PHISHING AWARENESS AND SECURITY CONCERNS: ANALYZING THE ROLE OF ANTI-PHISHING KNOWLEDGE AND INTERNET EXPERIENCE IN ONLINE BANKING USERS
Kesadaran akan Phishing dan Masalah Keamanan: Menganalisis Peran Pengetahuan Anti-Phishing dan Pengalaman Internet pada Pengguna Perbankan Online
DOI:
https://doi.org/10.24156/jikk.2025.18.2.121Keywords:
anti-phishing knowledge, influence of social engineering, internet experience, phishing awareness, security concernAbstract
Phishing has become Indonesia's most prevalent cybercrime from 2017 to 2022, primarily due to the collection of users' personal information. The purpose of this study is to examine how security concerns are impacted by social engineering, internet experience, anti-phishing expertise, and phishing awareness. The Technology Threat Avoidance Theory (TTAT) model lends credence to this study. A quantitative methodology was employed, conducted through online surveys. To enrich the discussion, six of these respondents participated in in-depth interviews as a complementary approach. Data analysis was performed using LISREL 8.80 and SPSS 26. The findings demonstrated that internet experience and anti-phishing knowledge significantly increased phishing awareness. Furthermore, security concerns were significantly impacted by anti-phishing expertise. The results of further analysis revealed that social engineering had no significant effect on phishing awareness. In addition, Internet experience did not significantly affect security concerns. Based on the research results, user understanding can be enhanced by creating educational media that can be disseminated via social media.
References
Ahmed, B., Zada, S., Zhang, L., Sidiki, S. N., Contreras-Barraza, N., Vega-Muñoz, A., & Salazar-Sepúlveda, G. (2022). The impact of customer experience and customer engagement on behavioral intentions: Does competitive choice matter? Frontiers in Psychology, 13, 1–14. https://doi.org/10.3389/fpsyg.2022.864841
Alahmad, M. (2020). Strengths and weaknesses of cognitive theory. Budapest International Research and Critics Institute-Journal (BIRCI-Journal), 3(3), 1584–1593. https://doi.org/10.33258/birci.v3i3.1088
Annur, C. M. (2022, August 23). Ada 5 ribu serangan phishing terjadi di RI pada kuartal II-2022, ini lembaga yang paling banyak diincar. Databoks – Katadata. Retrieved April 6, 2023, from https://databoks.katadata.co.id/datapublish/2022/08/23/ada-5-ribu-serangan-phishing-terjadi-di-ri-pada-kuartal-ii-2022-ini-lembaga-yang-paling-banyak-diincar
Asosiasi Penyelenggara Jasa Internet Indonesia. (2024, February 7). APJII jumlah pengguna internet Indonesia tembus 221 juta orang. https://apjii.or.id/berita/d/apjii-jumlah-pengguna-internet-indonesia-tembus-221-juta-orang
Anti-Phishing Working Group. (2020). Phishing activity trends report, 2nd quarter 2020. https://docs.apwg.org/reports/apwg_trends_report_q2_2020.pdf
Arachchilage, N. A. G., & Love, S. (2014). Security awareness of computer users: A phishing threat avoidance perspective. Computers in Human Behavior, 38, 304–312. https://doi.org/10.1016/j.chb.2014.05.046
Astuti, F., & Iswati, K. D. (2023). Hubungan karakteristik dan tingkat pengetahuan masyarakat Desa Welahan Wetan tentang penggunaan vitamin C sebagai pencegahan COVID-19. Damianus Journal of Medicine, 22(2), 88–97. Retrieved from https://ejournal.atmajaya.ac.id/index.php/damianus/article/view/4108
