Jurnal Ilman Gani Muis Fix
Jurnal Ilman Gani Muis Fix
1, April 2022
ISSN: p-ISSN 1979-9160 (Print)| e-ISSN 2549-7901 (Online)
DOI: http://dx.doi.org/10.15408/jti.v10I2.(article id)
JURNAL TEKNIK
INFORMATIKA
Homepage :
http://journal.uinjkt.ac.id/index.php/ti
1
Muis, Measuring the Level of Information Security Awareness…
Journal of Informatics Engineering Vol. 1 5 No. 1, April 2022
ISSN: p-ISSN 1979-9160 (Print)| e-ISSN 2549-7901 (Online)
DOI: http://dx.doi.org/10.15408/jti.v10I2.(article id)
2
Muis, Measurement of Level of Consciousness Security Information …
Journal of Informatics Engineering Vol. 1 5 No. 1, April 2022
ISSN: p-ISSN 1979-9160 (Print)| e-ISSN 2549-7901 (Online)
DOI: http://dx.doi.org/10.15408/jti.v10I2.(article id)
II. METHODOLOGY
3
Muis, Measuring the Level of Information Security Awareness…
Journal of Informatics Engineering Vol. 1 5 No. 1, April 2022
ISSN: p-ISSN 1979-9160 (Print)| e-ISSN 2549-7901 (Online)
DOI: http://dx.doi.org/10.15408/jti.v10I2.(article id)
of the matrix, and add up the values in each commonly referred to as the KAB model.
row by dividing them according to the number Each dimension is applied with 7 focus
of elements, then obtain the average. The areas based on HAIS-Q (Human Aspects of
comparison matrix of focus areas is obtained Information Security).
based on the results of interviews with experts 4. Developing the questionnaire: The
in the field of information security [20]. The questionnaire distributed to respondents had
results of the calculation of priority weights by 51 questions related to information security
calculating the eigenvalues of the comparison and was created on the Google forms
matrix are shown in Table 3. platform.
5. Distribution of questionnaires: Distribution
Table 3Focus Area Weight
of questionnaires was carried out using
Focus Area Weight
Password Management 17.36% random sampling techniques.
Mobile Devices 15.40% 6. Data processing and analysis: Data from the
Internet Usage 5.22% questionnaire will be processed and
Incident Reporting 13.62% analyzed to obtain the final results.
Email Usage 7.69% 7. Conclusion: At the end of the study, a
Use of Social Media 15.40% conclusion is given regarding the research
Information Handling 25.30% results and recommendations to increase
Total awareness for every 100% the information awareness of ShopeePay
dimension users in making transactions on Shopee .
The research steps can be seen in Figure III. RESULTS AND DISCUSSION
2 with the following details:
Respondents in this study is user
ShopeePay as method payment transaction
Shopee application in Thailand, especially at
Ban Buketamong School . A total of 250
respondents filled out the questionnaire that
was distributed. The questionnaire consisted of
4 questions regarding the characteristics of the
respondents consisting of age, gender,
occupation and last education and 51 questions
related to dimensions and focus areas. For each
dimension there are 17 questions in the
questionnaire. The demographics of the 250
respondents can be seen in table 4 below.
Table 4Respondent Demographics
Percentag
Criteria Goods e
Gender Woman 56.0%
Man 44.0%
Figure 2Research Steps Age <20 1.2%
1. Defining the problem and determining the 20-30 80.0%
desired solution, then designing a 31-40 16.0% of
hierarchical structure of the problems faced. >40 2.8%
The creator of this hierarchy is responsible last
for setting goals that reflect the overall education Senior High School 2.0% of
goals of the system.
