ANALISIS KESADARAN DAN SIKAP MAHASISWA TERHADAP KEBOCORAN DATA PRIBADI DI ERA DIGITAL
DOI:
https://doi.org/10.54259/satesi.v5i1.3417Kata Kunci:
Kebocoran Data, Data Pribadi, Privasi Data, MahasiswaAbstrak
Kesadaran siswa tentang keamanan data pribadi di era teknologi diteliti dalam penelitian ini. Mahasiswa sering berperilaku dengan cara yang meningkatkan kemungkinan kebocoran data, meskipun mereka memperhatikan privasi mereka. Ini dikenal sebagai Paradoks Privasi. Penelitian ini, yang dilakukan melalui peninjauan literatur sistematis dan pendekatan PRISMA, menemukan bahwa rendahnya kesadaran mahasiswa disebabkan oleh kurangnya pemahaman tentang proses pengumpulan data dan risiko yang menyertainya. Mereka biasanya memberikan izin akses tanpa mempertimbangkan risiko dan mengabaikan kebijakan privasi. Akibatnya, sangat penting untuk meningkatkan instruksi dan pelatihan tentang keamanan siber di institusi pendidikan, termasuk penerapan model perlindungan data yang jelas. Diharapkan pengesahan Rancangan Undang-Undang Perlindungan Data Pribadi (RUU PDP) di Indonesia akan membantu meningkatkan keamanan data mahasiswa, mengurangi risiko kebocoran data, dan menyelaraskan peraturan perlindungan data internasional.
Unduhan
Referensi
A. Mishra, Y. I. Alzoubi, A. Q. Gill, and M. J. Anwar, “Cybersecurity Enterprises Policies: A Comparative Study,” 2022, mdpi.com. doi: 10.3390/s22020538.
W. Yu and F. Shen, “The relationship between online political participation and privacy protection: evidence from 10 Asian societies of different levels of cybersecurity,” Behaviour and Information Technology, vol. 41, no. 13, pp. 2819–2834, 2022, doi: 10.1080/0144929X.2021.1953597.
N. Kshetri, Vasudha, and D. Hoxha, “KnowCC: Knowledge, Awareness of Computer & Cyber Ethics between CS/Non-CS University Students,” Proceedings - 4th IEEE 2023 International Conference on Computing, Communication, and Intelligent Systems, ICCCIS 2023, pp. 298–304, 2023, doi: 10.1109/ICCCIS60361.2023.10425385.
R. Rohan, S. Funilkul, D. Pal, and W. Chutimaskul, “Understanding of Human Factors in Cybersecurity: A Systematic Literature Review,” 2021 International Conference on Computational Performance Evaluation, ComPE 2021, pp. 133–140, 2021, doi: 10.1109/ComPE53109.2021.9752358.
M. Williams, J. R. C. Nurse, and S. Creese, “Smartwatch games: Encouraging privacy-protective behaviour in a longitudinal study,” Comput Human Behav, vol. 99, no. April, pp. 38–54, 2019, doi: 10.1016/j.chb.2019.04.026.
P. Shah and A. Agarwal, “Cybersecurity behaviour of smartphone users in India: an empirical analysis,” Information and Computer Security, vol. 28, no. 2, pp. 293–318, 2020, doi: 10.1108/ICS-04-2019-0041.
H. Robert, “Institutional Knowledge at Singapore Management University ScienceDirect Privacy leakage analysis in online social Privacy leakage analysis in online social networks networks,” pp. 239–254, 2015.
X. Li, C. Zhao, Y. Hu, H. Xie, Y. Wang, and J. Zhao, “Precursor of privacy leakage detection for individual user,” Comput Secur, vol. 142, no. April, 2024, doi: 10.1016/j.cose.2024.103879.
I. Shklovski and E. Grönvall, “CreepyLeaks: Participatory Speculation Through Demos,” ACM International Conference Proceeding Series, 2020, doi: 10.1145/3419249.3420168.
Z. Wang and Z. Chen, “Analysing the Causes and Implications of the Privacy Paradox: Consumer Surveillance and Online Data Collection,” Bull Sci Technol Soc, vol. 43, no. 3–4, pp. 86–93, 2023, doi: 10.1177/02704676231220842.