Azizah, S. N., Simanjuntak, M., & Muflikhati, I. (2022). Consumer complaint behaviour in Indonesia: Role of knowledge and self-confidence. Jurnal Ilmu Keluarga dan Konsumen, 15(1), 90–101. https://doi.org/10.24156/jikk.2022.15.1.90
Baral, G., & Arachchilage, N. A. G. (2019). Building confidence not to be phished through a gamified approach: Conceptualising user’s self-efficacy in phishing threat avoidance behaviour. In Proceedings of the 2019 Cybersecurity Cyberforensics Conference (CCC 2019) (pp. 102–110). IEEE. https://doi.org/10.1109/CCC.2019.000-1
Carpenter, D., Young, D. K., Barrett, P., & McLeod, A. (2019). Refining technology threat avoidance theory. Communications of the Association for Information Systems, 44, Article 22, 380-407. https://doi.org/10.17705/1cais.04422
Chen, X., Jiao, C., Ji, R., & Li, Y. (2021). Examining customer motivation and its impact on customer engagement behavior in social media: The mediating effect of brand experience. SAGE Open, 11(4), 1–16. https://doi.org/10.1177/21582440211052256
Darwis, D., Junaidi, A., & Wamiliana. (2019). A new approach of steganography using center sequential technique. Journal of Physics: Conference Series, 1338(1), 1–8. https://doi.org/10.1088/1742-6596/1338/1/012063
Dewi, M. A. C., & Farida, Y. (2018). Tingkat pengetahuan pasien rawat jalan tentang penggunaan antibiotika di Puskesmas Wilayah Karanganyar. JPSCR Journal of Pharmaceutical Sciences and Clinical Research, 3(1), 27. https://doi.org/10.20961/jpscr.v3i1.15102
Domingo, W. G., Nicolas, K., MIT, J. A. G., Lardizabal, E. N., Gonzales, V., & Cruz, A. D. (2022). Smsecurity: Security system and SMS notification cum face recognition. International Journal of Computer Science and Information Technology, 14(1). https://doi.org/10.5121/ijcsit.2022.141
Farhana, N., Zaharon, M., & Ali, M. M. (2021). Factors affecting awareness. Asia-Pacific Management Journal, 16(2), 409–444. http://doi.org/10.24191/APMAJ.V16i2-15
Ferreira, A., & Teles, S. (2019). Persuasion: How phishing emails can influence users and bypass security measures. International Journal of Human-Computer Studies, 125, 19–31. https://doi.org/10.1016/j.ijhcs.2018.12.004
Gavett, B. E., Zhao, R., John, S. E., Bussell, C. A., Roberts, J. R., & Yue, C. (2017). Phishing suspiciousness in older and younger adults: The role of executive functioning. PLoS One, 12(2), 1–16. https://doi.org/10.1371/journal.pone.0171620
Ge, Y., Lu, L., Cui, X., Chen, Z., & Qu, W. (2021). How personal characteristics impact phishing susceptibility: The mediating role of mail processing. Applied Ergonomics, 97, 14. https://doi.org/10.1016/j.apergo.2021.103526
Gultom, D. K., Arif, M., Azhar, M. E., & Mukmin. (2021). Peran mediasi brand satisfaction pada pengaruh self congruity terhadap brand loyalty. Jurnal Ilmu Manajemen dan Bisnis, 22(1), 72–85. https://doi.org/10.30596/jimb.v22i1.5633
Gupta, S., & Bashir, L. (2018). Social networking usage questionnaire: Development and validation. Turkish Online Journal of Distance Education, 19(4), 214–227. https://dergipark.org.tr/tr/download/article-file/556241
Hair, J. F., Black, W. C., Babin, B. J., & Anderson, R. E. (2019). Multivariate data analysis (8th ed.). Prentice Hall.
