Desain Penelitian Dampak Penggunaan broadband terhadap perilaku Keamanan Informasi
Main Article Content
Abstract
Abstrak
Broadband memberikan kecepatan tinggi dalam berinternet dan penggunakan data. Manusia sebagai titik terlemah dari rantai kemananan yang perlu selalu dibina agar dapat meminimalisasi dampak serangan keamanan yang bisa menjadi ancaman untuk organisasi. Oleh karena itu, dalam tulisan ini akan merumuskan desain penelitian dampak penggunaan broadband terhadap perilaku keamanan informasi. Metode yang digunakan adalah studi literatur. Hasilnya pada desain penelitian ini melibatkan variabel risk tolerance, risk perception, past experience severity, past experience frequency, penggunaan broadband sebagai variable independen sedangkan variabel Keamanan informasi sebagai variable dependen.
Kata kunci : broadband, keamanan informasi, perilaku
Abstract
Broadband give high speed to surfing, downloading, uploading and using data. Humans are the weakess point in security that needs to be educated in order to minimize the impact of security attach to organization. This paper will purpose design of research the impact of broadband to information security behavior. Literature study used as a method. Result of this design are risk tolerance, risk perception, past experience severity, past experience frequency, use of broadband as independen variable and information security as dependen variable.
Key Word : broadband,behavior, information security
Article Details
Authors who publish with this journal agree to the following terms:
- Copyright on any article is retained by the author(s).
- Author grant the journal, right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work’s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal’s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
- The article and any associated published material is distributed under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License
References
Seymour, Lisa F and Naidoo , Mogen “The Usage and Impact of Broadband: A South African Household analysis” The Electronic Journal Information Systems Evaluation Volume 16 Issue 2 2013, (134-147) , available online at www.ejise.com diakses 6 Januari 2016
Ronald L. Krutz and Russell Dean Vines, 2007, The CISSP and CAP Prep Guide: Platinum Edition, John Wiley & Sons.
InfoSecurity Europe, 2010, Information SecurityBreaches Survey 2010 (ISBS-2010) : Technical Report
, www.infosec.co.uk/files/isbs_2010_technical_report_single_pages.pdf
Kevin D. Mitnick and William L. Simon, 2002, The Art of Deception, Wiley Publishing, Inc.
Hal Tipton and Micki Krause, 2005, Handbook of Information Security Management, CRC Press LLC.
Undang-Undang No. 14 Tahun 2008 tentang Keterbukaan Informasi Publik (KIP).
National Institute of Standards and Technology Special Publication (NIST SP) 800-59, Guideline for Identifying an Informastion System as a National
Security System.
Dupuis Marc J., Crossler Robert E., Popovsky Barbara Endicott, “The Information Security Behavior of Home Users : Exploring a User’s Risk Tolerance and Past Experiences in the Context of Backing Up Information” http://faculty.washington.edu/marcjd/pubs/risk-tolerance.pdf diakses 11 Maret 2016 jam 14.00