Diploma 28.0%
2. Searching for literature studies: Searching
for literature studies used for research Bachelor 66.8%
purposes. Passed 1.2%
3. Determination of research variables: The Professio
variables in this study are the dimensions of n Student 10.0%
Knowledge , Attitude , Behavior which are Government employees 14.0% of
4
Muis, Measurement of Level of Consciousness Security Information …
Journal of Informatics Engineering Vol. 1 5 No. 1, April 2022
ISSN: p-ISSN 1979-9160 (Print)| e-ISSN 2549-7901 (Online)
DOI: http://dx.doi.org/10.15408/jti.v10I2.(article id)
Private sector employee 58.0% of potential to require action so that each user can
Another 10.0% be more careful and care about the security of
their personal data information. Actions that
The results of data processing using the can be taken are not to include personal
AHP method on the questionnaires that have information on social media like number
been filled out by respondents can be seen in mobile phone , because matter This can be
table 5. Differences color on each component used as a mode of fraud by other parties by
parts indicate that the component receives taking transfer number mobile phone . (SIM
special attention to carry out an action. Card Swap) is used so that fraudsters can
Explanation color can seen in table 6 [11]. obtain the OTP number, then reset the user's
Table 5Information Security Awareness password, thus threatening account security
Measurement and high risk. theft balance ShopeePay from
Focus Areas Dimensions Total Shopee account .
English aware In dimension behavior There are 4 focus
A B areas with the lowest scores. These focus areas
:K ness
Password 80.36% 80.24% 81.55 80.93 are Email Usage, Internet Usage, Information
Management % % Handling, and Incident Reporting. In the
85.95% 87.62% 76.43 81.52 knowledge dimension, there is a focus area on
Email Usage % % Internet Usage which has a score of 76.67%,
Internet 76.67% 84.64% 80.36 80.11 this score is the lowest in the knowledge
Usage % % dimension. This category has an "average"
Information 87.62% 81.19% 79.29 82.17 value, where actions must be taken such as
Handling % %
Mobile 83.10% 80.71% 81.67 81.91
providing education to user ShopeePay about
Devices % % related transactions on Shopee with need
Use of 76.37% 79.12% 69.23 73.35 education about the risk of fraud through fake
Social % % websites, websites must be opened using a
Media VPN and offer various prizes. This can result
Incident 91.67% 83.10% 73.81 81.03 in theft of personal data or Shopee account
Reporting % % data which can result in damage to balance
Total 83.75% 81.56% 77.55 80.21 ShopeePay users by irresponsible parties.
consciousnes % % Dimensions behavior own focus areas
s with average scores of Email Usage,
(dimension)
Information Handling, and Incident Reporting
with scores of 76.43%, 79.29%, and 73.81%.
Table 6Information Security Awareness This shows that part user ShopeePay in
Criteria and Actions transacting on Shopee has habit enter related
Colo Score
Category Information personal data Shopee email account on the
r (%)
80- Satisfying, and
online site, still has the habit of storing
(Good) personal data around Shopee account on his
100 requires no action
Monitoring, and mobile phone by not providing any special
60-79 (average) potentially security protection on the phone. So that when
requiring action mobile phone opened by someone else, stolen,
Unsatisfactory and or lost, then the user will lost balance
0-59 (poor)
requires action ShopeePay Because allows the person to open
files containing personal data or other
According to the results attached in important information. Users should report if
Table 5, the total level of security awareness someone calls asking for an OTP code to take
information user ShopeePay to transactions on transfer ShopeePay .
