CONFIRMATORY FACTOR ANALYSIS (CFA) MODEL PENERIMAAN TEKNOLOGI BERBASIS KEAMANAN INFORMASI

Wenni Syafitri

Abstract


Sistem Informasi Akademik (SMART) merupakan sebuah inovasi di dalam proses akademik di Universitas Lancang Kuning. Seluruh aktivitas akademik dilakukan pada sistem tersebut. Berdasarkan kondisi tersebut, smart merupakan aset penting universitas lancang kuning. Permasalahan yang timbul yaitu bagaimanakah sikap pengguna terhadap awareness informasi yang ada pada pada smart, terutama ditinjau dari aspek keamanan informasi.

Penelitian ini menggunakan metode confirmatory factor analysis (CFA) untuk dapat menguji information security policy awareness, general awareness, perceived ease of use, intention to use information system security, percieved usefulness, management support dan subjective norm. Setiap variabel diuji dengan t-value, cronbach alpha, reliability (Composite / Construct Reliability dan Average Variance Extracted serta penilaian model CFA dengan menggunakan 19 pengujian  model fit.

Model CFA yang diusulkan telah berhasil melewati berbagai pengujian seperti nilai masing variabel telah melebihi pengujian t-value yaitu > |1,9|, nilai cronbach alpha hasil pengujian adalah 0.946 serta Model CFA telah lulus 14 pengujian dari 19 pengujian model fit. Model penelitian terkendala pada  pengujian chi-square (p-value), NCP (non-centrality parameter), AGFI (Adjusted Goodness of Fit Index) , GFI (goodness of fit index) and CN (critical n).


Full Text:

PDF

References


Bagozzi, R. P., & Yi, Y. (1988). On the Evaluation of Structure Equation Models. Journal of the Academy of Marketing Sciece, 16(1), 74–94.

Bartels, F. L., Giao, H. N. K., & Ohlenburg, T. J. (2006). ASEAN Multinational Enterprises: A Structural Model Analysis of Strategic Coherence. Asean Economic Bulletin, 23(2), 171–191. https://doi.org/10.1355/AE23-2C

Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness. MIS Quarterly, 34(3), 523–548. https://doi.org/10.1093/bja/aeq366

Crespo, Á. H., del Bosque, I. R., & de los Salmones Sánchez, M. M. G. (2009). The influence of perceived risk on Internet shopping behavior: a multidimensional perspective. Journal of Risk Research, 12(2), 259–277. https://doi.org/10.1080/13669870802497744

Fan, J., & Zhang, P. (2011). Study on E-government information misuse based on General Deterrence Theory. 8th International Conference on Service Systems and Service Management - Proceedings of ICSSSM’11. https://doi.org/10.1109/ICSSSM.2011.5959454

Gliem, J. A., & Gliem, R. R. (2003). Calculating, Interpreting, And Reporting Cronbach’s Alpha Reliability Coefficient For Likert-Type Scales. In Midwest Research to Practice Conference in Adult, Continuing, and Community Education (pp. 82–88). https://doi.org/10.1109/PROC.1975.9792

Gould, J. E., Macharis, C., Haasis, H.-D., Gould, J. E., & Haasis, H.-D. (2010). Emergence of security in supply chain management literature Introduction and overview. J Transp Secur, 3, 287–302. https://doi.org/10.1007/s12198-010-0054-z

Hooper, D., Coughlan, J., & Mullen, M. (2008). Structural Equation Modelling : Guidelines for Determining Model Fit Structural equation modelling : guidelines for determining model fit. Electronic Journal of Business Research Methods, 6(1), 53–60. https://doi.org/10.1037/1082-989X.12.1.58

Ifinedo, P. (2012). Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers and Security, 31(1), 83–95. https://doi.org/10.1016/j.cose.2011.10.007

Jones, C. M., McCarthy, R. V, & Halawi, L. (2010). Utilizing the Technology Acceptance Model to Assess the Employee Adoption of Information Systems Security Measures. Journal of International Technology and Information Management, 19(2), 43–56.

Kanat, I. E., & Ozkan, S. (2009). Explaining Citizen Adoption of Government To Citizen Services : a Model Based on Theory of Planned Behaviour ( Tbp ). European and Mediterranean Conference on Information Systems 2009, 2009, 1–12.

