QRishing: A User Perspective

QRishing: A User Perspective

Published in International Journal of Advanced Computer Science and Applications 8 (10) 301

QR Code offers more benefits and features than its predecessor, Barcode, which make it more popular. However, there is no doubt that behind the features and conveniences offered by QR Code, it turns that the QR Code can be utilized to perform QRishing. This study proposes a model based on Technology Acceptance Model (TAM) combined with Perceived Security, Trust, Perceived Behavioral Control, Self-Efficacy and Perceived Risk based on previous research. Data obtained from 300 respondents are then analyzed with Structural Equation Modeling (SEM). The results show that Attitude, Perceive Security and Perceived Risk affect the individual to scan QR Code.

Creating and Protecting Password: A User Intention

Creating and Protecting Password: A User Intention

Published in International Journal of Advanced Computer Science and Applications 8 (8) 270

Students Academic Information System (SAIS) is an application that provides academic information for the students. The security policy applied by our university requires the students to renew their SAIS password based on the university’s policy. This study aims to analyze SAIS users’ behavior by using six variables adapted from Protection Motivation Theory (PMT), which are Perceived Severity, Perceived Vulnerability, Fear, Response Efficacy, Response Cost and Intentions. The data was collected from 288 SAIS users as respondents. The data analysis method used is Structural Equation Modeling (SEM) analysis. The study result shows that the factors affecting the intention of changing the passwords are perceived severity, fear, response efficacy, and response cost.

The Role of Privacy, Security and Trust in User Acceptance of Smartphone User in Indonesia

The Role of Privacy, Security and Trust in User Acceptance of Smartphone User in Indonesia

Published and Presented in 5th International Conference on Information and Communication Technology (ICoIC7)

Smartphone is one of the technological evolutions that become one of the important things for Indonesian nowadays. By using the Smartphone, variety of work can be done easily, faster and certainly more practical. There are many benefits to be gained from the use of Smartphone, such as ebanking, online shopping, etc. On the contrary, Smartphone usage will lead to negative impact for its users, such as data theft and data misuse. This study aims to identify factors that affect the use of Smartphone by using eight variables constructs, which are Perceive Usefulness, Perceive Ease of Use, Functionality, Perceive Trust, Perceive Privacy, Perceive Security, Social Network and Behavioral Intention. Data were collected by distributing web-based questionnaires to 248 respondents. Structural Equation Modeling (SEM) is used as data analysis method. The result of this study indicates that the factors which have positive affect toward behavioral intention to use Smartphone that will affect the variable actual use of Smartphone are Perceive Usefulness, Perceive Ease of Use, Perceive Trust.

The Role of Privacy Concerns and Trust in User Acceptance of Instant Messaging Usage Intention

The Role of Privacy Concerns and Trust in User Acceptance of Instant Messaging Usage Intention

Published in International Journal of Computer Science and Information Security 14 (12), 584

Telegram is a messaging application that is quite popular nowadays. However, at this time there is not yet known what factors can affect behavioral intention of Telegram. This research focuses on the factors that influence behavioral intention of Telegrams’ users. This research proposes a model based on Unified Theory of Acceptance and Use of Technology (UTAUT) combined with a privacy concerns, trust and enjoyment based on previous studies. This research conducted a questionnaire survey with 300 respondents. Data collected is analyzed using Structural Equation Modelling (SEM). The result of this research shows that three of the six hypotheses influencing behavioral intention are acceptable, which are effort expectancy, performance expectancy, and trust.

“Can I Trust You, Doc?” : User Perception Of Online Health Information

“Can I Trust You, Doc?” : User Perception Of Online Health Information

Published in International Journal of Computer Science and Information Security 14 (12), 589

Klikdokter.com is one of websites that provides information service about health. Besides, it also provides live chat service i.e., question and answer about health which is directly claimed and answered by the specialist doctors. According to the survey conducted by IndoPacific Edelman and Research Unit and Community Service of Public Health Faculty of Indonesia University, the amount of 79% doctors believes in the most accurate health information source on the internet. Moreover, a study entitle Patients Use of the Internet for Medical Information shows that 53,5% out of 512 patients use internet as a media to find out information about health. The trust of doctors and internet users towards health information is indeed influenced by several factors. Therefore, the aim of this research is to analyze the factors that influence the trust of users towards the health information uploaded on klikdokter,com using ten construct variables. The data is collected from klikdokter.com users with 250 respondents. The data is analyzed using structural equation modeling analysis (SEM). The result shows that factors that influence Trust are perceived information quality, source expertise and argument quality.

Security Intention: Creating and Protecting Google Password

Security Intention: Creating and Protecting Google Password

Published in International Journal of Computer Science and Information Security 14 (12), 555

Google is a multinational company in the US that focuses on Internet product and service. To use the various services from Google, the users must own a Google account. In registering process to create a new Google account, the users are asked to create a password to protect the account. The password regulation policy made by Google requires all the users to develop a password for their Google account according to the policy applied. This study aims to analyze the behavior of the users with Google account case study by using 11 construct variable adapted from Protection Motivation Theory (PMT). The data is collected from the Google users that consists of 285 respondents. The data analysis method used in this study is structural equation modelling (SEM). The study result shows that the factor affecting the intention is perceived vulnerability and threat suspensibility.

Discuss With Us