Shopee show results of 80.21%. The score in To increase awareness of security
the results of this study is in the "good" information user ShopeePay on transactions on
(satisfactory) category so that no action is Shopee, then we recommend several things to
required. However, in the focus area of " social the e-commerce party, namely Shopee ,
media utilization " it has color yellow For third namely develop policy information security ,
dimensions with the lowest level of awareness improving technologies such as features
value of 73.35%, where this value has the security service ShopeePay which can used by
5
Muis, Measuring the Level of Information Security Awareness…
Journal of Informatics Engineering Vol. 1 5 No. 1, April 2022
ISSN: p-ISSN 1979-9160 (Print)| e-ISSN 2549-7901 (Online)
DOI: http://dx.doi.org/10.15408/jti.v10I2.(article id)
Shopee. Users like to do double authentication social media usage. Then for the attitude
via OTP message and email on the service. dimension that falls into the “average”
ShopeePay moment do transactions and when category, namely social media usage. Then For
the user logs in to Shopee application , then dimensions behaviors that include in “average”
application cannot be accessed if the user is categories are email usage, information
detected using an unsafe network or VPN, the handling, social media usage, and incident
password management feature with a reporting. These focus areas require
combination of uppercase, lowercase, and monitoring and potentially require action. The
numbers is made mandatory so that users are recommendations used are solutions to
forced to use passwords with this pattern, and increase user awareness application to security
requires users to periodically update their security information , with make policies for
passwords according to the specified time, the focus areas, the technology used must be
"auto logout" feature is used to prevent users adequate, adding features security on the
from opening the application on two devices, application like add system multi- factor
the notification feature is sent to users via short verification dynamic that is require biometric
message or on the application periodically as a verification for transactions , real-time security
reminder of the dangers that must be avoided nudges namely add notification contextual
and a guide to always comply with information moment user will share OTP, and do education
security. Recommendations addressed to users such as micro learning modules with give 3
regarding strengthening information security minutes about security medical social before
awareness are education, both through online do transactions and make simulation attack
communication media in the form of phishing via in-app messenger .
interactive videos, online seminars, and social
media, as well as through conventional BIBLIOGRAPHY
communication media in the form of training
and seminars with places determined by the [1] Y. Meidita, Suprapto, and R. I.
organizer. Especially for dimensions and focus Rokhmawati, “Pengaruh Kualitas Layanan
areas that are still in the "average" value by Terhadap Kepuasan, Kepercayaan dan
requiring supervision so that they can be Loyalitas Pelanggan Pada E-Commerce
increased to the satisfactory category, so that
(Studi Kasus : Berrybenka),” Jurnal
no action or monitoring from users is required.
Pengembangan Teknologi Informasi dan
IV. CONCLUSION Ilmu Komputer, vol. 2, no. 11, pp. 5682–
5690, 2021.
This study was used to measure security [2] I. K. Gatot Suhendra, “KEKUATAN SHOPEE
awareness. information user ShopeePay to SEBAGAI E-COMMERCE TERPOPULER
transactions on Shopee with using the DI INDONESIA SAAT INI Gatot Suhendra
Knowledge-Attitude- Behavioral (KAB) 1 , Iwan Krisnadi 2,” no. 29, 2023.
Model. Research This use Analytic Hierarchy [3] L. Hadlington, J. Binder, and N. Stanulewicz,
Process method in processing data from “Exploring role of moral disengagement and
questionnaires. This study distributed counterproductive work behaviours in
questionnaires given to 250 respondents using information security awareness.,” Computers
ShopeePay in transacting on Shopee Thailand. in Human Behavior, vol. 114, no. September
Research This disclose that level awareness 2020, p. 106557, 2021, doi:
security information user ShopeePay Thailand 10.1016/j.chb.2020.106557.
in overall is in the category Good or satisfying [4] H. N. Chua, S. F. Wong, Y. C. Low, and Y.
which is 80.21% so that No need action , but Chang, “Impact of employees’ demographic
there is vulnerability critical namely in characteristics on the awareness and
understanding digital security in particular compliance of information security policy in
internet and social media usage only reached organizations,” Telematics and Informatics,
58.4%, while practice email security and vol. 35, no. 6, pp. 1770–1780, 2021, doi:
handling information is at under standard 10.1016/j.tele.2018.05.005.
which is 63.7%. There are several focus areas [5] SMJ Times, “Waspada Modus Penipuan
on the knowledge dimension that fall into the Shopee Pay, Jangan Bocorkan Kode OTP.”
