Ari Kusyanti

Ari Kusyanti

Ari Kusyanti received her MSc degree in Information Security Technology from Eindhoven University of Technology (TU/e), the Netherlands in 2015. She received her BSc in Information Technology from Universitas Brawijaya, Indonesia. Currently, she is working as a lecturer in Faculty of Computer Science (FILKOM) Universitas Brawijaya, Indonesia, which she joined in 2011. Since 2015, she has been leading the TRiPS (Trust, Risk, Privacy and Security) project she founded. She has various accomplishments including Full Scholarship and funded research project from General Electric (GE) and ASML Netherlands, B.V.

Department

Department of Computer Science

Projects

24 Projects

Joined At

7 tahun yang lalu

Projects

“HOW DO I LOOK”: SELF-DISCLOSURE OF INSTAGRAM USERS IN INDONESIA
Facebook Privacy Concerns among High-School Teens
Security Intention: Creating and Protecting Google Password
“Can I Trust You, Doc?” : User Perception Of Online Health Information
The Role of Privacy Concerns and Trust in User Acceptance of Instant Messaging Usage Intention
The Role of Privacy, Security and Trust in User Acceptance of Smartphone User in Indonesia
Creating and Protecting Password: A User Intention
QRishing: A User Perspective
Information Privacy Concerns on Teens as Facebook Users in Indonesia
Teen‘s Social Media Adoption: An Empirical Investigation in Indonesia
Trust and Security Concerns of Cloud Storage: An Indonesian Technology Acceptance
Performance Evaluation of Trivium on Raspberry Pi
An Empirical Study of App Permissions: A User Protection Motivation Behaviour
“Sign me in, please!”: An Indonesian Perspective of Google Single Sign-On
Statistical Comparison of Grain Algorithm for IoT Device Security
Empirical Study of #instastory
Protecting Facebook Password: Indonesian Users’ Motivation
Investigating mobile users’ intention: Technology acceptance and privacy perspectives
The Implementation of zk-SNARK HH Authentication on IoT Protocols
Implementation of Encryption Algorithm in UAV
Implementation of SHA2 for LoRa
Implementation of Ethereum DApps
Lizard Cipher for IoT Security on Constrained Devices
" Do I Really Need to Use a Lock Screen?": An Evaluation of Indonesian Smartphone Users

Discuss With Us