The Peran Pengetahuan dan Sikap dalam Membentuk Perilaku Pelaporan Insiden Keamanan di Perbankan Mobile
https://doi.org/10.36342/teika.v14i2.3758
Kata Kunci:
Perbankan Mobile, Keamanan Informasi, Pelaporan Insiden, Pengetahuan, SikapAbstrak
Meningkatnya ketergantungan pada perbankan mobile memberikan kemudahan bagi pengguna, tetapi juga meningkatkan risiko keamanan, sehingga analisis pengetahuan, sikap, dan perilaku pengguna terhadap pelaporan insiden keamanan informasi menjadi sangat penting. Penelitian ini mengkaji ketiga dimensi tersebut dalam konteks perbankan mobile di Indonesia, dengan tujuan menjembatani kesenjangan antara kesadaran dan tindakan. Survei dilakukan terhadap 430 responden menggunakan instrumen yang diadaptasi dari Human Aspect of Information Security Questionnaire (HAIS-Q). Analisis statistik, termasuk Cronbach's alpha, reliabilitas komposit, dan Average Variance Extracted (AVE), digunakan untuk memvalidasi konstruk. Hasil penelitian menunjukkan bahwa responden memiliki tingkat pengetahuan (mean = 4,21) dan sikap positif (mean = 4,20) yang tinggi, tetapi perilaku proaktif mereka dalam melaporkan insiden relatif rendah (mean = 3,26). Analisis koefisien jalur menunjukkan bahwa pengetahuan sangat memengaruhi sikap (0,722) tetapi memiliki dampak langsung yang lebih lemah terhadap perilaku (0,162). Perbedaan gender juga memiliki peran signifikan yang memengaruhi pengetahuan dan perilaku. Temuan ini menyoroti perlunya intervensi yang terfokus, termasuk pelatihan yang lebih baik, budaya pelaporan yang mendukung, dan mekanisme pemantauan yang kuat untuk mengurangi risiko dan meningkatkan praktik pelaporan insiden. Penelitian selanjutnya perlu mengeksplorasi faktor psikologis dan teknologi untuk lebih meningkatkan keamanan perbankan mobile.
Unduhan
Referensi
. D. Baltuttis, T. Teubner, and M. T. P. Adam, "A typology of cybersecurity behavior among knowledge workers," Computers & Security, vol. 140, p. 103741, 2024. [Online]. Available: https://doi.org/10.1016/j.cose.2024.103741
. Q. An, W. C. H. Hong, X. Xu, and others, "How education level influences internet security knowledge, behaviour, and attitude: a comparison among undergraduates, postgraduates and working graduates," International Journal of Information Security, vol. 22, pp. 305–317, Apr. 2023. [Online]. Available: https://doi.org/10.1007/s10207-022-00637-z
. A. Smith et al., "Minimizing the fallout from security breaches: The role of prompt incident reporting," International Journal of Cybersecurity, vol. 21, no. 3, pp. 112–125, 2023.
. Cybersecurity and Infrastructure Security Agency, "Cybersecurity Incident Response," Department of Homeland Security, 2024. [Online]. Available: https://www.cisa.gov/cybersecurity-incident-response
. R. Jones and K. Lee, "The critical importance of timely reporting in protecting sensitive data," Data Protection Quarterly, vol. 8, no. 4, pp. 67–80, 2022.
. T. Brown and J. Taylor, "Learning from security incidents: Enhancing organizational resilience," Cyber Defense Review, vol. 10, no. 3, pp. 98–110, 2023.
. M. Garcia and P. Martinez, "Transparency and trust: Reporting security breaches to stakeholders," Journal of Information Security, vol. 17, no. 1, pp. 45–59, 2023.
. L. Wang et al., "Enhancing coordinated incident response through comprehensive reporting," Cyber Threat Intelligence Review, vol. 11, no. 2, pp. 77–91, 2023.
. K. Parsons, D. Calic, M. Pattinson, M. Butavicius, A. McCormac, and T. Zwaans, "The Human Aspects of Information Security Questionnaire (HAIS-Q): Two further validation studies," Computers & Security, vol. 66, pp. 40-51, May 2017, doi: 10.1016/j.cose.2017.01.004.
. J. C. Nunnally, Psychometric Theory, 2nd ed. New York: McGraw-Hill, 1978.
. C. Lee, J. Kim, and S. Park, "Evaluating scale reliability: A comprehensive review," Journal of Quantitative Research Methods, vol. 14, no. 3, pp. 234–246, 2022.
. J. F. Hair, W. C. Black, B. J. Babin, and R. E. Anderson, Multivariate Data Analysis, 8th ed. Cengage Learning, 2021.
. C. Fornell and D. F. Larcker, "Evaluating structural equation models with unobservable variables and measurement error," Journal of Marketing Research, vol. 18, no. 1, pp. 39–50, 1981.
. P. Johnson and X. Wang, "Convergent and discriminant validity in measurement models: A practical guide," Journal of Measurement Science, vol. 11, no. 2, pp. 112–128, 2023.
. N. Alkhazi, M. Alomari, and A. Basalamah, "Assessment of the impact of information security awareness training methods on knowledge, attitude, and behavior," Journal of Information Security Research, vol. 14, no. 3, pp. 234–246, 2022. [Online]. Available: https://www.researchgate.net/publication/366380248
. Q. An, W. C. H. Hong, X. Xu, and others, "How education level influences internet security knowledge, behaviour, and attitude: a comparison among undergraduates, postgraduates, and working graduates," International Journal of Information Security, vol. 22, pp. 305–317, 2023. [Online]. Available: https://doi.org/10.1007/s10207-022-00637-z
##submission.downloads##
Diterbitkan
Cara Mengutip
Terbitan
Bagian
Lisensi
Hak Cipta (c) 2024 TeIKa
Artikel ini berlisensiCreative Commons Attribution-ShareAlike 4.0 International License.
The submitting author warrants that the submission is original and that she/he is the author of the submission together with the named co-authors; to the extend the submission incorporates text passages, figures, data or other material from the work of others, the submitting author has obtained any necessary permission.
Articles in this journal are published under the Creative Commons Share Alike Attribution Licence (CC-BY-SA What does this mean?). This is to get more legal certainty about what readers can do with published articles, and thus a wider dissemination and archiving, which in turn makes publishing with this journal more valuable for you, the authors.
By submitting an article the author grants to this journal the non-exclusive right to publish it. The author retains the copyright and the publishing rights for his article without any restrictions.