Protecting Facebook Password: Indonesian Users’ Motivation

Protecting Facebook Password: Indonesian Users’ Motivation

Published in Procedia Computer Science (The Fifth Information Systems International Conference 2019)

Facebook is one of the social networking services that have users around 1.86 billion active users spread all over the world. To be able to enjoy various services from Facebook, a user is required to have a Facebook account. In the registration process to create a new Facebook account, the user is prompted to create a password to protect his account. The password policy service applied by Facebook requires all users to create and use a password for their Facebook account in accordance with the policies. This study aims to analyze user behavior with case study of Facebook account by using 12 construct variables adapted from Protection Motivation Theory (PMT). Data collected from Facebook users of 300 respondents. Data analysis method used is Structural Equation Modeling (SEM) analysis. From the research result, the factors that influence Facebook users’ intention to protect their account are perceived vulnerability, fear, response efficacy, response cost, subjective norm, prior experience with safety hazard, threat susceptibility and personal responsibility. Meanwhile, they ignore the threat sverity, coping self-efficacy and security support from others while protecting their Facebook account.

Empirical Study of #instastory

Empirical Study of #instastory

Published in Procedia Computer Science (The Fifth Information Systems International Conference 2019)

Instagram is a social media which provides services that enable users to share photos or videos via its features called Instastory. Indonesia as the largest Instagram user in Asia Pacific region is worth studying. There are several factors affecting Instagram users to share their photos or videos, such as they are enjoying to represent themselves in an online world so that the can get connected virtually or even build new relationship. Apart from the benefits, there is hidden risk that may occur such as the misused of the personal information they have shared that may lead to privacy violation. The main objective of this study is to analyze the factors that affect Instagram users in sharing their videos or photos via Instastory by using ten latent variables and one second-order variable. The data are collected from 300 respondents who are active users of Instagram. Data from respondents are analyzed using Structural Equation Modelling (SEM) model. The results of this study shows that the factors that affect self-disclosure on Instagram via Instastory are self-presentation, enjoyment, perceived collectivism, new relationship building, Internet Users Information Privacy Concerns (IUIPC) and perceived risk.

Statistical Comparison of Grain Algorithm for IoT Device Security

Statistical Comparison of Grain Algorithm for IoT Device Security

Published in 11th International Conference on Telecommunication Systems, Services, and Applications

Internet of Things (IoT) is an interconnection among devices or “things” that exchange data between them. A man-in-the-middle can be performed when two IoT devices are communicating, therefore secure data transmission between IoT devices has emerged as a challenging task. There are numbers of existing cryptography algorithms that offers protection. However, their utilization in IoT is questionable since the hardware is not suitable for inexpensive yet efficient encryption process. This paper proposed implementation of Grain as the winner for eSTREAM project and compare all version of Grain, i.e Grain v0, Grain v1 and Grain 128 in Arduino Mega 2560 as it used as a single board computer for IoT. The result shows that there is no significant difference in encryption-decryption processing time. While, in generating keystream, Grain 128 will take more time when implemented in Arduino Mega 2560.

An Empirical Study of App Permissions: A User Protection Motivation Behaviour

An Empirical Study of App Permissions: A User Protection Motivation Behaviour

Published in International Journal of Advanced Computer Science and Applications 9 (11) 106

Smartphone is one of the telecommunications media that can be used anytime and anywhere. To be able to support the activity of its users, smartphone users install the application on their smartphone. When installing an application, there are permissions provided by the application about data that will be collected. However, many users choose to ignore and do not read the application permission since it is too long or difficult to understand, hence they accept the apps permissions without thinking and consequently leads to security problems. This study aims to determine the factors that affect users in reading apps permissions that have been provided by an application before they install the application. Data were collected from 292 respondents who were active in using smartphones. The data analysis method used is Structural Equation Modeling (SEM). The results of the study show that the factors that influence the user in reading the app permissions before they install the application are coping self-efficacy and personal responsibility.

Performance Evaluation of Trivium on Raspberry Pi

Performance Evaluation of Trivium on Raspberry Pi

Published in International Journal of Advanced Computer Science and Applications 9 (11) 579

High connectivity of billions of IoT devices lead to many security issues. Trivium is designed for IoT to overcome the security challenges of IoT. The objective of this study is to implement a security service to provide confidentiality for the communication of IoT devices. Furthermore, this study aims to analyze Trivium performance in terms of keystream generation time and memory utilization on Raspberry Pi Zero, Raspberry Pi 2B, and Raspberry Pi 3B. The result showed that there was a statistically significant difference between the keystream generation time and memory utilization on Raspberry Pi Zero, Raspberry Pi 2B, and Raspberry Pi 3B based on Kruskal-Wallis H test. Further test of Jonckheere-Terpstra indicates that the fastest keystream generation time was on Raspberry Pi 3B, and the smallest memory utilization was on Raspberry Pi 2B. The implemantation of Trivium on three versions of Raspberry Pi shows promising results with less than 27 MB of memory utilization for cryptography leaves more resources available to applications.

Trust and Security Concerns of Cloud Storage: An Indonesian Technology Acceptance

Trust and Security Concerns of Cloud Storage: An Indonesian Technology Acceptance

Published in International Journal of Advanced Computer Science and Applications 9 (6) 453

Cloud drive is a service that offers data storage on the cloud. As the worldwide rapid growth of cloud drive there are ongoing concerns about trust, privacy and security concerns about how the user’s personal information and data are visible to other users or even abused by the cloud drive provider. This study provides empirical evidence about the factors affecting the acceptance of cloud drive users by using seven construct variables which are Trust, Perceived Risk, Perceived Ease of Use, Perceived Usefulness, Security, Behavioural Intention and Subjective Norm. Data were collected from 294 respondents by using online questionnaire. The data analysis method used was Structural Equation Modelling (SEM) analysis. The results of this study show that the factor affecting the intention of using cloud drive are trust, perceived risk and subjective norm.

Discuss With Us