan pelatihan berkelanjutan untuk mengubah kesadaran menjadi perilaku aman yang konsisten dalam menghadapi ancaman digital.

Downloads

Download data is not yet available.

References

[1] S. Singh, P. Sharma, S. Moon, D. Moon, and J. Park, "A comprehensive study on APT attacks and countermeasures for future networks and communications: challenges and solutions," The Journal of Supercomputing, vol. 1, pp. 1-32, 2019, doi: 10.1007/s11227-016-1850-4.

[2] O. Digilina, I. Teslenko, N. Muravyova, and A. Chekushov, "Information Security in a Digital Economy Deployment," pp. 1225-1230, 2021, doi: 10.1007/978-3-030-69415-9_133.

[3] J. Kizza, Cyber Crimes and Hackers, Texts in Computer Science, 2020, doi: 10.1007/978-1-4471-4543-1_5.

[4] M. Althobaiti, "Assessing User’s Susceptibility and Awareness of Cybersecurity Threats," Intelligent Automation and Soft Computing, vol. 28, pp. 167-177, 2021, doi: 10.32604/IASC.2021.016660.

[5] N. Taha and L. Dahabiyeh, "College students information security awareness: a comparison between smartphones and computers," Education and Information Technologies, vol. 26, pp. 1721-1736, 2020, doi: 10.1007/s10639-020-10330-0.

[6] T. Alharbi and A. Tassaddiq, "Assessment of Cybersecurity Awareness among Students of Majmaah University," Big Data Cogn. Comput., vol. 5, p. 23, 2021, doi: 10.3390/bdcc5020023.

[7] A. Subhani, I. Khan, and U. Ahmad, "Importance of Conducting Cyber Security Awareness Sessions among Undergraduate Students," Journal of Advanced Research in Social Sciences and Humanities, 2023, doi: 10.26500/jarssh-08-2023-0202.

[8] A. Elkhail, N. Lachtar, D. Ibdah, R. Aslam, H. Khan, A. Bacha, and H. Malik, "Seamlessly Safeguarding Data Against Ransomware Attacks," IEEE Transactions on Dependable and Secure Computing, vol. 20, pp. 1-16, 2023, doi: 10.1109/TDSC.2022.3214781.

[9] H. Ping, "Network Information Security Data Protection Based on Data Encryption Technology," Wireless Personal Communications, vol. 126, pp. 2719-2729, 2022, doi: 10.1007/s11277-022-09838-0.

[10] A. Moustafa, A. Bello, and A. Maurushat, "The Role of User Behaviour in Improving Cyber Security Management," Frontiers in Psychology, vol. 12, 2021, doi: 10.3389/fpsyg.2021.561011.

[11] J. R. Batmetan Suyoto, J. D. C. L. Suares, "An Empirical Investigation on Customer Behavior to Adopt Mobile Commerce among the Y Generation in Indonesia," Sriwijaya International Conference On Engineering, Science & Technology [SICEST 2016], 2016.

[12] J.L. Sidel, R.N. Bleibaum, and K.W.C. Tao, "Quantitative Descriptive Analysis," in Descriptive Analysis in Sensory Evaluation, S.E. Kemp, J. Hort, and T. Hollowood, Eds., 2018, doi: 10.1002/9781118991657.ch8.

[13] R. Raju, N. Hidayah, A. Rahman, and A. Ahmad, "Cyber Security Awareness in Using Digital Platforms Among Students in A Higher Learning Institution," Asian Journal of University Education, 2022, doi: 10.24191/ajue.v18i3.18967.

[14] H. Berry, "Survey of the Challenges and Solutions in Cybersecurity Awareness Among College Students," in 2023 11th International Symposium on Digital Forensics and Security (ISDFS), 2023, pp. 1-6, doi: 10.1109/ISDFS58141.2023.10131851.

[15] A. Garba, M. Siraj, S. Othman, and M. Musa, "A Study on Cybersecurity Awareness Among Students in Yobe State University, Nigeria: A Quantitative Approach," 2020.

[16] T. Steen, E. Norris, K. Atha, and A. Joinson, "What (if any) behaviour change techniques do government-led cybersecurity awareness campaigns use?," J. Cybersecur., vol. 6, 2020, doi: 10.1093/cybsec/tyaa019.

[17] M. Alqahtani, "Factors Affecting Cybersecurity Awareness among University Students," Applied Sciences, 2022, doi: 10.3390/app12052589.

[18] M. Mohammed and D. Bamasoud, "The Impact of Enhancing Awareness of Cybersecurity on Universities Students: a Survey Paper," Journal of Theoretical and Applied Information Technology, vol. 100, 2022.

[19] Z. Zulkifli, N. Molok, N. Rahim, and S. Talib, "Cyber Security Awareness Among Secondary School Students in Malaysia," Journal of Information Systems and Digital Technologies, 2020, doi: 10.31436/jisdt.v2i2.151.

[20] C. Canfield, B. Fischhoff, and A. Davis, "Better beware: comparing metacognition for phishing and legitimate emails," Metacognition and Learning, vol. 14, pp. 343-362, 2019, doi: 10.1007/s11409-019-09197-5.

[21] D. Maimon, C. Howell, R. Perkins, C. Muniz, and T. Berenblum, "A Routine Activities Approach to Evidence-Based Risk Assessment: Findings From Two Simulated Phishing Attacks," Social Science Computer Review, vol. 41, pp. 286-304, 2021, doi: 10.1177/08944393211046339.

[22] N. Beu, A. Jayatilaka, M. Zahedi, A. Babar, L. Hartley, W. Lewinsmith, and I. Baetu, "Falling for phishing attempts: An investigation of individual differences that are associated with behavior in a naturalistic phishing simulation," Comput. Secur., vol. 131, 103313, 2023, doi: 10.1016/j.cose.2023.103313.

Downloads

Published

30-06-2023

Issue

Section

Articles

How to Cite

Analisis Perilaku Mahasiswa dari Ancaman Keamanan Komputer. (2023). Journal of Vocational, Informatics and Computer Education, 1(1), 38-43. https://doi.org/10.61220/voice.v1i1.20235