Analisa Perilaku Keamanan Informasi Pengguna Mobile Banking
https://doi.org/10.36342/teika.v14i1.3382
Kata Kunci:
perilaku keamanan informasi, resiko, mobile banking, kewaspadaan keamanan informasiAbstrak
Penggunaan layanan mobile banking bertumbuh dengan pesat dan telah merevolusi sektor perbankan, menawarkan pelanggan akses yang nyaman dan efisien ke layanan perbankan tanpa batasan waktu dan jarak. Namun, kenyamanan ini disertai dengan risiko keamanan informasi. Karena itu perilaku keamanan informasi pengguna penting untuk meminimalkan resiko dan dampaknya. Penelitian ini bertujuan menganalisa perilaku keamanan informasi pengguna mobile banking di Indonesia, dengan fokus pada faktor-faktor yang mempengaruhi perilaku tersebut.
Penelitian ini melakukan survey terhadap 365 responden pengguna aplikasi mobile banking dengan gender, umur, tingkat pendidikan, dan preferensi aplikasi mobile banking yang beragam. Penelitian ini mengukur lima dimensi perilaku keamanan informasi, yaitu: manajemen password, penggunaan aplikasi pesan, penggunaan internet, penggunaan perangkat di ruang publik, dan pelaporan insiden.
Penelitian menemukan bahwa perilaku keamanan informasi pengguna mobile banking mempunyai keberagaman yang signifikan. Temuan ini menekankan pentingnya bank mengintegrasikan perilaku pengguna ke dalam strategi keamanan informasi yang komprehensif. Penelitian ini berkontribusi dalam meningkatkan praktik keamanan informasi di mobile banking dengan memberikan wawasan tentang perilaku pengguna dan pengaruh demografis.
Unduhan
Referensi
. S. Kim, D. Shin, and J. Lee, "The Adoption of Mobile Banking in Emerging Markets: A Cross-Country Study," Journal of Global Information Management, vol. 29, no. 3, pp. 1-23, 2021.
. N. Yildirim and A. Varol, "A Research on Security Vulnerabilities in Online and Mobile Banking Systems," 2019 7th International Symposium on Digital Forensics and Security (ISDFS), 2019, doi: 10.1109/ISDFS.2019.8757495.
. S. Goel and R. Gupta, "Security Issues in Mobile Banking Applications: The Current State of Risks," International Journal of Information Management, vol. 50, pp. 456-468, 2020.
. K. Parsons, E. Young, M. Butavicious, A. McCormac, M. Pattison, dan C. Jerram, "The Influence of organisational information security culture on cybersecurity decision making," Journal of Cognitive Engineering and Decision Making, vol. 9, no. 2, pp. 117-129, 2015.
. Pricewaterhouse Coopers (PWC), "Turnaround and transformation in cybersecurity: key finding from The Global State of Information Security Survey 2016," 2015.
. M. Hakami and M. Alshaikh, "Identifying Strategies to Address Human Cybersecurity Behavior: A Review Study," International Journal of Computer Science and Network Security, vol. 22, no. 4, pp. 299-309, 2022.
. I. Al-Shanfari, W. Yassin, N. Tabook, R. Ismail and A. Ismail, "Determinants of Information Security Awareness and Behaviour Strategies in Public Sector Organizations among Employees," International Journal of Advanced Computer Science and Applications, vol. 13, no. 8, pp. 479-490, 2022.
. V. Linkov, P. Zámečník, D. Havlíčková and C.-W. Pai, "Human Factors in the Cybersecurity of Autonomous Vehicles: Trends in Current Research," Frontiers in Psychology, vol. 10, pp. 1-7, 2019.
. G. K. Ajufo and A. Qutieshat, "An Examination of the Human Factors in Cybersecurity: Future Direction for Nigerian Banks," Indonesian Journal of Information Systems (IJIS), vol. 6, no. 1, pp. 1-16, Aug. 2023
. D. Shin and H. Kang, "Security Practices in Mobile Banking: User Awareness and Prevention Measures," Journal of Financial Services Marketing, vol. 26, no. 1, pp. 54-66, 2021.
. K. Parsons, D. Calic, M. Pattinson, M. Butavicius, A. McCormac, and T. Zwaans, "The Human Aspects of Information Security Questionnaire (HAIS-Q): Two further validation studies," Computers & Security, vol. 66, pp. 40-51, May 2017, doi: 10.1016/j.cose.2017.01.004.
. D. Iacobucci and A. Duhachek, "Advancing Alpha: Measuring Reliability With Confidence," Journal of Consumer Psychology, vol. 13, no. 4, pp. 478-487, 2003.
. K.-c. Chang and C.-p. Wang, "Information systems resources and information security," Information Systems Frontiers, vol. 13, pp. 579-593, Apr. 2010. DOI: 10.1007/s10796-010-9232-6.
. S. Lee, D. Lee, and M. Kang, "Factors Influencing User Behavior in Mobile Banking Security: An Empirical Study," Computers & Security, vol. 114, p. 102580, 2022.
. J. Park, H. Jeong, and S. Kim, "Understanding the Influence of Security Awareness on Mobile Banking Use: A Comparative Study," Telematics and Informatics, vol. 57, p. 101508, 2021.
##submission.downloads##
Diterbitkan
Cara Mengutip
Terbitan
Bagian
Lisensi
Hak Cipta (c) 2024 TeIKa
Artikel ini berlisensiCreative Commons Attribution-ShareAlike 4.0 International License.
The submitting author warrants that the submission is original and that she/he is the author of the submission together with the named co-authors; to the extend the submission incorporates text passages, figures, data or other material from the work of others, the submitting author has obtained any necessary permission.
Articles in this journal are published under the Creative Commons Share Alike Attribution Licence (CC-BY-SA What does this mean?). This is to get more legal certainty about what readers can do with published articles, and thus a wider dissemination and archiving, which in turn makes publishing with this journal more valuable for you, the authors.
By submitting an article the author grants to this journal the non-exclusive right to publish it. The author retains the copyright and the publishing rights for his article without any restrictions.