CONFIRMATORY FACTOR ANALYSIS (CFA) MODEL PENERIMAAN TEKNOLOGI BERBASIS KEAMANAN INFORMASI
DOI:
https://doi.org/10.24014/sitekin.v14i2.4126Abstract
Sistem Informasi Akademik (SMART) merupakan sebuah inovasi di dalam proses akademik di Universitas Lancang Kuning. Seluruh aktivitas akademik dilakukan pada sistem tersebut. Berdasarkan kondisi tersebut, smart merupakan aset penting universitas lancang kuning. Permasalahan yang timbul yaitu bagaimanakah sikap pengguna terhadap awareness informasi yang ada pada pada smart, terutama ditinjau dari aspek keamanan informasi.
Penelitian ini menggunakan metode confirmatory factor analysis (CFA) untuk dapat menguji information security policy awareness, general awareness, perceived ease of use, intention to use information system security, percieved usefulness, management support dan subjective norm. Setiap variabel diuji dengan t-value, cronbach alpha, reliability (Composite / Construct Reliability dan Average Variance Extracted serta penilaian model CFA dengan menggunakan 19 pengujian model fit.
Model CFA yang diusulkan telah berhasil melewati berbagai pengujian seperti nilai masing variabel telah melebihi pengujian t-value yaitu > |1,9|, nilai cronbach alpha hasil pengujian adalah 0.946 serta Model CFA telah lulus 14 pengujian dari 19 pengujian model fit. Model penelitian terkendala pada pengujian chi-square (p-value), NCP (non-centrality parameter), AGFI (Adjusted Goodness of Fit Index) , GFI (goodness of fit index) and CN (critical n).
References
Bagozzi, R. P., & Yi, Y. (1988). On the Evaluation of Structure Equation Models. Journal of the Academy of Marketing Sciece, 16(1), 74–94.
Bartels, F. L., Giao, H. N. K., & Ohlenburg, T. J. (2006). ASEAN Multinational Enterprises: A Structural Model Analysis of Strategic Coherence. Asean Economic Bulletin, 23(2), 171–191. https://doi.org/10.1355/AE23-2C
Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness. MIS Quarterly, 34(3), 523–548. https://doi.org/10.1093/bja/aeq366
Crespo, Á. H., del Bosque, I. R., & de los Salmones Sánchez, M. M. G. (2009). The influence of perceived risk on Internet shopping behavior: a multidimensional perspective. Journal of Risk Research, 12(2), 259–277. https://doi.org/10.1080/13669870802497744
Fan, J., & Zhang, P. (2011). Study on E-government information misuse based on General Deterrence Theory. 8th International Conference on Service Systems and Service Management - Proceedings of ICSSSM’11. https://doi.org/10.1109/ICSSSM.2011.5959454
Gliem, J. A., & Gliem, R. R. (2003). Calculating, Interpreting, And Reporting Cronbach’s Alpha Reliability Coefficient For Likert-Type Scales. In Midwest Research to Practice Conference in Adult, Continuing, and Community Education (pp. 82–88). https://doi.org/10.1109/PROC.1975.9792
Gould, J. E., Macharis, C., Haasis, H.-D., Gould, J. E., & Haasis, H.-D. (2010). Emergence of security in supply chain management literature Introduction and overview. J Transp Secur, 3, 287–302. https://doi.org/10.1007/s12198-010-0054-z
Hooper, D., Coughlan, J., & Mullen, M. (2008). Structural Equation Modelling : Guidelines for Determining Model Fit Structural equation modelling : guidelines for determining model fit. Electronic Journal of Business Research Methods, 6(1), 53–60. https://doi.org/10.1037/1082-989X.12.1.58
Ifinedo, P. (2012). Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers and Security, 31(1), 83–95. https://doi.org/10.1016/j.cose.2011.10.007
Jones, C. M., McCarthy, R. V, & Halawi, L. (2010). Utilizing the Technology Acceptance Model to Assess the Employee Adoption of Information Systems Security Measures. Journal of International Technology and Information Management, 19(2), 43–56.
Kanat, I. E., & Ozkan, S. (2009). Explaining Citizen Adoption of Government To Citizen Services : a Model Based on Theory of Planned Behaviour ( Tbp ). European and Mediterranean Conference on Information Systems 2009, 2009, 1–12.