“average” category, namely internet usage and [Online]. Available:
6
Muis, Measurement of Level of Consciousness Security Information …
Journal of Informatics Engineering Vol. 1 5 No. 1, April 2022
ISSN: p-ISSN 1979-9160 (Print)| e-ISSN 2549-7901 (Online)
DOI: http://dx.doi.org/10.15408/jti.v10I2.(article id)
7
Muis, Measuring the Level of Information Security Awareness…
Journal of Informatics Engineering Vol. 1 5 No. 1, April 2022
ISSN: p-ISSN 1979-9160 (Print)| e-ISSN 2549-7901 (Online)
DOI: http://dx.doi.org/10.15408/jti.v10I2.(article id)
JURNAL TEKNIK
INFORMATIKA
Website : http://journal.uinjkt.ac.id/index.php/ti
1
Muis, Measuring the Level of Information Security Awareness…
Journal of Informatics Engineering Vol. 1 5 No. 1, April 2022
ISSN: p-ISSN 1979-9160 (Print)| e-ISSN 2549-7901 (Online)
DOI: http://dx.doi.org/10.15408/jti.v10I2.(article id)
2
Muis, Measurement of Level of Consciousness Security Information …
Journal of Informatics Engineering Vol. 1 5 No. 1, April 2022
ISSN: p-ISSN 1979-9160 (Print)| e-ISSN 2549-7901 (Online)
DOI: http://dx.doi.org/10.15408/jti.v10I2.(article id)
pengukuran, yaitu Pengetahuan, Sikap, dilakukan secara acak dengan asumsi hasil
Perilaku, yang umum digunakan. yang disebut dengan persentase 80-100 memiliki nilai baik,
Model KAB [11]. Model KAB menjadi salah untuk persentase 60-79 memiliki nilai rata-rata,
satu acuan bagi beberapa penelitian terdahulu dan untuk persentase <59 memiliki nilai buruk
tentang pengukuran kesadaran keamanan [16]. Kuesioner dibuka dengan 4 pertanyaan
informasi [13]. Dalam hal ini, inisiatif mengenai karakteristik responden. Kemudian
kesadaran keamanan informasi memiliki fokus dilanjutkan dengan pertanyaan mengenai
utama pada perubahan perilaku. Bimbingan model pengetahuan, sikap dan perilaku yang
tentang pemahaman tingkat pengetahuan telah diterapkan pada 7 variabel area fokus
perilaku akan membantu untuk menjadi paling yang berjumlah 51 pertanyaan. Uji validasi
efektif dalam perubahan ini [14]. Namun, konstruk dengan faktor pemuatan > 0,7 dengan
penelitian terkait pengukuran tingkat kesadaran reliabilitas Cronbach's alpha sebesar 0,82.
keamanan informasi untuk menggunakan Pemilihan sampel dilakukan dengan teknik
ShopeePay dalam bertransaksi di Shopee stratified random sampling untuk memastikan
belum ada. Penelitian ini bertujuan untuk representasi demografis yang seimbang di
mengetahui tingkat kesadaran keamanan di wilayah Bangkok dan sekitarnya, dengan
dunia maya dengan menguji tingkat keamanan pertimbangan :
pengguna saat menggunakan metode 1. Kriteria Inklusi: Pengguna aktif ShopeePay
pembayaran ShopeePay dalam bertransaksi di dengan minimal 5 transaksi / bulan,
aplikasi Shopee. Penelitian ini menggunakan berdomisili di Thailand dan rentang usia
metode AHP, yaitu Analytic Hierarchy 18-55 tahun.
Process. AHP merupakan suatu pendekatan 2. Keterbatasan: cakupan geografis terbatas
dan metode dalam pengambilan keputusan. pada wilayah perkotaan oleh 83%
Thomas L. Saaty merupakan orang yang responden dari Bangkok, dan margin
mengembangkan metode ini dengan memilih kesalahan 6% pada tingkat kepercayaan
sejumlah alternatif terbaik yang akan 95% untuk populasi pengguna ShopeePay
dievaluasi berdasarkan kriteria yang telah Thailand (~15 juta).
ditentukan [15]. Responden yang Hirarki analitis digunakan sebagai
menggunakan ShopeePay untuk bertransaksi di pemrosesan data dalam penelitian ini.
