Evaluation of Information Security Behavior Based on Awareness and Experience of Social Media Users

Evaluation of Information Security Behavior Based on Awareness and Experience of Social Media Users

Authors

  • Nadeya Ladia Tantri Universitas Sebelas April

Abstract

This study aims to evaluate the level of awareness and behavior of social media users towards digital information security. Through a quantitative approach by distributing online questionnaires to 100 respondents, the data were analyzed using the Partial Least Squares – Structural Equation Modeling (PLS-SEM) method through SmartPLS 4 software. The study found that the phenomenon of direct experience with digital threats has a significant and dominant influence on the formation of good security behavior. Meanwhile, awareness has a significant but weak influence. Based on these findings, procedural recommendations are also formulated to form a safe, adaptive, and responsible digital culture.

References

K. K. dan I. RI, “Survei Literasi Digital Nasional 2021: Hasil dan Analisis,” 2021.https://katadata.co.id/publikasi/literasi-digital

J. F. Hair, C. M. Ringle, and M. Sarstedt, “PLS-SEM: Indeed a silver bullet,” J. Mark. Theory Pract., vol. 19, no. 2, pp. 139–152, 2011, doi:10.2753/MTP1069-6679190202.

“ISO/IEC 27001:2013 – Information technology —Security techniques — Information security management systems — Requirements.”https://www.iso.org/standard/54534.html

M. Karlsson, F. Karlsson, J. Åström, and T. Denk, “The effect of perceived organizational culture on employees’ information security compliance,” Inf. Comput. Secur., vol. 30, no. 3, pp. 382–401, 2022, doi: 10.1108/ICS-06-2021-0073.

K. Z. Ansyafa, M. Fajarudin, M. Fadhil, and S. N. Neyman, “Analisis Keamanan Media Sosial terhadap Serangan Phising Online menggunakan Metode Zphisher dan Social Engineering Toolkit,” J. Internet Softw. Eng., vol. 1, no. 4, p. 10, 2024, doi: 10.47134/pjise.v1i4.2641.

F. P. E. Putra, U. Ubaidi, A. Zulfikri, G. Arifin, and R. M. Ilhamsyah, “Analysis of Phishing Attack Trends, Impacts and Prevention Methods: Literature Study,” Brill. Res. Artif. Intell., vol. 4, no. 1, pp. 413–421, 2024, doi: 10.47709/brilliance.v4i1.4357.

Z. Alkhalil, C. Hewage, L. Nawaf, and I. Khan, “Phishing Attacks: A Recent Comprehensive Study and a New Anatomy,” Front. Comput. Sci., vol. 3, no. March, pp. 1–23, 2021, doi:[8] [9] [10] 10.3389/fcomp.2021.563060.

A. M. Pahnilaa, Seppo, Mikko Siponena, “Employees’ Behavior t owar ds IS Secur ity Policy Comp liance,” J. Dermatol., vol. 39, no. 6, pp. 567–568, 2012, doi: 10.1111/j.1346-8138.2011.01436.x.

A. Fattah, W. Wagimin, and N. Nurlia, “Enhancing Cybersecurity Awareness among University Students: A Study on the Relationship between Knowledge, Attitude, Behavior, and Training,” JSIJ. Sist. Inf., vol. 15, no. 1, pp. 3139–3149, 2023, doi:10.18495/jsi.v15i1.21812.

A. Melnikovas, R. G. Lugo, K. Maennel, A. Brilingaite, S. Sutterlin, and A. Juozapavicius,

“Teaching pentesting to social sciences students using experiential learning techniques to improve attitudes towards possible cybersecurity careers,” Eur. Conf. Inf. Warf. Secur. ECCWS, vol. 2023-June, pp. 294–302, 2023, doi:10.34190/eccws.22.1.1145.

Y. D. Guracho, S. J. Thomas, N. Almutairi, and K. T. Win, Experiential Learning or Direct Training fostering ethical cybersecurity decision making via serious games, vol. 14636 LNCS, no. April. 2024. doi: 10.1007/978-3-031-58226-4_10.

Helmiawan, M. A., Fadil, I., Sofiyan, Y., & Firmansyah, E. (2021). Security model using intrusion detection system on cloud computing security management. 2021 9th International Conference on Cyber and IT Service Management

Helmiawan, M. A., & Nasution, A. I. (2022). The Effect of Internet Banking Use and Customer Protection Against Cyber Crime at Bank Rakyat Indonesia. Journal of Islamic Economics and Business, 2(2), 170–183.

Helmiawan, M. A., Firmansyah, E., Fadil, I., Sofivan, Y., Mahardika, F., & Guntara, A. (2020). Analysis of web security using open web application security project 10. 2020 8th International Conference on Cyber and IT Service Management

Helmiawan, M. A., Julian, E., Cahyan, Y., & Saeppani, A. (2021). Experimental evaluation of security monitoring and notification on network intrusion detection system for server security. 2021 9th International Conference on Cyber and IT Service Management

Published

2025-08-22
Loading...