T. Dienlin and S. Trepte, “Is the privacy paradox a relic of the past? An in-depth analysis of privacy attitudes and privacy behaviors,” Eur J Soc Psychol, vol. 45, no. 3, pp. 285–297, 2015, doi: 10.1002/ejsp.2049.
C. Prince, N. Omrani, and F. Schiavone, “Online privacy literacy and users’ information privacy empowerment: the case of GDPR in Europe,” Information Technology and People, vol. 37, no. 8, pp. 1–24, 2023, doi: 10.1108/ITP-05-2023-0467.
S. Havelka, “Typologies of Mobile Privacy Behavior and Attitude: A Case Study Comparing German and American Library and Information Science Students,” Serials Librarian, vol. 81, no. 1, pp. 42–58, 2021, doi: 10.1080/0361526X.2021.1875961.
A. Farooq, S. R. U. Kakakhel, S. Virtanen, and J. Isoaho, “A taxonomy of perceived information security and privacy threats among IT security students,” 2015 10th International Conference for Internet Technology and Secured Transactions, ICITST 2015, pp. 280–286, 2016, doi: 10.1109/ICITST.2015.7412106.
K. C. Chung, C. H. Chen, H. H. Tsai, and Y. H. Chuang, “Social media privacy management strategies: A SEM analysis of user privacy behaviors,” Comput Commun, vol. 174, no. April, pp. 122–130, 2021, doi: 10.1016/j.comcom.2021.04.012.
H. I. Maseeh et al., “Exploring the privacy concerns of smartphone app users: a qualitative approach,” Marketing Intelligence and Planning, vol. 41, no. 7, pp. 945–969, 2023, doi: 10.1108/MIP-11-2022-0515.
M. Feng, B. Hu, Y. Tian, and H. Wang, “Data leaking scandal, risks, and financial consumption behaviors in online tourism platforms: The role of trust on college students and teachers,” 2022, frontiersin.org. doi: 10.3389/fpsyg.2022.968271.
J. Wang, G. Liu, and G. Zhao, “Two-attribute privacy protection method of MCS based on blockchain smart contract,” Comput Commun, vol. 193, no. June, pp. 126–135, 2022, doi: 10.1016/j.comcom.2022.06.045.
D. Moher et al., “Preferred reporting items for systematic reviews and meta-analyses: The PRISMA statement,” PLoS Med, vol. 6, no. 7, 2009, doi: 10.1371/journal.pmed.1000097.
T. Dienlin, P. K. Masur, and S. Trepte, “A longitudinal analysis of the privacy paradox,” New Media Soc, vol. 25, no. 5, pp. 1043–1064, 2023, doi: 10.1177/14614448211016316.
D. E. Krych and P. McDaniel, “Exposing Android social applications: linking data leakage to privacy policies,” Journal of Cyber Security Technology, vol. 5, no. 3–4, pp. 139–190, 2021, doi: 10.1080/23742917.2019.1630093.
S. Barth, M. D. T. de Jong, M. Junger, P. H. Hartel, and J. C. Roppelt, “Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources,” Telematics and Informatics, vol. 41, no. November 2017, pp. 55–69, 2019, doi: 10.1016/j.tele.2019.03.003.
A. Das and H. U. Khan, “Security behaviors of smartphone users,” Information and Computer Security, vol. 24, no. 1, pp. 116–134, 2016, doi: 10.1108/ICS-04-2015-0018.
S. Mujeye, “An analysis of differences in behaviors and practices of security-conscious users and regular users on mobile devices,” Information and Computer Security, vol. 31, no. 5, pp. 624–634, 2023, doi: 10.1108/ICS-05-2023-0086.
P. Fehér-Polgár and Z. Németh, “Safety consciousness of the mobile phone users,” SACI 2016 - 11th IEEE International Symposium on Applied Computational Intelligence and Informatics, Proceedings, pp. 345–348, 2016, doi: 10.1109/SACI.2016.7507399.
A. Jayatilleke, S. Thelijjagoda, and P. Pathirana, “Security Awareness among Smart Speaker Users,” 2019 National Information Technology Conference, NITC 2019, pp. 8–10, 2019, doi: 10.1109/NITC48475.2019.9114497.