Shopee dalam penelitian ini adalah mayoritas Langkah selanjutnya dalam AHP adalah
pengguna ShopeePay di Thailand. membuat struktur hierarki berdasarkan
tujuan pertama. Tujuan pertama adalah
II. METODOLOGI memulai pembentukan struktur ini [17],
[18].
Instrumen dalam penelitian ini adalah Gambar 1 adalah struktur hierarki
kuesioner. Kuesioner yang digunakan penelitian ini.
Kuesioner berisi pertanyaan-pertanyaan terkait
pengetahuan dan perilaku yang dilakukan
responden saat menggunakan ShopeePay untuk
bertransaksi di Shope. Skala Likert digunakan
dalam menjawab pertanyaan yang diberikan
kepada responden [16]. Skala Likert dalam
penelitian ini menggunakan 5 level. Tabel 1
merupakan skala yang digunakan dalam
kuesioner.
Tabel 7 Skala Likert
Sangat Tidak Ragu- Set Sangat
Tidak Setuju ragu uju Setuju
Setuju
(1) (2) (3) (4) (5) Gambar 3 Penelitian Hirarki AHP
Kuesioner yang dibuat dengan platform Tahap Pertama adalah membuat matriks
Google Form ini menggunakan teknik perbandingan antara kriteria, yaitu model KAB
pengambilan sampel secara acak (random dengan setiap alternatif (HAIS-Q), yaitu area
sampling). Teknik pengambilan sampel fokus yang telah ditentukan. Dalam
3
Muis, Measuring the Level of Information Security Awareness…
Journal of Informatics Engineering Vol. 1 5 No. 1, April 2022
ISSN: p-ISSN 1979-9160 (Print)| e-ISSN 2549-7901 (Online)
DOI: http://dx.doi.org/10.15408/jti.v10I2.(article id)
4
Muis, Measurement of Level of Consciousness Security Information …
Journal of Informatics Engineering Vol. 1 5 No. 1, April 2022
ISSN: p-ISSN 1979-9160 (Print)| e-ISSN 2549-7901 (Online)
DOI: http://dx.doi.org/10.15408/jti.v10I2.(article id)
Responden dalam penelitian ini adalah Penanganan 87.62% 81.19% 79.29 82.17
pengguna ShopeePay sebagai metode Informasi % %
pembayaran transaksi aplikasi Shopee di Perangkat 83.10% 80.71% 81.67 81.91
Thailand, khususnya di Sekolah Ban Seluler % %
Pengguna 76.37% 79.12% 69.23 73.35
Buketamong. Sebanyak 250 responden
Sosial Media % %
mengisi kuesioner yang telah dibagikan. Pelaporan 91.67% 83.10% 73.81 81.03
Kuesioner terdiri dari 4 pertanyaan mengenai Insiden % %
karakteristik responden yang meliputi usia, Kesadaran 83.75% 81.56% 77.55 80.21
jenis kelamin, pekerjaan, dan pendidikan total % %
terakhir, serta 51 pertanyaan terkait dimensi (dimensi)
dan area fokus. Untuk setiap dimensi, terdapat
17 pertanyaan dalam kuesioner. Demografi Tabel 12 Kriteria dan Tindakan Kesadaran
250 responden dapat dilihat pada tabel 4 di Keamanan Informasi
bawah ini. Warn Skor
Kategori Informasi
a (%)
Tabel 10 Demografi Responden
Memuaskan, dan
Percentag membutuhkan
Kriteria Detail Unit e 80-
(Bagus) tindakan
Jenis 100
memantau
Kelamin Perempuan 56.0%
Laki-laki 44.0% Berpotensi
Umur <20 1.2% (Menenga memerlukan
60-79
h) tindakan
20-30 80.0%
31-40 16.0% of Tidak memuaskan
>40 2.8% 0-59 (Buruk) dan memerlukan
Pendidika Sekolah Menengah tindakan
n Terakhir Atas 2.0% of
Berdasarkan hasil yang terlampir pada
Diploma 28.0%
Tabel 5, total tingkat kesadaran keamanan
Sarjana 66.8% informasi pengguna ShopeePay terhadap
Lulus 1.2% transaksi di Shopee menunjukkan hasil sebesar
