CategoryUsable Security

Security requirements come from people, individually or in wider society. And the effectiveness of security solutions often depends on the behaviour of people.

An Empirical Study of App Permissions: A User Protection Motivation Behaviour

An Empirical Study of App Permissions: A User Protection Motivation Behaviour

Published in International Journal of Advanced Computer Science and Applications 9 (11) 106

Smartphone is one of the telecommunications media that can be used anytime and anywhere. To be able to support the activity of its users, smartphone users install the application on their smartphone. When installing an application, there are permissions provided by the application about data that will be collected. However, many users choose to ignore and do not read the application permission since it is too long or difficult to understand, hence they accept the apps permissions without thinking and consequently leads to security problems. This study aims to determine the factors that affect users in reading apps permissions that have been provided by an application before they install the application. Data were collected from 292 respondents who were active in using smartphones. The data analysis method used is Structural Equation Modeling (SEM). The results of the study show that the factors that influence the user in reading the app permissions before they install the application are coping self-efficacy and personal responsibility.

Trust and Security Concerns of Cloud Storage: An Indonesian Technology Acceptance

Trust and Security Concerns of Cloud Storage: An Indonesian Technology Acceptance

Published in International Journal of Advanced Computer Science and Applications 9 (6) 453

Cloud drive is a service that offers data storage on the cloud. As the worldwide rapid growth of cloud drive there are ongoing concerns about trust, privacy and security concerns about how the user’s personal information and data are visible to other users or even abused by the cloud drive provider. This study provides empirical evidence about the factors affecting the acceptance of cloud drive users by using seven construct variables which are Trust, Perceived Risk, Perceived Ease of Use, Perceived Usefulness, Security, Behavioural Intention and Subjective Norm. Data were collected from 294 respondents by using online questionnaire. The data analysis method used was Structural Equation Modelling (SEM) analysis. The results of this study show that the factor affecting the intention of using cloud drive are trust, perceived risk and subjective norm.

QRishing: A User Perspective

QRishing: A User Perspective

Published in International Journal of Advanced Computer Science and Applications 8 (10) 301

QR Code offers more benefits and features than its predecessor, Barcode, which make it more popular. However, there is no doubt that behind the features and conveniences offered by QR Code, it turns that the QR Code can be utilized to perform QRishing. This study proposes a model based on Technology Acceptance Model (TAM) combined with Perceived Security, Trust, Perceived Behavioral Control, Self-Efficacy and Perceived Risk based on previous research. Data obtained from 300 respondents are then analyzed with Structural Equation Modeling (SEM). The results show that Attitude, Perceive Security and Perceived Risk affect the individual to scan QR Code.

Creating and Protecting Password: A User Intention

Creating and Protecting Password: A User Intention

Published in International Journal of Advanced Computer Science and Applications 8 (8) 270

Students Academic Information System (SAIS) is an application that provides academic information for the students. The security policy applied by our university requires the students to renew their SAIS password based on the university’s policy. This study aims to analyze SAIS users’ behavior by using six variables adapted from Protection Motivation Theory (PMT), which are Perceived Severity, Perceived Vulnerability, Fear, Response Efficacy, Response Cost and Intentions. The data was collected from 288 SAIS users as respondents. The data analysis method used is Structural Equation Modeling (SEM) analysis. The study result shows that the factors affecting the intention of changing the passwords are perceived severity, fear, response efficacy, and response cost.

The Role of Privacy, Security and Trust in User Acceptance of Smartphone User in Indonesia

The Role of Privacy, Security and Trust in User Acceptance of Smartphone User in Indonesia

Published and Presented in 5th International Conference on Information and Communication Technology (ICoIC7)

Smartphone is one of the technological evolutions that become one of the important things for Indonesian nowadays. By using the Smartphone, variety of work can be done easily, faster and certainly more practical. There are many benefits to be gained from the use of Smartphone, such as ebanking, online shopping, etc. On the contrary, Smartphone usage will lead to negative impact for its users, such as data theft and data misuse. This study aims to identify factors that affect the use of Smartphone by using eight variables constructs, which are Perceive Usefulness, Perceive Ease of Use, Functionality, Perceive Trust, Perceive Privacy, Perceive Security, Social Network and Behavioral Intention. Data were collected by distributing web-based questionnaires to 248 respondents. Structural Equation Modeling (SEM) is used as data analysis method. The result of this study indicates that the factors which have positive affect toward behavioral intention to use Smartphone that will affect the variable actual use of Smartphone are Perceive Usefulness, Perceive Ease of Use, Perceive Trust.

Security Intention: Creating and Protecting Google Password

Security Intention: Creating and Protecting Google Password

Published in International Journal of Computer Science and Information Security 14 (12), 555

Google is a multinational company in the US that focuses on Internet product and service. To use the various services from Google, the users must own a Google account. In registering process to create a new Google account, the users are asked to create a password to protect the account. The password regulation policy made by Google requires all the users to develop a password for their Google account according to the policy applied. This study aims to analyze the behavior of the users with Google account case study by using 11 construct variable adapted from Protection Motivation Theory (PMT). The data is collected from the Google users that consists of 285 respondents. The data analysis method used in this study is structural equation modelling (SEM). The study result shows that the factor affecting the intention is perceived vulnerability and threat suspensibility.

Discuss With Us