PELATIHAN LITERASI KEAMANAN DIGITAL (ANTI-PHISHING & PASSWORD HYGIENE) BAGI CIVITAS AKADEMIKA
Keywords:
literasi keamanan digital; phishing; password hygiene; civitas akademika; ketahanan siber.Abstract
Transformasi digital di lingkungan pendidikan tinggi meningkatkan efisiensi layanan akademik sekaligus memperluas risiko keamanan siber, khususnya serangan phishing dan lemahnya praktik pengelolaan kata sandi (password hygiene). Faktor manusia menjadi titik lemah utama dalam insiden pelanggaran data, sehingga peningkatan literasi keamanan digital bagi civitas akademika merupakan kebutuhan strategis. Penelitian ini bertujuan untuk menganalisis efektivitas pelatihan Literasi Keamanan Digital (Anti-Phishing dan Password Hygiene) dalam meningkatkan pengetahuan, sikap, dan perilaku keamanan digital. Penelitian menggunakan pendekatan kuantitatif dengan desain quasi-experimental melalui model pretest–posttest control group. Instrumen penelitian meliputi kuesioner literasi keamanan digital, simulasi identifikasi phishing, serta evaluasi praktik password hygiene. Data dianalisis menggunakan uji perbedaan rata-rata untuk mengidentifikasi signifikansi peningkatan sebelum dan sesudah pelatihan. Hasil penelitian menunjukkan adanya peningkatan signifikan pada seluruh indikator literasi keamanan digital setelah pelatihan, dengan nilai signifikansi (p < 0,05) dan kategori peningkatan tinggi. Temuan ini menegaskan bahwa pelatihan berbasis simulasi dan praktik langsung efektif dalam membangun kesadaran, kompetensi, serta perilaku protektif civitas akademika terhadap ancaman siber. Oleh karena itu, program pelatihan literasi keamanan digital direkomendasikan sebagai strategi preventif berkelanjutan untuk memperkuat ketahanan digital institusi pendidikan tinggi.
Downloads
References
Beck, U. (1992). Risk society: Towards a new modernity. Sage Publications.
Carayon, P., & Smith, M. J. (2000). Work organization and ergonomics. Applied Ergonomics, 31(6), 649–662. https://doi.org/10.1016/S0003-6870(00)00040-5
Deci, E. L., & Ryan, R. M. (2000). The “what” and “why” of goal pursuits: Human needs and self-determination of behavior. Psychological Inquiry, 11(4), 227–268. https://doi.org/10.1207/S15327965PLI1104_01
Google & Harris Poll. (2024). Password security & authentication trends report. Google Safety Center.
Kolb, D. A. (1984). Experiential learning: Experience as the source of learning and development. Prentice Hall.
Microsoft Security. (2024). Digital defense report. Microsoft Corporation.
Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change. The Journal of Psychology, 91(1), 93–114. https://doi.org/10.1080/00223980.1975.9915803
Schein, E. H. (2010). Organizational culture and leadership (4th ed.). Jossey-Bass.
Slovic, P., Finucane, M. L., Peters, E., & MacGregor, D. G. (2002). The affect heuristic. In T. Gilovich, D. Griffin, & D. Kahneman (Eds.), Heuristics and biases: The psychology of intuitive judgment (pp. 397–420). Cambridge University Press. https://doi.org/10.1017/CBO9780511808098.025
Sweller, J. (1988). Cognitive load during problem solving: Effects on learning. Cognitive Science, 12(2), 257–285. https://doi.org/10.1207/s15516709cog1202_4
Verizon. (2025). Data breach investigations report (DBIR). Verizon Enterprise.
Anti-Phishing Working Group (APWG). (2024). Phishing activity trends report. https://apwg.org
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Juandana Kawuladini Putra, Lilis Setiyoningsih

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
1. Copyright on any article is retained by the author(s).
2. The author grants the journal, right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work’s authorship and initial publication in this journal.
3. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal’s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
4. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
5. The article and any associated published material is distributed under the Creative Commons Attribution-ShareAlike 4.0 International License