Profesi Pelajar 10.0% 80,21%. Skor pada hasil penelitian ini berada
Pegawai Pemerintah 14.0% of pada kategori "baik" (memuaskan) sehingga
Pegawai Swasta 58.0% of tidak diperlukan tindakan. Namun, pada area
Lainnya 10.0% fokus "pemanfaatan media sosial" memiliki
warna kuning untuk dimensi ketiga dengan
Hasil pengolahan data menggunakan nilai tingkat kesadaran terendah sebesar
metode AHP pada kuesioner yang telah diisi 73,35%, dimana nilai ini berpotensi
oleh responden dapat dilihat pada tabel 5. memerlukan tindakan agar setiap pengguna
Perbedaan warna pada setiap bagian komponen dapat lebih berhati-hati dan peduli terhadap
menunjukkan bahwa komponen tersebut keamanan informasi data pribadinya. Tindakan
menerima perhatian khusus untuk melakukan yang dapat dilakukan adalah tidak
suatu tindakan. Penjelasan warna dapat dilihat mencantumkan informasi pribadi di media
pada tabel 6 [11]. sosial seperti nomor telepon seluler, karena hal
ini dapat digunakan sebagai modus penipuan
Tabel 11 Pengukuran Kesadaran Keamanan oleh pihak lain dengan melakukan transfer
Informasi nomor telepon seluler. (SIM Card Swap)
Area Dimen Kesad
digunakan agar penipu dapat memperoleh
K Fokus si aran
Total nomor OTP, kemudian mereset kata sandi
Manajemen 80.36% 80.24% 81.55 80.93 pengguna, sehingga mengancam keamanan
Kata Sandi % % akun dan berisiko tinggi. pencurian saldo
Pengguna 85.95% 87.62% 76.43 81.52 ShopeePay dari akun Shopee.
Email % % Pada dimensi perilaku terdapat 4 area
Pengguna 76.67% 84.64% 80.36 80.11 fokus dengan skor terendah. Area fokus
Internet % % tersebut adalah Penggunaan Email,
5
Muis, Measuring the Level of Information Security Awareness…
Journal of Informatics Engineering Vol. 1 5 No. 1, April 2022
ISSN: p-ISSN 1979-9160 (Print)| e-ISSN 2549-7901 (Online)
DOI: http://dx.doi.org/10.15408/jti.v10I2.(article id)
6
Muis, Measurement of Level of Consciousness Security Information …
Journal of Informatics Engineering Vol. 1 5 No. 1, April 2022
ISSN: p-ISSN 1979-9160 (Print)| e-ISSN 2549-7901 (Online)
DOI: http://dx.doi.org/10.15408/jti.v10I2.(article id)
Indonesia: yaitu penggunaan media sosial. [5] SMJ Times, “Waspada Modus Penipuan
Kemudian untuk dimensi perilaku yang Shopee Pay, Jangan Bocorkan Kode OTP.”
termasuk dalam kategori "rata-rata" adalah [Online]. Available:
penggunaan email, penanganan informasi, https://smjtimes.com/2020/09/28/waspada-
penggunaan media sosial, dan pelaporan modus-penipuan-shopee-pay-jangan-bocorkan-
insiden. Area fokus ini memerlukan kode-otp/
pemantauan dan berpotensi memerlukan [6] A. Tsohou, M. Karyda, and S. Kokolakis,
tindakan. Rekomendasi yang digunakan adalah “Analyzing the role of cognitive and cultural
solusi untuk meningkatkan aplikasi kesadaran biases in the internalization of information
pengguna terhadap keamanan informasi security policies: Recommendations for
keamanan, dengan membuat kebijakan untuk information security awareness programs,”
area fokus, teknologi yang digunakan harus Computers and Security, vol. 52, pp. 128–141,
memadai, menambahkan fitur keamanan pada 2020, doi: 10.1016/j.cose.2015.04.006.
