Pengaruh Hipersekuritisasi dan Praktik Keamanan Siber Harian Terhadap Kepatuhan Mahasiswa dalam Menghadapi Ancaman Digital
DOI:
https://doi.org/10.61255/jupiter.v3i1.555Keywords:
Digital Threats, Hypersecuritization, Cyber Security, Digital Security Policy, Student ComplianceAbstract
While advances in information technology have many benefits, they also increase cybersecurity risks, especially for students. The purpose of this study was to see how hypersecuritization and daily cybersecurity practices affect students' compliance with digital security policies. This descriptive quantitative study involved 94 students from various majors, and data was collected through an online survey that used a five-level Likert scale. The results showed that hypersecuritization had a mean score of 4.04, which indicates that people are very wary of cyber threats. The mean score of 4.01 for daily cybersecurity practices indicates positive behaviors such as the use of two-factor authentication and device updates. Although more flexible policies are needed, the mean score of 3.86 indicates a fairly high acceptance of cybersecurity policies. This study found that to improve students' knowledge and compliance about cybersecurity, education-based methods and more inclusive policies are needed.
Abstract views: 188
,
PDF downloads: 123
Downloads
References
Aldughayfiq, B., & Sampalli, S. (2021). Digital Health in Physicians’ and Pharmacists’ Office: A Comparative Study of e-Prescription Systems’ Architecture and Digital Security in Eight Countries,” Omi. A J. Integr. Biol., 25(2) 102–122, doi: 10.1089/omi.2020.0085.
Almeaibed, S., Al-Rubaye, S., Tsourdos, A., & Avdelidis, N.P. (2021). Digital Twin Analysis to Promote Safety and Security in Autonomous Vehicles,” IEEE Commun. Stand. Mag., 5(1), 40–46, doi: 10.1109/MCOMSTD.011.2100004.
Atalay M., & Angin P. (2020) A Digital Twins Approach to Smart Grid Security Testing and Standardization. IEEE Int. Work. Metrol. Ind. 4.0 IoT, MetroInd 4.0 IoT - Proc., pp. 435–440, doi: 10.1109/MetroInd4.0IoT48571.2020.9138264.
Balasundram, S.K., Shamshiri, R.R., Sridhara, S., & Rizan, N. (2023). The Role of Digital Agriculture in Mitigating Climate Change and Ensuring Food Security: An Overview. Sustain. 15(6), doi: 10.3390/su15065325.
Bhujel, S., and Rahulamathavan, Y. (2022). A Survey: Security, Transparency, and Scalability Issues of NFT’s and Its Marketplaces,” Sensors, 22(22) doi: 10.3390/s22228833.
Coles-Kemp, L., Jensen, R.B., & Heath, C.P.R. (2020). Too Much Information: Questioning Security in a Post-Digital Society. Conf. Hum. Factors Comput. Syst. - Proc., 1–14,, doi: 10.1145/3313831.3376214.
Dedkova L., Smahel D., and Just M. (2022). Digital security in families: the sources of information relate to the active mediation of internet safety and parental internet skills. Behav. Inf. Technol., 41(5) 1052–1064, doi: 10.1080/0144929X.2020.1851769.
Gehrmann, C., & Gunnarsson, M. (2020). A digital twin based industrial automation and control system security architecture. IEEE Trans. Ind. Informatics, 16(1), 669–680. doi: 10.1109/TII.2019.2938885.
Ha L. T. (2022). Are digital business and digital public services a driver for better energy security? Evidence from a European sample. Environ. Sci. Pollut. Res., 29(18), 27232–27256, doi: 10.1007/s11356-021-17843-2
Hadar, E., Kravchenko, & Basovskiy, A. (2020) Cyber Digital Twin Simulator for Automatic Gathering and Prioritization of Security Controls’ Requirements. Proc. IEEE Int. Conf. Requir. Eng., 250–259, doi: 10.1109/RE48521.2020.00035.
Hansen, L., & Nissenbaum, H. (2009). Digital disaster, cyber security, and the copenhagen school,” Int. Stud. Q. 53(4), 1155–1175, doi: 10.1111/j.1468-2478.2009.00572.x.
Isaac A.O., Alawida, M., Esther O.A, and Alabdulatif, A. (2022). Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey. J. King Saud Univ. - Comput. Inf. Sci., 34(10), 10217–10245, doi: 10.1016/j.jksuci.2022.10.018.
