Analysis of Factors Influencing the Perception of User Data Security in the Digital Era

Analysis of Factors Influencing the Perception of User Data Security in the Digital Era

Authors

  • Rifqi Rahmatullah Universitas Sebelas April
  • Muhammad Irsan
  • Reyto yogastiana

Keywords:

Security Perception, Data Security, Digital Era, Technology Acceptance Model (TAM), Protection Motivation Theory (PMT), User Trust.

Abstract

In the digital era, user data protection is a crucial challenge along with the increasing use of digital platforms for various transactions. This study aims to analyze the determinant factors that shape users' perception of data security. By integrating the theoretical frameworks of Technology Acceptance Model (TAM), Protection Motivation Theory (PMT), and Trust Theory, this study proposes a comprehensive conceptual model. The methodology used was a quantitative survey of digital payment platform users in Indonesia, with 258 valid respondents. The data was analyzed using Structural Equation Modeling (SEM). The results show that Perceived Usefulness, Perceived Security, and Trust significantly and positively affect users' perception of the security of their data. It was also found that the Perception of Security is the main antecedent of Trust. The implication of this research is that digital service providers must not only build secure technical infrastructure, but must also actively manage and improve perceptions of usability, security, and trust to build user trust.

References

J. Mollick, R. Cutshall, C. Changchit, and L. Pham, “Contemporary Mobile Commerce: Determinants of Its Adoption,” J. Theor. Appl. Electron. Commer. Res., vol. 18, no. 1, pp. 501–523, 2023, doi: 10.3390/jtaer18010026.

S. Saeed, “A Customer-Centric View of ECommerce Security and Privacy,” Appl. Sci., vol. 13, no. 2, 2023, doi: 10.3390/app13021020.

S. Nifakos et al., “Influence of human factors on cyber security within healthcare organisations: A systematic review,” Sensors, vol. 21, no. 15, pp. 125, 2021, doi: 10.3390/s21155119.

M. K. Hasan et al., “Blockchain Technology on Smart Grid, Energy Trading, and Big Data: Security Issues, Challenges, and Recommendations,” Wirel. Common. Mob. Comput., vol. 2022, 2022, doi: 10.1155/2022/9065768.

N. S. Sulaiman, M. A. Fauzi, W. Wider, J. Rajadurai, S. Hussain, and S. A. Harun, “Cyber–Information Security Compliance and Violation Behaviour in Organisations: A Systematic Review,” Soc. Sci., vol. 11, no. 9, 2022, doi: 10.3390/socsci11090386.

I. Al-Shanfari, W. Yassin, N. Tabook, R. Ismail, and A. Ismail, “Determinants of Information Security Awareness and Behaviour Strategies in Public Sector Organizations among Employees,” Int. J. Adv. Comput. Sci. Appl., vol. 13, no. 8, pp. 479–490, 2022, doi:10.14569/IJACSA.2022.0130855.

Helmiawan, M. A., Firmansyah, E., Fadil, I., Sofivan, Y., Mahardika, F., & Guntara, A. (2020). Analysis of web security using open web application security project 10. 2020 8th International Conference on Cyber and IT Service Management

Helmiawan, M. A., Julian, E., Cahyan, Y., & Saeppani, A. (2021). Experimental evaluation of security monitoring and notification on network intrusion detection system for server security. 2021 9th International Conference on Cyber and IT Service Management (CITSM Helmiawan, M. A., Fadil, I., Sofiyan, Y., & Firmansyah, E. (2021). Security model using intrusion detection system on cloud computing security management. 2021 9th International Conference on Cyber and IT Service Management

Helmiawan, M. A., & Nasution, A. I. (2022). The Effect of Internet Banking Use and Customer Protection Against Cyber Crime at Bank Rakyat Indonesia. Journal of Islamic Economics and Business, 2(2), 170–183.

S. Ahmad, H. Xu, and E. M. B. P. Ekanayake, “Socioeconomic Determinants and Perceptions of Smallholder Farmers towards Agroforestry Adoption in Northern Irrigated Plain, Pakistan,” Land, vol. 12, no. 4, 2023, doi: 10.3390/land12040813.

Siagan et al, “Entrancing tales for change with hypnosis and NLP,” Int. J. Data Netw. Sci., vol. 6, p.120, 2022.

J. Haney, Y. Acar, and S. Furman, “‘It’s the company, the Government, you and I’: User perceptions of responsibility for smart home privacy and security,” Proc. 30th USENIX Secur. Symp.no. May, pp. 411–428, 2021.

S. Nookhao and S. Kiattisin, “Achieving a successful e-government: Determinants of behavioral intention from Thai citizens’ perspective,” Heliyon, vol. 9, no. 8, p. e18944, 10.1016/j.heliyon.2023.e18944.

Published

2025-08-22
Loading...