Penerapan Metode Technology Threat Avoidance Theory Terhadap Tingkat Kesadaran Data Privasi Pengguna Media Sosial

A. Rifai, Ade Meliyani, Putri Chyntia, Ichtiar Akbar Sakti
{"title":"Penerapan Metode Technology Threat Avoidance Theory Terhadap Tingkat Kesadaran Data Privasi Pengguna Media Sosial","authors":"A. Rifai, Ade Meliyani, Putri Chyntia, Ichtiar Akbar Sakti","doi":"10.47065/josh.v4i3.3081","DOIUrl":null,"url":null,"abstract":"Theft of credential data by entering a username and password on the login page until the account is open. The authentication process in applications and the web is used to identify ownership of user data, this is because there is a vulnerability to attacks in the use of unsafe usernames and passwords. There are several security issues, one of the most common being passwords. Most systems use passwords to verify user identity. However, these passwords come with major security issues as users tend to use ones that are easy to guess, use the same password across multiple accounts, write it down and store it on their devices. Hackers have many options using which to steal passwords or hack user accounts such as credential stuffing, phishing, password.spraying, bruce force, prior data breach / reused passwords, password reset, keystroke logging and local discovery. To overcome security attacks, Multi-Factor Authentication (MFA) techniques provide higher security guarantees. Public awareness to protect identity information is fundamental, identity theft can go through various channels and ways and this needs to be emphasized. Self-efficacy (security awareness), behavioral intention, avoidance motivation and avoidance behavior are factors that influence the object. This factor analysis aims to determine the level of awareness and behavior patterns of social media users. Factor analysis used the MANOVA method as data analysis and the TTAT model. Based on the results of the MANOVA tests of between – subjects effects, the factor of favorance motivation (r = 0.499 and Sig. 0.000) and behavioral intention (r = 0.427 and Sig. 0.000). There is a link between these factors, so users must avoid data theft through security measures using multi-factor authentication (MFA).","PeriodicalId":233506,"journal":{"name":"Journal of Information System Research (JOSH)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information System Research (JOSH)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47065/josh.v4i3.3081","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Theft of credential data by entering a username and password on the login page until the account is open. The authentication process in applications and the web is used to identify ownership of user data, this is because there is a vulnerability to attacks in the use of unsafe usernames and passwords. There are several security issues, one of the most common being passwords. Most systems use passwords to verify user identity. However, these passwords come with major security issues as users tend to use ones that are easy to guess, use the same password across multiple accounts, write it down and store it on their devices. Hackers have many options using which to steal passwords or hack user accounts such as credential stuffing, phishing, password.spraying, bruce force, prior data breach / reused passwords, password reset, keystroke logging and local discovery. To overcome security attacks, Multi-Factor Authentication (MFA) techniques provide higher security guarantees. Public awareness to protect identity information is fundamental, identity theft can go through various channels and ways and this needs to be emphasized. Self-efficacy (security awareness), behavioral intention, avoidance motivation and avoidance behavior are factors that influence the object. This factor analysis aims to determine the level of awareness and behavior patterns of social media users. Factor analysis used the MANOVA method as data analysis and the TTAT model. Based on the results of the MANOVA tests of between – subjects effects, the factor of favorance motivation (r = 0.499 and Sig. 0.000) and behavioral intention (r = 0.427 and Sig. 0.000). There is a link between these factors, so users must avoid data theft through security measures using multi-factor authentication (MFA).
技术方法对社交媒体用户的隐私意识水平进行威胁
通过在登录页面上输入用户名和密码来窃取凭证数据,直到帐户打开。应用程序和web中的身份验证过程用于识别用户数据的所有权,这是因为使用不安全的用户名和密码容易受到攻击。有几个安全问题,其中最常见的是密码。大多数系统使用密码来验证用户身份。然而,这些密码存在重大的安全问题,因为用户倾向于使用易于猜测的密码,在多个帐户中使用相同的密码,并将其写下来并存储在他们的设备上。黑客有很多选择来窃取密码或黑客用户帐户,如凭证填充,网络钓鱼,密码。喷洒,布鲁斯力量,先前的数据泄露/重复使用的密码,密码重置,击键记录和本地发现。为了克服安全攻击,MFA (Multi-Factor Authentication)技术提供了更高的安全性保证。公众保护身份信息的意识是根本,身份盗窃可以通过各种渠道和方式,这需要强调。自我效能感(安全意识)、行为意向、回避动机和回避行为是影响客体的因素。这种因素分析旨在确定社交媒体用户的意识水平和行为模式。因子分析采用方差分析方法作为数据分析和TTAT模型。根据被试间效应的MANOVA检验结果,偏好动机(r = 0.499, Sig. 0.000)和行为意向(r = 0.427, Sig. 0.000)的影响因素。这些因素之间存在联系,因此用户必须通过使用多因素身份验证(MFA)的安全措施来避免数据被盗。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信