Joshi, A.B., Kumar, D., & Mishra, D.C. (2021). Security of Digital Images Based on 3D Arnold Cat Map and Elliptic Curve. Int. J. Image Graph., 21(1), doi: 10.1142/S0219467821500066.
Lee C., S., Han, M., & Seong, M.P. (2020). Development of a quantitative method for identifying fault-prone cyber security controls in NPP digital I&C systems. Ann. Nucl. Energy, Vol. 142, p. 107398, doi: 10.1016/j.anucene.2020.107398.
Marelli, M. (2020). Hacking humanitarians: Defining the cyber perimeter and developing a cyber security strategy for international humanitarian organizations in digital transformation. Int. Rev. Red Cross, 102(913) 367–387, doi: 10.1017/S1816383121000151.
Mendhurwar, S., & Mishra, R. (2021). Integration of social and IoT technologies: architectural framework for digital transformation and cyber security challenges. Enterp. Inf. Syst., 15(4) 565–584, doi: 10.1080/17517575.2019.1600041.
Paul M., L. Maglaras, Ferrag, M. A., & Almomani, I. (2023). Digitization of healthcare sector: A study on privacy and security concerns. ICT Express, 9(4), 571–588, doi: 10.1016/j.icte.2023.02.007.
Ross, A., Banerjee, S., & Chowdhury, A. (2020). Security in smart cities: A brief review of digital forensic schemes for biometric data. Pattern Recognit. Lett., Vol. 138, 346–354, doi: 10.1016/j.patrec.2020.07.009.
Rudnichenko, Y., Melnyk, S., Havlovska, N., Illiashenko, O., & Nakonechna, N. (2021). Strategic interaction of state institutions and enterprises with economic security positions in digital economy. WSEAS Trans. Bus. Econ.. 18(1), 218–230, 2021, doi: 10.37394/23207.2021.18.23.
Sahi, A.M., Khalid, H., Abbas A.F., Zedan, F., Khatib S.F.A, and Al Amosh, H. (2022). The Research Trend of Security and Privacy in Digital Payment. Informatics, 9(2), doi: 10.3390/informatics9020032.
Saugmann, R. (2020). The security captor, captured. Digital cameras, visual politics and material semiotics. Crit. Stud. Secur. 8(2) 130–144, 2020, doi: 10.1080/21624887.2020.1815479.
Shrestha, Wenan, T., Khadka, A., & Jeong, S.R.. (2020). Digital Tourism Security System for Nepal. KSII Trans. Internet Inf. Syst. 14(11), 4331–4354, doi: 10.3837/tiis.2020.11.005.
Standards, A. U. S. D., Stevens, R., Dykstra, J., Everette, W.K., & Chapman, J.(2020). Compliance Cautions : Investigating Security.
Tijan, E., Jović, S. Aksentijević, & A. Pucihar. (2021). Digital transformation in the maritime transport sector. Technol. Forecast. Soc. Change. 170(1), doi: 10.1016/j.techfore.2021.120879.
Torres, H.N., & Gallego-Arrufat, M.J. (2022). Indicators to assess preservice teachers’ digital competence in security: A systematic review. Educ. Inf. Technol. 27(6) 8583–8602, doi: 10.1007/s10639-022-10978-w.
Wang, S., Jiang, X., and Khaskheli, M.B. (2024). The Role of Technology in the Digital Economy’s Sustainable Development of Hainan Free Trade Port and Genetic Testing: Cloud Computing and Digital Law,” Sustain., 16(14), doi: 10.3390/su16146025.
Yasin, A., Fatima, R., JiangBin, Z., Afzal, W., and Raza, S. (2023). Can serious gaming tactics bolster spear-phishing and phishing resilience?: Securing the human hacking in Information Security. Inf. Softw. Technol. 170(1),107426, doi: 10.1016/j.infsof.2024.107426.
Zermi, N., Khaldi, A., Kafi, R., Kahlessenane, F., & Euschi, S. (2021). A DWT-SVD based robust digital watermarking for medical image security. Forensic Sci. Int., 320(1) doi: 10.1016/j.forsciint.2021.110691.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Algi Fahrizal algi, Muh Fikri Ainul Yakin, Hajar Dewantara, Andi Naila Quin Azisah Alisyahbana, Diarra Salim

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.








Email : fakhri@diginus.id