Lippert, S. K. (2007). Investigating postadoption utilization: An examination into the role of interorganizational and technology trust. IEEE Transactions on Engineering Management, 54(3), 468–483. https://doi.org/10.1109/TEM.2007.900792

Lu, C. T., & Zhu, D. S. (2010). The study on the determinants of the online consumers’ intention to return. Proceedings - 9th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2010, 289–294. https://doi.org/10.1109/ICIS.2010.88

Overby, J., & Suvanujasiri, A. (2012). A Second Order Confirmatory Factor Analysis Of A Leadership Competency Model: An Empirical Study Conducted In Thailand. The Journal of Applied Business Research, 28(5), 1073–1084.

Prybutok, V. R., & Kappelman, L. a. (2001). IS-MBNQA : A NEW FRAMEWORK FOR THE RELATIONSHIP BETWEEN INFORMATION SYSTEMS AND ORGANIZATIONAL QUALITY Hyonsong Chong , B . S ., MBA Dissertation Prepared for the Degree of DOCTOR OF PHILOSOPHY December 2001 APPROVED : Chang E Koh , Committee Member Maliy.

Rahmatina, D. (2014). PEMODELAN STRUCTURAL EQUATION MODELLING PADA DATA ORDINAL DENGAN MENGGUNAKAN METODE WEIGHTED LEAST SQUARE ( WLS ). SNM, 1–10.

Schmidt, M. C., & Kolodinsky, J. M. (2007). Microenterprise Development Program Success: a Path Analysis of Factors That Lead To and Mediate Client Success. Journal of Developmental Entrepreneurship, 12(1), 47–69. https://doi.org/10.1142/S1084946707000551

Sit, W.-Y., Ooi, K.-B., Lin, B., & Chong, A. Y.-L. (2009). TQM and customer satisfaction in Malaysia’s service sector. Industrial Management & Data Systems, 109(7), 957–975. https://doi.org/10.1108/02635570910982300

Sun, H. (2010). Journal of the Association for Information Sellers ’ Trust and Continued Use of Online Marketplaces * Sellers & Trust and Continued Use of Online. Journal of the Association for Information Systems, 11(4), 182–211.

Sun, Q., Wang, C., & Cao, H. (2009). An Extended TAM for Analyzing Adoption Behavior of Mobile Commerce. 2009 8th International Conference on Mobile Business, 52–56. https://doi.org/10.1109/ICMB.2009.16

Tang, J. T. E., & Chihui, C. (2009). Perceived innovativeness, perceived convenience and TAM: Effects on mobile knowledge management. 3rd International Conference on Multimedia and Ubiquitous Engineering, MUE 2009, 413–420. https://doi.org/10.1109/MUE.2009.75

Tohidinia, Z., & Mosakhani, M. (2010). Knowledge sharing behaviour and its predictors. Industrial Management & Data Systems, 110(4), 611–631. https://doi.org/10.1108/02635571011039052

Wang, Q. (2006). ASYMMETRICAL BUYER-SUPPLIER RELATIONSHIPS: THE ROLE OF PERCEIVED BENEVOLENCE. UNIVERSITY OF FLORIDA.

Xu, Z., Zhang, C., & Ling, H. (2008). Examining User Acceptance of Mobile Services. 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing, 1–4. https://doi.org/10.1109/WiCom.2008.2147

Zhao, W., Liu, J., Ye, D., & Wei, J. (2013). Mining user daily behavior patterns from access logs of massive software and websites. Proceedings of the 5th Asia-Pacific Symposium on Internetware - Internetware ’13, 1–4. https://doi.org/10.1145/2532443.2532462


Refbacks

  • There are currently no refbacks.


Copyright (c) 2017 Jurnal Sains dan Teknologi Industri



FAKULTAS SAINS DAN TEKNOLOGI
UIN SUSKA RIAU

Kampus Raja Ali Haji
Gedung Fakultas Sains & Teknologi UIN Suska Riau
Jl.H.R.Soebrantas No.155 KM 18 Simpang Baru Panam, Pekanbaru 28293
Email: sitekin[at]uin-suska[dot]ac[dot]id
© 2015 SITEKIN, ISSN 2407-0939
Free counters!
Creative Commons License
SITEKIN by http://ejournal.uin-suska.ac.id/index.php