{"dcterms:modified":"2023-09-30","dcterms:creator":"A Dataverse Instance","@type":"ore:ResourceMap","@id":"https://dataverse.telkomuniversity.ac.id/api/datasets/export?exporter=OAI_ORE&persistentId=doi:10.34820/FK2/3Y61SN","ore:describes":{"Alternative URL":"https://www.iieta.org/journals/ijsse/paper/10.18280/ijsse.120212","Title":"Analysis of Behavioral and Information Security Awareness among Users of Zoom Application in COVID-19 Era","Subject":"Business and Management","Deposit Date":"2023-03-31","citation:Depositor":"CANDIWAN, CANDIWAN","citation:Description":{"dsDescription:Text":"Accepted: 6 April 2022 Behavior in using inappropriate technology and low level of individual awareness causes a high risk of cybercrime. This study aims to see the behavior and awareness of information security among users of the Zoom application, especially in the COVID-19 era in Indonesia. The measurement scales used in this study were RBS (Risky Behavior Scale), CBS (Conservative Behavior Scale), EOS (Exposure Offence Scale), and RPS (Risk Perception Scale). This research used an online questionnaire to collect data with 400 respondents. Data analysis techniques used the Independent Sample T-Test, Mann Whitney, One Way Anova, Krusskal Wallis, Tukey, Pairwise Comparison, and Spearman Rank, which were processed using the SPSS program. The results showed significant differences between demographics on behavior and information security awareness. Daily Internet usage time influenced behavior and awareness of information security. Security behavior and awareness of information security are essential to determine the risks due to behavior and lack of awareness of information security. The most important findings in this study can be used as a reference in designing information security training. Further studies are expected to add other variables such as psychography, geography, or other users of different video conferencing applications such as Google Meet, Microsoft Team, and Webex.","dsDescription:Date":"2022-04-06"},"Related Publication":{"ID Type":"doi","ID Number":"https://doi.org/10.18280/ijsse.120212","URL":"https://www.iieta.org/journals/ijsse/paper/10.18280/ijsse.120212"},"citation:Keyword":{"keyword:Term":"information security behavior, information security awareness, zoom video conference, COVID-19"},"Author":{"author:Name":"CANDIWAN, CANDIWAN","author:Affiliation":"Fakultas Ekonomi dan Bisnis : KK ICT Based Management (IBM)","Identifier Scheme":"ScopusID","Identifier":"56288812200"},"citation:Contact":{"datasetContact:Name":"CANDIWAN, CANDIWAN","datasetContact:Affiliation":"Fakultas Ekonomi dan Bisnis : KK ICT Based Management (IBM)","datasetContact:E-mail":"candiwan@telkomuniversity.ac.id"},"@id":"doi:10.34820/FK2/3Y61SN","@type":["ore:Aggregation","schema:Dataset"],"schema:version":"1.0","schema:datePublished":"2023-09-29","schema:name":"Analysis of Behavioral and Information Security Awareness among Users of Zoom Application in COVID-19 Era","schema:dateModified":"Fri Sep 29 23:57:40 WIB 2023","schema:license":"https://creativecommons.org/publicdomain/zero/1.0/","dvcore:fileTermsOfAccess":{"dvcore:fileRequestAccess":false},"schema:includedInDataCatalog":"CANDIWAN CANDIWAN Dataverse","ore:aggregates":[{"schema:description":"Data set for : analysis of behavioral and information security awareness among users of zoom application in COVID-19 era","schema:name":"Data Bersih 3 Maret 2021.xlsx","dvcore:restricted":false,"schema:version":2,"dvcore:datasetVersionId":725,"@id":"doi:10.34820/FK2/3Y61SN/GLNQ0W","schema:sameAs":"https://dataverse.telkomuniversity.ac.id/api/access/datafile/:persistentId?persistentId=doi:10.34820/FK2/3Y61SN/GLNQ0W","@type":"ore:AggregatedResource","schema:fileFormat":"application/vnd.openxmlformats-officedocument.spreadsheetml.sheet","dvcore:filesize":12181503,"dvcore:storageIdentifier":"file://187368c7a4e-562bcb1f4eac","dvcore:rootDataFileId":-1,"dvcore:checksum":{"@type":"MD5","@value":"ecdb0f417dd54ab9e7710480349ff780"}}],"schema:hasPart":["doi:10.34820/FK2/3Y61SN/GLNQ0W"]},"@context":{"Alternative URL":"https://schema.org/distribution","Author":"http://purl.org/dc/terms/creator","Deposit Date":"http://purl.org/dc/terms/dateSubmitted","ID Number":"http://purl.org/spar/datacite/ResourceIdentifier","ID Type":"http://purl.org/spar/datacite/ResourceIdentifierScheme","Identifier":"http://purl.org/spar/datacite/AgentIdentifier","Identifier Scheme":"http://purl.org/spar/datacite/AgentIdentifierScheme","Related Publication":"http://purl.org/dc/terms/isReferencedBy","Subject":"http://purl.org/dc/terms/subject","Title":"http://purl.org/dc/terms/title","URL":"https://schema.org/distribution","author":"https://dataverse.org/schema/citation/author#","citation":"https://dataverse.org/schema/citation/","datasetContact":"https://dataverse.org/schema/citation/datasetContact#","dcterms":"http://purl.org/dc/terms/","dsDescription":"https://dataverse.org/schema/citation/dsDescription#","dvcore":"https://dataverse.org/schema/core#","keyword":"https://dataverse.org/schema/citation/keyword#","ore":"http://www.openarchives.org/ore/terms/","schema":"http://schema.org/"}}