Huwaidi, M. Z., & Destya, S. (2022). Mencegah serangan rekayasa sosial dengan human firewall. Justin: Jurnal Sistem dan Teknologi Informasi, 10(1). https://doi.org/10.26418/justin.v10i1.44280
Kairupan, V. A., & Rahman, A. A. (2022). Analisis kesadaran cybersecurity pada pengguna media sosial di kalangan mahasiswa Kota Bandung. Jurnal Darma Agung, 30(1), 1164–1173. https://doi.org/10.46930/ojsuda.v30i1.3167
Fanasafa, I. (2022, March 25). Waspada! Kejahatan phishing mengintai anda. Direktorat Jenderal Kekayaan Negara. https://www.djkn.kemenkeu.go.id/kpknl-purwakarta/baca-artikel/14851/Waspada-Kehajatan-Phishing-Mengintai-Anda.html
Krombholz, K., Hobel, H., Huber, M., & Weippl, E. (2014). Advanced social engineering attacks. Journal of Information Security and Application, 22, 113–122. https://doi.org/10.1016/j.jisa.2014.09.005
Lee, Y. Y., Gan, C. L., & Liew, T. W. (2023). Thwarting instant messaging phishing attacks: The role of self-efficacy and the mediating effect of attitude towards online sharing of personal information. International Journal of Environmental Research and Public Health, 20(4), 23. https://doi.org/10.3390/ijerph20043514
Lestari, F., Rahmawati, R., & Martono, A. (2023). Hubungan karakteristik pasien terhadap pengetahuan dalam penggunaan obat antibiotik di Puskesmas Seginim Kabupaten Bengkulu Selatan. Bencoolen Journal of Pharmacy, 3(2), 3–15. Retrieved from https://ejournal.unib.ac.id/index.php/bjp/index
Muniandy, L., Muniandy, B., & Samsudin, Z. (2017). Cybersecurity behaviour among higher education students in Malaysia. Journal of Information Assurance & Cybersecurity, 1–13. https://doi.org/10.5171/2017.800299
e-Governance Academy Foundation. (n.d.). National cyber security index. Retrieved May 13, 2023, from https://ncsi.ega.ee/ncsi-index/?order=rank
Nurhafizha, D., Dianingati, R. S., & Annisa, E. (2023). Hubungan persepsi dengan perilaku penggunaan internet sebagai media pencarian informasi obat selama pandemi Covid-19 pada masyarakat di Kota Semarang. Jurnal Research in Pharmacy, 3(2), 83–91. https://ejournal2.undip.ac.id/index.php/generics/article/view/20057
Parsons, K., Butavicius, M., Delfabbro, P., & Lillie, M. (2019). Predicting susceptibility to social influence in phishing emails. International Journal of Human-Computer Studies, 128, 17–26. https://doi.org/10.1016/j.ijhcs.2019.02.007
Rahayu, I. L., Syarifa, R., Akmalia, L. R., Samosir, M. S., Puja Hanggrita, E., Muflikhati, I., & Simanjuntak, M. (2023). Willingness to share data pribadi dan kaitannya dengan penyalahgunaan data konsumen e-commerce di Indonesia: Pendekatan mixed methods. Jurnal Ilmu Keluarga dan Konsumen, 16(3), 274–287. https://doi.org/10.24156/jikk.2023.16.3.274
Ramadhan, A. Y., & Asandimitra, N. (2019). Determinants of financial management behavior of millennial generation in Surabaya. Jurnal Minds: Manajemen Ide dan Inspirasi, 6(2), 129. https://doi.org/10.24252/minds.v6i2.9506
Rao, K., Rao, R. S., Abraham, A., & Gabralla, L. A. (2022). Multilayer stacked ensemble learning model to detect phishing websites. IEEE Access, 10, 79543–79552. https://doi.org/10.1109/access.2022.3194672
Ribeiro, L., Guedes, I. S., & Cardoso, C. S. (2024). Which factors predict susceptibility to phishing? An empirical study. Computer and Security, 136, 12. https://doi.org/10.1016/j.cose.2023.103558
Rifai, A., Meliyani, A., Chyntia, P., & Sakti, I. A. (2023). Penerapan metode technology threat avoidance theory terhadap tingkat kesadaran data privasi pengguna media sosial. Journal of Information System Research (JOSH), 4(3), 1026-1032. https://doi.org/10.47065/josh.v4i3.3081
