Abstract

The penetration of Indonesian internet users in first quarter of 2020 has increased by 17 percent compared to 2019. Based on Google Consumer Barometer in 2018, many 79% of Internet users in Indonesia use the internet on a daily basis. During the Covid-19 Pandemic, universities had to do Study From Home and Work From Home. This resulted, use of information technology and computers also increasing. This increase will have an impact on the level of cybercrime vulnerability. The scale of cyber vulnerability is needed to measure level of cybersecurity in universities, especially in data managers. There are five scales, Very Safe, Safe, Vulnerable, Very Vulnerable, and Dangerous. Where the scale is used in negative and positive statements. The measurement results show an average value of 3.3 or a vulnerable scale. Total average value of negative statements is 2.53 or scale close to vulnerability. So it is necessary to socialize the importance of cybersecurity to minimize occurrence of cybercrime.

Highlights

  • The penetration of internet users in Indonesia has always increased every year

  • Research released by Hotsuite and We Are Social in January 2020 states that the number of internet users in Indonesia has reached 175.4 million people

  • Based on the Google Consumer Barometer in 2018, 79% of Internet users in Indonesia use the internet on a daily basis [2]

Read more

Summary

INTRODUCTION

The penetration of internet users in Indonesia has always increased every year. Research released by Hotsuite and We Are Social in January 2020 states that the number of internet users in Indonesia has reached 175.4 million people. The existence of Work From Home (WFH) and Study From Home (SFH) causes an increase in Indonesia internet uses for the first quarter of 2020. College database manager, an administrator must understand the importance of data and information security in using computer devices. If not, it will result in the inability of the agency to deal with cybercrime. With the existence of cybersecurity behavior assessment, it can be a reference for increasing cyberattack awareness in College. This paper is an attempt to provide an overview of relevant theories and principles, and provides insights including an interdisciplinary framework that incorporates behavioral cybersecurity

LITERATURE REVIEW
College or University Data Center
Using free-to-access public Wi-Fi
AND DISCUSSION
Behavior of Using Smartphone Devices
Analysis of Using Password Behavior
Analysis of Data and Information Access Behavior
Analysis of Using Smartphone Behavior
Findings
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call