Desain Penelitian Dampak Penggunaan broadband terhadap perilaku Keamanan Informasi

Isi Artikel Utama

Dewi Hernikawati

Abstrak

Abstrak

Broadband memberikan kecepatan tinggi dalam berinternet dan  penggunakan data. Manusia sebagai titik terlemah dari rantai kemananan yang perlu selalu dibina agar dapat meminimalisasi dampak serangan keamanan yang bisa menjadi ancaman untuk organisasi. Oleh karena itu, dalam tulisan ini akan merumuskan desain penelitian dampak penggunaan broadband terhadap perilaku keamanan informasi. Metode yang digunakan adalah studi literatur. Hasilnya pada desain penelitian ini melibatkan variabel risk tolerance, risk perception, past experience severity, past experience frequency, penggunaan broadband sebagai variable independen sedangkan variabel Keamanan informasi sebagai variable dependen.

Kata kunci : broadband, keamanan informasi, perilaku

 

Abstract

Broadband give high speed to surfing, downloading, uploading and using data. Humans are the weakess point in security that needs to be educated in order to minimize the impact of security attach to organization. This paper will purpose design of research the impact of broadband to information security behavior. Literature study used as a method. Result of this design are risk tolerance, risk perception, past experience severity, past experience frequency, use of broadband as independen variable and information security as dependen variable.

Key Word : broadband,behavior, information security

Rincian Artikel

Bagian
Artikel

Referensi

Seymour, Lisa F and Naidoo , Mogen “The Usage and Impact of Broadband: A South African Household analysis” The Electronic Journal Information Systems Evaluation Volume 16 Issue 2 2013, (134-147) , available online at www.ejise.com diakses 6 Januari 2016

Ronald L. Krutz and Russell Dean Vines, 2007, The CISSP and CAP Prep Guide: Platinum Edition, John Wiley & Sons.

InfoSecurity Europe, 2010, Information SecurityBreaches Survey 2010 (ISBS-2010) : Technical Report

, www.infosec.co.uk/files/isbs_2010_technical_report_single_pages.pdf

Kevin D. Mitnick and William L. Simon, 2002, The Art of Deception, Wiley Publishing, Inc.

Hal Tipton and Micki Krause, 2005, Handbook of Information Security Management, CRC Press LLC.

Undang-Undang No. 14 Tahun 2008 tentang Keterbukaan Informasi Publik (KIP).

National Institute of Standards and Technology Special Publication (NIST SP) 800-59, Guideline for Identifying an Informastion System as a National

Security System.

Dupuis Marc J., Crossler Robert E., Popovsky Barbara Endicott, “The Information Security Behavior of Home Users : Exploring a User’s Risk Tolerance and Past Experiences in the Context of Backing Up Information” http://faculty.washington.edu/marcjd/pubs/risk-tolerance.pdf diakses 11 Maret 2016 jam 14.00