J. Liu and S. Zhou, “Application Research of Data Mining Technology in Personal Privacy Protection and Material Data Analysis,” Integrated Ferroelectrics, vol. 216, no. 1, pp. 29–42, 2021, doi: 10.1080/10584587.2021.1911255.
A. H. M. Bradley and A. L. Howard, “Stress and Mood Associations With Smartphone Use in University Students: A 12-Week Longitudinal Study,” Clinical Psychological Science, vol. 11, no. 5, pp. 921–941, 2023, doi: 10.1177/21677026221116889.
J. Rastenis, S. Ramanauskaite, J. Janulevicius, and A. Cenys, “Credulity to Phishing Attacks: A Real-World Study of Personnel with Higher Education,” 2019 Open Conference of Electrical, Electronic and Information Sciences, eStream 2019 - Proceedings, 2019, doi: 10.1109/eStream.2019.8732169.
G. Alsadoon, “Comparisons and appropriate solutions to prevent data threats of cloud computing, applied in green environment,” 2019 8th International Conference on Modeling Simulation and Applied Optimization, ICMSAO 2019, 2019, doi: 10.1109/ICMSAO.2019.8880344.
J. Walls and K. K. R. Choo, A Study of the Effectiveness Abs Reliability of Android Free Anti-Mobile Malware Apps. Elsevier Inc., 2017. doi: 10.1016/B978-0-12-804629-6.00008-0.
R. Isus, K. Kolesnikova, I. Khlevna, T. Oleksandr, and K. Liubov, “Development of a model of personal data protection in the context of digitalization of the educational sphere using information technology tools,” Procedia Comput Sci, vol. 231, no. 2023, pp. 347–352, 2024, doi: 10.1016/j.procs.2023.12.215.
P. Schmidt et al., “Twitter Users’ Privacy Behavior: A Reasoned Action Approach,” Social Media and Society, vol. 8, no. 3, 2022, doi: 10.1177/20563051221126085.
M. Guri, R. Puzis, K. K. R. Choo, S. Rubinshtein, G. Kedma, and Y. Elovici, “Using malware for the greater good: Mitigating data leakage,” Journal of Network and Computer Applications, vol. 145, no. September 2018, p. 102405, 2019, doi: 10.1016/j.jnca.2019.07.006.
Y. Wang, Y. Chen, F. Ye, H. Liu, and J. Yang, “Implications of smartphone user privacy leakage from the advertiser’s perspective,” Pervasive Mob Comput, vol. 53, pp. 13–32, 2019, doi: 10.1016/j.pmcj.2018.12.006.
R. Belen Saglam, J. R. C. Nurse, and D. Hodges, “Personal information: Perceptions, types and evolution,” Journal of Information Security and Applications, vol. 66, no. March, p. 103163, 2022, doi: 10.1016/j.jisa.2022.103163.
G. Heo and I. Doh, “Blockchain and differential privacy-based data processing system for data security and privacy in urban computing,” Comput Commun, vol. 222, no. April, pp. 161–176, 2024, doi: 10.1016/j.comcom.2024.04.027.
S. Gabrielli, S. Rizzi, O. Mayora, S. More, J. C. P. Baun, and W. Vandevelde, “Multidimensional Study on Users’ Evaluation of the KRAKEN Personal Data Sharing Platform,” 2022, mdpi.com. doi: 10.3390/app12073270.
M. T. B. Hoang, D. Dang-Pham, A. P. Hoang, B. Le Gia, and M. Nkhoma, “Network Analytics for Improving Students’ Cybersecurity Awareness in Online Learning Systems,” Proceedings - 2020 RIVF International Conference on Computing and Communication Technologies, RIVF 2020, 2020, doi: 10.1109/RIVF48685.2020.9140781.
S. D. Rosadi, A. Noviandika, R. Walters, and F. R. Aisy, “Indonesia’s personal data protection bill, 2020: does it meet the needs of the new digital economy?,” International Review of Law, Computers and Technology, vol. 37, no. 1, pp. 78–90, 2023, doi: 10.1080/13600869.2022.2114660.
Unduhan
Diterbitkan
Cara Mengutip
Terbitan
Bagian
Lisensi
Hak Cipta (c) 2025 Camilia Indah Novia Taufik, Agus Juhana

Artikel ini berlisensi Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).