aplikasi seperti menambahkan sistem verifikasi [7] H. J. M. M.E.Whitman, Principles of
multi-faktor dinamis yaitu memerlukan Information Security, 4th ed. Course
verifikasi biometrik untuk transaksi, dorongan Technology Cengage Learning, 2020.
keamanan waktu nyata yaitu menambahkan [8] PWC, “Information Security Breaches
notifikasi kontekstual saat pengguna akan Survey 2010 Technical Report,” pp. 1–22,
membagikan OTP, dan melakukan pendidikan 2020.
seperti modul pembelajaran mikro dengan [9] J. Andress, The Basics of Information
memberikan 3 menit tentang keamanan medis Security: Understanding the Fundamentals
sosial sebelum melakukan transaksi dan of InfoSec in Theory and Practice, 2nd Ed.
membuat simulasi serangan phishing melalui Elsevier, 2021.
messenger dalam aplikasi. [10] V. T. B. Guardner, Building an information
security awareness program: defending
BIBLIOGRAFI against social engineering and technical,
1st Ed. Elsiver, 2021.
[1] Y. Meidita, Suprapto, and R. I. [11] H. A. Kruger and W. D. Kearney,
Rokhmawati, “Pengaruh Kualitas Layanan “Measuring Information Security
Terhadap Kepuasan, Kepercayaan dan Awareness: a West Africa Gold Mining
Loyalitas Pelanggan Pada E-Commerce Environment Case Study,” no. March,
2021.
(Studi Kasus : Berrybenka),” Jurnal
[12] D. D. H. Wahyudiwan, Y. G. Sucahyo, and
Pengembangan Teknologi Informasi dan A. Gandhi, “Information security awareness
Ilmu Komputer, vol. 2, no. 11, pp. 5682– level measurement for employee: Case
5690, 2021. study at ministry of research, technology,
[2] I. K. Gatot Suhendra, “KEKUATAN SHOPEE and higher education,” Proceeding - 2017
SEBAGAI E-COMMERCE TERPOPULER 3rd International Conference on Science in
DI INDONESIA SAAT INI Gatot Suhendra Information Technology: Theory and
1 , Iwan Krisnadi 2,” no. 29, 2023. Application of IT for Education, Industry
[3] L. Hadlington, J. Binder, and N. Stanulewicz, and Society in Big Data Era, ICSITech
“Exploring role of moral disengagement and 2017, pp. 654–658, 2022, doi:
counterproductive work behaviours in 10.1109/ICSITech.2017.8257194.
information security awareness.,” Computers [13] K. Parsons, A. McCormac, M. Butavicius,
in Human Behavior, vol. 114, no. September M. Pattinson, and C. Jerram, “Determining
2020, p. 106557, 2021, doi: employee awareness using the Human
10.1016/j.chb.2020.106557. Aspects of Information Security
[4] H. N. Chua, S. F. Wong, Y. C. Low, and Y. Questionnaire (HAIS-Q),” Computers and
Chang, “Impact of employees’ demographic Security, vol. 42, no. September 2023, pp.
characteristics on the awareness and 165–176, 2014, doi:
compliance of information security policy in 10.1016/j.cose.2013.12.003.
organizations,” Telematics and Informatics, [14] A. McIlwraith, Information security and
vol. 35, no. 6, pp. 1770–1780, 2021, doi: employee behavior: how to reduce risk
10.1016/j.tele.2018.05.005. through employee education, training and
7
Muis, Measuring the Level of Information Security Awareness…
Journal of Informatics Engineering Vol. 1 5 No. 1, April 2022
ISSN: p-ISSN 1979-9160 (Print)| e-ISSN 2549-7901 (Online)
DOI: http://dx.doi.org/10.15408/jti.v10I2.(article id)
8
Muis, Measurement of Level of Consciousness Security Information …
Journal of Informatics Engineering Vol. 1 5 No. 1, April 2022
ISSN: p-ISSN 1979-9160 (Print)| e-ISSN 2549-7901 (Online)
DOI: http://dx.doi.org/10.15408/jti.v10I2.(article id)
9
Author Name, etc. : Article Title