Analysis of the Influence of Awareness and Perception of Phenomena on Cyber Security Behavior Using PLS-SEM
Keywords:
Cyber Security Behavior, Security Awareness, Risk Perception, Data Breach, PLS-SEMAbstract
The increasing frequency of personal data leak cases in Indonesia indicates significant vulnerability among digital communities, even though various awareness campaigns have been conducted. This phenomenon indicates that conventional educational approaches that only focus on conveying information are often ineffective in changing user behavior in real terms. This study aims to analyze the factors driving cybersecurity behavior by testing the influence of Awareness and Perception of Phenomena on Cybersecurity Behavior. Using a quantitative approach, this study collected data through questionnaires from 100 respondents who are active users of digital services. The collected data were then analyzed using the Partial Least Squares - Structural Equation Modeling (PLS-SEM) method with SmartPLS software. The results of the analysis show that the variables Awareness and Perception of Phenomena, both, have a positive and significant influence on Cybersecurity Behavior. This finding confirms that in order to form safe behavior, cognitive understanding of risk must be accompanied by experiential triggers that make the threat feel real. The results of this study are expected to be a data-based foundation for designing a more holistic and effective digital security education strategy, by integrating elements of knowledge and experience to bridge the gap between knowing and acting.
References
R. Rusman and A. Kamaludin, “Investigation of Cyber Crime in the Indonesian Legal Framework,” J. La Soc., vol. 5, no. 6, pp. 1576–1586, 2024, doi: 10.37899/journal-la-sociale.v5i6.1367.
A. P. Kehista et al., “Analisis Keamanan Data Pribadi pada Pengguna E-Commerce: Ancaman, Risiko, Strategi Kemanan (Literature Review),” J. Ilmu Manaj. Terap., vol. 4, no. 5, pp. 625–632, 2023, doi: 10.31933/jimt.v4i5.
R. D. Hapsari and K. G. Pambayun, “ANCAMAN CYBERCRIME DI INDONESIA: Sebuah Tinjauan Pustaka Sistematis,” J. Konstituen, vol. 5, no. 1, pp. 1–17, 2023, doi: 10.33701/jk.v5i1.3208.
G. R. Duana, A. Masyar, and C. Wulandari, “TINJAUAN TEORI KRIMINOLOGI DALAM KEJAHATAN SIBER ( KASUS KEBOCORAN DATA NASABAH ) Overview of Criminological Theory in Cyber Crime ( Customer Data Leakage Cases ),” J. Prioris, vol. 11, no. 2, pp. 161–174, 2024, doi: 10.25105/prio.v11i2.18959.
G. Notoatmodjo and C. Thomborson, “Passwords and perceptions,” Conf. Res. Pract. Inf. Technol. Ser., vol. 98, no. June, pp. 71–78, 2009.
M. Bada, A. Sasse, and J. Bada, M., Sasse, A., Nurse, “Cyber Security Awareness Campaigns: Why They Fail to Change Behavior,” Int. Conf. Cyber Secur. Sustain. Soc., no. July, p. 38, 2014.
D. Russo and K. J. Stol, “PLS-SEM for software engineering research: An introduction and survey,” ACM Comput. Surv., vol. 54, no. 4, 2022, doi: 10.1145/3447580.
N. Zeng, Y. Liu, P. Gong, M. Hertogh, and M. König, “Do right PLS and do PLS right: A critical review of the application of PLS-SEM in construction management research,” Front. Eng. Manag., vol. 8, no. 3, pp. 356–369, 2021, doi: 10.1007/s42524-021-0153-5.
Helmiawan, M. A., & Wiharko, T. (2018). Application of Fingerprint Security System on Motorcycles using Arduino Microcontroller. J-Tin’s-Jurnal Teknik Informatika, 2(1).
Helmiawan, M. A., Juna, D. I., & Ramdhani, B. (2018). Pengamanan Sistem Dan Data E-Voting Berbasis Network. INTERNAL (Information System Journal), 1(1), 1–10.
Helmiawan, M. A., Firmansyah, E., Fadil, I., Sofivan, Y., Mahardika, F., & Guntara, A. (2020). Analysis of web security using open web application security project 10. 2020 8th International Conference on Cyber and IT Service Management
Helmiawan, M. A., Julian, E., Cahyan, Y., & Saeppani, A. (2021). Experimental evaluation of security monitoring and notification on network intrusion detection system for server security. 2021 9th International Conference on Cyber and IT Service Management (CITSM ….
Helmiawan, M. A., Fadil, I., Sofiyan, Y., & Firmansyah, E. (2021). Security model using intrusion detection system on cloud computing security management. 2021 9th International Conference on Cyber and IT Service Management (CITSM ….
Helmiawan, M. A., & Nasution, A. I. (2022). The Effect of Internet Banking Use and Customer Protection Against Cyber Crime at Bank Rakyat Indonesia. Journal of Islamic Economics and Business, 2(2), 170–183.