Analysis of Cybersecurity Awareness Among Social Media Users Among Teenagers Using Exploratory Factor Analysis (EFA) & Confirmatory Factor Analysis (CFA) Methods

DOI: https://doi.org/10.33650/jeecom.v7i2.11407

Authors (s)


(1) * Sofia Angela   (Nahdlatul Ulama University of Blitar)  
        Indonesia
(2)  Muhamat Maariful Huda   (Nahdlatul Ulama University of Blitar)  
        Indonesia
(3)  Rizqi Darma Rusdiyan   (Nahdlatul Ulama University of Blitar)  
        Indonesia
(*) Corresponding Author

Abstract


Nowadays, security awareness is very important for social media users, especially teenagers. Many users become victims of cybercrime due to the lack of education about cybersecurity awareness. This case began with many complaints submitted by teenagers from SMP Negeri 2 Ngoro, one of whom was a victim of cybercrime on Instagram social media whose account was hijacked by unknown individuals. This also happens on WhatsApp social media where there are criminals who steal someone's identity to be used as a victim and commit fraudulent money transfers, credit and other fraud. The purpose of this study was to assess and ensure the level of cybersecurity awareness among the three most significant social media platforms in Indonesia, namely WhatsApp, Instagram, and TikTok. The Exploratory Factor Analysis (EFA) and Confirmatory Factor Analysis (CFA) methods were used to analyze the online survey data set. The EFA results obtained were 6.67% insignificant in one of the factors contained in the knowledge variable and 93.33% EFA results stated significant. Meanwhile, the CFA calculation results obtained 80% results which were stated as Fit, indicating that the model accurately represented the data, 20% of the CFA calculation results stated Moderate Fit because they reflected values that were almost close to the fit value.


Keywords

cybercrime; social media; Exploratory Factor Analysis; Confirmatory Factor Analysis; awareness



Full Text: PDF



References


R. Rosnawati, U. N. Yogyakarta, I. Artikel, E. Test, and J. Education, “ANALISIS EXPLORATORY FACTOR ANALYSIS ( EFA ) PADA,” vol. 12, no. 3, pp. 70–76, 2024.

S. E. M. S. Dr. Sigit Hermawan and S. E. M. M. Amirullah, METODE PENELITIAN BISNIS: Pendekatan Kuantitatif & Kualitatif. Media Nusa Creative (MNC Publishing), 2021. [Online]. Available: https://books.google.co.id/books?id=tHNMEAAAQBAJ

M. F. Arkanuddin, M. A. Firmansyah, M. B. Fakhruddin, C. H. Dewani, and T. E. Kridaningsih, “The Analysis Of Satisfaction On Digital Business Sector: Expectation Confrimation Model Validation,” EKOMBIS Rev. J. Ilm. Ekon. dan Bisnis, vol. 11, no. 2, pp. 1781–1800, 2023, doi: 10.37676/ekombis.v11i2.4843.

L. Ambarwati and A. Saikhu, “ANALISIS EFEKTIVITAS APLIKASI MYITS THESIS MENGGUNAKAN CONFIRMATORY FACTOR ANALYSIS UNTUK PENINGKATAN LAYANAN PENYELENGGARAAN UJIAN PADA PROGRAM DOKTOR ILMU KOMPUTER ANALYSIS OF THE EFFECTIVENESS OF THE MYITS THESIS APPLICATION USING CONFIRMATORY FACTOR A,” vol. 9, no. 2, pp. 175–188, 2024.

J. E. FoEh, K. I. Meutia, and R. Basuki, “Faktor-Faktor Yang Mempengaruhi Kinerja Karyawan RSUD S.K. Lerik Kota Kupang,” J. Kaji. Ilm., vol. 21, no. 3, pp. 275–292, 2021, doi: 10.31599/jki.v21i3.701.

R. Priyanda et al., Metodologi Penelitian Kuantitatif. Pradina Pustaka, 2022. [Online]. Available: https://books.google.co.id/books?id=B5t1EAAAQBAJ

N. Suriani, Risnita, and M. S. Jailani, “Konsep Populasi dan Sampling Serta Pemilihan Partisipan Ditinjau Dari Penelitian Ilmiah Pendidikan,” J. IHSAN J. Pendidik. Islam, vol. 1, no. 2, pp. 24–36, 2023, doi: 10.61104/ihsan.v1i2.55.

T. Setiadi et al., Sistem Informasi Cyber Security. CV. Gita Lentera, 2024. [Online]. Available: https://books.google.co.id/books?id=ExALEQAAQBAJ

G. Rahmadi and A. R. Pratama, “Analisis Kesadaran Cyber Security pada Kalangan Pelaku e-Commerce di Indonesia,” Automata, vol. 1, no. 2, p. 7, 2020, [Online]. Available: https://journal.uii.ac.id/AUTOMATA/article/view/15399

V. A. Kairupan and A. A. Rahman, “Analisis Kesadaran Cybersecurity Pada Pengguna Media Sosial Di Kalangan Mahasiswa Kota Bandung,” J. Darma Agung, vol. 30, no. 1, p. 1164, 2022, doi: 10.46930/ojsuda.v30i1.3167.

M. W. A. Prastya, M. Tahir, A. A. Ningrum, and A. P. Zaibintoro, “Analisis Ancaman Pishing melalui Aplikasi WhatsApp : Review Metode Studi Analisis Ancaman Pishing melalui Aplikasi WhatsApp : Review Metode Studi Literatur,” no. May, 2024, doi: 10.32672/jnkti.v7i3.7551.

N. F. Utami and N. Yuliati, “Pemanfaatan Media Sosial Instagram sebagai Media Informasi,” Bandung Conf. Ser. Public Relations, vol. 2, no. 2, 2022, doi: 10.29313/bcspr.v2i2.3334.

Y. H. Pratama, “The Role of Multimedia Platforms in Education : A Study on TikTok Usage by Generation Z,” vol. 2, no. 2, pp. 58–63, 2024.

Princen, D. Sugianto, and E. J. Simanjuntak, “Pengembangan Skala Cyberchondria Versi Pendek,” J. Penelit. dan Pengukuran Psikol. JPPP, vol. 13, no. 1, pp. 34–42, 2024, doi: 10.21009/jppp.131.05.

L. Bognár and L. Bottyán, “Evaluating Online Security Behavior: Development and Validation of a Personal Cybersecurity Awareness Scale for University Students,” Educ. Sci., vol. 14, no. 6, 2024, doi: 10.3390/educsci14060588.

Sulistiyanto S, Hadits N. Helm Cerdas Pendeteksi Gas Berbasis IoT untuk Keselamatan Pekerja Tambang. Akiratech. 2025 Jun 17;2(2):40-7.


Dimensions, PlumX, and Google Scholar Metrics

10.33650/jeecom.v7i2.11407


Refbacks

  • There are currently no refbacks.


Copyright (c) 2025 sofia angela

 
This work is licensed under a Creative Commons Attribution License (CC BY-SA 4.0)

Journal of Electrical Engineering and Computer (JEECOM)
Published by LP3M Nurul Jadid University, Indonesia, Probolinggo, East Java, Indonesia.