Sadya, S. (2023, March 28). Ada 164.131 kasus email phishing di Indonesia pada 2022. DataIndonesia.id. https://dataindonesia.id/digital/detail/ada-164131-kasus-email-phising-di-indonesia-pada-2022
Sakti, M. A. J., Achsani, N. A., & Syarifuddin, F. (2018). Online banking implementation: Risk mapping using ERM approach. Bulletin of Monetary Economics Bank, 20(3), 279–306. https://doi.org/10.21098/bemp.v20i3.824
Saputri, W. L. (2021). Karakteristik pengguna dan pemanfaatan internet pada penduduk bekerja di Kota Samarinda. BESTARI: Buletin Statistik dan Aplikasi Terkini, 1(2), 79–87. https://bestari.bpskaltim.com/index.php/bestari-bpskaltim/article/view/36
Schoenmakers, K., Greene, D., Stutterheim, S., Lin, H., & Palmer, M. J. (2023). The security mindset: Characteristics, development, and consequences. Journal of Cybersecurity, 9(1), 1–15. https://doi.org/10.1093/cybsec/tyad010
Session, W., & Muller, S. R. (2022). Technology threat avoidance factors affecting cybersecurity professionals' willingness to share information. Annals of Computer Science and Information Systems, 34, 209–213.
Soto, P., Monila, A. F., Lopez, C. C., & Colomo, N. R. (2015). The effect of information overload and disorganisation on intention to purchase online. Online Information Review, 38(4), 543–561. https://doi.org/10.1108/OIR-01-2014-0008
Urdea, A. M., & Constantin, C. P. (2021). Exploring the impact of customer experience on customer loyalty in e-commerce. Proceedings of the International Conference on Business Excellence, 15(1), 672–682. https://doi.org/10.2478/picbe-2021-0063
Verkijika, S. F. (2019). If you know what to do, will you take action to avoid mobile phishing attacks: Self-efficacy, anticipated regret, and gender. Computers in Human Behavior, 101, 286–296. https://doi.org/10.1016/j.chb.2019.07.034
Wijaya, A. S., Rohimi, U. E., & Asyifah, A. (2023). The effect of information security systems on service quality in e-commerce systems. Journal of World Science, 2(4), 566–570. https://doi.org/10.58344/jws.v2i4.276
Wu, X., Zhou, Z., & Chen, S. (2024). A mixed-methods investigation of the factors affecting the use of facial recognition as a threatening AI application. Internet Research, 34(5), 1872-1897. https://doi.org/10.1108/intr-11-2022-0894
Wulandari, A., Rahman, F., Pujianti, N., Sari, A. R., Laily, N., Anggraini, L., Muddin, F. I., Ridwan, A. M., Anhar, V. Y., Azmiyannoor, M., et al. (2021). Hubungan karakteristik individu dengan pengetahuan tentang pencegahan coronavirus disease 2019 pada masyarakat di Kecamatan Pungging Mojokerto. Jurnal Kesehatan Masyarakat Indonesia, 4(1), 46–51. https://doi.org/10.52646/snj.v4i1.97
Zhang, A. B. J. A. K. T. (2016). Towards a unified customer experience in online shopping environments: Antecedents and outcomes. International Journal of Quality and Service Science, 8(1), 102–119. https://doi.org/10.1108/IJQSS-07-2015-0054
Downloads
Published
Issue
Section
License
Authors submitting manuscripts should understand and agree that copyright of manuscripts published are held Jurnal Ilmu Keluarga dan Konsumen. The statement to release the copyright to Jurnal Ilmu Keluarga dan Konsumen is stated in Copyright Release Form. Copyright encompass exclusive rights to reproduce, to distribute, and to sell any part of the journal articles in all form and media. The reproduction of any part of this journal is allowed with a written permission from Jurnal Ilmu Keluarga dan Konsumen.




