CategoryUsable Security

Security requirements come from people, individually or in wider society. And the effectiveness of security solutions often depends on the behaviour of people.

" Do I Really Need to Use a Lock Screen?": An Evaluation of Indonesian Smartphone Users

" Do I Really Need to Use a Lock Screen?": An Evaluation of Indonesian Smartphone Users

Published in 7th International Conference on Information and Communication Technology (ICoICT) 2019

Nowadays, smartphone diversifies its functionality to store users' personal data including their sensitive information, which needs protection from unauthorized access. Lock screen is the simplest security method to guarantee the security of smartphone. This study aims to determine the factors that affect users in using lock screen as a lock on their smartphone by using 8 variables adapted from previous research. Data analysis used is Structural Equation Modelling (SEM) analysis. The results of this study suggest that the factors that influence users in using lock screen on their smartphone are trust, attitude and perceived risk.

Investigating mobile users’ intention: Technology acceptance and privacy perspectives

Investigating mobile users’ intention: Technology acceptance and privacy perspectives

Published in Sixth Information Systems International Conference (ISICO 2021)

Smartphones are essential device in most people's live nowadays. There are many benefits offered by smartphones, such as: the ability to access the internet, e-mail, access social media, etc. Their advanced features and ease of use enhances their functionality including storing contacts, photos, videos and other sensitive information. Thus, smartphones become attractive target for hackers especially with regard to get unauthorized access to sensitive data from users that violates their privacy. This paper investigated the impact of users’ intention in using a smartphone despite privacy threats that can occur. Questionnaires were distributed to 300 respondents who were actively using a smartphone to obtain the study data. The level of relationships among the constructs were analysed using Structural Equation Modelling (SEM). The results of this study indicate that the factors that influence users in using a smartphones are mobile users’ information privacy concern, perceived ease of use and perceived usefulness.

An Empirical Study of App Permissions: A User Protection Motivation Behaviour

An Empirical Study of App Permissions: A User Protection Motivation Behaviour

Published in International Journal of Advanced Computer Science and Applications 9 (11) 106

Smartphone is one of the telecommunications media that can be used anytime and anywhere. To be able to support the activity of its users, smartphone users install the application on their smartphone. When installing an application, there are permissions provided by the application about data that will be collected. However, many users choose to ignore and do not read the application permission since it is too long or difficult to understand, hence they accept the apps permissions without thinking and consequently leads to security problems. This study aims to determine the factors that affect users in reading apps permissions that have been provided by an application before they install the application. Data were collected from 292 respondents who were active in using smartphones. The data analysis method used is Structural Equation Modeling (SEM). The results of the study show that the factors that influence the user in reading the app permissions before they install the application are coping self-efficacy and personal responsibility.

Trust and Security Concerns of Cloud Storage: An Indonesian Technology Acceptance

Trust and Security Concerns of Cloud Storage: An Indonesian Technology Acceptance

Published in International Journal of Advanced Computer Science and Applications 9 (6) 453

Cloud drive is a service that offers data storage on the cloud. As the worldwide rapid growth of cloud drive there are ongoing concerns about trust, privacy and security concerns about how the user’s personal information and data are visible to other users or even abused by the cloud drive provider. This study provides empirical evidence about the factors affecting the acceptance of cloud drive users by using seven construct variables which are Trust, Perceived Risk, Perceived Ease of Use, Perceived Usefulness, Security, Behavioural Intention and Subjective Norm. Data were collected from 294 respondents by using online questionnaire. The data analysis method used was Structural Equation Modelling (SEM) analysis. The results of this study show that the factor affecting the intention of using cloud drive are trust, perceived risk and subjective norm.

QRishing: A User Perspective

QRishing: A User Perspective

Published in International Journal of Advanced Computer Science and Applications 8 (10) 301

QR Code offers more benefits and features than its predecessor, Barcode, which make it more popular. However, there is no doubt that behind the features and conveniences offered by QR Code, it turns that the QR Code can be utilized to perform QRishing. This study proposes a model based on Technology Acceptance Model (TAM) combined with Perceived Security, Trust, Perceived Behavioral Control, Self-Efficacy and Perceived Risk based on previous research. Data obtained from 300 respondents are then analyzed with Structural Equation Modeling (SEM). The results show that Attitude, Perceive Security and Perceived Risk affect the individual to scan QR Code.

Creating and Protecting Password: A User Intention

Creating and Protecting Password: A User Intention

Published in International Journal of Advanced Computer Science and Applications 8 (8) 270

Students Academic Information System (SAIS) is an application that provides academic information for the students. The security policy applied by our university requires the students to renew their SAIS password based on the university’s policy. This study aims to analyze SAIS users’ behavior by using six variables adapted from Protection Motivation Theory (PMT), which are Perceived Severity, Perceived Vulnerability, Fear, Response Efficacy, Response Cost and Intentions. The data was collected from 288 SAIS users as respondents. The data analysis method used is Structural Equation Modeling (SEM) analysis. The study result shows that the factors affecting the intention of changing the passwords are perceived severity, fear, response efficacy, and response cost.

Discuss With Us