Lippert, S. K. (2007). Investigating postadoption utilization: An examination into the role of interorganizational and technology trust. IEEE Transactions on Engineering Management, 54(3), 468–483. https://doi.org/10.1109/TEM.2007.900792
Lu, C. T., & Zhu, D. S. (2010). The study on the determinants of the online consumers’ intention to return. Proceedings - 9th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2010, 289–294. https://doi.org/10.1109/ICIS.2010.88
Overby, J., & Suvanujasiri, A. (2012). A Second Order Confirmatory Factor Analysis Of A Leadership Competency Model: An Empirical Study Conducted In Thailand. The Journal of Applied Business Research, 28(5), 1073–1084.
Prybutok, V. R., & Kappelman, L. a. (2001). IS-MBNQA : A NEW FRAMEWORK FOR THE RELATIONSHIP BETWEEN INFORMATION SYSTEMS AND ORGANIZATIONAL QUALITY Hyonsong Chong , B . S ., MBA Dissertation Prepared for the Degree of DOCTOR OF PHILOSOPHY December 2001 APPROVED : Chang E Koh , Committee Member Maliy.
Rahmatina, D. (2014). PEMODELAN STRUCTURAL EQUATION MODELLING PADA DATA ORDINAL DENGAN MENGGUNAKAN METODE WEIGHTED LEAST SQUARE ( WLS ). SNM, 1–10.
Schmidt, M. C., & Kolodinsky, J. M. (2007). Microenterprise Development Program Success: a Path Analysis of Factors That Lead To and Mediate Client Success. Journal of Developmental Entrepreneurship, 12(1), 47–69. https://doi.org/10.1142/S1084946707000551
Sit, W.-Y., Ooi, K.-B., Lin, B., & Chong, A. Y.-L. (2009). TQM and customer satisfaction in Malaysia’s service sector. Industrial Management & Data Systems, 109(7), 957–975. https://doi.org/10.1108/02635570910982300
Sun, H. (2010). Journal of the Association for Information Sellers ’ Trust and Continued Use of Online Marketplaces * Sellers & Trust and Continued Use of Online. Journal of the Association for Information Systems, 11(4), 182–211.
Sun, Q., Wang, C., & Cao, H. (2009). An Extended TAM for Analyzing Adoption Behavior of Mobile Commerce. 2009 8th International Conference on Mobile Business, 52–56. https://doi.org/10.1109/ICMB.2009.16
Tang, J. T. E., & Chihui, C. (2009). Perceived innovativeness, perceived convenience and TAM: Effects on mobile knowledge management. 3rd International Conference on Multimedia and Ubiquitous Engineering, MUE 2009, 413–420. https://doi.org/10.1109/MUE.2009.75
Tohidinia, Z., & Mosakhani, M. (2010). Knowledge sharing behaviour and its predictors. Industrial Management & Data Systems, 110(4), 611–631. https://doi.org/10.1108/02635571011039052
Wang, Q. (2006). ASYMMETRICAL BUYER-SUPPLIER RELATIONSHIPS: THE ROLE OF PERCEIVED BENEVOLENCE. UNIVERSITY OF FLORIDA.
Xu, Z., Zhang, C., & Ling, H. (2008). Examining User Acceptance of Mobile Services. 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing, 1–4. https://doi.org/10.1109/WiCom.2008.2147
Zhao, W., Liu, J., Ye, D., & Wei, J. (2013). Mining user daily behavior patterns from access logs of massive software and websites. Proceedings of the 5th Asia-Pacific Symposium on Internetware - Internetware ’13, 1–4. https://doi.org/10.1145/2532443.2532462
Downloads
Published
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License
Copyright Notice
An author who publishes in the SITEKIN Journal agrees to the following terms:
- Author retains the copyright and grants the journal the right of first publication of the work simultaneously licensed under the Creative Commons Attribution-ShareAlike 4.0 License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal
- Author is able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book) with the acknowledgement of its initial publication in this journal.
- Author is permitted and encouraged to post his/her work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of the published work (See The Effect of Open Access).
Read more about the Creative Commons Attribution-ShareAlike 4.0 Licence here: https://creativecommons.org/licenses/by-sa/4.0/.